cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 649 Documents
Content Analysis to Detect the Role Behaviors of Student in Online Discussion Erlin .; Rahmiati .; Unang Rio
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (763.449 KB) | DOI: 10.11591/eecsi.v1.362

Abstract

Online discussion is a powerful way to conduct online conversation and a significant component of online learning. Online discussion can provide a platform for online learners to communicate with one another easily, without the constraint of place and time. In an online discussion, the students communicate a common interest, exchange information, share ideas, and assist each other in text/transcript form. So far, content analysis is a popular method for analyzing transcripts. However, using content analysis in computer supported collaborative learning (CSCL) or computer mediated communication (CMC) research focused on the surface of the transcripts. Usually, content analysis is employed to categorize news article, product reviews and web pages. Therefore, this study proposed content analysis to a deeper level is to detect the role behavior of students in an online discussion based on a conversation in text form. The findings showed that this method provides more meaningful students’ interaction analysis in term of information on communication transcripts in online discussion. Educators can assess the contribution of students and can detect the role behavior of the student based on their conversation in transcript form; whether the role behavior as a mediator, motivator, informer, facilitator, or as a questioner.
Adding Synonyms To A Concept In An Ontology Herlina Jayadianti; Lukito Edi Nugroho; Paulus Insap Santosa; Wahyu Widayat; Carlos Alberta Baptista Sousa Pinto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1229.475 KB) | DOI: 10.11591/eecsi.v1.363

Abstract

The purpose of this paper is to provide research based understanding of adding sinonyms to a concept in an ontology. We hypothesize that managing synonyms with a good taxonomy and a good integration process are good approaches to organize and share knowledge. This paper can give a discourse to a group of people in different societies that want to share data using different concepts in the same domain. We will generate a common set of terms based on the terms of several different storage devices, used by different societies, in order to make data retrieval independent of the different perceptions and terminologies used by those societies. We use ontologies to represent the particular knowledge of each society and integration techniques to find relations between terms used in those ontologies.
Summarizing Text for Indonesian Language by Using Latent Dirichlet Allocation and Genetic Algorithm Silvia .; Pitri Rukmana; Vivi Regina Aprilia; Derwin Suhartono; Rini Wongso; Meiliana .
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (734.636 KB) | DOI: 10.11591/eecsi.v1.364

Abstract

The number of documents progressively increases especially for the electronic one. This degrades effectivity and efficiency in managing them. Therefore, it is a must to manage the documents. Automatic text summarization is able to solve by producing text document summaries. The goal of the research is to produce a tool to summarize documents in Bahasa: Indonesian Language. It is aimed to satisfy the user’s need of relevant and consistent summaries. The algorithm is based on sentence features scoring by using Latent Dirichlet Allocation and Genetic Algorithm for determining sentence feature weights. It is evaluated by calculating summarization speed, precision, recall, F-measure, and some subjective evaluations. Extractive summaries from the original text documents can represent important information from a single document in Bahasa with faster summarization speed compared to manual process. Best F-measure value is 0,556926 (with precision of 0.53448 and recall of 0.58134) and summary ratio of 30%.
Analysis and Identification of Data Heterogeneity on Learning Environment Using Ontology Knowledge Arda Yunianta; Norazah Yusof; Abdul Aziz; Nataniel Dengen; Mohd Shahizan Othman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1073.609 KB) | DOI: 10.11591/eecsi.v1.365

Abstract

Heterogeneity on learning environment is about different data and applications to support a learning process in education institutions. Distributed and various systems on learning environment is the current issues to produce big and heterogeneity data problem. A lot of relationships are formed between elements on learning environment. The element on learning environment consists of learning data, learning applications, data sources, learning concept, and data heterogeneity aspect on learning environment. These elements are interrelated and produce complex relationship between each other. A complex relationship problem between elements on learning environment makes a process of analysis and identification difficult to be done. Existing method to drawing this heterogeneity problem make confuse and misunderstanding readers. To solved this problem, researcher using ontology knowledge to describe and draw a semantic relationship that represent the complexity of data relationship on learning environment. The result of this analysis is to develop ontology knowledge to solve complexity relationship on learning environment, and also to help reader’s better understanding the complex relationship between elements on learning environment.
Online Data Stream Learning and Classification with Limited Labels Loo Hui Ru; Trias Andromeda; M. N. Marsono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.855 KB) | DOI: 10.11591/eecsi.v1.366

Abstract

Mining data streams such as Internet traffic andnetwork security is complex. Due to the difficulty of storage, datastreams analytics need to be done in one scan. This limits thetime to observe stream feature and hence, further complicatesthe data mining processes. Traditional supervised data miningwith batch training natural is not suitable to mine data streams.This paper proposes an algorithm for online data streamclassification and learning with limited labels using selective selftrainingsemi-supervised classification. The experimental resultsshow it is able to achieve up to 99.6% average accuracy for 10%labeled data and 98.6% average accuracy for 1% labeled data. Itcan classify up to 34K instances per second.
CAPBLAT Development and Testing: Computer-Assisted Assessment Tool for Problem Based Learning Muhammad Qomaruddin; Azizah Abdul Rahman; Noorminshah A. Iahad
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (837.401 KB) | DOI: 10.11591/eecsi.v1.367

Abstract

Recent years, Computer-Assisted Assessment (CAA) has become increasingly important in education. This is indicated by many researches that focused on the development of computer-based assessment tool to help assess performances of students from various disciplines. This study contributes to education area with the research on the development of innovative computer-based tool for Problem-Based Learning (PBL) assessment. A web-based assessment tool, named CAPBLAT, has been developed. The tool incorporates some methods of PBL assessment process which framed within “Problem-Based Learning Assessment Framework”. The tool has been created for evaluating students’ achievements on the PBL approach. This paper presents the development and user acceptance test of the CAPBLAT. The study utilizes the tool within two PBL classes as a medium for testing in the duration of one semester. A total of forty students participated in the testing of the tool. During the study, questionnaires were administered to students. The results concerning the assessment tool acceptance demonstrate that students showed positive feedback and accepted the usage of CAPBLAT for the PBL assessment process. It is also proved that the use of CAA in PBL gives advantages for both of lecturers and students by providing them with detailed formative feedback on their learning achievements compared to conventional assessment. It also reduces lecturer’s tedious load by automating parts of the task of marking students’ work.
Evaluating Students’ Learning Experiences Using Course Management System in a Blended Learning Marva Mirabolghasemi; Noorminshah A. Iahad; Muhammad Qomaruddin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (837.902 KB) | DOI: 10.11591/eecsi.v1.368

Abstract

One of the major software used in today’s classroom are Course Management Systems (CMS). There is currently little research regarding the learning experience of students using CMS like Moodle in a blended learning environment. Effective learning environments give students a chance to learn better and faster. Understanding the students’ learning experience in a blended course using a CMS is the first step to determine how to best engage students. It assumes that good learning environments are achieved through three factors which are Cognitive Presence, Teaching Presence, and Social Presence. This study used a set of questionnaire to evaluate students’ learning experience for 107 students in blended learning. Correlation analysis has been used to find the relationship between Cognitive Presence, Teaching Presence, Social Presence and learning experience of students who use CMS in blended learning. The findings of this research study show that there is a significant correlation among Cognitive Presence, Teaching Presence, Social Presence and the overall learning experience using Moodle in blended learning. However, the level of Social Presence is lower in comparison with Teaching Presence and Cognitive Presence.
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard Mu’awya Naser; Rahmat Budiarto; Ismat Aldmour; Pedro Peris Lopez
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (760.264 KB) | DOI: 10.11591/eecsi.v1.369

Abstract

In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks.
Authentication Login E-Library with Multimodal Biometrics System Pandapotan Siagian; Kurniabudi .; Erick Fernando; Herry Mulyono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (888.44 KB) | DOI: 10.11591/eecsi.v1.370

Abstract

Previous studies with the title of the login authentication e-library with method of CBIR for matching face, have proved reaching the level of accuracy about 75%. This multiple verification of QR-code/QR-CMBS this process data among other things the identity ID, fingerprint patterns and pattern signatures. Each user can have a QR-CMBS, which is used to login to the e-library. This research-oriented system development with application authentication login with QR code/QR-QR, Data of the CMBS will store data from bineri identity ID, fingerprint patterns and pattern signatures.The advantage of Retrieval CBIR is the popularity and test result with a high degree of accuracy and time parameters. The results obtained from QR-CMBS every training, i.e. classify and determine the value of fingerprint patterns and signatures for each label. Feature extraction results are temporarily stored in the session database and compare the features that are stored in the database image classification. The most similar classification results will be displayed, i.e. QR-CMBS, fingerprints and signatures, as well as verification of login. The application login authentication system of e-library uses to calculate the similarity of this research, will be able to extract the feature of colour, texture and edge of a multiple verification of QR-code/ QR-CMBS, fingerprint and signature by using the Prewitt gradient. The result of the extraction process feature is then used by the software in the learning process and calculates the similarity. Learning image contained in 3 classes features a picture that is stored in the database query 100 png images and the image of the sample test with the size 400 x 400. The results showed that the combination of the Prewitt filter extraction gradient magnitude. Verification data classification compared to the three classes, namely QR-CMBS, fingerprints and signatures contained in the database. Response time to find the most CMBS-QR is similar to 10 sample data, giving the effect of a higher degree of accuracy that is 97%.
Enhancement of FMIPv6 by Utilising Concurent Binding Update Process Ismat Aldmour; Lelyzar Siregar; Thair Al Dala’in; Rahmat Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (794.184 KB) | DOI: 10.11591/eecsi.v1.371

Abstract

The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6.

Page 4 of 65 | Total Record : 649