Fauhan Handay Pugar, Sultan Muzahidin, A. M. Arymurthy
{"title":"Copy-Move Forgery Detection Using SWT-DCT and Four Square Mean Features","authors":"Fauhan Handay Pugar, Sultan Muzahidin, A. M. Arymurthy","doi":"10.1109/ICEEI47359.2019.8988905","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988905","url":null,"abstract":"Image forgery detection is challenging to solve, especially in blind image forgery detection. Copy-move forgery is a common and popular method in image forgery. Copy-move forgery become more challenging to detect with addition of post-processing operation in the image. In this paper, the proposed methodology is copy-move detection with Stationary Wavelet Transform (SWT), Discrete Cosine Transform (DCT), and Four-Square Mean Features. SWT is used because it enables to handle various kind of post-processing operation. Likewise, DCT has many advantages such as the lower dimension and robust to various attacks. The proposed methodology is evaluated using CoMoFoD dataset and the performance are measured using precision, recall, and F1-scores. The result reveal that the methodology is successful in detecting duplicated region and robust against brightness change, contrast adjustment, image blurring, and color reduction.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Afini Natrah Mohd Ashril, D. P. Dahnil, S. Abdullah
{"title":"Wi-Fi Based Smart Home Prototype Development","authors":"Nur Afini Natrah Mohd Ashril, D. P. Dahnil, S. Abdullah","doi":"10.1109/ICEEI47359.2019.8988871","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988871","url":null,"abstract":"Internet of Things (IoT) is a technology which enables computing devices, physical and virtual objects/devices to be connected to the internet so that users can control and monitor devices. In this paper, a smart home prototype is build using the IoT technology architecture framework. The prototype uses Wi-Fi module for connectivity to a server that is located in the cloud. Wi-Fi connectivity is used because it is a must have utility that exist in each home nowadays. The prototype includes four major components which are electronics components of the system, the cloud server, a processor with built in Wi-Fi module and a mobile application that is designed for user interaction and monitoring of the electronic components in the house. The prototype is tested for its reliability inside the campus area. The results shows that the prototype is reliable in term of performing its major function of controlling the electronics components from the mobile application such as switching the LED and fan with a coverage area of 300 meters within the university campus.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increase Activity Time Efficiency in Official Documents Management using Blockchain-based Distributed Data Storage","authors":"Ahmad Zaky, I. B. Nugraha","doi":"10.1109/ICEEI47359.2019.8988882","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988882","url":null,"abstract":"In general, the electronic official documents system is designed with a centralized system and managed by each government agency, so that data and records of official documents process activities are stored in a centralized database and managed by a single organizational unit. However, there are some disadvantages of this centralized system, especially in the workflow of official documents that involve more than one organizational unit. i.e. dependence on third parties which is the sole authority of the official documents data management. If there is a system failure there is a certain period of time, it will increase the activity cycle time and decrease activity time efficiency in the official documents business process. The blockchain-based solution described in this paper is to avoid the occurrence of delay times during the activity cycle time in business processes when a system failure occurs which can cause a decrease in activity time efficiency. Blockchain makes the official documents system become “Trusless Operation” with each participant of different organizational unit having a copy of transaction data through a consensus mechanism. The simulation results show that our system can reduce time delay in activity cycle time during a system failure as long as the number of faulty peers within the tolerance limit so that it can increase the activity time efficiency.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mutia Fadhila Putri, N. C. Harahap, Shelly Pramudiawardani, D. I. Sensuse, Mochammad Aricf Hcrmawan Sutoyo
{"title":"Usage Intention Model for Mobile Health Application: Uses and Gratification Perspective","authors":"Mutia Fadhila Putri, N. C. Harahap, Shelly Pramudiawardani, D. I. Sensuse, Mochammad Aricf Hcrmawan Sutoyo","doi":"10.1109/ICEEI47359.2019.8988801","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988801","url":null,"abstract":"There is a need to improve the health status of the Indonesian people. Health information technology (HIT) like mobile health (mHealth) has the potential to improve health conditions and the quality of health services for all Indonesian people. However, the adoption rate of mHealth applications in Indonesia is still lower than other application categories. This study aims to investigate several factors or characteristics that motivate people consumption of mHealth from Uses and Gratification perspectives. The methodology used in this research is a mixed method that includes in-depth interviews and online questionnaires. The gratification factors investigated in this study were divided into three categories: Hedonic Gratification, Utilitarian Gratification, and Social Gratification. The Gratification factors was validated with questioners and identified the most significant factor is Utilitarian Gratification which was approved by 51% of respondents, and this is affected from the ease of use and information aspects which can fulfill user needs and effect on continuous intention using mHealth.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132162782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Direct and Indirect Current Control Algorithms for Shunt Active Power Filter","authors":"N. A. Rahman, N. Nasir, R. Baharom","doi":"10.1109/ICEEI47359.2019.8988823","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988823","url":null,"abstract":"This paper presents a study on the development and simulation of two current control algorithms for a single-phase Shunt Active Power Filter (SAPF) operation. These current control algorithms are developed using two control strategies namely as direct and indirect current control strategies. Both current control algorithms are called Direct Current Control (DCC) algorithm and Indirect Current Control (ICC) algorithm. The operation of the SAPF using DCC and ICC algorithms are analysed in MATLAB/Simulink; to determine which current control algorithm is capable to boost up the steady-state performance of the SAPF in compensating harmonic currents. This work considers two cases of study. The first one is to study the performance of the SAPF under different percentages of full-load current, whilst, the second case is to study the performance of the SAPF when it is connected to different types of non-linear load. The SAPF performance is assessed by analysing the Total Harmonic Distortion (THD) value of instantaneous supply currents. From simulation results, it can be claimed that the SAPF using the DCC algorithm inherits better performance (in compensating harmonic currents) than using the ICC algorithm. Selected simulation results are presented to verify the hypothesis.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117141290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dian Rusdiyanto, Fikri Faisal Adli, Nusriyati Mahmudah, C. Apriono, F. Zulkifli
{"title":"Design of Point-to-Point Optical Fiber for Digital Video Broadcasting Television in Jakarta","authors":"Dian Rusdiyanto, Fikri Faisal Adli, Nusriyati Mahmudah, C. Apriono, F. Zulkifli","doi":"10.1109/ICEEI47359.2019.8988793","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988793","url":null,"abstract":"Information technology has been growing along with increasing information needs, including television. In Indonesia, television technology is in shifting to implement the digital system, by single multiplexing, multi multiplexing or hybrid. All of them allow television stations to transmit their broadcast to a central provider that is an authorized multiplexing operator. Based on that background, this paper presents a point-to-point design of optical fiber routes for supporting digital television in Jakarta. The considered paths consist of 20 lines, which is from broadcasters to the central provider (TVRI). The analysis considers parameters of link loss budget and rise-time budget as Quality of Service (QoS) with 70% of the non-return-zero modulation scheme. From our proposed design, the total loss of all routes and rise-time from all paths is under maximum allowable loss, that is 29 dBm, and rise time. Based on the results of these two parameters, this proposed design is reliable to be applied.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115478802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization of Codes and Code Smells with 3D Mushroom Farm Metaphor","authors":"Anandhini Medianty Nababan, B. Hendradjaya","doi":"10.1109/ICEEI47359.2019.8988796","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988796","url":null,"abstract":"Code visualization presents a visual representation of the state of the code to support code comprehension activities. In addition to representing code elements (for example, methods, classes and packages) and relationships between them, previous studies of code visualization also represent metrics to indicate code smell. However, the metric value only shows vague symptoms in describing the code smell behind it. This study tries to visualize the code smell directly using detection strategies, which are formulation of one or more than one metric and its threshold value for each type of code smell. ‘Smelly’ elements are immediately shown in code visualization according to the predetermined detection strategies. 3D mushroom farm metaphor is a new metaphor proposed in this study for code visualization. Through code visualization in a familiar natural 3D environment, code properties are displayed in an attractive manner. The presented code properties are chosen by considering object-oriented paradigm key ideas. During this time, there has never been a fundamental reason as to why a specific property was chosen to be included in a code visualization metaphor. Therefore, this study questioned code properties visualized to participants of the evaluation: is the early comprehension of the code sufficient enough or should it be added/reduced. The evaluation results showed that the code smell that was immediately shown in the visualization could be captured by the user correctly. All evaluated participants managed to identify all the smelly elements. Broadly speaking, participants understood the purpose of visualization and agreed that code visualization with the 3D mushroom farm metaphor is intuitive and easy to use. All participants stated that they needed all code properties displayed in code visualization with the 3D mushroom farm metaphor, although there were participants who proposed several properties to be added to the visualization.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126906951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management of Debtor Information System At Bank XYZ Using OCTAVE Allegro Method","authors":"J. Suroso, Ari Januanto, A. Retnowardhani","doi":"10.1109/ICEEI47359.2019.8988890","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988890","url":null,"abstract":"Risk assessment as part of the risk management of the debtor information system is conducted to assess how possible threats and vulnerabilities to the debtor's information system and assets. This study aims to analyze risk on the debtor information system at Bank XYZ, while the evaluation and analysis process is more focused on the management of critical assets owned by the bank. The analysis was carried out using the OCTAVE Allegro (Operationally Critical Threat, Assets and Vulnerability Evaluation) method. It is expected that this analysis will get the final results in the form of recommendations about the steps that must be taken to protect and manage the debtor information system critical assets at Bank XYZ.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Savira Latifah Hanum, Muhammad Arzaki, Yanti Rusmawati
{"title":"Knowledge Representation of Political Parties' Ideological Characteristics Using Formal Concept Analysis","authors":"Savira Latifah Hanum, Muhammad Arzaki, Yanti Rusmawati","doi":"10.1109/ICEEI47359.2019.8988789","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988789","url":null,"abstract":"We build a knowledge representation of ideological characteristics of political parties. In particular, we propose a knowledge representation regarding the ideological characteristics of Indonesia's political parties in the 2019 general election. Our proposed knowledge base is constructed using the rigorous approach of Formal Concept Analysis (FCA). We first define several formal contexts specifying the ideological characteristics satisfied by the associated political parties. These formal contexts are then used to construct the pictorial relationship among political parties' ideologies in the form of concept lattice. From this lattice, we also derived implications and association rules pertaining to the relationship between two or more ideological characteristics. These implications and association rules are useful for building the ontology of Indonesia's Political Parties ideological characteristics.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127275403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of COCOMO II Model to Increase the Accuracy of Effort Estimation","authors":"W. Sunindyo, Chintia Rudiyanto","doi":"10.1109/ICEEI47359.2019.8988909","DOIUrl":"https://doi.org/10.1109/ICEEI47359.2019.8988909","url":null,"abstract":"Effort estimation is one of the most important activities in the software development project, because the project managers need to bea able to estimate the amount of cost and time for developing software. There are several techniques and models that can be used to estimate effort such as COCOMO, COCOMO II, SLIM, SEER-SEM. One method that is widely used for effort estimation is COCOMO II. COCOMO II model is an improvement of COCOMO '81 model. However, COCOMO II estimation results are still not satisfying in terms of accuracy. To improve the accuracy of COCOMO II, many researchers are trying to combine COCOMO II with other methods. In this paper, we propose to combine COCOMO II with K-Means clustering method to improve the accuracy. K-Means clustering is used to determine the data that will be used in the COCOMO II calibration process. The COCOMO II calibration aims to determine the new A and B constant values based on software project dataset. Based on the results of the study, it can be concluded that the accuracy of the proposed method generally increased compared to the original COCOMO II model. The value of accuracy depends on the preprocessing technique performed and the number of clusters. The best accuracy is achieved when the preprocessing technique used is to multiply cost driver attributes by 100 and number of clusters is 5. This proposed method can reduce the value of MRE COCOMO II from 1.32 to 0.85 and increase the value of PRED (0.3) from 32% to 54% for COCOMO NASA 2 dataset and Turkish Software Industry.","PeriodicalId":236517,"journal":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}