cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 144 Documents
Search results for , issue "Vol 5: EECSI 2018" : 144 Documents clear
Comparative Analysis of Forensic Software on Android-based Blackberry Messenger using NIJ Framework Imam Riadi; Sunardi Sunardi; Arizona Firdonsyah
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1255.105 KB) | DOI: 10.11591/eecsi.v5.1615

Abstract

Instant Messaging application is the most widely used application all over the world. Blackberry Messenger is a multiplatform instant messaging with lots of features that can be a magnet for many people to use Blackberry Messenger for commiting digital crimes. In the process of investigating digital crime cases, digital evidences are required. To obtain digital evidence, a set of forensic tools are needed to conduct forensic process on physical evidences. The topic of this research is to describe the forensic process and to compare the current forensic tools used based on acquired digital evidences by using method that refers to mobile device forensic guidelines made by the National Institute of Justice (NIJ). The forensic tools used in this research are Magnet AXIOM, Belkasoft Evidence Center, and MOBILedit Forensic Express. The outcome shows that Magnet AXIOM has the highest capability to obtain digital evidences, Belkasoft Evidence Center has superiority in terms of data text acquisition, and MOBILedit Forensic Express has superiority in physical evidence preserving and cloning.
Learning Motivation increased due to a Relaxed Assessment in a Competitivee-Learning Environment Muhammad Said Hasibuan; Onno W Purbo
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (354.929 KB) | DOI: 10.11591/eecsi.v5.1616

Abstract

In this work, e-learning is used to increase learners 'motivation and competence in addition to learning complementary environment. This work is based on of the 7-years of hybrid e-learning classes on Operating System, Computer Network, Network Security, Network Management subjects at 3 Indonesian universities, namely, Surya University, STKIP Surya, and IBI Darmajaya. Most of STKIP Surya's students are from Papua and need more attention and motivation than others. Relaxed assessment processes are performed on each module in addition to mid term and final exams. On average, there are 12-18 modules in each subject matter. To motivate the learners, they may perform as many exams as ones' wish to attained the highest possible mark within the semester on all exams and quizzes. Relaxed assessment processes to attained maximum grades seems to increase the learners' motivation as some learners' retrying in exceeding 50 times for the 100 questions final shown in the Level of Competency (LoC) measurement. In addition, to anticipate, any cheating, eliminate remedial and cost savings, all exams are done on moodle via web. Such method of a whole semester relaxed assessment equipped with about 2000-6000 questions bank per subject and is for the first time performed in Indonesia. This study is also found an increase in the majority of learner's understanding on the subject is very good without remedial. Thus, e-learning seems not only complement learning processes but also able to motivate and to improve the competence of learners as well creating healthy competitive environment among learners.
Optimal ANFIS Model for Forecasting System Using Different FIS Deasy Adyanti; Dian Candra Rini Novitasar; Ahmad Hanif Asyhar; Fajar Setiawan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.341 KB) | DOI: 10.11591/eecsi.v5.1617

Abstract

Adaptive Network Based Fuzzy Inference System (ANFIS) using time series analize is one of intelligent systems that can be used to predict with good accuracy in all fields like in meteorology. However, some research about forecasting has less emphasis on the structure of the FIS ANFIS. Thus, in this paper, the optimization of the ANFIS model for predicting maritime weather is carried out by analyzing the appropriate initialization determinations of the three fuzzy Inference structures ANFIS which includes FIS structure 1 (grid partition), FIS structure 2 (subtractive clustering) and FIS structure 3 (fuzzy c-means clustering). In this paper, the variable input used are two hours (t-2) and one hour (t-1) before, and data at that time (t), and the output of this system is the prediction of next hour, six hours, twelve hours and next day of variable ocean currents velocity (cm/s) and wave height (m) using the three FIS ANFIS approaches. Based on the smallest goal error (RMSE and MSE) of the three FIS ANFIS approaches used to predict the ocean currents speed (velocity) and wave height, the model is best generated by subtractive clustering. It can be seen that subtractive clustering produces the smallest RMSE and MSE error values of other FIS structure.
Development of Mobile Based Educational Game as a Learning Media for Basic Programming in VHS Hakkun Elmunsyah; Gradiyanto Radityo Kusumo; Utomo Pujianto; Didik Dwi Prasetya
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.229 KB) | DOI: 10.11591/eecsi.v5.1618

Abstract

The purpose of this research is to develop mobile based education game which will be used as the learning media of basic programming for grade X VHS student as well as to know the its eligibility level. The developed education game consists of four basic programming competencies. This learning media is developed using ADDIE model with waterfall model for the flow development. The validation process involved 2 material experts, 1 media expert, and two groups of eligibility testing. The type of data is qualitative and quantitative with the method of data collection is questionnaire. The measurement uses five scale of likert. This study concluded that the developed educational game are valid and eligible to be used as a basic programming learning media.
Incident and Service Request Management for Academic Information System based on COBIT Indra Kharisma Raharjana; Ibnu Ibadillah; Purbandini Purbandini; Eva Hariyanti
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.569 KB) | DOI: 10.11591/eecsi.v5.1619

Abstract

This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related Technologies (COBIT) framework as basis for determining the activities in Incident and Service Request Management. The COBIT itself is an IT governance framework included incident handling and service requests, also providing incident response and service request decisions. The software will be developed as a proof of concept that it brings benefits to academic service operations. For most academic services in university, encountered a problem such as incidents reports or a request for services are not immediately addressed, took a long time to respond, or even lost and left unreadable. It is a good idea to standardize incident management and plant it into academic information systems to enforce its application. In software development, we perform five development stages: requirement analysis, system design, stakeholder confirmation, system development, and system evaluation. In requirement analysis stages, we elicited features from activity describe in COBIT and customize it based on interviews and observation. We design use case diagram, use case scenario and database design in system design stages. In stakeholder confirmation stages, a meeting with the stakeholders held and discuss whether the system complies with the requirements or not. system adaptations are made to answer stakeholders concern. System development is conducted based on confirmed system design. Stakeholder evaluated after they follow the case simulation session. Stakeholders provide an evaluation of the system according to their role, based on their experience when using the system in the simulation session. User experience (UX) aspects are also evaluated based on user's interaction with the system. User experience results obtained meet all aspects, including useful, usable, desirable, findable, accessible, credible, and valuable. The evalu.
Arm Robot Manipulator Design and Control for Trajectory Tracking; a Review Hendra Marta Yudha; Tresna Dewi; Pola Risma; Yurni Oktarina
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (295.988 KB) | DOI: 10.11591/eecsi.v5.1620

Abstract

Arm robot manipulator heavily applied in industries ranging from welding, pick-and-place, assembly, packaging, labeling, etc. Trajectory planning and tracking is the fundamental design of an arm robot manipulator. The trajectory is set and determined to satisfy a certain criterion effectively and optimally. Optimization of robot trajectory is necessary to ensure the good quality product and to save energy, and this optimization can be provided by the right modeling and design. This paper presents a review study of arm-robot manipulator design and control for trajectory tracking by investigating the modeling of an arm robot manipulator starting from kinematics, dynamics and the application of the more advanced methods. The idea of this paper comes from the popularity of inverse kinematics among students.
A New Method for Minimizing the Unnecessary Handover in High-Speed Scenario Hoe Tung Yew; Muhammad Haikal Satria; Rindu Nurma Illahi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (404.489 KB) | DOI: 10.11591/eecsi.v5.1621

Abstract

The application of Wireless Local Area Network (WLAN) is limited to indoor or pedestrian walking speed environment because the small WLAN coverage will lead to the growth of unnecessary handover rate in high-speed scenario. The previously proposed traveling distance prediction based handover methods assumed mobile terminal (MT) travels at a constant speed is impractical as most of the MTs may not be traveling at constant speed in real environment. These methods have poor performance in case of acceleration because MT will leave the network earlier than the estimated time. In this paper, a new traveling distance prediction based handover scheme that is aware of MT's speed changes is proposed to overcome the limitation of the existing methods. The proposed scheme is adapted to the MT velocity and acceleration or deceleration rate. The numerical result shows that the performance of the proposed scheme is better than the existing handover methods in high-speed scenario. It keeps the probability of unnecessary handover within the user acceptable level in high-speed scenario.
Applying IT Services Business Relationship Management on Security Outsource Company Indra Kharisma Raharjana; Susmiandri Susmiandri; Army Justitia
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.452 KB) | DOI: 10.11591/eecsi.v5.1622

Abstract

Most outsource security companies have not implemented information technology optimally. A company must implement information technology that is oriented to customers and stakeholders to be competitive. Outsourcing security companies need to apply a systematic approach for managing customer-oriented services. In this study, we implemented business relationship management based on Information Technology Infrastructure Library (ITIL) framework to develop a service strategy, especially for an outsourced security company. There are 5 stages of activities carried out, namely identifying stakeholders, defining business outcomes, establishing strategic and funding requirements, defining business cases, and validating business activity patterns. Verification and revision of customer requirement analysis are performed to validate and evaluate the results. The result of implementing business relationship management is the recommendations of four IT services that suits the organization. The four IT service recommendations are websites, CRM services, monitoring services, and ordering services. Business case documents for each service have been created to identify business impacts and risks.
Automate Snort Rule For Xss Detection With Honeypot Syaifuddin Syaifuddin; Diah Risqiwati; Hanugra Sidharta
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.911 KB) | DOI: 10.11591/eecsi.v5.1623

Abstract

In modern era, data become precious and important, if there is occurrence data leakage will cause high damage to business, data loss will impact on loosing profit. To avoiding that, organization need equip with updated security tools for protect data and network from malicious software and hacker attack. As computer network growing day by day, security become important role to preventing from attack from outside and inside network. Unfortunetely, new vulnerability finds almost every day, resulting increment number of intrusion and attack. Meanwhile each intrusion and attack have different pattern and behavior, continuous development on intrusion detection is mandatory. In 2011, most attack associate with XSS, 12.58% attack is XSS followed by Denial of Service (DOS) 8.06%.
Improvement of Cluster Importance Algorithm with Sentence Position for News Summarization Nur Hayatin; Gita Indah Marthasari; Syadza Anggraini
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (704.002 KB) | DOI: 10.11591/eecsi.v5.1624

Abstract

Text summarization is one of the ways to reduce large document dimension to obtain important information from the document. News is one of information which usually has several sub-topics from a topic. In order to get the main information from a topic as fast as possible, multi-document summarization is the solution, but sometimes it can create redundancy. In this study, we used cluster importance algorithm by considering sentence position to overcome the redundancy. Stages of cluster importance algorithm are sentence clustering, cluster ordering, and selection of sentence representative which will be explained in the subsections below. The contribution of this research was to add the position of sentence in the selection phase of representative sentence. For evaluation, we used 30 topics of Indonesian news tested by using ROUGE-1, there were 2 news topics that had different ROUGE-1 score between using cluster importance algorithm by considering sentence position and using cluster importance. However, those 2 news topics which used cluster importance by considering sentence position have a greater score of Rouge-1 than the one which only used cluster importance. The use of sentence position had an effect on the order of sentence on each topic, but there were only 2 news topics that affected the outcome of the summary.

Page 4 of 15 | Total Record : 144