Documente Academic
Documente Profesional
Documente Cultură
P R O C E E D I N G S
Tangerang - Indonesia
Published by
CCIT Journal, Indonesia
The Association of Computer and Informatics Higher Learning Instituition in Indonesia (APTIKOM) and
STMIK Raharja Tangerang Section
Personal use of this material is permitted. However, permition on reprint/republish this material for
advestising or promotional or for creating new collective work for resale or redistribution to servers or lists,
or to reuse any copyrighted component of this work in other works must be obtained form the Publisher
CD Conference Proceedong
CCIT Catalog Number:
ISSN: 1978 8282
Technically Co-Sponsored by
National Council Informatioan Techonology Of Indonesia
Raharja Enrichment Centre (REC)
The Institutional of Information Communication and Technology
Digital Syinztizer Laboratory of Computers system Processing
Contents
Steering Committee
- Message from Steering Committee
Programme Committee
Organizing Committee
10
Paper Participants
13
Revievwers
17
- Panel of Reviewers
18
Keynote Speeches
19
20
31
Paper
32
Author Index
284
Schedule
286
Location
288
Steering Committee
Chairman:
R. Eko Indrajit, Prof.
(ABFI Institute, Perbanas)
Steering Committee
Chairman:
R. Eko Indrajit, Prof.
Co Chairman:
Zainal A. Hasibuan, Ph.D
(University of Indonesia)
Members:
Tri Kuntoro Priyambodo, M.Sc.
Members:
Rangga Firdaus, M.Kom.
Members:
Arief Andi Soebroto, ST.
Members:
Tommy Bustomi, M.Kom.
(Lampung University)
(Brawijaya University)
Members:
Yusuf Arifin, MT.
Members:
Once Kurniawan, MM.
Members:
Achmad Batinggi, MPA.
Members:
Philipus Budy Harianto
(Pasundan University)
Programme Committee
Programme Committee
(Sepuluh November
(Gunadarma University,
Indonesia)
Indonesia)
(University of Glasgow,
United Kingdom)
(Swiss-German University,
Indonesia)
Indonesia)
Programme Committee
(National University of
Singapore)
T. Basaruddin, Prof.
(Nanyang Technological
(University of Indonesia)
(MIT, USA)
University Singapore)
Y. Sutomo, Prof.
(STIKUBANK University,
Indonesia)
Organizing Committee
General Char;
Po. Abas Sunarya, M.Si.
(STMIK Raharja, Indonesia)
Its a great pleasure to welcome everyone to The International Conference on Creative Communication and
Innovative Technology 2009 (ICCIT-09). It is being held in the campus of Raharja Institution is a credit to
Banten and which emphasizes the global nature of both ICCIT and our networking research community.
ICCIT is organized by Raharja Institution together with APTIKOM (The Association of Computer and
Informatics Higher-Learning Institutions in Indonesia). We hope that this conference facilitates a stimulating
exchange of ideas among many of the members of our international research community.
ICCIT has been made possible only through the hard work of many people. It is offers an exceptional forum
for worldwide researchers and practitioners from academia, industry, business, and government to share their
expertise result and research findings in all areas of performance evaluation of computer, telecommunications
and wireless systems including modeling, simulation and measurement/testing of such systems.
Many individuals have contributed to the success of this high caliber international conference. My sincere
appreciation goes to all authors including those whose papers were not included in the program. Many thanks
to our distinguished keynote speakers for their valuable contribution to the conference. Thanks to the program
10
Finally, on behalf of the Executive and Steering Committees of the International Conference on Creative
Communication and Innovative Technology, ICCIT-09, and the Society for Modeling and The Association of
Computer and Informatics Higher-Learning Institutions in Indonesia (APTIKOM), I invite all of you to be us
in Raharja Institution, at ICCIT -09.
11
Organizing Committee
Chairman:
Po. Abas Sunarya, M.Si.
Members:
Augury El Rayeb, M.MSi.
Members:
Maria Kartika, SE.
12
Members:
Eko Prasetyo Windari
Karso, Ph.D
Members:
Muhamad Yusup, S.Kom.
Co Chairman:
Sunar Abdul Wahid, Dr.
Members:
Euis Sitinur
Aisyah, S.Kom.
Members:
Mukti Budiarto, Ir
Co Chairman:
Henderi, M.Kom.
Members:
Junaidi, S.Kom.
Members:
Lusyani Sunarya, S.Sn.
Members:
Padeli, S.Kom.
Members:
Sugeng Santoso, S.Kom.
Paper Participants
Paper Participant
Gede Rasben Dantes
- Doctoral Student in Computer Science Department, University of Indonesia
Widodo Budiharto, DjokoPurwanto, Mauridhi Hery Purnomo
- Electrical Engineering Department Institue Technology Surabaya
Untung Rahardja, Valent
- STMIK RAHARJA Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
Diyah Puspitaningrum, Henderi
- Information System, Faculty of Computer Science
Wiwik Anggraeni, Danang Febrian
- Information System Department, Institut Teknologi Sepuluh Nopember
Aan Kurniawan, Zainal A. Hasibuan
- Faculty of Computer Science, University of Indonesia
Untung Rahardja, Edi Dwinarko, Muhamad Yusup
- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
- GADJAH MADA UNIBERSITYFaculty of Mathematics and Natural SciencesYogyakarta,
Sarwosri, Djiwandou Agung Sudiyono Putro
- Department of Informatics, Faculty of Information Technology
- Institute of Technology Sepuluh Nopember
Chastine Fatichah, Nurina Indah Kemalasari
- Department, Faculty of Information Technology
- Institut Teknologi Sepuluh Nopember, Kampus ITS Surabaya
Untung Rahardja, Jazi Eko Istiyanto
- STMIK RAHARJA Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
- GADJAH MADA UNIVERSITY Yogyakarta, Republic of Indonesia
Bilqis Amaliah, Chastine Fatichah, Diah Arianti
- Informatics Department Faculty of Technology Information
- Institut Teknologi Sepuluh Nopember (ITS), Surabaya, Indonesia
Tri Pujadi
- Information System Department Faculty of Computer Study Universitas Bina Nusantara
Jl. Kebon Jeruk Raya No. 27, Jakarta Barat 11530 Indonesia
Untung Rahardja, Retantyo Wardoyo, Shakinah Badar
- Faculty of Information System, Raharja University Tangerang, Indonesia
- Faculty of Mathematics and Natural Science, Gadjah Mada University Yogyakarta, Indonesia
- Faculty of Information System, Raharja UniversityTangerang, Indonesia
14
Paper Participant
Henderi, Maimunah, Asep Saefullah
- Information Technology Department Faculty of Computer Study STMIK Raharja
Jl. Jenderal Sudirman No. 40, Tangerang 15117 Indonesia
Yeni Nuaraeni
- Program Study Information Technology University Paramadina
Sfenrianto
- Doctoral Program Student in Computer Science University of Indonesia
Asep Saefullah, Sugeng Santoso
.- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
Henderi, Maimunah, Aris Martono
- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
M. Tajuddin, Zainal Hasibuan, Abdul Manan, Nenet Natasudian, Jaya
- STMIK Bumigora Mataram West Nusa Tenggara
- Indonesia University
- PDE Office of Mataram City
- ABA Bumigora Mataram
Ermatita, Edi Dwinarko, Retantyo Wardoyo
- Information systems of Computer science Faculty Sriwijaya University
(Student of Doctoral Program Gadjah Mada university)
- Computer Science of Mathematics and Natural Sciences Faculty Gadjah Mada University
Junaidi, Sugeng Santoso, Euis Sitinur Aisyah
- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
Ermatita, Huda Ubaya, Dwiroso Indah
- Information systems of Computer science Faculty Sriwijaya University
(Student of Doctoral Program Gadjah Mada university)
- Computer Science Faculty of Sriwijaya University Palembang-Indonesia.
Mauritsius Tuga
- Jurusan Teknik Informatika Universitas Katolik Widya Mandira Kupang
Padeli, Sugeng Santoso
- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
M. Givi Efgivia, Safarudin, Al-Bahra L.B.
- Staf Pengajar STMIK Muhammadiyah Jakarta
- Staf Pengajar Fisika, FMIPA, UNHAS, Makassar
- Staf Pengajar STMIK Raharja, Tangerang
Primantara, Armanda C.C, Rahmat Budiarto, Tri Kuntoro P.
- School of Computer Sciences, Univeristi Sains Malaysia, Penang, Malaysia
- School of Computer Science, Gajah Mada University, Yogyakarta, Indonesia
15
Paper Participant
Hany Ferdinando, Handy Wicaksono, Darmawan Wangsadiharja
- Dept. of Electrical Engineering, Petra Christian University, Surabaya - Indonesia
Untung Rahardja, Hidayati
- STMIK RAHARJA Raharja Enrichment Centre (REC) Tangerang - Banten, Republic of Indonesia
Dina Fitria Murad, Mohammad Irsan
- STMIK RAHARJA Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
Asep Saefullaf, Augury El Rayeb
- STMIK RAHARJA Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
Richardus Eko Indrajit
- ABFI Institute, Perbanas
Azzemi Arifin, Young Chul Lee, Mohd. Fadzil Amiruddin, Suhandi Bujang, Salizul Jaafar, Noor
Aisyah, Mohd. Akib
- AKIB#6#System Technology Program, Telekom Research & Development Sdn. Bhd., TMR&D
Innovation Centre, Lingkaran Teknokrat Timur, 63000 Cyberjaya, Selangor Darul Ehsan, MALAYSIA
Division of Marine Electronics and Communication Engineering, Mokpo National Maritime
University (MMU) 571 Chukkyo-dong, Mokpo, Jeonnam, KOREA 530-729
Sutrisno
- Departement of Mechanical and Industrial Engineering, Gadjah Mada University,
Jl. Grafika 2 Yogyakarta. 52281
- Faculty of Mathematics and Natural Sciences, Gadjah Mada University,
- Departement of Geodetical Engineering, Gadjah Mada University,
Saifuddin Azwar, Untung Raharja, Siti Julaeha
- Faculty Psychology, Gadjah Mada University Yogyakarta, Indonesia
- Faculty of Information System Raharja University Tangerang, Indonesia
Henderi, Sugeng Widada, Euis Siti Nuraisyah
- Technology Department Faculty of Computer Study STMIK Raharja
Jl. Jenderal Sudirman No. 40, Tangerang 15117 Indonesia
16
Reviewers
Panel of Reviewers
Abdul Hanan Abdullah, Prof.
T. Basaruddin, Prof.
University of Indonesia,
MIT, USA
Y. Sutomo, Prof.
Iping Supriyana, Dr.
Bandung University of Technology, Indonesia
Keynote Speech
Saturday, August 8, 2009
13:30 - 13:50
Room M-AULA
Schools in Indonesia
As the biggest archipelago country in the world, Indonesia consists of more than 18,000 islands nationwide. In
2005, there are more than 230 million people living in this 5
million square meter area where almost two third of it is
water. The existence of 583 languages and dialects spoken
in the country is the result of hundreds of ethic divisions
split up by diverse separated island. According to statistics, 99 million of Indonesia population are labors with
45% of them works in agriculture sector. Other data source
also shows that 65% of total population are within productive age, which is 15-64 years old. The unbalanced
region development since the national independents day
of August 17th 1945 has made Java as the island with the
highest population density (average of 850 people per
20
experts, the conceptual architecture of an education institution can be illustrated through the following anatomy.
Vision, Mission, and Value
Every school has its own vision and mission(s) in the society. Most of them are related to the process of knowledge acquisition (learning) for the purpose of increasing
the quality of peoples life. As being illustrated above, the
vision and mission(s) of an education institution is very
depending upon the needs of stakeholders that can be
divided into 7 (seven) groups, which are (Picture 1):
21
22
Most of academicians, researchers, scholars, students, and practitioners disclose what they have (e.g. data,
information, and knowledge) through the internet so that
many people in other parts of the world can take benefit
out of it through ICT (e.g. website, database), all those
multimedia formats (e.g. text, picture, sound, and video)
can be easily distributed to other parties; and
various approaches;
3. Community of Interests Groupware how community
of lecturers, professors, students, researchers, man
agement, and practitioners can do collaboration,
cooperation, and communication through meeting in
cyber world;
4. Institution Network how school can be a part of and
access a network where its members are education in
stitutions for various learning-based activities;
5. Dynamic Content Management how data or content
are dynamically managed, maintained, and preserved;
6. Standard Benchmarking and Best Practices how
school can analyze themselves by comparing their
knowledge-based acquisition with other education in
stitutions worldwide and learning from their success;
and
7. Intelligence System how various scholars can have
the information regarding the latest knowledge they
need without having to search it in advance.
ICT as Teaching Tools and Devices
Learning should become activities that are considered
enjoyable by people who involve. It means that the delivery processes of education should be interesting so that
either teachers and students are triggered to acquire and
to develop knowledge as they convenience. As suggested
by UNESCO, Indonesia has adopted the CompetenceBased Education System that force the education institution to create curriculum and to conduct delivery approaches that promote not just cognitive aspect of competence, but also affective and psychomotor ones. There
are several paradigm shifts that should be adapted related
to teachers learning style to promote the principle (Picture 3). The followings are some transformation that should
be undergone by all teachers in education institution20.
23
24
25
26
By crossing the six level of maturity with all seven stakeholders, it can be generated the more contextual conditional statements29 based on stakeholders nature.
Mapping into ICT-Education Matrix
So far, there two parameters or indicators that can show
the status of ICT for education development in Indonesia,
which are: portfolio completeness and maturity level. Based
on the research involving approximately 7,500 schools in
Indonesia from primary school to the college level the
existing status of ICT development can be described as
(Picture 8):
27
References
[1] Computers as Mindtools for Schools Engaging Critical Thinking.
[2] E-Learning: An Expression of the Knowledge-Economy
A Highway Between Concepts and Practice.
[3] E-Learning Games: Interactive Learning Strategies for
Digital Delivery.
[4] E-Learning: Building Successful Online Learning in Your
Organization Strategies for Delivering Knowledge
in the Digital Age.
Picture 8: The ICT-Education Matrix
28
29
30
ing today
s modern educational organization.
21
Note that the government of Indonesia is in the middle
of discussion on putting the e-literacy as a must to have
skills and competencies for civil servants in the country,
including teachers.
22
It is also true with the blending between physical value
chain (a series of processes that require physical resources)
and virtual value chain (a series of process that involve
the flow of digital goods).
23
Don Tapscott refers this phenomenon as digitalization
on his principle of Digital Economy.
24
Having a good decision becomes something important
as government urges all organizations to implement a good
governance system.
25
Note that the stakeholders aware the impacts on new
technology to be included in the portfolio. But for the time
being, it has been agreed that no new application should
be added to the portfolio until a further decision has been
made based on the evaluation.
26
The weights have been defined through a national consensus in implementing the blue print on ICT for education.
27
The all assumptions being made are based on the trend
and phenomena appear in the Indonesia market setting.
28
It is highly used in many areas such as project management, ICT human resource development, IT governance,
etc.
29
Collection of statements that pictures the mental condition of a stakeholder in how their perceive the important of ICT in education.
30
Meaning that such institution has strong financial resources.
31
For example schools that are owned by religious community or industrial-related business groups.
32
Including from Microsoft PIL Program or other sources
such as USAID, ADB, JICA, etc.
33
It has been approved and endorsed by the Ministry of
Education and the Department of Communication and Information Technology.
Keynote Speech
Name
Institution
Position (Please underline)
Area(s) of Expertise
: RAHMAT BUDIARTO
: NAv6 CENTRE USM
: Associate Professor. Dr
: COMPUTER NETWORK, AI
Brief Biodata:
Rahmat Budiarto received B.Sc. degree from Bandung Institute of Technology in 1986, M.Eng, and
Dr.Eng in Computer Science from Nagoya Institute of Technology in 1995 and 1998 respectively.
Currently, he is an associate professor at School of Computer Sciences, USM. His research interest
includes IPv6, network security, Mobile Networks, and Intelligent Systems. He was chairman of
APAN Security Working Group and APAN Fellowship Committee (2005-2007).. He has been a JSPS
Fellow in the School of Computer and Cognitive Sciences of Chukyo University, Japan (2002). He
has published 26 International Journal papers, and more than 100 International and Local Conference
papers.
31
Paper
Saturday, August 8, 2009
13:30 - 13:50
Room L-210
Abstract
As further investigation on the Information and Communication Technology (ICT) investment especially in Indonesia
showed that a larger capital of investment does not automatically bring more benefit for the company, for example
Enterprise Resource Planning (ERP) system implementation. The present research was aimed at developing a methodology for ERP Implementation which was fundamental problem for achieving a successful implementation. This methodology will be contained some factors that influenced ERP implementation success (technical or non-technical) as an
activity each phase. Because, some of methodologies that common used by consultant more concentrating on technical
factors without considering non-technical factors. Non-technical factors were involved in the new proposed of ERP
implementation methodology, such as: top management commitment, support, and capability; project team composition,
leadership, and skill; organizational culture; internal/external communication; organization maturity level; etc. The
conclusion of the study was expected to be useful for private or public sectors when implementing ERP in order to gain
optimal return value from their investment.
Keywords: Enterprise Resource Planning (ERP), Methodology, Return value.
1. Introduction
Enterprise Resource Planning (ERP) is one of the integrated
information systems that support business process and
manage the resources in organization. This system integrates a business unit with other business unit in the same
organization or inter-organization. ERP is needed by organization to support day to day activity or even to create
competitive advantage.
In the ERP implementation, a business transformation is
always made to align ERP business process and companys
business strategy. This transformation consists of
companys business process improvement, cost reduction,
service improvement, and minimizing the effect on the
companys operation (Summer, 2004). Consequently, there
needs to be an adjustment between the business process
that the ERP system has and the business process that
exists in the company to give value added for the company.
There are some ERP systems that are currently developed.
In the study conducted by OLeary (2000) it is shown that
SAP (System, Application, Product in Data Processing) is
a system that has the largest market share in the world,
32
On the other hand, Xue et.al. (2005) found that organization culture & environment and technical aspects influenced ERP implementation success. Others research also
shown that 50% of the companies implementing ERP failed
to gain success (IT Cortex, 2003), while in China, only 10%
of the companies gained success (Zhang et.al, 2003). These
continuing study on the success of ERP implementation
show how critical ERP implementation is yet in IT investment.
Related to this study, Niv Ahituv (2002) argues that ERP
implementation methodology is the fundamental problem
in implementation success. In line with this, the present
research is aimed at developing ERP implementation methodology, taking into account the key success factor (technical or non-technical factors) that will be included in ERP
implementation methodology.
2. Theoretical Background
One of the major issues in ERP implementation is the ERP
software itself. What should come first, the companys
business needs or the business processes available in the
ERP software? The fundamental invariant in system design and implementation is that the final systems belong
to the users.
A study by Deloitte Consulting (1999) indicated that going live isnt the end of ERP implementation, but merely
the end of the beginning. The radical changes in business practices driven by e-commerce and associated
Internet technologies are accelerating change, ensuring
that enterprise systems will never remain static.
Because of the uniqueness of ERP implementation, methodologies to support ERP systems implementation are vital (Siau, 2001, Siau and Tian 2001). A number of ERP implementation methodologies are available in the marketplace.
These are typically methodologies proposed by ERP vendors and consultants. We classify ERP methodologies into
three generations first, second, and third generations
(Siau, 2001). Each successive generation has a wider scope
and is more complex to implement.
Most existing ERP implementation methodologies belong
to the first generation ERP methodologies. These methodologies are designed to support the implementation of an
ERP system in an enterprise, and the implementation is
typically confined to a single site. Methodologies such as
Accelerated SAP (from SAP), SMART, and Accelerated
Configurable Enterprise Solution (ACES) are examples of
first generation ERP implementation methodologies.
Second generation ERP methodologies are starting to
emerge. They are designed to support an enterprise-wide
and multiple-site implementation of ERP. Different busi-
33
3. Research Design
Methodology is a fundamental problem on ERP implementation (Juhani et. al, 2001). When the organizations were
successful in implementing ERP system, it can improve an
organization productivity and efficiency. The conceptual
framework will be used in this research, describe in figure
1.
Variables on this research contain of independent variable, such as: ERP implementation success factors (X1..X2)
(i.e. organization maturity level, implementation approach,
top management commitment, organization culture, investment value, etc.) and dependent variable is ERP implementation success.
Referring back to final product, this study used a literature
review methodology. The developing ERP implementation
methodology is academic activities that need a theoretical
exploration and a real action. Furthermore, the planning
and developing this methodology, we need to identify
some problems and doing a deep analysis for some factors
that influenced ERP implementation success. These factors can be used to develop a preliminary study of ERP
implementation methodology. The phases that have to be
done in this research are: justification of ERP implementation success factors (technical or non-technical) from literatures review, and the developing of preliminary model.
In this study, we found out that some factors that influenced an ERP implementation success can be shown on
table 1. These factors (technical or non-technical) will be
used to develop a new ERP Implementation methodology.
Non-technical aspects were important thing that always
forgotten by organization when adopt ERP system as support for their organization. A lot of companies were failed
to implement ERP system because of it.
ERP Implementation Success Factors
Related to the literature review which is focused on discussion and need assessment for ERP implementation in
private or public sector, we can conclude that some factors influence the ERP implementation success, we can
classify into three aspects, namely: Organizational, Technology and Country (External Organizational).
Organizational Aspects
The organizational aspect is an important role in ERP implementation. Related to it, there are some activities that are
supposed to be done on ERP implementation methodology, such as: (1) identification of top management support, commitment and capability; (2) identification of
project team composition and leadership; (3) identification of business vision; (4) preparing of project scope,
schedule and role; (5) identification of organization maturity level; (6) change management; (7) Business Process
Reengineering (BPR); (8) building of functional requirement; (9) preparing of training program; (10) build a good
34
35
36
5. CONCLUSSION
In the light of the findings on this study, it can be concluded that ERP implementation methodology as preliminary study divided into 5 phase, namely: (1) ERP Selection
Phase, (2) Project Preparation Phase, (3) Implementation &
Development Phase, (4) Operational & Maintenance Phase,
and (5) Support & Monitoring Phase. This methodology
will give the organization an optimal return value. Because,
each phase contained some factors that influenced ERP
implementation success.
6. FURTHER RESEARCH
This study shown that some aspects influence ERP implementation success, which we can classify into organization factor, technology factor and country / external organization factor. Each aspect contains some activity that
should be involved in ERP implementation methodology
as preliminary design that we proposed. For further research, we need to explore more deeply according to ERP
implementation methodology that suitable for organization culture especially in Indonesia and also fit to industrial sector.
REFERENCES
Ahituv Niv, Neumann Seev dan Zviran Moshe (2002), A
System Development Methodology for ERP Systems, The
Journal of Computer Information Systems.
Allen D, Kern T, Havenhand M (2002), ERP Critical Success Factors: An Exploration of the Contextual Factors in
Public Sector Institution, Proceeding of the 35th Hawaii
International Conference on System Sciences.
Al-Mashari M, Al-Mudimigh A, Zairi M (2003), Enterprise
Resource Planning: A Taxonomy of Critical Factors, European Journal of Operational Research.
Brown C., Vessey I. (1999), Managing the Next Wave of
Enterprise Systems: Leveraging Lessons from ERP, MIS
Quarterly Executive.
Dantes Gede Rasben (2006), ERP Implementation and
37
Motwani J, Akbul AY, Nidumolu V. (2005), Successful Implementation of ERP Systems: A Case Study of an Interna-
Deloitte Consulting (1999). ERPs Second Wave: Maximizing the Value of Enterprise Applications and Processes,
http://www.dc.com/Insights/research/cross_ind/
erp_second_wave_global.asp
Rajapakse and Seddon (2005), Utilizing Hofstedes Dimensions of Culture, Investigated the Impact of National and
Management Journal.
Systems Theory and Practice I: Implementing ERP Systems in China, Communication of the AIS.
Systems.
Factors of Process Modeling for Enterprise Systems, Proceedings of the Americas Conference on Information Sys-
ern Vendors dont Dominate Chinas ERP Market?, Communications of the ACM.
38
Systems
Conference,
http://
accountingeducation.com/ecais
and Activities Across the ERP Project Life Cycle, Information and Management.
Development.
39
Paper
Saturday, August 8, 2009
13:30 - 13:50
Room L-211
Abstract
Result of edge detection using CNN could be not optimal, because the optimal result is based on template applied to the
images. During the first years after the introduction of the CNN, many templates were designed by cut and try techniques.
Today, several methods are available for generating CNN templates or algorithms. In this paper, we presented a method
to make the optimal result of edge detection by using TEMPO (Template Optimization). Result shown that template
optimization improves the image quality of the edges and noise are reduced. Simulation for edge detection uses CANDY
Simulator, then we implementing the program and optimized template using MATLAB. Comparing to Canny and Sobel
operators, image shapes result from CNN edge detector also show more realistic and effective to user.
Keywords: CNN, edge detection, TEMPO, Template optimization.
I. Introduction
A cellular neural network (CNN) is a 2 dimensional
rectangular structure, composed by identical analogical
non-linear processors, named cells [1]. CNN can be used
in many scientific applications, such as in signal
processing, image processing and analyzing 3D complex
surfaces [9]. In this paper, we implement edge detection
program based on CNN and optimized using TEMPO
provided by CNN Simulator called CANDY Simulator [7].
The basic circuit unit of CNNs contains linear and nonlinear
circuit elements, which typically are linear capacitors, linear
resistors, linear and nonlinear controlled sources, and
independent sources.
40
II. LITERATURES
Figure 2. A two-dimensional cellular neural network.
This circuit size is 4x4. The squares are the circuit units
called cells. The links between the cells indicate that there
are interactions between the linked cells [2].
The state equation of a cell is [2]:
Edge Detection
In general, edge detection defines as boundary between
2 region ( two adjacent pixel) that have very high different
intensity [3]. Some of the others operator are Sobel,
Prewitt, Roberts and Canny [3]. In this research we will
compare the result with Sobel and Canny edge detector
as another important methods [6].
EDGEGRAYCNN
We use EDGEGRAY CNN for edge detection gray scale
input images that accepting gray-scale input images and
always converging to a binary output image . One
application of this CNN template is to convert gray scale
images into binary images, which can then be used as
inputs to many image-processing tasks which require a
binary input image. Here is gray scale edge detection
template with z/bias used are -0.5:
(2)
(1)
Where
41
IV. RESULTS
In this section the experimental results obtained by
CANDY and MATLAB are presented. Let us consider an
image figure 6,
42
V. CONCLUSION
In this paper, we have investigated the implementation of
CNN and template optimization for edge detection. Based
on the experiment, template optimization proved able to
improves the quality of images for edge detection.
Template optimization also reduced noises, but it makes
some important lines disconnected. To solve this problem,
we can use closing operation.
VII. REFERENCES
43
44
Paper
Saturday, August 8, 2009
14:45 - 15:05
Room L-212
Global Password
for Ease of Use, Control and Security in Elearning
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
untung@pribadiraharja.com
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
valent@pribadiraharja.com
Abstract
Authentication is applied in the system for maintaining the confidentiality of information and data security. How common
is through the use of a password. However, the authentication process such as this would cause inconvenience to both
users and administrators, that is, when taken in the environment that has many different systems, where on each system to
implement the authentication process is different from one another. Through the method of global password, a user does
not need to enter passwords repeatedly to enter into multiple systems at once. In addition, the administrator does not
need to adjust the data in each database system when there are changes occur on data user. In this article, identified the
problem that faced e-learning institution in terms of authentication using the password on a web-based information
system, defined 7 characteristics of the concept of authentication using the global password method as a step of problemsolving, and set benefit from the implementation of the new concept. In addition, also shown the snippets of program
written using ASP script and its implementation in e-learning the Students Information Services (SIS) Online JRS at
Perguruan Tinggi Raharja. Global password as a method in e-learning, not only the security level which is the attention,
but also the convenience and ease of use both in the process and at the time control.
Index TermsGlobal Password, Authentication, Security, Database, Information System
I. Introduction
II. Problems
45
46
47
48
V. Implementation
Authentication method to use the Global Password is implemented in Raharja University, namely the information system SIS OJRS (Online JRS). Students Information Services,
or commonly abbreviated SIS, is a system developed by
University Raharja for the purpose of information services
system as student optimal [4]. Development of SIS is also
an access to the publication Raharja Universities in the
field of computer science and IT world in particular [4].
SIS has been developed in several versions, each of which
is a continuation from the previous version of SIS. SIS
OJRS (Online Schedule Study Plan) is a version of the SIS4. Appropriate name, SIS OJRS made for the needs of the
student lecture, which is to prepare the JRS (Schedule
Study Plan) and KRS (Card Plan Studies) students.
In the SIS OJRS there are other subsystem-subsystem,
RPU ADM, ADM Lecturer, Academic, GO, Pool Registration, Assignment, and Data Mining. Each subsystem is
associated with one or more of the Universities in Raharja.
Therefore, to facilitate the user in the access switch or
apply the concept of inter-subsystem Global Password.
For, not uncommon in the user account have more than
one subsystem, and must move from one subsystem to
another subsystem.
49
VI. Conclusion
Authentication is an important part in the security system.
Will also be optimal when considering the environment
and the needs of both users and administrators. Global
Password is a new concept that will accommodate the needs
of user convenience in accessing information systems,
especially on the environmental condition of a compound
system. From an administrator, will also become easier in
the case of authentication data for each system. In addition, the Global Password still maintaining the confidentiality of the data in the system for the early goal, security of
the information system.
References
[1]Chandra Adhi W (2009). Identification and Authentication: Technology and Implementation Issues.
Ringkasan Makalah. Diakses pada 4 Mei 2009 dari:
http://bebas.vlsm.org/v06/Kuliah/Seminar-MIS/
2008/254/254-08-Identification_and_Authentication.
pdf
If after the user logs in and declared eligible for entry into
the system, then a session will be formed. This session
enter into other systems or not.
50
51
Paper
Saturday, August 8, 2009
13:55 - 14:15
Room L-210
Abstract
Ever since the seminal paper by Imielinski and Mannila [8], inductive databases have been a constant theme in the data
mining literature. Operationally, an inductive database is a database in which models and patterns are _rst class
citizens.
Having models and patterns in the database raises many interesting problems. One, which has received little attention so
far, is the following: do the models and patterns that are stored help in computing new models and patterns? For example,
if we have induced a classi_er C from the database and we compute a query Q. Does knowing C speed up the induction
of a new classi_er on the result of Q? In this paper we answer this problem positively for one speci_c class of models, viz.,
the code tables induced by our Krimp algorithm. The Krimp algorithm was built using minimum description length
(MDL) principle. In Krimp algorithm, if we have the code tables for all tables in the database, then we can approximate
the code table induced by Krimp on the result of a query, using only these global code tables as candidates; that is, we do
not have to mine for frequent item sets one the query result. Since Krimp is linear in the number of candidates and Krimp
reduces the set of frequent item sets by many orders of magnitude, this means that we can speed up the induction of code
tables on query results by many orders of magnitude.
Keywords: Inductive Database, Frequent Item Sets, MDL
1. Introduction
Ever since the start of research in data mining, it has been
clear that data mining, and more general the KDD process,
should be merged into DBMSs. Since the seminal paper
by Imielinski and Mannila [8], the so-called inductive databases have been a constant theme in data mining research.
Perhaps surprisingly, there is no formal de_nition of what
an inductive database actually is. In fact, de Raedt in [12]
states that it might be too early for such a de_nition. There
is, however, concensus on some aspects of inductive databases. An important one is that models and patterns
should be _rst class citizens in such a database. That is,
e.g., one should be able to query for patterns.
52
Having models and patterns in the database raises interesting new problems. One, which has received little attention so far, is the following: do the models and patterns
that are stored help in computing new models and patterns? For example, if we have induced a classi_er C from
the database and we compute a query Q. Does knowing C
speed up the induction of a new classi_er on the result of
Q?
In fact, this general question is not only interesting in the
context of inductive databases, it is of prime interest in
everyday data mining practice.
In the data mining literature, the usual assumption is that
we are given some database that has to be mined.
2. Problem Statement
This section starts with some preliminaries and assumptions. Then we introduce the problem informally. To
53
54
55
mental set-up.
First we briey describe the data sets we used. Next we
discuss the queries used for testing. Finally we describe
how the tests were performed.
5.1 The Data Sets . To test our hypothesis that Krimp_ is a
good and fast approximation of Krimp, we have performed
extensive test on 8 well-known UCI [3]
data sets, listed in table 1, together with their respective
numbers of tuples and attributes. These data sets were
chosen because they are well suited for Krimp. Some of
the other data sets in the UCI repository are simply too
small for Krimp to perform well. MDL needs a reasonable
amount of data to be able to function.
Some other data sets are very dense. While Krimp performs well on these data sets, choosing them would have
turned our extensive testing prohibitively time-consuming.
Note that all the chosen data sets are single table Dataset
#rows #attributes Heart 303 52
Iris 150 19 Led7 3200 24 Pageblocks 5473 46 Pima 786 38
Tictactoe 958 29 Wine 178 68
Table 1: UCI data sets used in the experiments.
data sets. This means, of course, that queries involving
joins can not be tested in the experiments. The reason for
this is simple: we have already tested the quality of Krimp_
in earlier work [10]. The algorithm introduced in that paper,
called R-Krimp, is essentially Krimp_;
well return to this topic in the discussion section.
5.2 The Queries To test our hypothesis, we need to consider randomly generated queries. On _rst sight this appears a daunting task. Firstly, because the set of all possible queries is very large. How do we determine a representative set of queries? Secondly, many of the generated
queries will have no or very few results. If the query has
no results, the hypothesis is vacuously true.
If the result is very small, MDL (and Krimp) doesnt perform very well.
Generating a representative set of queries with a non-trivial
result set seems an almost impossible task.
Fortunately, relational query languages have a useful property: they are compositional. That is, one can combine
queries to form more complex queries. In fact, all queries
use small, simple, queries as building blocks.
For the relational algebra, the way to de_ne and combine
queries is through well-known operators: pro-jection (_),
selection (_), join (on), union ([), intersec-tion (\), and
setminus (n). As an aside, note that in principle the Cartesian product (_) should be in the list of operators rather
than the join. Cartesian prod-ucts are, however, rare in
practical queries since their results are often humonguous
and their interpretation is at best di_cult. The join, in contrast, su_ers less from the _rst disadvantage and not from
the second. Hence, our ommission of the Cartesian products and addition of the join.
56
ber of candidates.
The fact that Krimp_ performs so well for selections means
that while Krimp models the global underlying data distribution, it still manages capture the \local structure very
well. That is, if there is a pattern that is important for a part
of the database, it will be present in the code table.
The fact that the results improve with the number of attributes in the selection, though mostly not sig-ni_cantly,
is slightly puzzling. If one looks at all the experiments in
detail, the general picture is that big-ger query results give
better results. In this table, this global picture seems reversed. We do not have a good explanation for this observation.
6.3 Union The projection results are given in Ta-ble 4. The
general picture is very much as with the previous experiments. The ADM score is a few percent, while the reduction in the number of candidates is often impressive.
The notable exception is the Iris database. The explanation is that this data set has some very local structure that
(because of minsup settings) doesnt get picked up in the
two components; it only becomes apparent in the union.
Note that this problem is exaggerated by the fact that we
split the data sets at random. The same explanation very
much holds for the_rst Led7 experiment.
We already alluded a few times to the general trend that
the bigger the query results, the better the results.
This trend seems very apparent in this table. For, the higher
the overlap between the two data sets, the bigger the two
sets are, since their union is the full data set.
However, one should note that this is a bit misleading, for
the bigger the overlap the more the two code tables\know
about the \other data distribution.
6.4 Intersection The projection results are given in Table 5.
Like with for the union, the reduction of the number of
candidates is again huge in general. The ADM scores are
less good than for the union, however, still mostly below
0.1. This time the Heart and the Led7 databases that are
the outliers. Heart shows the biggest reduction in the number of candidates, but at the detriment of the ADM score.
The explanation for these relative bad scores lies again in
local structures, that have enough support in one or both
of the components, but not in the intersec-tion. That is,
Krimp doesnt see the good candidates for the tuples that
adhere to such local structures. This is witnessed by the
fact that some tuples are compressed better by the original
code tables than by the Krimp generated code table for the
intersection. Again, this problem is, in part, caused by the
fact that we split our data sets at random.
The ADM scores for the other data sets are more in line
with the numbers we have seen before. For these, the ADm
score is below 0.2 or (much) lower.
6.5 Setminus The projection results are given in Table 6.
57
Both the ADM scores and the Size scores are very good
for all of these experiments. This does make sense, each of
these experiments is computed on a random subset of the
data. If Krimp is any good, the code tables generated from
the complete data set should compress a random subset
well.
It may seem counter intuitive that the ADM score grows
when the size of the random subset grows. In fact, it is not.
The bigger the random subset, the closer its underlying
distribution gets to the \true underlying distribution. That
is, to the distribution that underlies the complete data set.
Since Krimp has seen the whole data set, it will pick up this
distribution better than Krimp_.
7 Discussion
First we discuss briey the results of the experiments.
Next we discuss the join. Finally we discuss what these
experiments mean for more general queries.
7.1 Interpreting the Results The Size scores re-ported in
the previous section are easy to interpret.
They simply indicate how much smaller the candidateset
becomes. As explained before, the runtime complex-ity of
Krimp is linear in the number of candidates. So, since the
Size score is never below 0.4 and, often, con-siderably
lower, we have established our _rst goal for Krimp_. It is
faster, and often far faster, than Krimp.
In fact, one should also note that for Krimp_, we do not
have to run a frequent item set miner. In other words, in
practice, using Krimp_ is even faster than suggested by
the Size scores.
But, how about the other goal: how good is the approximation? That is, how should one interpret ADM scores? Except for some outliers, ADM scores are below 0.2. That is,
a full-edged Krimp run compresses the data set 20% better
than Krimp_. Is that good?
In a previous paper [15], we took two random sam-ples
from data sets, say D1 and D2. Code tables CT1and CT2
were induced from D1 and D2 respectively.
Next we tested how well CTi compressed Dj . For the four
data sets also used in this paper, Iris, Led7, Pima and,
PageBlocks, the \other code table compressed 16% to
18% worse than the \own code table; the _g-ures for
other data sets are in the same ball-park. In other words, an
ADM score on these data sets below 0.2 is on the level of
\natural variations of the data distri-bution. Hence, given
that the average ADM scores are often much lower we
conclude that the approximation by Krimp_ is good.
In other words, the experiments verify our hypoth-esis:
Krimp_ gives a fast and good approximation of Krimp. At
least for simple queries.
7.2 The Join In the experiments, we did not test the join
operator. We did, however, already test the join in a previous paper [10]. The R-Krimp algorithm introduced in that
58
Another use of background knowledge is to _nd un-expected patterns. In [9], e.g., Bayesian Networks of the data
are used to estimate how surprising a frequent pattern is.
In other words, the (automatically induced) background
knowledge is used _lter the output. In other words, speedup is of no concern in this approach. Ap-proximation clearly
is, albeit in the opposite direction of ours: the more a pattern deviates from the global model, the more interesting it
becomes. Whereas we would like that all patterns in the
query result are covered by our approximate answer. 9
Conclusions In this paper we introduce a new problem:
given that we have a model induced from a database DB.
Does that help us in inducing a model on the result of a
query Q on DB. For a given mining algorithm A, we
formalise this problem as the construction of an algorithm
A_ such that:
[7] Peter D. Grnunwald. Minimum description length tutorial. In P.D. Grnunwald and I.J. Myung, editors,
Advances in Minimum Description Length. MIT
Press, 2005.
[8] Tomasz Imielinski and Heikki Mannila. A database perspective on knowledge discovery. Communications
of the ACM, 39(11):58{64, 1996.
[9] Szymon Jaroszewicz and Dan A. Simovici. Interestingness of frequent itemsets using bayesian networks
as background knowledge. In Proceedings KDD,
pages 178{186, 2004.
[10] Arne Koopman and Arno Siebes. Discovering relational item sets e_ciently. In Proceedings SDM 2008,
pages 585{592, 2008.
[11] M. Li and P. Vit_anyi. An introduction tp kolmogorov
complexity and its applications. Springer-Verlag,
1993.
[12] Luc De Raedt. A perspective on inductive databases.
SIGKDD Explorations, 4(2):69{77, 2000.
References
[1] Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant,
Hannu Toivonen, and A. Inkeri Verkamo.Fast discovery of association rules. In Advances in Knowledge Discovery and Data Mining, pages 307{328.
AAAI, 1996.
[2] Jean-Fran_cois Boulicaut and Artur Bykowski. Frequent
closures as a concise representation for binary data
mining. In Knowledge Discovery and Data Mining, Current Issues and New Applications, 4th
Paci_c-Asia Conference, PADKK 2000, pages
62{73, 2000.
59
60
Table 4: The results of the union experiments. The percentages denote the amount of overlap between the two
data sets. The ADM and Size scores are averages _ standard deviation
Dataset 33.3% 50% 66.6%
ADM Size ADM Size ADM Size
Heart 0.39 _ 0.14 0.0002 _ 0.0001 0.36 _ 0.05 0.0002 _ 0.0001
0.42 _ 0.17 0.0001 _ 0.0001
Iris 0.09 _ 0.08 0.1 _ 0.02 0.08 _ 0.07 0.09 _ 0.02 0.03 _ 0.02
0.09 _ 0.01
Led7 0.5 _ 0.14 0.005 _ 0.002 0.42 _ 0.1 0.007 _ 0.001 0.3 _
0.12 0.01 _ 0.001
PageBlocks 0.13 _ 0.07 0.001 _ 0.0002 0.09 _ 0.06 0.002 _
0.0001 0.07 _ 0.05 0.002 _ 0.0001
Pima 0.09 _ 0.06 0.01 _ 0.002 0.09 _ 0.09 0.01 _ 0.003 0.05 _
0.06 0.01 _ 0.002
TicTacToe 0.2 _ 0.05 0.007 _ 0.002 0.22 _ 0.04 0.005 _ 0.0007
0.24 _ 0.04 0.004 _ 0.0007
Wine 0.1 _ 0.02 0.01 _ 0.005 0.12 _ 0.03 0.005 _ 0.001 0.15 _
0.04 0.002 _ 0.0006
Table 5: The results of the intersection experiments. The
percentages denote the amount of overlap between the
two data sets. The ADM and Size scores are averages _
standard deviation
Dataset 33.3% 50% 66.6%
ADM Size ADM Size ADM Size
heart 0.01 _ 0.01 0.001 _ 0.00007 0.01 _ 0.01 0.001 _ 0.0001
0.03 _ 0.02 0.002 _ 0.0004
iris 0.003 _ 0.006 0.11 _ 0.007 0.005 _ 0.008 0.12 _ 0.01 0.02 _
0.02 0.14 _ 0.01
led7 0.02 _ 0.02 0.02 _ 0.0002 0.02 _ 0.02 0.02 _ 0.0006 0.06 _
0.03 0.02 _ 0.001
pageBlocks 0.01 _ 0.004 0.002 _ 0.00004 0.02 _ 0.01 0.002 _
0.00003 0.03 _ 0.01 0.003 _ 0.00007
pima 0.02 _ 0.01 0.02 _ 0.001 0.01 _ 0.01 0.02 _ 0.001 0.01 _
0.02 0.02 _ 0.001
ticTacToe 0.06 _ 0.02 0.01 _ 0.0003 0.07 _ 0.02 0.01 _ 0.0005
0.08 _ 0.02 0.02 _ 0.002
wine 0.01 _ 0.007 0.01 _ 0.002 0.02 _ 0.01 0.02 _ 0.005 0.03 _
0.02 0.04 _ 0.01
Table 6: The results of the setminus experiments. The percentages denote the size of the remaining data set.
The ADM and Size scores are averages _ standard deviation
Paper
Saturday, August 8, 2009
13:55 - 14:15
Room L-211
Danang Febrian
(University of Indonesia)
(University of Indonesia)
Abstract
Nowadays, forecasting is developed more rapidly because of more systematicaly decision making process in companies.
One of the good forecasting characteristics is accuration, that is obtaining error as small as possible. Many current
forecasting methods use large historical data for obtaining minimal error. Besides, they do not pay attention to the
influenced factors. In this final project, one of the forecasting methods will be proposed. This method is called Regression
Dynamic Linear Model (RDLM). This method is an expansion from Dynamic Linear Model (DLM) method, which model
a data based on variables that influence it.In RDLM, variables that influence a data is called regression variables. If a
data has more than one regression variables, then there will be so many RDLM candidate models. This will make things
difficult to determine the most optimal model. Because of that, one of the Bayesian Model Averaging (BMA) methods will
be applied in order to determine the most optimal model from a set of RDLM candidate models. This method is called
Akaike Information Criteria (AIC). Using this AIC method, model choosing process will be easier, and the optimal
RDLM model can be used to forecast the data.BMA-Akaike Information Criteria (AIC) method is able to determine
RDLM models optimally. The optimal RDLM model has high accuracy for forecasting. That can be concluded from the
error estimation results, that MAPE value is 0.62897% and U value is 0.20262.
Keyword : Forecasting, Regression variables, RDLM, BMA, AIC
1. Introduction
Nowadays, forecasting has developed more rapidly
because of the more systematically decision making in a
organization or company. One of the good forecasting
characteristic is from accuration, and should get error
that is as minimal as possible. Usually, forecasting just
estimates based on historical data only without
considering external factors that might influence the data.
Because of that, in this paper will be proposed a method
that takes all external factors into consideration, this
method is called Regression Dynamic Linear Models
(RDLM), with Bayesian Model Averaging (BMA) applied
in order to choose the most optimal model. By using this
method, the forecast results will have high accuracy.
(Mubwandarikwa et al., 2005).
2. The Method
There are four steps to forecast a data using RDLM
method, i.e. : forming candidate models, choosing optimal
61
Yt = Ft t + vt ,
where
vt ~ N [0, Vt ] (1)
o System equation :
t = Gt t 1 + t ,
where
t ~ N [0,Wt ]
(2)
o Initial information :
0 ~ N [m0 , C 0 ]
(3)
Yt .
X1
has value of 1.
o
of
62
V j is observation variance of .
2.2.1.
RDLM Sequential Updating
Estimation of state variables () can not be done directly at
all times, but by using information from data which update
from time t-1 to t is performed using Kalman Filter. For
further information, see West and Harrison (1997).
Take as example describes all information from past times
until time t and is data at time t.
Assume that :
(6) Equation (2) and (6) have Gaussian distribution, so
linear combinations of both of them can be formed
and produce prior distribution that is :
(7) Then from equation (1) and (7), forecast distribution
can be obtained, that is :
(8) where From forecast distribution at equation (8),
forecast result for can be obtained using :
(9) By using Kalman Filter, posterior distribution can be
obtained :
(10)
where
with
All the steps above solve recursive update of RDLM and
can be summaried as following :
1. determining model by choosing .
2. setting initial values of .
3. forecasting using equation (9) .
4. observing and updating using equation (10).
5. back to (c), then substituting t+1 with t
2.3 Bayesian Model Averaging of RDLM
In RDLM method, there are many candidate models. For
determining the most optimal model, one of BMA method
is used, that is Akaike Information Criteria (AIC).
2.3.1 Akaike Information Criteria (AIC)
Akaike Information Criteria (AIC) by Akaike (1974)
originates from maximum (log-)likelihood estimate (MLE)
from error variance of Gaussian Linear regression model.
Maximum (log-) likelihood model can be used to estimate
parameter value in classic linier regression model. AIC
suggests that from a class of candidate models, choose
model that minimize :
(11) Where for jth model :
o is likelihood.
o p is number of parameters in model.
This method chooses model that gives best
(14)
o
Theils U statistic
63
4 . Conclusion
5. Daftar Pustaka
Akaike, H. (1974), A new look at the Statistical model
identication. IEEE Trans. Auto. Control, 19, 716-723.
Aplevich, J., 1999. The Essentials of Linear State Space
Systems. J. Wiley and Sons.
64
65
Paper
Saturday, August 8, 2009
14:20 - 14:40
Room L-210
Abstract
Educational resources usually reside in the digital library, e-learning and e-laboratory systems. Many of the systems
have been developed using different technologies, platforms, protocols and architectures. These systems maintain a
large number of digital objects that are stored in many different storage systems and data formats with differences in:
schema, access rights, metadata attributes, and ontologies. This study proposes a generic architecture for sharing
educational resources in the heterogeneous environments using data grid. The architecture is designed based on the
two common types of data: structured and unstructured data. This architecture will improve the accessibility, integration
and management of those educational resources.
Keywords: resource sharing, data grid, digital library
1. Introduction
Currently, the increasing social demands on high quality
educational resources of higher education cannot be
fulfilled only by the available educators and conventional
libraries. With the advances of information technology,
many learning materials and academic journals created by
universities have been converted into digital objects. The
rapid growth of Internet infrastructure accelerates the
transformation of conventional libraries and learning to
the digital libraries and e-learning. This transformation
greatly affects the way of people to get information and
learn. Accessing information and learning now can be
done from anywhere at any time.
Since many digital library, e-learning and e-laboratory
systems have been developed using different
technologies, platforms, protocols and architectures, they
will potentially introduce the problem of information
islands. In order to address this problem, some previous
works [1][2][3][4] proposed the use of grid technology
that has the capability of integrating the heterogeneous
platforms. However, most of them considered that the
shared resources are only files or unstructured data.
Educational resources consist of not only unstructured
data, but also structured data. Much information such as
66
2. Inherent
INHERENT (Indonesian Higher Education Network) [5] is
a network backbone that is developed by Indonesian
government to facilitate the interconnection among the
higher education institutions (HEIs) in Indonesia. The
project was proposed by the directorate of higher
education. Started on July 2006, currently it connects 82
state HEIs, 12 regional offices of the coordination of
private HEIs, and 150 private HEIs (see Figure 1).
All state HEIs in Java are connected by STM-1 National
Backbone with the bandwidth of 155 Mbps. Other cities
in the other islands use 8-Mbps leased line and 2 Mbps
VSAT connections.
3. Data Grid
Data grid is one of the types of grid technologies. The
other types are computational and access grid. Originally,
the emphasis of grid technology lay in the sharing of
computational resources [6]. Technological and scientific
advances have led to an ongoing data explosion in many
fields. Data are stored in many different storage systems
and data formats with different schema, access rights,
metadata attributes, and ontologies. These data also need
to be shared and managed. The need then introduces a
new grid technology, namely data grid. There are some
existing data grids. In the following, we will overview two
of them (iRODS and OGSA-DAI) and highlight their
features to address the need.
iRODS
iRODS (Integrated Rule-Oriented Data System) [7] is a
second generation data grid system providing a unified
view and seamless access to distributed digital objects
across a wide area network. It is extended from the Storage
Resource Broker (SRB) that is considered as the first
generation data grid system. Both SRB and iRODS are
developed by the San Diego Supercomputing Center
(SDSC).
67
OGSA-DAI
OGSA-DAI (Open Grid Services Architecture Data
Access and Integration) [9] is a middleware software that
allows structured data resources, such as relational or
XML databases, from multiple, distributed,
heterogeneous and autonomously managed data sources
to be easily accessed via web services. It focuses on cases
where the assembly of all the data into a single data
warehouse is inappropriate [9].
68
69
b.
c.
d.
Some digital library systems store index files for the use
of searching in relational databases. The systems can also
manage some kinds of educational resources formatted in
XML (e.g. semi-structured documents) using native XML
databases. All of this information can be accessed and
integrated by the Integrated Higher Education Digital
Library Portal using OGSA-DAI. Therefore, a user can do
distributed searching for files stored in all resources of
both sites.
70
5. Conclusion
In this study, we propose a generic architecture for sharing
educational resources in the heterogeneous environment.
The architecture distinguishes the managed data into two
categories, namely structured and unstructured data. The
data grid middleware used for virtualization is separated
based on the two categories of data. In our design, we
The combination of the two data grids completely handles
all kinds of data types. Hence, this architecture can
improve the accessibility, integration and management of
those educational resources.
6. References
[1] Yang, C.T., Hsin-Chuan Ho. Using Data Grid
Technologies to Construct a Digital Library
Environment. Proceedings of the 3rd International
Conference on Information Technology: Research
and Education (ITRE 05), pp. 388-392, NTHU,
Hsinchu, Taiwan, June 27-30, 2005. (EI)
[2] Candela, L., Donatella Castelli, Pasquale Pagano,
Manuele Simi. Moving Digital Library Service
Systems to the Grid. Springer-Verlag. 2005.
[3] Sebestyen-Pal, G., Doina Banciu, Tunde Balint, Bogdan
Moscaiuc, Agnes Sebetyen-Pal. Towards a GRIDbased Digital Library Management System. In
Distributed and Parallel Systems p77-90. SpringerVerlag. 2008.
[4] Pan, H. Research on the Interoperability Architecture
of the Digital Library Grid. 2007. in IFIP
International Federation for Information
Processing, Volume 251, Integration and
InnovationOrient to E-Society Volume l, Wang, W.
(Eds), (Boston: Springer), pp. 147 154.
71
Paper
Saturday, August 8, 2009
14:20 - 14:40
Room L-212
Edi Winarko
GADJAH MADA UNIBERSITYFaculty of Mathematics and Natural SciencesYogyakarta, Indonesia
ewinarko@ugm.ac.id
Muhamad Yusup
STMIK RAHARJARaharja Enrichment Centre (REC) Tangerang - Banten, Indonesia
m.yusup@pribadiraharja.com
Abstract
Goal implementation system that is web-based information so that users can access information wherever and whenever
desired. Absensi Online (AO) is a web-based information system that functions to serve the students and lectures have
been applied in the Universities Raharja. Lecturer in attendance to the presence of lecturers and students in classrooms
on a lecture. The system can still be read and accessed by all users connected to the network. However, this may lead to
the occurrence of Breach or deceptions in the presence of the attendance. There is access to the prevention of entry is not
the right solution to be used when the information should still be readable and accessible by all users connected to the
network. Security system must be transparent to the user and does not disrupt. With behavior detection, using the concept
of data mining Absensi Online (AO) can be done with the wise. The system can detect and report if there is an indication
things are negative. Initialization of the information still can be enjoyed by all users connected to the network without
restriction access entrance. In this article, the problems identified in the Absensi Online (AO) in the Universities Raharja,
critical review related to the behavior detection, detection and behavior is defined using the concept of data mining as
a problem-solving steps and defined the benefits of concept. There is a behavior detection using the concept of data
mining on a web-based information systems, data integrity and accuracy can be guaranteed while the system performance be optimized so that the life of the system can continue to progress well.
Index Terms behavior detection, data mining, Absensi Online (key words)
I. Introduction
Raharja university that are moving in the field of computer
science and located in Banten Province is located only 10
(ten) minutes from the International Airport Soekarno Hatta. Many awards that have been achieve in, one of
which is winning the WSA 2009 - Indonesia E-Learning
and Education of Intranet Product Category Raharja Multimedia Edutainment (RME). At this time Raharja university has to improve the quality and quality through accreditation certificate National Accreditation Board of
Higher Education (BAN-PT) of which states that the program of Diploma 3 in Komputerisasi Akuntansi AMIK
Raharja Informatika accredited A. In addition, the univer-
72
Multimedia Edutainment (RME), which designed and implemented to improve services and better training of students
and lecturers to be able to appreciate more time in the
lecture [6].
But, whether the system has been developed which is able
to provide convenience in terms of reporting to the faculty
and students considered to violate the order and lecture
discipline or in the process of learning activity? Whether
the system itself can detect and report if there is an indication of deception, cheating the system?
II. Problem
A system is the subject of miss management, errors, deception, cheating and abuse-general debauchery other. The
control system applied to the information, very useful for
the purpose of maintaining or preventing the occurrence
of things that are not desired [7]. Similarly, Absensi Online
(AO), which is part of the RME (Raharja Multimedia
Edutainment) require a control that is useful to prevent or
keep things that are negative so that the system will be
able to continue to perpetuate his life.
Control of both is also very important for web-based information system to protect themselves from things that hurt,
considering the ability of the system to be accessed by
many users, including users who are not responsible [8].
One of the ways the system is web-based information system with the security transparent to the user and does not
disrupt. In this case, whether the behavior detection using
the concept of data mining can be a choice?
Have been described previously that Absensi Online (AO)
in the RME functions to serve the lecture. Lecturers can
do attendance attendance lecturers and students in Absensi
Online (AO) in a lecture room in particular. However, the
process that occurs in the system there is a problem in the
cheating-cheating student attendance attendance. This is
because the system can be read and accessed by all users
connected to the network so that attendance can be done
by anyone and anywhere.
Besides, cheating can also be done by lecturers who do
attendance attendance as students lecturer states not
present, the present faculty and students present states,
but not present. It is used as indication of deception can
also obtain the results of auditing, meeting lecturers, findings, complaints of students and others. When auditing is
done, many in attendance found that Online provides students present in class when the student outside of class.
In addition, attendance at the Online that a class average
of all students present at the appropriate time after the
check, the lecturers are mengabsen all students at the beginning of the first lecture, and if there are students who
do not attend, attendance changes made at the end of the
lecture.
73
III.
Critical Review
A number of critical reviews will be sought for the detection or behavior associated with it. After that the results
will be considered, sought equality and difference, and to
detect weaknesses and strength. Some of the critical review are as follows :
Figure 2. Persentase IMM pertanggal
From figure 2 above, can know the average percentage of
attendance and the number of students each day. If the
data at a time with a very drastic change it can also be an
indication of deception, cheating Absensi Online (AO).
74
1. The
average
student
attendance
The system can detect the cheating by looking at the
level of attendance of a student. This is the same as
the previous explanation is shown in the picture with
the 3 red circle.
2. Student with low IPK Cumulative Performance Index
(IPK) is the average value of the last students during
lectures followed.
Students who have an average GPA that low, if at a
GPA semester will increase drastically it can also serve
as the indication of deception.
3. Data Breach of the previous Breach of previously re
corded to have occurred in a database and can be used
as a reference if it happens again.
4. Based on the social background Deception can also
be seen from the student social background. This is
represented on the size of the income earned.
5. Friends or gang factor Generally, students have a friend
or group (gang) specific. Groups can make a student to
be diligent in following the lectures, or vice versa can
also.
6. Comparing Low Aptitude Test Behavior detection can
also refer to Ujian Saringan Masuk (USM) students, as
the number of GPA and level of attendance a student
may also be measured from the USM.
7. Comparing IMM Student Quality Index (IMM) is a sys
tem that is prepared to measure and know the level of
discipline a student attendance by using Online (AO).
Time student attendance during the Teaching Learning
Activities (KBM) will be recorded in the whole database.
So that it can also serve as the reference behavior detection.
When the system detects an unusual event detection based
on behavior, there are two (2) the possibility that can be
done by the user control system at the time of which is as
follows:
1. Going down to the field and find the truth
Absensi Online (AO) system controllers or admin per
form auditing directly to the class that was detected to
determine whether there is a true indication of the ex
istence of cheating or not.
2. Saved a reference behavior for the next detection
Breach that is detected can be recorded and stored in
the database to serve as the reference detection if be
havior occurs again Breach.
75
random initial centroids used for the proximity is calculated by using the euclidean distance, that in the end some
Iterations will be able to find the desired point.
Before you begin to format your paper, first write and save
the content as a separate text file. Keep your text and
graphic files separate until after the text has been formatted and styled. Do not use hard tabs, and limit use of hard
returns to only one return at the end of a paragraph. Do
not add any kind of pagination anywhere in the paper. Do
not number text heads-the template will do that for you.
V. Implementation
76
When the lecturers have to click on the section be surrounded at the top, then this means the process that is
absent a second lecturer in the present class is finished.
The process is next to the lecturers to students absent on
the page or screen the same as above.
77
78
VII. Conclusion
There is a behavior detection system on attendance Online
(AO) can minimize or even eliminate cheating-cheating
(Breach), which is in the presence of student attendance.
Critical review of some existing, it is known that the focus
on examining the behavior of detection have not been
done, most research conducted to investigate the anomaly
detection. However, outline the anomaly detection can be
useful for the detection behavior for behavior detection
can be done using the data mining concept. K-means clus-
References
79
Paper
Saturday, August 8, 2009
14:20 - 14:40
Room L-211
ABSTRACT
In order to provide assurance about the value of Information Technology (IT), enterprises needs to recognize and
manage benefits and associated risks related to business process and IT. Failures of managing IT can lead to problems
in achieving enterprise objectives as IT is now understood as key elements of enterprise assets.
Control Objectives for Information and Related Technologies (COBIT) provides good practices across a domain and
process framework and presents activities in manageable and logical structure. It is known as framework to ensure that
the enterprises IT supports the business objectives by providing controls to measure IT effectiveness and efficiency.
COBIT also provides tools for obtaining an objective view of an enterprises performance level namely Performance
Indicator Measurement and Maturity Level Assessment.
In this paper, we propose the implementation of IT Audit process by using COBIT Framework 4.1, the latest COBIT
version. Due to the large extent of scope of COBIT Framework 4.1, hereby we delimitate scope of using COBITs
measurement tools to determine and monitor the appropriate IT control and performance in the enterprise.
Keywords : COBIT Framework 4.1, IT Audit, Performance Indicator Measurement, Maturity Level Assessment
1. INTRODUCTION
In 1998, monetary scandal involved Enron and Arthur
Andersen LLP, IT failure at AT & T, and also fund problems
on internet and e-commerce development in USA has
caused great growth within IT Audit field.[3]
In that case, the importance of IT Audit really does
matter to ensure availability and succeed in IT projects
and services inside the company. Framework means
international standard that ensure IT Audit process can
be implemented appropriately and meet the requirements,
the example of IT Audit Frameworks: COBIT, ITIL, ISO.
2. COBIT FRAMEWORK
COBIT framework used in this paper can be modeled
below:
The process focus of COBIT illustrated by Figure1
subdivides IT into four domains and 34 processes in line
80
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability
81
3. PERFORMANCE INDICATOR
MEASUREMENT
82
53
Figure 5. COBIT Table Linking IT Goals to IT ProcessesThe terms KGI and KPI, used in previous version of COBIT,
have been replaced with two types of metrics:
54
83
84
55
2.
A manner to efficiently decide where to go.
3.
A tool for measuring progress against the goal.
Maturity modeling for management and control over IT
processes is based on a method of evaluating the
organization, so it can be rated from a maturity level of
non-existent (0) to optimized (5) as shown in Figure 9.
Figure 9. Graphic Representation of Maturity Models
Using the Maturity Models developed for each of
COBITs 34 IT processes, management can identify:
The actual performance of the enterprise Where
the enterprise is today.
The current status of the industry the
comparison.
The enterprises target for improvement Where
the enterprise wants to be.
The required growth path between as-is and
to-be.
Figure 10. COBIT Maturity Level Assessment
TableFigure 10 provides Maturity Level Assessment Table
to assess enterprises IT value.
To obtain Value of each statement s answer, we need to
multiply Weight and Answer. With the formula:
(1)
Figure 10. COBIT Maturity Level Assessment TableFigure 10 provides Maturity Level Assessment Table to assess
enterprises IT value.
56
85
5. CONCLUSION
1.
Figure 11. COBIT Maturity Level Calculation
In order to obtain Maturity Level score, first, Auditor
needs to calculate the Compliance for each Maturity Level.
2.
3.
(2)
Which C is Compliance, V is value for each maturity
statements answer, and W is weight for each maturity
statement.
Normalize can be obtained by calculating each levels
Compliance divided with Total Compliance for all level of
an IT Process.
(3)
Which N is Normalize, C is Compliance for each maturity
statement.
4.
REFERENCES
[1] IT Governance Institute.2007.COBIT 4.1
[2]
Indrajit, Richardus Eko. Kajian Strategis
Analisa Cost-Benefit Investasi Teknologi
Informasi.
[3]
NationMaster.com. 2008. History of Information
Technology
Auditing<URL
:
http://
www.nationmaster.com/encyclopedia/History-ofi n f o r m a t i o n - t e c h n o l o g y auditing.htm#Major_Events>
86
57
Paper
Saturday, August 8, 2009
14:45 - 15:05
Room L-210
1. INTRODUCTION
The prediction of accuracy financial bank has been
the extensively researched area since late. Creditors,
auditors, stockholders and senior management are all
interested in bankruptcy prediction because it affects all
of them alike [7].
When the shareholders will make the investment
to a bank, the shareholder must first see the performance
of banks is good or not [2]. In some cases accurately
predicted the performance of a bank can also through
economic and financial ratio, the current assets / total
assets, current assets - cash / total assets, current assets
/ loans, reserve / loans, net income / total assets, net
income / total capital share, net income / loans, cost of
sales / sales, cash flow / loan.
Some research [3] use neural network approach for
performance predictions, neural network considered as
an alternative network to predict accuracy that can result
in the total value of the error more or less the same Error
Type 1 and Error Type 2.
87
support vectors
f ( x ) = sgn( g ( x ))
(1)
where,
(2)
In Equation 2, K is one of many possible kernel
point xi , and
{x }
* l*
i i =1
xi* are called support vectors and are the points from
the data set that fall closest to the separating hyper
plane. Finally, the coefficients
optimal boundary
88
K ( x, xi* ) = ( x.xi* + 1) 2
(3)
3.
89
SVM
2Accuracy
PCA-RBFN
2Accuracy
PCA-PNN
2Accuracy
PCA-RBFN
Error Type 1Error Type 2Accuracy
0%33.33%66.67.%
PCA-PNN
25%8.33%66.67.%
PCA-RBFN
Error Type 1Error Type 2Accuracy
0%16.67%83.33%
PCA-PNN
Error Type 1Error Type 2Accuracy
0%16.67%83.33%
90
5. REFERENCE
[1]. A. Asano, Pattern information processing,
Session 12 (05. 1. 21), 2004.
[2]. Bank.(http://en.wikipedia.org/wiki/Bank).
[3]. K.Y. Tam, M. Kiang, Predicting bank failures: a
neural network approach, Decis. Sci. 23 (1992)
926947.
Table 5. The result of two bank sample of Bank Asing
category
SVM
8.33%16.66%75%
PCA-PNN
Error Type 1Error Type 2Accuracy
0%16.66%83.3333%
4. CONCLUSION
This paper presents bank performance prediction
can be used to evaluate bank performance in real cases.
2007.
[8]. Y.U. Ryu, W.T. Yue, Firm bankruptcy prediction:
experimental comparison of isotonic separation and
other classification approaches, IEEE Trans. Syst.,
Manage. Cyber.Part A: Syst. Hum. 35 (5) (2005)
727737
91
Paper
Saturday, August 8, 2009
13:30 - 13:50
Room L-212
Untung Rahardja
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
untung@pribadiraharja.com
Sri Darmayanti
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
sridarmayanti@pribadiraharja.com
Abstract
Many research has been done on information technology planning effectiveness in a developing country, this paper takes
a step further in examining such factors in Indonesia, which is also a developing country. The results have surprisingly
shown that empirical data produced in Indonesia is not consistent to those researches conducted in other developing
countries. Hence we come to conclude that a study of one developing country on E-laerning Effectiveness cannot and
should not represent all developing nations in the world. One should carefully study the regional cultures and background that will eventually help to determine one different IT behaviors to another. For research to become effective,
hypothesis should be tested on several different countries and then follow by paying attention on similar behavior on the
results before drawing the conclusion. Based on some previous research about IT Planning Effectiveness in a Developing
Country, we perform similar research in Indonesia on the 6 hypothesis research model previously performed in Kuwait
[1].
Index Terms Information Technology Planning Effectiveness, Developing countries, Indonesia
I. Introduction
The term Critical Success Factor (CSF) is defined simply
as The thing(s) an organization MUST do to be successful. [2]. This definition is translated into the conceptual
context of our subject, which is the critical success factor
of IT planning effectiveness. What are the thing(s) a developed country MUST have in order to be effective in Elaerning? As a whole, good E-laerning must be able to
integrate the business perspectives of the other organizational functions into an enterprise IT perspective that addresses strategic and internal technology requirements.
Research on Information Technology planning effectiveness has been done to many developing countries, such
92
93
This is thus true whether this hypothesis is tested on developed country or developing country, that obviously
informed IT management have a positive effect on information technology planning effectiveness. Inversely, uninformed IT management has adverse effect on IT planning because IT management is involved directly to Elaerning. Hence, for E-laerning to be effective, IT management has to be well informed on technology skills and
update necessary. Thus, we fully support hypothesis H2
to be true that the critical success factor of E-laerning
effectiveness in developing country such as Indonesia is
well informed IT management.
Management involvement is defined as the extent to which
management is involved in the planning process [16],
whereas user involvement is defined as the extent to which
there is adequate user involvement in the planning process [17]. Both management involvement and user involvement are important ingredients for successful information
technology planning [18];[19]. Premkumar and King reported higher management involvement in strategic IS planning [20]. Gottschalk reported a positive relationship between user involvement and the effective implementation
of information technology planning [21]. Gibson asserted
that management involvement is critical for successful planning for information technology transfer to Latin American countries [22]. In a study of information technology
projects in Kuwait, Aladwani emphasized the importance
of involving management and users in information technology implementation activities [23]. Thus, in order to
conduct similar survey in another developing country such
as Indonesia, we hypothesize that:
Organizations in developing countries too [24] If organizations want to benefit from information technology planning, then they must allocate adequate financial resources
for information technology planning [25]. Thus, we hypothesize that:
H3:
Management involvement is one of the critical
success factors of information technology planning effectiveness in developing countries.
Prediction theory on H3:
Management is part of the stakeholder of information technology development. It also means that they are the source
to provide funding to conduct operation such as Elaerning. Funding becomes available after the management approval of E-laerning. Hence the management has
94
to strategic IT related activities such as information technology planning [33]. As it appears that the hypothesis
environmental factors such as government policies are
supported in Kuwait [34], we continue the same hypothesize that:
H6: Liberal government policy is one of the critical success factors of information technology planning effectiveness in developing countries.
Prediction theory on H6:
Liberal government policies generally act as a catalyst to
encourage existing organization to extensively perform Elaerning. How effective is the performance of technology
planning somewhat contributes little for this purpose. We
conclude that a liberal government policy is none whatsoever contribute to the effectiveness of E-laerning. Hence
a liberal government policy is not one of the critical success factors of information technology planning effectiveness in developing countries such as Indonesia.
present investigation contributes to the literature by being one of the first studies to provide an empirical test of
information technology planning effectiveness in the context of developing countries. Our analysis for both countries reveals mixed and different support for the proposed
relationships. In accordance with the findings of information technology planning research in Indonesia, we found
a positive relationship between IT penetration, management involvement, informed information technology management, and financial resources. On the other hand, we
found no support for a positive relationship between user
involvement and liberal government policies on determining the critical success factor of information technology
planning effectiveness.
Management involvement is found to have a positive relationship with information technology planning effectiveness. This result is somewhat expected. This finding confirms one more time the importance of management involvement in information technology initiatives in contemporary organizations. It is not surprising as it is pointed earlier in the paper that management involvement is more substantial in developing countries compare to developed
country as the critical success factor of E-laerning effectiveness. This finding indicates that management involvement is the most important facilitator of information technology planning in the research model. It coincides with
our findings that both countries Kuwait and Indonesia
both supports Management Involvement hypothesis (H3).
Informed information technology management is the second most significant correlate of information technology
planning effectiveness in our study (H2). As we can see in
the comparison tables, that Indonesia and Kuwait, both
support the hypothesis. The findings show that an informed information technology manager plays an important role in enhancing information technology planning
effectiveness through improving communication with top
management of the organization. Additionally, the finding
also show that an informed information technology manager has a greater propensity to develop work plans that
support organizational goals and activities leading to better integration of IT-business plans.
The findings of past information technology planning research highlight the importance of informed information
technology management for organizations operating in
developed countries [35] and our finding highlights the
similar findings of the importance for organizations operating in developing countries as well.
Furthermore, we found contrasting relationship on liberal
government policies and information technology planning
effectiveness. Extensive government liberalization has been
conducted in Indonesia where e-government plan supported fully by ICT, Nusantara 21, SISFONAS and
95
BAPPENAS has been seriously conducted [36]. Yet despite such effort, E-laerning effectiveness is still very minimal. This finding is not consistent with our theorizing and
with the findings of Dasgupta and his colleagues [37];
[38]. Even though liberal government policies was ranked
the second most significant determinant of information
technology planning effectiveness in the ITPE-5 model
(IT for gaining competitive advantage), survey conducted
on the two countries failed to both support the hypothesis. When organizations perceive government policies to
be less restricting, they become more inclined to engage in
operations aimed at exploiting information technology
opportunities for gaining competitive advantage.
References
[1]Aladwani, A.M. (2000). IS project characteristics and
performance: A Kuwaiti illustration. Journal of Global Information Management, Vol.8 No.2 , pp. 50-57.
[2]Luftman, J. (1996). Competing in the Information Age
Strategic Alignmen in Practice, ed. By J. Luftman.
Oxford University Press.
[3]Brancheau, J.C., Janz, B.D & Wetherbe J.C. (1996). Key
Issues in Information Systems Management: 1994
95 SIM Delphi Results. MIS Quarterly, Vol. 20 No. 2,
pp. 225-242.
[4]Mata, F.J. & Fuerst, W.L. (1997). Information Systems
Management Issues in Central America: A Multinational and Comparative Study. Journal of Strategic
96
199-208.
[16]Premkumar, G. & King, W.R (1992). An Empirical Assessment of Information Systems Planning and the
Role of Information Systems in Organizations. Journal of Management Information Systems, Vol. 9 No.
2, pp. 99-125.
[17]Premkumar, G. & King, W.R (1992). An Empirical Assessment of Information Systems Planning and the
Role of Information Systems in Organizations. Journal of Management Information Systems, Vol. 9 No.
2, pp. 99-125.
[18]Lederer, A.L. & Mendelow, A.L. (1990). The Impact of
the Environment on the Management of Information
Systems. Information Systems Research, Vol.1 No. 2,
pp. 205-222.
[19]Lederer, A.L. & Sethi, V. (1988). The Implementaion of
Strategic Information Systems Planning, Decision
Sciences, Vol. 22 No. 1, pp. 104-119.
[20]Premkumar, G. & King, W.R (1992). An Empirical Assessment of Information Systems Planning and the
Role of Information Systems in Organizations. Journal of Management Information Systems, Vol. 9 No.
2, pp. 99-125.
[21]Gottschalk, P. (1999). Strategic Information Systems
Planning: The IT Strategy Implementation Matrix.
European Journal of Information Systems, Vol. 8 No.
2, pp. 107-118.
[22]Gibson, R. (1998). Informatics Diffusion in South American Developing Economies. Journal of Global Information Management, Vol. 6 No. 1, pp. 35-42.
[23]Aladwani, A.M. (2000). IS project characteristics and
performance: A Kuwaiti illustration. Journal of Global Information Management, Vol.8 No.2 , pp. 50-57.
[24]Abdul-Gader, A.H., & Alangari, K.H. (1996). Enhancing IT assimilation in Saudi public organizations:
Human resource issues. In E. Szewczak & M.
Khosrowpour (Eds.), The human side of information
technology management, Idea Group Publishing, pp.
112-141.
[25]King, W.R (1978). Strategic Planning for Management
Information Systems. MIS Quarterly, Vol. 2 No.1, pp.
26-37.
Abdul-Gader, A.H., & Alangari, K.H. (1996). Enhancing IT assimilation in Saudi public organizations:
Human resource issues. In E. Szewczak & M.
Khosrowpour (Eds.), The human side of information
technology management, Idea Group Publishing, pp.
112-141.
[31]Dasgupta, S., Ionnidis, A., & Agarwal, D. (2000). Information Technology Adoption in the Greek Banking
Industry. Journal of Global Information Technology
Management, Vol. 3 No. 3, pp. 32-51.
[32]Dasgupta, S., Agarwal, D., Ioannidis, A. &
Gopalakrishnan, S. (1999). Determinants of Information Technology Adoption: An extension of existing
models to firms in a Developing Country. Journal of
Global Information Management, Vol. 7 No. 3, pp. 3040.
[33]Palvia, S.C., & Hunter, M.G (1996). Information Systems Development: A Conceptual Model and a Comparison of Methods used in Singapore, USA and
Europe. Journal of Global Information Management,
Vol. 4 No. 3, pp. 5-16.
[34]Aladwani, A.M. (2001). E-laerning Effectiveness in a
Development Country. Journal of Global Information
Technology Management, Vol.4 No.3, pp. 51-65.
[35]Premkumar, G. & King, W.R (1992). An Empirical Assessment of Information Systems Planning and the
Role of Information Systems in Organizations. Journal of Management Information Systems, Vol. 9 No.
2, pp. 99-125.
97
[36]Rusli, A. & Salahuddin, R. (2003). E-Government Planning in Indonesia: A Reflection against Strategic Information Communication Technology Planning Approaches. Proceedings for the Kongres Ilmu
Pengetahuan Nasional (KIPNAS) VII, September 9
11, 2003.
[37]Dasgupta, S., Ionnidis, A., & Agarwal, D. (2000). Information Technology Adoption in the Greek Banking
Industry. Journal of Global Information Technology
Management, Vol. 3 No. 3, pp. 32-51.
[38]Dasgupta, S., Agarwal, D., Ioannidis, A. &
Gopalakrishnan, S. (1999). Determinants of Information Technology Adoption: An extension of existing
models to firms in a Developing Country. Journal of
Global Information Management, Vol. 7 No. 3, pp. 3040.
[39]Hofstede, G. (1980). Cultures consequences: International differences in workrelated values. Beverly Hills,
CA: Sage Publications.
98
Paper
Saturday, August 8, 2009
14:45 - 15:05
Room L-211
Abstrak
The edge detection approach based on minimal spanning tree and vector order statistic is proposed. Minimal spaning
tree determined ranking from the observations and identified classes that have similarities. Vector Order Statistic view a
color image as a vector field and employ as a distance metrics. Experiment of edge detection on several images show that
the result of minimal spanning tree is more smooth and more computational time comparing to that vector order statistic.
Keywords: edge detection, Minimal Spanning Tree, Vector Order Statistics.
1. Introduction
Edge detection is a very important low-level vision operation. Despite the fact that a great number of edge detection methods have been proposed in the literature so far,
there is still a continuing research effort. Recently, the main
interest has been directed toward algorithms applied to
color [1] and multispectral images [6] , which also have the
ability to detect specific edge patterns like corners and
junctions [2]. Edges are defined, in digital image processing terms, as places where a strong intensity change occurs. Edge detection techniques are often required in different tasks in image processing and computer vision applied to areas such as remote sensing or medicine, to preserve important structural properties, image segmentation,
pattern recognition, etc [7]. Another method to edge detection is using YUV Space and Minimal Spanning Tree
[8].
Scalar order statistics have played an important role in the
design of robust signal analysis techniques.
Statistic ordering can be easily adapted to unvaried data,
but for multivariate data, it must go through preprocessing before it can be ordered. For this Vector Order Statistic
method, R-ordering is used because based of test result; it
is the best method to be used on color image processing.
In this work, a new approach for ordering and clustering
multivariate data is proposed. It is based on the minimal
99
(2)
4. System Design
In Minimal Spanning Tree method implementation, there
are 3 main process, which are the calculation of the distances between neighboring pixels, finding the Minimal
Spanning Tree route, and the deciding the output type
(plain, edge, corner, or junction). Those three processes
are done in a sliding window that the size is already defined, which is 3x3.
For that reason, the original input image matrix must be
100
5. Experiment Result
The images that used are lena.bmp, peppers.bmp,
house.bmp, dan clown.bmp.
5.1 MST Method Test Using T1 Variation
The goal of this test is to prove whether changes in T1
value affect the edge detection process.
Based on the result on Figure 1, T1 value that gave best
result is 1.0 on all samples images.
5.2 MST and VOS Comparison Test
5.2.1 Edge Quality Test
From the test result in Figure 2, it is seen that the result of
edge detection using Minimal Spanning Tree Method gave
edges that are more solid and not separated. Meanwhile
using Vector Order Statistic gave edges that are not solid
5.434minutes
.
(MST = 100%)
Elapsed time is
14.242192
seconds =
0.2374 minutes.
(VOS= 4.388%)
Figure 3. Result comparison and procentase between MST
and VOS base on algorithms time execution.
From the result in Figure 3, it is clearly seen that Minimal
Spanning Tree method takes longer time to finish than
Vector Order Statistic method.
6. Result Evaluation
6.1 Best Threshold for MST Method
T1 value that gives best result on all sample images is
1.0.
5
The correlation between T1 and the detector output are as
follow:
If (E7/E8 >T1) then Result = plain
else if (E6/E7 > T1) then Result = edge or
corner
else Result = junction
In this method, if E7 equal to E8 then it can be concluded
that the pixel in observation is plain.
The pixel is considered edge or corner if E6 equal to E7
while E7 not equal to E8.
Last, if E6, E7 and E8 are all not equal, then the pixel can be
considered as junction.
Data on Figure 3 was tested using T1 = 0.7 or T1 = 0.8,
which gave plain type result, meanwhile if tested using T1
= 0.9 or T1 = 1.0, it was detected by the detector as junction.
From the experiments it is known that the increment of T1
value makes the sensitivity of the detector increases.
Changes on T1 value can be used to get different detector
sensitivity.
6.2 Edge Quality Comparison
Vector Order Statistic is a method that orders the sum of
distances between pixels in a sliding window.
A pixel has distance to all other pixels in the sliding window, including to itself. That distance is calculated using
Euclidean distance equation.
In a uniform area, each vector will relatively close to each
other and the distance value is smaller. Output value from
this method is the average of the distances between pixels
neighboring the pixel in question.
Minimal spanning tree is a method that can rank data in a
set into clear groups. Because of the nature of this method
101
7. Conclusion
From the experiments done, some conclusions found:
1. Minimal Spanning Tree method gave a more solid line
than edge result from Vector Order Statistic method.
2. With the use of threshold parameter, detector sensitivity of Minimal Spanning Tree method can be defined
according to the preferred result. Threshold value for
best edge detection on Minimal Spanning Tree method
is 1.
3. Minimal spanning Tree needs longer execution time
than Vector Order Statistic with average ratio for sample
images between MST and VOS is 100% : 3.733%.
4. Edge detection result from Minimal Spanning Tree
method for images that have more detail will give sharper
edge than Vector Order Statistic.
102
8. Suggestions
It is suggested to optimize the edge detection algorithm
using minimal spanning tree, to shorten the execution time.
9. References
[1] P.W. Trahanias, A.N. Venetsanopoulos, Color edge
detection using vector order statistics, IEEE Trans. Image
Process. 2 (2) (1993) 259264.
[2] M.A. Ruzon, C. Tomasi, Edge, junction, and corner detection using color distributions, IEEE Pattern Anal. Mach.
Intell. 23 (11) (2001) 12811295.
[3] J. Astola, P. Haavisto, Y. Neuvo, Vector median filter,
Proc. IEEE 78 (1990) 678689.
[4] C.T. Zahn, Graph-theoretical methods for detecting and
describing Gestalt clusters, IEEE Trans. Comput. C 20 (1)
(1971).
[5] Theoharatos .Ch, Economou.G, Fotopoulos. S, Color
edge detection using the minimal spanning tree, Pattern
Recognition 38 (2005) 603 606.
[6] P.J. Toivanen, J. Ansamaki, J.P.S. Parkkinen, J.
Mielikainen, Edge detection in multispectral images using
the selforganizing map, Pattern Recognition Lett. 24 (16)
(2003) 29872993.
[7] T. Hermosilla, L. Bermejo, A. Balaguer, Nonlinear fourthorder image interpolation for subpixel edge detection and
localization, Image and Vision Computing 26 (2008) 1240
1248
[8] Runsheng Ji, Bin Kong, Fei Zheng. Color Edge Detection Based on YUV Space and Minimal Spanning Tree,
Proceedings of the 2006 IEEE International Conference on
Information Acquisition August 20 - 23, 2006, Weihai,
Shandong, China.
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-210
1. INTRODUCTION
PT. Indonusa Telemedia is with Brand Name
TELKOMVision who gets address at Tebet in south
Jakarta. Executed research program deep three-month
duration, from date 1st January 2009 and end on the 08
Aprils 2009. The scope of observational activity to be
done at Networks &IT division whereas watch on HRDS
division, Business Production & Customer Qualitys
division communicates in makings carries on business to
process, design of application. There are severally job
description of this activities, for example is (1) Design of
Application Penerimaan dan Seleksi Calon Karyawan ;
(2) Design of Application Koperasi ; (3) Captured this
candidate fires an employee Indonusa Telemedia; (4)
Design of Business Process;
Presented result write-up deep observational one contains
about application scheme activity Penerimaan dan Seleksi
Calon Karyawan utilizing Visual Basic 6.0, Ms Access
database and microsoft excels to Report of application.
PT. Indonusa Telemedia stand on the May 1997 and
operating on year 1999, with many of stockholder there
103
104
Clerk acceptance
Function of recruitment clerk is look for and pulls clerk
candidate to want apply for works according to job
description and, job specification. For the purpose that
firm can look for clerk candidate of internal source and
externals source. Each source has gain and lack.
Advantages of clerk acceptance by internal source.
1. Stimulating preparation for transfer and promotion.
2. Increasing job spirit.
3. More information a lot of about candidate can be gotten
71
72
3. Research result
Telkom has Vision To become a leading InfoCom player
in the region, meanwhile its Mission is give to service
One Stop InfoCom Services with Excellent Quality and
Competitive Price and To Be the Role Model as the Best
Managed Indonesian Corporation. Unit Carries On
Business Telkom consisting of division, Centre,
Foundation and Subsidiary. To subsidiary Telkom have
stock ownership is more than 50%, for example one of it,
is on PT Indonusa Telemedia (Indonusa)
The Product and Services
In the early year month of July 2000, PT. Indonusa
Telemedia has begun to do INTERNET service attempt.
Now that service finitely can be enjoyed by achievable
customer by Hybrid Fiber Optic Coaxial (HFC networks)
at Jakarta, Surabaya and Bandung.
Many several product and servives from PT Indonusa
Telemedia is :
105
106
b. Design of Output
Output or reporting result of that application as statistical
of denominating amount interview candidate fires an
employee in any directorate and sidelight hit state
interview of employee candidate.
Figure 5. Input Applicant
Input Data Interview, in function for memasukan appraisal
of each interviewer for each called employee candidate
and for each step interview. Menu it also been utilized to
process candidate more employee already at interview, is
that employee prospective will be drawned out to next
phase or not.
107
c. Design of database
4. Summary
108
Paper
Saturday, August 8, 2009
13:55 - 14:15
Room L-212
Retantyo Wardoyo
Faculty of Mathematics and Natural Science
Gadjah Mada University
Yogyakarta, Indonesia
rw@ugm.ac.id
Shakinah Badar
Faculty of Information System
Raharja University
Tangerang, Indonesia
Shakinah@pribadiraharja.com
Abstract
Along with rapid development of network and communication technology, the proliferation of online information resources increases the importance of efficient and effective distributed searching in distributed database environment
system. Information within a distributed database system allows users to communicate with each other in the same
environment. However, with the escalating number of users of information technology in the same network, the system
often responds slowly at times. In addition, because of large number of scattered database in a distributed database
system, the query result degrades significantly in the occurrence of large-scale demand at each time data needs. This
paper presents a solution to display data instantly by using Data Mart Query. In other words, Data Mart Query (DMQ)
method works to simplify complex query manipulating table in the database and eventually creates a presentation table
for final output. This paper identifies problems in a distributed database system especially display problem such as
generating users view. This paper extends to define DMQ, explain the architecture in detail, advantages and weaknesses
of DMQ, the algorithm and benefits of this method. For implementation, the program listings displayed written ASP script
and view the example using DMQ. DMQ methods is proven to give significant contribution in Distributed Database
System as a solution that is needed by network users to display data instantly that is previously very slow and inefficient.
Index TermsData Mart Query, Distributed Database
I. Introduction
The development of technology that continues to increase
rapidly, affecting the rate of information on human needs,
especially in a organization or company. Information continues to flow and the longer the amount increasing as the
number of requests, the amount of data and more. In addi-
109
II. PROBLEMS
Distributed database that has many advantages especially
for the structure of the organization at this time. However,
among the benefits of the distributed database also allows
a system more complex, because the number of databases
which are spread and the amount of data and many continue to increase in an organization or company. If a database has a number of data stored with the many queries
and tables, a request the search result data source or data
to be slow addition, the number of users that can access a
web display or display a Web information system is also a
slow .. Here was the view of conventional sources of data
that have multilevel query:
From the picture above, we can see that to produce a display on the web display, the conventional sources
of data need to be stratified queries. Source of data is done
from one table and another table and to query the query to
one another. Imagine if you have hundreds or thousands
of tables and queries in a database, and database distributed so happens that the relationship between the database with each other. How long does it take only one view
to the web?
From the above description, several problems can be formulated as the following:
1. Whether the query view because research has been
graded?
2. What is the impact of a slow process due to stratified
110
queries?
3. What methods can be used to speed up the process
on a display distributed database system?
4. What benefits and disadvantages with the new method
is proposed?
111
112
Literature review of the ten who have, have a lot of research on check pointing, parallel database system, discussion of the component database system, is also about
security. Besides, there is also discussion about the nested
transaction, distributed searching, view management and
fragment allocation. However, it can be that there is no
research that specifically discuss the issue or view a slow
process due to stratified queries.
IV. TROUBLESHOOTING
To overcome the above issues, the process required a fast
and efficient access to all data in a more organized and not
in the database, especially for a system database that distributed. Currently, programmers prefer to use Ms Access
and query functions for the entire script command. Consequently the process of large-scale query occurs every need
data. The use of SQL server is not a new thing in this case,
therefore proposed for the establishment of a system to
process more at the time of loading and presentation of
data have a linear speed faster than the conventional way.
DMQ (Mart Data Query) is a method of applying the analogy Waste Space for Speed. DMQ is also one of the
methods of forming the separation between the Engine
and Display. In other words DMQ method can display
the source code directly on the display and process the
query is done on the engine. DMQ generally produce a
display that data far more quickly than by using common
methods, as DMQ does not do it again in the process of
displaying data. DMQ and finally a solution that can help
the needs of users on the display data, previously very
slow and does not efficient.
Query on the Data Mart data sources come from the table.
113
Where
a = Y shortcuts, (the value of Y when X = 0)
b = slope of regression line (increase or decrease in Y for
each one-unt change in X) or regression coefficients, which
measure the amount of the influence of X on Y when X
increased unit
X = value of variable-free
Y = a value that is measured / calculated on a variable not
free
Values a and b in the regression equation can be
calculated with formula below:
a = - X [11]
Linear regression calculation for the view without using the DMQ
Here is the data obtained when not using the Data Mart
Query:
114
Summary of data
x2
X
Y
5000
43
506250000
10000 79
Time
xy
(X X) (Y- )
-22500 -80.25
1811250 6480.25
-17500
778750 1980.25
-44.5
y2
306250000
15000 78
156250000
20000 103
56250000
25000 118
6250000
30000 124
6250000
35000 159
56250000
40000 141
156250000
45000 189
306250000
50000 201
506250000
275000 1235
2062500000
-12500
-45.5
568750 2070.25
-7500
-20.5
153750 420.25
-2500
-5.5
13750
30.25
2500
0.5
1250
0.25
7500
35.5
266250 1260.25
12500
17.5
218750 306.25
17500
65.5
1146250 4290.25
22500
77.5
1743750 6006.25
6702500 22844.5
10000 16
306250000
15000 18
156250000
20000 15
56250000
25000 19
6250000
30000 21
6250000
35000 18
56250000
40000 20
156250000
45000 23
306250000
50000 19
506250000
275000 180
2062500000
-17500
-2
35000
-12500
-7500
-3
22500
-2500
-2500
2500
7500
7500
12500
25000
17500
87500
25
22500
22500
102
355000 203
X = 27500
Y = 15.25 + 0.0001X
= 123.5
From the above calculation, the value of a and b are calculated as follows:
= 0.0032
a =-X
= 123.5 0.0035 (27500)
= 35.5
So, the regression equation that shows the relationship between the number of both variable data and a time
to view the display is:
This shows that bDMQ not significant than bn. thus regression to remain non DMQ:
y = 35.5 + 0.0032x
whereas DMQ regression to be:
Y = 35.5 + 0.0032X
y = 15.25
So each time the amount of data increases the time
the process will be 0.0032 time.
B. Linear Correlation
The term correlation refers to the concept of mutual relationships between several variables. In correlation of the
complex involving many variables at once. However, in
this discussion I take the two variables, namely the amount
of data for the X and Y for the time. One formula to calculate the size of the correlation coefficient between two variables that each scale intervals have been formulated by
experts and statistics formula called the product-moment
correlation Pearson. Formula is as follows:
115
<%
dim conn
set conn=server.CreateObject(ADODB.Connection)
conn.open PROVIDER=MSDASQL;DRIVER={SQL
SERVER};SERVER=rec;DATABASE=raharja_integrated;
%>
<% dim strsql1,rs1
strsql1=drop table Daftar_Nilai
set rs1=conn.execute(strsql1) %>
<% dim strsql2,rs2
strsql2=select * INTO Daftar_Nilai from Lap_KHS4"
set rs2=conn.execute(strsql2) %>
<% response.redirect (default.asp) %>
Figure 10. Listing the value of the program update the list
of GPA
V. IMPLEMENTATION
The concept of Data Mart Query (DMQ) was implemented
on the Raharja University in List view to create value GPA
(Cumulative Performance Index). GPA is an average of IPS
(Index As Prestasi). IPK system is prepared to measure
and know the level of ability for students to lecture. Use
the DMQ in the value of making a list of GPA, the appearance can be quickly accessed.
= 0.97
While the linear correlation between the amount of data
and the time to view the process of using the DMQ-based
data in the table 2. is as follows:
= 0.55
116
Algorithm Lap_khs4:
The Screen
VI. CONCLUSION
In the column on the left or top, when we click on the linklink, it will open a URL on the right-hand column. In the
picture above there is a link Asdir. When click on the link,
it will open a URL that contains the entire Top 100 Students with Active status that are sorted descending. URL
has the interface as the image below.
References
[1]Lin. J. L., Dunham M. H. and Nascimento M. A. A Survey of Distributed Database Checkpointing. Texas:
Department of computer science and engineering,
Shoutern Methodist University. 1997.
[2]DeWitt. D.J., Gray.J. Parallel Database Systems: The
Future of High Performance Database Processing.
San Francisco: Computer Sciences Department, University of Wisconsin. 1992.
[3]Mitchell Carolyn. Component of a distributed database.
Department of Computer science, Norfolk state University. 2004.
[4]Hamidah Ibrahim. Deriving Global And Local Integrity
Rules For A Distributed Database. Departement of
Computer Science Faculty of Computer Science and
Information Technology, University Putra Malaysia 43400 UPM Serdang. 2001.
[5]Steven P Coy. Security Implications of the Choice of
Distributed Database Management System Model:
Relational Vs Object Oriented. University of Maryland. 2008.
[6]Stephane Gangarski, Claudia Leon, Hurbert Naacke,
Marta Rukoz and Pablo Santini. Integrity Constraint
Checking In Distributed Nested Transactions Over
A Database Clustur. Laboratorie the Information
Paris 6. University Pierre et Marie Curie 8 rue du
Capitaine Scott, 75015, Paris. Centro de Computacion
Paralela Y Distribuida, Universidad Central de Venezuela. Apdo. 47002, Los Chaguaramos, 1041 A,
Caracas, Venezuela. 2006.
117
[7]Allison L. Powell, James C. French, Jamie Callan, Margaret Connell and Charles L. Viles. The Impact of
Database Selection on Distributed Searching. 23rd
ACM SIGIR Conference on Information Retrieval
(SIGIR00), pages 232-239, 2000.
[8]Huang Yin-Fu and JYH-CHEN HER. Fragment Allocation in Distributed Database Design. Nasional
Yunlin University Sains and Teknology Yunlin. Taiwan 640, R.O.C. 2001.
[9]Filipova Nadezhda and Filipov Filcho. Development Of
Database For Distributed Information Measurement And Control System University of Economics.
Varna, Bul. Kniaz Boris I. 2008.
[10]Stanchev Lubomir. Semantic Data Control In Distributed Database Environment. University of Waterloo. 2001.
[11]Supranto, Statistik Teori dan Aplikasi, Erlangga, 2000.
118
Paper
Saturday, August 8, 2009
16:50 - 17:10
Room L-211
Abstract
Many government organizations have been using a lot of IT in the implementation activities. Utilization of IT is known
by the term e-government. Implementation in general aims to improve the quality of activities and services to the
community. Therefore, the role of e-government the more important to support and create good governance in the
government organization. Through e-government implementation of the government are expected to provide first-rate
service to the community. However, in fact the implementation of e-government is not everything went well in accordance
with the expected. The-efisienan to occur in the different practices of governance, development planning and
implementation of e-government has not been sustainable, the development of IT infrasrtuktur many overlapping, and
service to the community also has not been able to be either prime.
Keywords: IT governance, e-government, good governance
1. Introduction
The information technology (IT) in the era melenium
at this time not only monopolized by business
organizations. Governmental organizations, through
various ministries have also been using IT in order to
optimize the implementation of various activities.
Government to use IT to support various areas of activities
related to the public, asset management organization, the
implementation of aspects of service and operational, even
to measure the achievement of the performance and
efficiency. Through the application of IT, the government
is expected to improve performance in various aspects in
accordance with the principles and way of good
governance, including: (1) create a governance or
management systems in good governance, (2) increase
community participation, (3) to know a complaint / real
needs of the community and follow up with the right /
responsive, (4) created through the ease of getting
information, (5) increase public confidence in reciprocal
back-the government, (6) accountability of the government
concerning the interests of the area, (7) the effectiveness
and efficiency of service and operational activities of
government (henderi et. all: 2008). Thus, the use of IT by
119
2 Issues
Based on the facts mentioned above and some of
the results of research articles, opinions, and report on
the strategy, implementation and benefits of the use of egovernment, it is known that the benefits of implementing
e-government is not in accordance with what is expected,
and not comparable with the value and investment
financing that has been remove. Implementation of egovernment has not been able to significantly improve
the ease of public access in the information required, have
not been able to increase community empowerment, and
not play a role in providing maximum service to the
community. To overcome these problems, and the
challenges that have the necessary framework and IT
governance strategy in e-government.
3. Discussion
3.1 Definition of Research Literature on the Definition
of IT Governance
According to Weill and Ross (2004) IT
governance is the authority and responsibility are properly
set in a decision to encourage the use of information
technology on the company. Meanwhile, henderi et. all
(2008: 3) defines IT governance is the correct decision in
a frame that can be responbility and the desire to
encourage the use of information technology practices.
On the other, Henderi et. all (2008: 3) also defines IT
governance is the basis of the measure and decide the
use and utilization of information technology by
considering the purpose, goals, targets and business
companies. Hence, IT governance is a business and
synergize the role of IT governance in achieving goals
and objectives of the organization and is the responsibility
of the Board of Directors and Executive Management. IT
governance is also a fact on the control system of organs
through the application of IT companies in order to
achieve the objectives and targets set, create new
opportunities, and the challenges that arise. Because IT
is a governance structure and mechanisms that are
designed to give the role of control and adequate
management for the organization or management. IT
Governance and management both have a strategic
function, while management also have operational
functions. IT governance is the mechanism to deliver value,
performance and risk management, with a focus on aspects
of how decisions are taken, who took the decision, the
decision of what, and why decisions are made. In the
120
121
122
123
124
5 Conclusion
Governmental organizations, through various
ministries and instansinya utilize IT in order to optimize
the implementation of various development activities and
services to the community. Utilization of IT by government
are known by the term e-government, the implementation
is very important to support and achieve good governance,
so that the government is able to provide the prime to the
community. For that, IT governance framework strategy
in e-government is made absolute and is used to prevent
or reduce the various permasalaan faced in the
implementation of e-government at this time such as: the
efisienan-going activities in different practices of
governance, resources spent useless, various edevelopment plan government has not been sustainable,
the development of IT infrasrtuktur many overlapping,
and services to society can not be either prime. This article
recommends a strategy framework for the development of
IT governance, development and implementation of egovernment with the main attention to the five elements
of IT governance, namely: (1) Aligment, (2) Value delivery,
(3) Risk management, (4) Resource management, and (5)
Performane management, and further define the five
essential elements of e-government strategies, namely:
(1) Leadership (e-leadership), policy and institutional, (2)
Information and communication infrastructure, integrated,
(3) The application of ICT in government (e-government),
(4) Utilization of ICT in community development (esociety), and (5) Development of ICT industry and the
utilization of business (e-business). Framework, and this
strategy can further be a reference in the development
and implementation of e-government can accelerate the
implementation of the principles of good governance in
the system of government.
REFERENCES
Darrell Jones. Creating Stakeholder Value: The Case for
Informatioan Technology Governance.
w w w. k p m g . c a / e n / s e r v i c e s / a d v i s o r y / e r r /
inforiskmgmt.html, Jule 11 2008
Hasibuan A. Zainal (2002). Electronic Govermnet For Good
Governance. Journal of Management Information
Systems and Information Technology 1 (1), 3-4.
125
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-211
Abstrak
Since 2008 Indonesian Governmemt had begun to conduct certification for lecturers of non professor with
purpose of recognation of profesionalism, profession protection and tutor welfare in Indonesia. All these efforts are
expected, at the end, could improve quality of mutu colleges and university in Indonesia, as lecturesrs are most
important component and determining in studying and teaching in university.
The fact that is not easy for lecturers to be certified, besides limited quota, the process should go through
complex bureaucracy. Threfore every university sahould set up mechanism and strategy in order to simplify for
gaining certificate for the lecturers. Among other thing that may be done is to set up integrated information system to
support process for certification for the lecturers. Required stages are process design model, application modules
development and implementation also system testing. Result of this investigation copuld become reference for every
univerity in Indonesia for dalam accomplishment of certified lecturers.
Key words: information system, certified lecturers
I. FOREWORDS
1.1 Background
Lecturers are one among essential components in
education system in university. Roles, assignments, and
lecturters responsibility is very important in realizing
national education. To perform these functions, roles, and
strategic position, it is required professional lecturers.
Human Resources for Lecturers has vital position in
creating quality image of then graduates as well as quality
of institution in general. This position should also be
strengthen by the fact that lecturers should have
considerable authoritiesin academical process, and even
higher than similar proffesion in lower educational
institutes.
People demand quantity and quality of the output
generated by University / Faculties / Majors is growing
stronger. Eventhough numbers of graduates from
university much larger than previous, particular majors
and especially in terms of quality still below expectation.
More advance the civilization, greater the competion in
various fields, including fields of science and technoilogy,
126
127
128
129
130
V. CONCLUSION
Lecturers are most important component in
education. Lecturer in the position as professional
educators and assigened scientist to be able in
tranforming, developingand and wide-spread-out sience,
technology dan art vthrough education, research and
dedication towards people. Government of Indonesia
through Permendiknas no 42/2007 awarding recognition
towards professionalisme, protect profesion and aslo
assuring lecturers welfare in the form of execution of
lecturers certification..
Each and every college and university in Indonesia
should have mekanism dan efective strategy in executing
lecturers certification for ensuring lecturers under shelter
of their organization can easily obtain certfication thus
expect performance and welfare of lecturers may be
improved and ultimately can be implicated on quality
enhancement of univerities in Indonesia.
131
2.
3.
4.
132
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-211
ABSTRACT
This study describes a model of adaptive e-learning system based on the characteristics of students motivation in the
learning process. This proposed model aims to accommodate learning materials that are adaptive and intelligent based
on the difference of the characteristics of students motivation, and to solve problems in a traditional learning system,
which only provide the materials for all students, regardless of motivation characteristics. Thus, the student must be
provided with good materials in accordance with the ability to study their characteristics and also their motivation in
learning. Approaches to the system development consist of have advantages in terms of combining the characteristics of
motivation, intelligent systems and adaptive systems, in e-learning environment. The system becomes a model for
intelligent and adaptive e-learning diversity of students motivation to learn. Study will identify students motivation in
learning with the support of intelligent and adaptive system, which can be use as a standard for providing learning
material to students based on the motivation levels of students.
Keywords: adaptive system, e-learning, studens motivation, adaptive e-learning.
1. INTRODUCTION
The development of e-learning activities in universities
should be able to observe the condition of the student
concerned, due to the changes in paradigm of learning
that is from Teacher Center Learning toward Student
Centered learning. System e-learning approach with the
Student Centered Learning can encourage students to
learn more active, independent, according to the style of
learning and others. Thus, by using e-learning system
approach with the Student Centered Learning will be able
to support students to learn more optimal because they
will get the learning materials and information needed.
E-learning system should be developed to be a student
centered e-learning. The system will have various features
that can support the creation of an electronic learning
environment. Among other features to ensure interaction
between faculty with students, to determine the various
features of the meeting schedule and the assignment for
both tests, quizzes, and writing papers [1].
E-learning in universities at this time is not fully Student
Centered Learning, and limited only to enrich the teaching
of conventional [1].
133
134
135
4 . ADAPTIVE HYPERMEDIA
SYSTEM (AHS)
Brusilovsky propose a model to AHS in two categories,
namely: adaptive presentation and adaptive navigation
support, as follows: [5] [18] Figure 5. AHS Model [5] [18].
5. MOTIVATION STUDENT
CHARACTERISTICS
136
Rule
Number
Time
spent
The
number of
activities
Help
request Motivation
CD1 Slow Many No Yes
CD2 Slow Normal No Yes
CD3 Medium Many No Yes
CD4 Medium Normal No Yes
CD5 Slow Many Yes Yes
CD6 Slow Normal Yes Yes
CD7 Medium Many Yes Yes
CD8 Medium Normal Yes Yes
CD9 Slow Few No Yes
CD10 Slow Few Yes No
CD11 Medium Few No No
CD12 Medium Few Yes No
CD13 Fast Many No No
CD14 Fast Normal No No
CD15 Fast Many Yes No
CD16 Fast Normal Yes No
CD17 Fast Few No No
CD18 Fast Few Yes No
In the learning exercise can be divides the into four
variables: Quality of Solving Problems Q (x) = {Hight,
Medium, Low}, Time spent T (x) = {Fast, Medium, Slow},
Hint or Solution Reques S(x) = {Yes or No}, and Relevant
Contents Request R(x) = {Yes or No} [9]. Therefore, there
are 36 (3*3*2*2) rule from the combinations of elements
in four variables in the learning contents (rule number
CD1CD36). For rules CD1CD18 are students
motivation and rules CD19CD38 are students not
motivation. As shown in the table 2 below:
Table 2. Motivation rules in the learning exercises Based
on the results of the simulation table 1 and table 2 can be
use as the standard rules implementation in students
motivation .
8
7. CONCLUSION
The development of intelligent and adaptive Elearning
sytem based on the characteristics of students motivation
level can combine several components ITS, AHS, and
MPT. ITS components are domain model, student model,
teacher model, pendagogic model, and the graphic
interface.
Support. AHS with the adaptive modules: presentation
adaptive and adaptive navigation support, can support
AES adaptive motivation.
While the MPT variables: learning in contens and learning
in exercise, can support AES Motivation in determining
the characteristics of students motivation.
Architecture design of a model AES Motivation developed
from several researches: AES, ITS, AHS, and MPT. The
system can accommodate the delivery of materials adaptive
learning, and knowing the characteristics of students
motivation in learning process.
FUTURE RESEARCH
Research on the classification of students motivation
have been conducted, with Naive bayes method. Results
of the use is already on trial in a small scale, Sfenrianto
[20].
REFERENCES
[1] Hasibuan, Zainal A and Harry B. Santoso, (2005) The
Use of E-Learning towards New Learning
Paradigm: Case Study Student Centered ELearning Environment at Faculty of Computer
Science University of Indonesia, ICALT TEDC,
Kaohsiung, Taiwan.
[2] Vicente, A. D. (2003) Towards Tutoring Systems that
Detect Students Motivation: an
Investigation, Ph.D. thesis, Institute for Communicating
and Collaborative Systems, 9 School of Informatics,
University of Edinburgh, U.K.
[3] Yong S. K., Hyun J. C., You R. C., Tae B. Y., Jee-H. L.
(2007) A Perspective Projection Tutoring System
With Motivation Diagnosis And Planning,,
Proceedings of the ASME International Design
Engineering Technical Conferences & Computers
and Information in Engineering Conference IDETC/
CIE September 4-7, 2007, Las Vegas, Nevada, USA.
[4] Soldato, T. D., (1994) Motivation in Tutoring Systems,
Ph.D. thesis, School of Cognitive and Computing
Sciences, The University of Sussex, U.K. Available
as Technical Report CSRP 303.
137
138
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room AULA
Sugeng Santoso
Information Engineering DepartmentSTMIK Raharja Tangerange
Mail: ciwi212@yahoo.com
ABSTRACT
Along with the microcontroller technology that very rapidly develops and in the end it brings to Robotics technology
era. Various sophisticated robot, home security systems, telecommunications, and computer systems have use
microcontroller as the main controller unit. Robotics technology has also been reaching out to the entertainment and
education for human. One type of robot that is the most attractive type is the wheeled Robot (Robotic Wheeled). Wheeled
Robot is the type of robot that using a wheel likes a car in its movement. Wheeled Robot has limited movement, its can only
move forward and only have control on the speed system without any control. By combined the microcontroller system
and embedded technologies we can obtain the Smart Robotic Wheeled (SWR). To that we can design a system of Smart
Wheeled Robotic that capable of detecting obstacles, move forward, stop, rewind, and turn to the left to right automatically. It is possible to create by using microcontroller AT89S2051 on embedded system based technology combine with
artificial intelligence technology. Principle work of SWR is that the infra red sensor senses an object and sends back the
results of the object senses to process by microcontroller. Output of this microcontroller will control the dc motor so the
SWR can move according to the results of the senses and instruction from microcontroller. The result is a prototype Smart
Wheeled Robot (SWR) that has an ability to avoid obstacles. In the future, Smart Wheeled Robot (SWR) prototype can be
developed to be implemented on the vehicles so it can increase the comfort and security in the drive.
Keywords: Smart Wheeled Robotic, Microcontroller, Automatic Control
INTRODUCTION
Along with the rapid development of microcontroller technologies that ultimately deliver our technology in an era of
Robotics, has made the quality of human life is high. Various sophisticated robot, home security systems, telecommunications, and many computer systems use
microcontroller as the main controller unit. Robotics technology development has been able to improve the quality
and quantity production of various factories. Robotics
technology has also been reaching out to the entertainment and education for people. Car robot is one type of
robot that is the most attractive type. Cars robot is a kind
of robot that movement use the withdrawal wheel car, although it can use only two or three wheels only. The prob-
lems that often occur in the design and create a robot cars
is the limited ability of a robot car that can only move
forward only, and only on the speed control system without the control car robot.
By using microcontroller and embedded technology that
can be designed artificial control car robot automatically,
that is controlling the robot car that is capable of moving
forward, stop, rewind, and turn automatically. Elections
embedded systems with embedded systems that can be
easily compared with
the multi-function computer, because it does have a special function. Embedded a system can be very good ability
and is an effective solution of the financial side. Embed-
139
digital data issued by the microcontroller To move the program from the computer into microcontroller use two modules that act as intermediaries for the program. The system
block diagram as a whole is as follows:
IR
Circuits
Microcontroller
AT89S2051
Motor 2
Driver
Motor DC
Motor 1
Push button START
Power Supply
SESSION
Discussion of the block diagram
Control car robot automatically designed to be able to move
forward, stop, rewind, turn right and turn left independently. Mobile robot used in the design using this type of
movement Differential Steering type movement, which is
most commonly used. Kinematics used is quite simple relative position where it can be determined with the difference in speed with the left wheel right wheel, the design
has two degrees freedom. With the motor left and right
one direction will cause the robot run forwards or backwards, and with the opposite direction, the robot will rotate the opposite direction or counter-clockwise direction.
Smart Robotic Wheeled (SWR) is designed with two types
of gearbox as the motor driving the wheels left and right,
infra red sensor which functions to avoid collision with
objects in the surrounding areas so that the robot can
walk better without the crash.
Control system design software SWR was built using the
assembly language programming, which is then converted
into the form of a hex (hexadecimal). Program in the form of
a hex this is later entered into microcontroller. Data received by microcontroller digital data is processed from
Analog to Digital Converter which is owned by
microcontroller itself. This feature is one of the most important features in the design SWR is because all of the
peripherals to support this move based on the robot input
140
Microcontroller
Microcontroller is a major component or can be referred to
as the brain that functions as the movement of motor (Motor Driver) and processing data generated by comparator
as a form of output from the sensor. Microcontroller series
consists of several components including: AT89S2051, a
10 K resistor sized, measuring a 220 resistor, a capacitor electrolyte measuring 10 f 35 Volt, 2 pieces LED (Light
Emitting diode) 2 pieces measuring 30 pf capacitors, a crystal
with 11.0592 MHz frequency, and a switch that serves to
start the simulation run. Of a series microcontroller scheme
is as follows:
141
142
No
Yes
Robot turn left
Straight Movement
Stop a moment, Turn right
Driver of DC Motor
How it works driver of a series DC motor is controlled only
through this port Microcontroller, as described above pin
1 and 9 are as enable you to play and can stop the motor
when flood with the electric current at 0 (to rotate) and 1
(to stop), whereas for P0.0 and P0.1 are used to make playing the motor left and right while the P0.2 and P0.3 are used
to make playing the motor up and down, if P0.0 = 0 and
P0.1 = 1 then rotate to the right M1 , and if P0.0 = 1 and P0.1
= 0 and M1 rotates left, while for M2 will rotate upwards if
P0.2 = 0 and P0.3 = 1 and M2 will rotate to the top, and if
P0.2 = 1 and P0.3 = 0 and M2 rotate will down. Motor 1
(M1) and Motor 2 (M2) mounted separately so that when
M2 rotate, it will rotate M2 as well because it is in the
section that has been driven by M2. And vice versa if the
M1 rotates, the M2 will not participate because it is rotating at a fixed position. Series of DC motor that is used can
be seen in the figure 9.
START
Prepare Robot
Press swich
Obstacle?
Straight movement
Obstacle?
No
Yes
Stop Robot
Figure 11. The prototype scheme SWR
143
POWER ON
ACALL
SUBRUTIN
DELAY
CALL
Design Software
The program initializations
Program designed to control for the SWR using assembly
language, while microcontroller only able to access a digital input signal logic high (logic 1) and logic low (logic
0) so that the need to perform initialization.
;======================================================
; SWR.ASM
;
; NAME
: PROTOTYPE SWR
;FACULTY
: SISTEM KOMPUTER ( SK )
;SEKOLAH TINGGI MANAJEMEN DAN ILMU
KOMPUTER RAHARJA
;=====================================================;
; INITIALISATION
;
;
SWITCH
BIT
P3.7
; PIN 11
SENS_KANAN BIT
P1.0
; PIN 12
SENS_KIRI
BIT
P1.1
; PIN 13
IN_1
BIT
P3.0
; PIN 2
IN_2
BIT
P3.1
; PIN 3
IN_3
BIT
P3.2
; PIN 6
IN_4
BIT
P3.3
; PIN 7
LED_1
BIT
P1.5
; Right sensor indicator
LED_2
BIT
P1.6
; Left sensor indicator
POW_IND
BIT
P1.7
; Power indicator
;======================================================
;SUBRUTIN MAIN PROGRAM
;======================================================
=======================================================
ORG 00H
;
START ADDRESS
SWITCH_ON:
SETB
SWITCH
JB
SWITCH,SWITCH_OFF ;
CLR
POW_IND
;
144
Microcontroller has been fully filled. And marks the emergence of error indicates the process failed, which is usually caused by errors in the hardware the downloader. After the steps - the steps above to run and complete, then
the IC Microcontroller in the design tool is the type
AT89S2051, already can be used to perform the work system design tool.
In the table above in mind that the most far distance that
can be located by the sensor 25 cm. Meanwhile, over 25
cm, sensor is not working.
145
CONCLUSION
Table 4. Microcontroller connection with the circuits DC
Motor
Overall results of testing and analysis system Smart Robotic Wheeled (SWR), can be as follows:
1. Car speed control system can work automatically with
out the need to use the remote and in control through
`microcontroller; SWR can avoid obstacles and move
freely to the left and right.
2. The distance is ideal for sensor sensitivity is 2 cm - 20
cm, between 21 cm -25 cm sensor sensitivity has been
less good and more than 26 cm sensor is not able to
work.
3. Type differential steering can be used for the
prototype so that the SWR can turn to the right and
146
left.
REFERENCES
1. Atmel, 2007, AT89S52. http://www.atmel.com/dyn resources/doc.0313.pdf (didownload 4 Maret 2007)
2. Budiharto Widodo, Perancangan Sistem dan Aplikasi
Mikrokontroller. Penerbit Erlangga, Jakarta, 2005
3. Eko Putra Agfianto, Belajar Mikrokontroller AT89S52
Teori dan Aplikasi. Penerbit ANDI, Yogyakarta, 2004
4. Operation Manual FAP 188-100L AT Command Guide,
NOKIA GSM AT COMMAND SET. http://
www.activexperts.com/smsandpagertoolkit/
atcommandsets/nokiahtml
5. Fairchild. DM74LS47. http://www.datasheetcatalog.com
147
Paper
Saturday, August 8, 2009
13:30 - 13:50
Room AULA
Abstraction
Information technology Exploiting (TI) by various organization in general aim to to facilitate and quicken execution
process business, improving efficiency, quality and ability kompetitif. That way also with College of Raharja as organization which is active in education. Through adjusment of technology information, various enforceable activity easierly,
quickly, effective, efficient, and requirement of various type of information required by all level of management in College
of Raharja representing critical success factor (CSF) for organization can be fulfilled quickly, accurate and economize.
One among product of information technology which have been created and used by College of the Raharja is Raharja
Multimedia Edutainment (RME). Technological this used to support and memperlancar of school activity execution, and
fulfill requirement of information [of] which deal with [his/its]. Refering to that matter, this research aim to to know
factors influencing accepted better or do not it him RME by his consumer. Also wish known [by] relation/link of [among/
between] factors influencing acceptance RME. Model used to know acceptance of RME of at this research is model TAM
(Technology Acceptance Model). Model of TAM in detail explain information technology acceptance (TI) with certain
dimension which can influence technological acceptance by consumer. Model this place factor of attitude and every
behavior of consumer by using two especial variable that is benefit ( usefulness) and use amenity (easy of use). Anticipated by acceptance of this RME is also influenced by other;dissimilar factor for example: Attitude Toward Using (ATU)
Or attitude to use, Intention To Use (ITU) Or intention to use to produk/servis and Actual System Usage (ASU) Or use
behavior.
Keyword : RME, TAM, usefulness, easy of use.
1. Antecedent
Besides used to facilitate execution process business and improve ability kompetitif, exploiting and
adjusment of technology information (TI) also can influence speed, efficient and effectiveness of execution activity of organizational business( inclusive of organization
moving area of education execution). Others, TI have also
offered a lot of opportunity to organization to increase
and mentransformasi service, market, process job, and the
business [relation/link]. In aspect of education management, applying of TI have influenced strategy and execution process to learn to teach. strategy of Study of at this
era have been influenced by TI and instruct to way of
learning active siswa-mahasiswa coloured by problembase-learning. Thereby, way of learning active guru-dosen
[is] progressively left by [doing/conducting] enrichment
148
2.
3.
4.
5.
6.
2. Problems
Problem which wish dikemukan and discussed in by this
research is
1. Any kind of factors which interact and have an effect
on to storey;level technological acceptance specially
Raharja Multimedia Edutainment to all dosen and stu
dent in College Raharja
2.
3.
149
150
nent kognisi ( cognitive), afeksi ( affective), and component [of] related to behavior ( behavioral components). (
Thompson 1991) [at] ( NASUTION 2004 g. Intention To
Use ( THAT) Intention To Use [is] tendency of behaviour
to know how strength of attention [of] a consumer to use
a technology
Mount use a technology of computer [of] [at]
one can diprediksi accurately from attitude of its attention
to the technology, for example keinginanan add peripheral
supporter, motivate to remain to use, and also the desire to
motivate other;dissimilar consumer ( DAVIS 1989). Researcher hereinafter express that attitude of attention to
use [is] prediksi which is good to knowing Actual Usage (
MALHOTRA 1999).
h. Actual System Usage ( ASU)
Behavioral [of] real usage [is] first time concepted in the
form of measurement of frequency and durasi of time to
use a technology ( DAVIS 1989).
Somebody will satisfy to use system [of] if they believe
that the system [is] easy to used and will improve them
productivity, what mirror from behavioral condition [of]
wearer reality ( Iqbaria 1997 5. Research Methodologies
5.1. Research Type
This Research is inclusive of into type of research
Explaratory, that is containing research of verification of
hypothesizing develop;builded [by] through theory with
approach of Technology Acceptance Model ( TAM), tested
to use software AMOS.
5.2. Sampel Research population
Method used to get empirical data through kuesioner have
Semantic scale to of diferensial. With this method [is] expected obtainable [of] rating consumer Raharja Multimedia Edutainment acceptance [of] [at] College Raharja and
minimize mistake in research.
Consumer Raharja Multimedia Edutainment population of
at College Raharja is dosen student and in College Raharja.
Sum up dosen student and which will be made by a responder is as much 120 responder, where 60% is dosen
and 40% again is student
5.3. Data Collecting Method
To get data or fact having the character of theoretical which
deal with this research is done/conducted by a bibliography research, by learning literature, research journal, substance of existing other;dissimilar kuliah source and of
his/its relation/link with problems which the writer study
Besides through book research, data collecting is also
done/conducted by using kuesioner. Kuesioner contain
question made to know how influence [of] [among/between] variable of Perception of Amenity Use ( Perceived
Ease of Use/Peou), Benefit Perception ( Perceived Usefulness/Pu), Consumer Attitude ( Attitude Toward Using/
=
=
11PEOU
21PEOU
+
+
1
(1)
21PU + 2
=
=
32ATU +
43ITU +
31PU + 3
4
(4)
(3)
151
ing correlation hypothesized [by] usher konstruk or variable. Form equation of indicator of variable of laten
eksogenous and indicator of variable of laten endogenous
for example :
equation of Measurement of indicator of variable
eksogenous
X1 = 11PEOU + 1
X2 = 21PEOU + 2
X3 = 31PEOU + 3
X4 = 41PEOU + 4
X5 = 51PEOU + 5
equation of Measurement of indicator of variable endogenous.
y1 = 11PU + 1
y2 = 21PU + 2
y3 = 31PU + 3
y4 = 41PU + 4
y5 = 51PU + 5
y6 = 62ATU + 6
y7 = 72ATU + 7
y8 = 82ATU + 8
y9 = 93ITU + 9
y10 = 103ITU + 10
y11 = 113ITU+ 11
y12 = 124ASU+ 12
y13 = 134ASU+ 13
y14 = 144ASU+ 14
Where this variable eksogenous variable endogenous and
second [is] [his/its] clarification [is] visible [at] tables of 1.
Research Variable which the Observation hereunder
Tables 1
Research Variable which Observation
152
75
153
2.
2. Indirect Examination
154
3. Hypothesis Examination
Examination of this Hypothesis to know influence
usher variable of laten-external system-seperti of at
tables 11 Result of Examination of Hypothesis
hereunder
Tables 11 Result of Hypothesis Examination
155
156
3.
157
8. Suggestion
As for suggestion raised [by] as according to research
which have been [done/conducted] by is
1. use Software RME have to be supported fully by
management party and given by a supporter facility for
certain matakuliah, for example existence software
windows media player to look on video
2. Use Software RME from its system facet have to be
developed again for its benefit for example for the student
absence so that dosen by using software RME can watch
student attendance
3. Moderating Factor for the basic structure of user TAM
/ the factor of interest consisted of by gender, age,
experience, intelectual capacity and type of techonolgy.
At this research is moderating factornya do not too paid
attention to and expected at elite hereinafter the
moderating factor have to be paid attention to better
because paid attention toly [is] moderating factor result
nya will be more be good and the model yielded good also
4. Indicator User interface ( dependent variable) at TAM
consisted of [by] attitude ( affect, cognition),
behavioural intention and actual usage. [At] this
research [is] mengaju [of] [at] 5 variable that is PU (
Perceived Usefulness), PEOU ( Perceived Easy of Use),
Attitude Toward Using ( ATU), Intention To Use ( ITU)
And ASU ( Actual System Usage ). Expected [at]
Paper
Saturday, August 8, 2009
16:00 - 16:20
Room L-211
Zainal Hasibuan
Indonesia University, e-mail: zhasibua@cs.ui.ac.id;
Abdul Manan
PDE Office of Mataram City, email: mananmti@gmail,com
1. INTRODUCTION
Background
National education functions to carry out capability and to build the people grade and character in the
frame work of developing the nation, aims to improve student potentials for being faithful and pious human to The
Great Unity God, having good moral, healthy, erudite, intelligent, creative, autonomous, and being democratic and
credible citizen (Regulation of National Education System,
2003).
Education is also a key to improve knowledge
and quality of capability to reach upcoming opportunity
to take part in the world transformation and future development. How significant the education role is, so often
stated as the supporting factor for economic and social
development of the people (Semiawan, 1999). This important role has placed the education as the people need, so
the participation in developing the education is very important (Tajuddin,M, 2005).
The improvement of education relevancy and
quality in accordance with the needs of sustainable devel-
opment is one of formulations in the National Work Meeting (Rakernas) of National Education Department
(Depdiknas) in 2000. Result from the meeting is efforts to
improve education quality in order that student possesses
expertise and skill required by the job market after graduated (Hadihardaja, J, 1999).
All the efforts could not be immediately implemented but should follow phases in education fields subject to the regulations e.g. learning process to improve
graduates quality, increment of foreign language proficiency especially English, and IT usage (Tajuddin M, 2004).
It is known that education and knowledge are important
capitals to develop the nation. Their impact on the achieved
development is unquestionable. Appearance of technology innovation results could change the way of life and
viewpoint in taking life needs requirement of a nation. So it
is concluded and proved that education provides strong
influences to create changes on a nation
(Wirakartakusumah, 1998).
159
160
services on things connected with equipment and infrastructures of education. Integrated information system of
education equipment and infrastructures offers many benefits such as:
1. Facilitating and modifying the system. An integrated
system commonly comprises modules that separated
each other. When system change occurred, adjustment
of the application will easily and quickly perform. As
the system change could just be handled by adding or
reducing the module on application system.
2. Facilitating to make on-line integrated system. It means
that the system could be accessed from any place,
though it is out of the system environment. This on
line ability is easy to make because it is supported by
the system integrated with the centered data.
3. Facilitating the system management on the executive
level. Integrated system enables executive board to
obtain overall view of the system. So the control pro
cess could be easier and entirely executed (Leman, 1998).
Besides having those strengths, the integrated system has
also weaknesses. Since the saved data is managed centrally, when data damage occurred, it will disturb the entirely processes. Therefore, to manage the database needs
an administrator whose main function is to maintain and
duplicate data on the system (Tajuddin M, 2005). Also, an
administrator has another function to be a regulator of
rights/license and security of data in an education environment, and so is in Mataram.
Department that responsible in education management in Mataram is the Diknas (National Education),
supervises three Branch Head-offices of Education Service [Kepala Cabang Dinas (KCD)] those are KCD of
Mataram, KCD of Ampenan, and KCD of Cakranegara.
Mataram has 138 state elementary schools (SDN) with
40.604 students, 6 private elementary schools having 1.342
students. Meanwhile the state Junior school (SMPN) it
has 21 schools with 15.429 students, and private junior
school amounts to 8 schools having 1.099 students. It has
8 state high schools (SMAN) having 5.121 students, 16
schools of private having 9.623 students, state vocational
high school (SMKN) amounts to 7 schools having 4.123
students and the privates have 6 schools with 1.568 students (Profil Pendidikan, 2006).
In 2006, granted by the Decentralized Basic Education Project (DBEP), Mataram Education Service has
wireless network connected with three sub-district Branch
Offices of Service, those are Mataram, Ampenan, and
Cakranegara, which will be continued in 2007 by connecting sub-district for Junior and High schools, and cluster
for elementary schools. Three constructions of wireless
network will be built in 2007 for high school sub-rayon, 6
constructions for junior school sub-rayon, and 15 constructions for elementary school cluster; the total is 24
wireless network connections for schools and three for
the KCDs. (RPPK, 2007). To know the wireless network
constructed in supporting the education system of
Mataram, it needs development of an education information system that integrated each other in a system named
Education Information System of Mataram. So the data
and information access, either for schools, Diknas, and
community could be executed swiftly in occasion of improving education services in Mataram based on the information technology or wireless network.
B. PROBLEM FORMULATION
C. PURPOSE OF RESEARCH
1.
D. METHOD OF RESEARCH
4. Data Analysis
a. System Planning
It uses methodology of System Development Life
Cycle (SDLC) by structured and prototyping tech
niques. Presently as analyzed, the education ser
vice has some departments having self-working, it
makes the process is taking longer time. This new
system enables each department of education sub
system connected each other; it makes each of them
know the available information. To keep the data
security, there should be ID Number for every de
partment or personnel involved as password to ac
cess into the related departments.
b. Validity Examination and Sense Analysis Analysis
on the information system comprises:
- Filling-out procedure of education data
- Processing procedure of education data
- Reporting procedure of education data
c. System Analysis, covering:
Need analysis to produce system need specifica
1. Kind of Research
161
tion
Process analysis to produce:
Context Diagram
Documentation Diagram
Data Flow Diagram (DFD)
Data analysis to produce:
Entity Relationship Diagram (ERD)
Structure of Data
3.
2. Development of Hardware
Addition of the Triangle facility on the Education
Service office of Mataram as the central of
management.
Addition of antenna and receiver radio at the
respective cluster on elementary school, 9 units for
each sub-district and 3 units for the cluster leaders.
Procurement of 6 units of antenna and receiver radio
at the respective sub-district of junior schools for
the sub-district leaders.
Procurement of 6 units of antenna and receiver radio,
2 units for each sub-district of high schools in 2007.
4.
5.
6.
162
7.
b. Implementation
This phase is commenced on making database in SQL by
conversing database into tables, adding integrates
limitations, making required functions and view to combine
tables. Application software is using PHP language to
access the database. Information system process of credit
point determining enumeration is the important process
on this module.
163
164
F. CONCLUSION
Figure 15. Catalogue data input facility
5. Reference Tracing
Tracing or re-searching of the kept collections is an
important matter in the library. This feature
accommodates tracing through author, title, publisher,
subject, published year, etc.
G. REFERENCES
Alexander, 2001. Personal Web Server. http://
www.asp101.com/.
Anonim, 2003. Undang-Undang No.20 tahun 2003
tentang Sistem Pendidikan Nasional.
Figure 16. Borrowing data input facility
6. Management of Member and Circulation
It is the center-point of the library automatic system,
because here are many manual activities replaced by
the computer. Available inside is various features i.e.
input and search of library member data, record of
book borrowing and returning (using barcode
technology), fine calculating for delay book return,
and book ordering.
165
166
101
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-212
Edi Winarko
Computer Science of Mathematics and Natural Sciences Faculty Gadjah Mada University
Retantyo Wardoyo
Computer Science of Mathematics and Natural Sciences Faculty Gadjah Mada University
Abstract
Data mining is a process to extract information from a set of data, not the exception of the data in the field bioinformatics.
Classification technique which is one of the techniques extract information in data mining, have been much help in
finding information to make an accurate prediction. Many of the techniques of research in the field of classification
bioinformatics was done. Research has been the development of methods in the introduction to classify the data pattern
in the field bioinformatics. Classification methods such as Analysis Discriminant, K-Nearest-neighbor Classifiers,
Bayesian classifiers, Support Vector Machine, Ensemble Methods, Kernel-based methods, and linier programming, has
been a lot of experience in the development of the output by researchers to obtain more accurate results in the input of
the data.
Keywords: Bioinformatics, classification, data mining, K - Nearest-neighbor Classifiers, Bayesian classifiers, Support
Vector Machine, Ensemble Methods, Kernel-based methods, and linier programming,
I. INTRODUCTION
Data mining is defined as the process of automatically
extract information from a subset of the data was large
and find patterns of interest (Nugroho, U.S., 2008) (Abidin,
T, 2008). Classification techniques in data mining has been
applied in the field bioinformatics [24].
Bioinformatics developed from human needs to
analyze these data that the quantity increases. For the
data mining as one of the techniques have an important
role in bioinformatics.
167
168
Support Vector Machine, Ensemble Methods, Kernelbased methods, and linier programming, has been a lot of
experience in the development of the output by
researchers to obtain more accurate results in the input of
the data.
Keywords: Bioinformatics, classification, data mining, K
- Nearest-neighbor Classifiers, Bayesian classifiers,
Support Vector Machine, Ensemble Methods, Kernelbased methods, and linier programming,
I. INTRODUCTION
Data mining is defined as the process of automatically
extract information from a subset of the data was large
and find patterns of interest (Nugroho, U.S., 2008) (Abidin,
T, 2008). Classification techniques in data mining has been
applied in the field bioinformatics [24].
Bioinformatics developed from human needs to
analyze these data that the quantity increases. For the
data mining as one of the techniques have an important
role in bioinformatics.
In this paper will focus on introducing the
methodology in the field of classification in bioinformatics.
Activity in the classification and prediction is for a model
that is able to input data on a new bioinformatics that
have never been there. Classification of data, the data is
in a particular class label. Form a classification model that
will be used to predict class labels to new data that have
not been there.
Model which resulted in a classification is called a
classifier. Some of the models in the classification
bioinformatics data has been in use for example Analysis
Diskriminant, Decision Tree, Neural Network, Bayesian
Network, Support Vector Machines, k-Nearest Neighbor,
etc.. That is used to input data category (diskrit), while for
the numeric data (Numerical data) usually use regression
analysis. These methods have been applied in many
bioinformatics such as the introduction Patterrn
Recognition in gene. Many studies have been done for
the development of methods of pattern recognition and
classification for gene expression and microarray data was
done. Jain, AK (2002) conducted a review of the methods
of statistics, Califano, et all Analysis of Gene Expression
Microarrays for Phenotype Classification, Liu, Y (2002),
Rogersy, S, doing research on the Class Prediction with
Microarray Datasets. Lai, C (2006) , Lee, G et all (2008)
Nonlinear Dimensionality Reduction, Nugroho, AS, et all
(2008) of SVM for the microarray data. Every research has
169
170
171
IV. CONCLUSION
Techniques that have been developed in data mining
techniques such as classification has been helping many
problems in the field bioinformatics.
In microarray data analysis has been done many
studies to obtain optimal results in the classification. This
is to obtain accurate data to obtain a valid analysis.
Classification approach in the most developed at this time
is the support vector machine in the algorithm to combine
with the other algorithms, to produce optimal results.
Reference
[1]Baldi,P Anthony D. Long2, A Bayesian framework for
the analysis of microarray expression data:
regularized t-test and statistical inferences of gene
changes, Bioinformatics, Vol. 17 no. 6. 2001 Pages
509519
[2] Bredensteiner, E. J. and Bennett, K. P, Multicategory
Classification by Support Vector Machines,
Computational Optimization and Applications, 12,
5379, 1999, Copy:1999 Kluwer Academic
Publishers, Boston. Manufactured in The
Netherlands.
[3] Cai,J, Dayanik ,A, Yu,H, et all. , Classification of
Cancer Tissue Types by Support Vector
Machines Using Microarray Gene Expression
DataDepartment of Medical Informatics, 2
Department of Computer Science, Columbia
University, New York, New York 10027
[4] Chapelle, O. and Vapnik, V. Model Selection for
Support Vector Machines, AT&T Research Labs
100 Schulz drive Red Bank, NJ 07701, 1999
[5] Cho, S. and Won, H, Machine Learning in DNA
Microarray Analysis for Cancer Classification,
This paper appeared at First Asia-Pacific
Bioinformatics Conference, Adelaide, Australia.
Conferences in Research and Practice in
Information Technology, Vol. 19. Yi-Ping Phoebe
Chen, Ed.,2003
[6]Christmant, C, Fisher,P,Joachims,T, Classification based
on the support vector machine ,regression depth,
http://
and
discriminant
analysist
citeseerx.ist.psu.edu/viewdoc/
summary?doi=10.1.1.37.3435
172
173
Paper
Saturday, August 8, 2009
16:25 - 16:45
Room AULA
ABSTRAKSI
Desktop is something that is not foreign for computer users, is a form of the display screen as a medium for the operation
of the operating system-based gui. Linux operating system with all turunannya has inherent with the use of multi-desktop,
in which a user can have multiple active desktop at the same time. This may be necessary to make it easier to for users to
be able to mengelompokan some of the applications that are opened, so it does not look untidy. However, for users
operating system based windows, multi desktop is not found in the operation. Use visual basic to the ability to access the
windows in the fire to be able to create an application that will create multiple windows on the desktop as well as the
multi-desktop on linux. This is necessary, because it is not uncommon for Windows users feel confused when many
applications are opened at the same time, because the desktop does not appear regularly with the number of applications
that are running. This paper will discuss the technical implementation of multi desktop linux on windows xp media
programming using visual basic and access the commands in the windows api, active in the notification area icon to the
inactive, has its own task manager with the applications that are displayed according to the applications that run on
their - their desktop. Capabilities designed to create a 10 on a users desktop, this has exceeded the ability of new linux
desktop display 4. Pengujiannya in this application is provided that is capable of 10 desktop is created and run on
windows xp, but in the design stage, this application is able to create the number of desktops that are not limited, this is
very dependent of the amount awarded in accordance with their needs.
Keywords: Multi Desktop, Windows, Linux, Notification Area, Inactive Icon
INTRODUCTION
Multi desktop, not something new for some computer users, especially for those already familiar with the operating
system and linux turunannya. However, multi-operating
system for desktop windows spelled still rare and difficult
to get, especially when talking pembuatannya.
174
Discussion
Engineering multi desktop on windows XP with applying
the concept of multi desktop linux in perancangannya can
use the programming language visual basic, and the windows API.
Picture 2
Layar Design Coding Dalam Mengakses Windows Api
The ability to create and run inactive icon in notification
area aim to be multi desktop application is still accessible
to every desktop is selected, more than that also, it only
has a menu interface as the main form and the dialog interface to determine the status of the application that opens
when you want to exit, screen interface and dialogue to
convey the information. Note 2 for a picture notification
area.
Creating Array Capability
To be able to maintain that every application on each desktop, to be able hidden on the desktop when not selected,
and display applications at the desktop is selected, it is
necessary to create an array variable 1 (one) dimensions
to accommodate desktop desktop, and a variable array of
2 (two ) dimensions to accommodate the information along
with desktop applications that are active in their - their
desktop.
Showing the ability Menyenbunyikan And Applications
Gambar 3
Potongan Scrip Dalam Menyembunyikan Aplikasi
175
Gambar 4
Potongan Scrip Dalam Mendeklarasikan Array
The ability to manipulate an array of arrays is
necessary because the ones who save each desktop along
with application information. So that its implementation in
order to display the application in accordance with the
active desktop to read the information stored in the address of each array. And ability to manipulate task manager is the application that are hidden will not be visible in
the task manager, otherwise apalikasi shown akan seen in
the task manager where the location of desktop task manager is opened. Figure 4 is a snippet in the script to create
some array.
Kemampuan kemampuan diatas mutlak harus
dipenuhi agar aplikasi multi desktop yang dimaksud dapat
berjalan dengan sempurna. Masing masing kemampuan
memiliki saling keterkaitan dengan kemampuan yang
lainnya. Misalnya saja kemampuan dalam menyembunyikan
dan menampilkan aplikasi sesuai dengan lokasi desktop
dapat dilakukan dengan memanfaatkan informasi yang
tersimpan pada array, dan informasi pada array terealisasi
berkat kemampuan dalam manipulasi array.
IMPLEMENTASI
Paparan berikut ini akan menampilkan secara full
source code dari program JaMuDeWi (JunAidi MUlti
DEsktop WIndows) yang berhasil di rancang (Gambar 5)
176
Gambar 5
Icon Menu JaMuDeWi
Untuk dapat menciptakan aplikasi multi desktop windows
yang kita beri nama JAMU DEWI menggunakan 1 buah
project dengan 2 form dan 1 buah modul. Dua form yang
dimaksud terdiri dari form untuk memilih desktop dan form
untuk dialog keluar. Form pertama yang dimaksudkan untuk
memilih desktop yang akan dijalankan terdari dari satu
menu utama dengan 10 sub menu untuk memberikan pilihan
desktop dari 1 s/d 10 dan 1 sub menu untuk memilih dialog
keluar dari program JAMU DEWI. Form kedua dimaksudkan
untuk dialog keluar teridri dari 1 label untuk memberikan
teks pertanyaan aksi setelah keluar dan satu buah combo
box yang berisi pilihan Ya dan Tidak sebagai bentuk
implementasi jawaban yang ditanyakan pada label yang
dimaksud tadi, kemudian terdapat juga 2 command bottom
untuk menangkap pernyataan akhir dari proses keluar yang
akan sebagai bentuk pernyataan user bahwa proses keluar
dibatalkan dengan mengabaikan pilihan pada combo box,
dan command bottom kedua yang berisi pernyataan bahwa
user setuju untuk keluar dari program aplikasi JAMU DEWI
dengan memperhatikan pilihan pada combo box. Pilihan
Ya pada combo box akan melaksanakan perintah untuk
memindahkan semua aplikasi yang berjalan disemua desktop ke desktop utama, sedangkan pilihan kedua
Design JaMuDeWi (JunAidi Multi Desktop Windows)
Bahasa pemrograman yang digunakan adalah visual basic dengan kemampuan mengakses windows api.
Aplikasi ini membutuhkan sebuah form utama untuk
keperluan menu, sebuah form keluar (Gambar 6) sebagai
media dialog untuk menentukan aksi lanjutan yang akan
dilakukan setelah keluar, sebuah form untuk media
informasi dan sebuah modul untuk membuat beberapa
coding untuk keperluan programmer.
Picture 6
Layar Informasi JaMuDeWi
Perhatikan coding berikut ini, terdapat beberapa
deklarasi variable dengan beberapa prosedur yang
dirancang di area coding pada form utama.
frmJaMuDeWi
prosedur yang dilakukan pada saat program dijalankan
Private Sub Form_Load()
Hide this form
Me.Hide
variabel penampung informasi desktop aktif
intDesktopAktif = 1
intDesktopTerakhir = 1
pengaturan program agar sebagai system tray pada
toolbar
With NotifyIcon
.cbSize = Len(NotifyIcon)
.hWnd = Me.hWnd
.uId = vbNull
.uFlags = NIF_ICON Or NIF_TIP Or NIF_MESSAGE
.uCallBackMessage = WM_MOUSEMOVE
.hIcon = Me.Icon
.szTip = Klik Kanan - JunAidi MUlti DEsktop
WIndows & vbNullChar
End With
Shell_NotifyIcon NIM_ADD, NotifyIcon
End Sub
Coding diatas merupakan prosedur yang paling pertama
dijalankan pada saat program pertama kali dijalankan dan
berada pada form utama. Hal ini dilakukan agar program
berjalan secara hidden dan muncul icon tray pada pojok
kanan bawah. Perintah Me.Hide berfungsi untuk
menyembunyikan form dan perintah with notifyIcon
end with berfungsi agar program berjalan dengan system
tray. Terdapat juga deklarasi variable bertipe integer untuk
menampung jumlah desktop yang telah dipilih variable
untuk menampung desktop mana yang sedang aktif dari
beberapa desktop yang dipilih.
177
funPilihDesktop intDesktopAktif, 10
End Sub
prosedur menu keluar untuk menampilkan aksi pilihan
keluar
Private Sub mnuExit_Click()
Load frmKeluar
frmKeluar.Show
End Sub
Coding diatas merupakan bagian dari coding form utama
dan berfungsi sebagai prosedur untuk mengaktifkan desktop yang diinginkan sesuai dengan nama desktop masingmasing. Setiap menu yang ditekan akan menjalani perintah
yang berada pada prosedur menu sesuai dengan dalam
fungsi pemilihan desktop dengan mengirimkan informasi
desktop yang aktif sesuai nilai pada variable sekaligus
mengirimkan informasi nomor desktop 1 yang diaktifkan
sesuai dengan pilihan menu nomor 1.
Form Keluar (frmKeluar)
178
Picture 7
Layar Dialog JaMuDeWi Untuk Aksi Keluar
Selain menggunakan form utama, perlu juga
menyiapkan sebuah form lagi untuk keperluan layar dialog
keluar dari program (Gambar 7). Didalamya terdapat satu
buah label yang berisikan pertanyaan aksi yang akan
dilakukan setelah keluar dari aplikasi, dan satu buah combo
box untuk memberikan alernatif pilihan aksi, serta
menggunakan dua buah command bottom.
procedure penekanan tombol keluar untuk
menghentikan program
Private Sub cmdKeluar_Click()
pengaturan variabel untuk pendataan jumlah desktop dan windows
Dim intJumlahDesktop As Integer
Dim intJumlahWindow As Integer
aksi yang dilakukan ketika keluar dilakukan
If cboAksiKeluar.Text = Ya Then
seluruh aplikasi aktif akan dipindahkan ke desktop utama
intJumlahDesktop = 1
Picture 8
Potongan Coding Deklarasi API
Untuk dapat lebih memaksimalkan dan
menjalankan program ini sesuai dengan fungsinya, maka
menyiapkan sebuah modul sebagai bentuk komunikasi
dengan windows api. Diantanya akan memanggil beberapa
fungsi api dengan deklarasi publik, seperti Fungsi
ShowWindows,
GetWindows,
SetWindows,
SetForeground,
SetMessage,
SendMessage,
SetNotufyIcon dan masih banyak lagi sesuai kebutuhan.
Yang terpenting dari sini adalah, setiap api yang dipanggil
merujuk kepada library tertentu untuk memanfaatkan
beberapa fungsi, seperti penggunaan library user32, dan
lain sebagainya. Berikut adalah coding dari modul dalam
memanfaatkan windows api yang dimaksud. Potongan
script modul dapat dilihat pada gambar 8.
deklarasi pemanggilan fungsi API Windows
Public Declare Function ShowWindow _
Lib user32 (ByVal hWnd As Long, ByVal nCmdShow As
Long) _
As Long
Public Declare Function GetWindow _
Lib user32 (ByVal hWnd As Long, ByVal wCmd As Long)
179
_
As Long
Public Declare Function GetWindowWord _
Lib user32 (ByVal hWnd As Long, ByVal wIndx As Long)
_
As Long
Public Declare Function GetWindowLong _
Lib user32 _
Alias GetWindowLongA (ByVal hWnd As Long, ByVal
wIndx As Long) _
As Long
Public Declare Function GetWindowText _
Lib user32 _
Alias GetWindowTextA (ByVal hWnd As Long, ByVal
lpSting _
As String, ByVal nMaxCount As Long) As Long
Public Declare Function GetWindowTextLength _
Lib user32 _
Alias GetWindowTextLengthA (ByVal hWnd As Long)
_
As Long
Public Declare Function SetWindowPos _
Lib user32 _
(ByVal hWnd As Long, _
ByVal hWndInsertAfter As Long, _
ByVal X As Long, _
ByVal Y As Long, _
ByVal cx As Long, _
ByVal cy As Long, _
ByVal wFlags As Long) _
As Long
Public Declare Function SetForegroundWindow _
Lib user32 (ByVal hWnd As Long) _
As Long
Public Declare Function PostMessage _
Lib user32 _
Alias PostMessageA _
(ByVal hWnd As Long, _
ByVal wMsg As Long, _
ByVal wParam As Long, _
lParam As Any) _
As Long
Public Declare Function SendMessageByString _
Lib user32 _
Alias SendMessageA _
(ByVal hWnd As Long, _
ByVal wMsg As Long, _
ByVal wParam As Long, _
ByVal lParam As String) _
As Long
Public Declare Function SendMessage _
Lib user32 _
Alias SendMessageA _
180
intPanjang =
GetWindowTextLength(hwndPilihWindows) + 1
strJudulWindow = Space$(intPanjang)
intPanjang = GetWindowText(hwndPilihWindows,
strJudulWindow, intPanjang)
If intPanjang > 0 Then
If hwndPilihWindows <> frmJaMuDeWi.hWnd
Then
RetVal = ShowWindow(hwndPilihWindows,
SW_HIDE)
aryBukaWindows(intDesktopAsal,
intJumlahWindow) = hwndPilihWindows
intJumlahWindow = intJumlahWindow + 1
End If
End If
End If
hwndPilihWindows
=
GetWindow(hwndPilihWindows, GW_HWNDNEXT)
Loop
aryJumlahBukaWindows(intDesktopAsal) =
intJumlahWindow
tampilkan desktop terpilih ke paling atas
didapat dari informasi aray berdasarkan desktop
yang terakhir dibuka
secara default isi array adalah kosong
intJumlahWindow = 0
While
intJumlahWindow
<
aryJumlahBukaWindows(intDesktopTujuan)
RetVal
=
ShowWindow(aryBukaWindows(intDesktopTujuan,
intJumlahWindow), _
SW_SHOW)
intJumlahWindow = intJumlahWindow + 1
Wend
memindahkan dari desktop aktif / terpilih ke desktop
baru / dipilih
intDesktopTerakhir = intDesktopAsal
intDesktopAktif = intDesktopTujuan
End Function
Coding diatas merupakan bagian dari coding form keluar
yang akan dijalankan pada saat form keluar pertama kali
dijalankan.
Function TaskWindow(hwCurr As Long) As Long
panangan windows untuk keperluan task manager
Dim lngStyle As Long
lngStyle = GetWindowLong(hwCurr, GWL_STYLE)
If (lngStyle And IsTask) = IsTask Then TaskWindow =
True
End Function
181
DAFTAR PUSTAKA
Junaidi (2006). Memburu Virus RontokBro Dan Variannya
Dalam Membasmi Dan Mencegah. Cyber Raharja, 5(3), 8299.
(2008). Rekayasa Teknik Pemrograman Pencegahan Dan
Perlindungan Dari Virus Lokal Menggunakan API Visual
Basic. CCIT, 1(2), 134-153.
(2008). Teknik Membongkar Pertahanan Virus Lokal
Menggunakan Visual Basic Script dan Text Editor Untuk
Pencegahan. CCIT, 1(2), 173-187.
Rahmat Putra (2006). Innovative Source Code Visual Basic, Jakarta: Dian Rakyat.
Slebold, Dianne (2001). Visual Basic Developer Guide to
SQL Server. Jakarta: Elex Media Komputindo.
Stallings, William (1999), Cryptography and Network Security. Second Edition. New Jersey: Prentice-Hall.Inc
Tri Amperiyanto (2002). Bermain-main dengan Virus
Macro. Jakarta: Elex Media Komputindo.
(2004). Bermain-main dengan Registry Windows. Jakarta:
Elex Media Komputindo.
Wardana (2007). Membuat 5 Program Dahsyat di Visual
Basic 2005. Jakarta : Elex Media Komputindo.
Wiryanto Dewobroto (2003). Aplikasi Sains dan Teknik
dengan Visual Basic 6.0. Jakarta: Elex Media Komputindo.
182
Paper
Saturday, August 8, 2009
16:00 - 16:20
Room AULA
ABSTRACT
IT World, which is always up to date at any time and have the innovative world of education, so that the information
circulating and the more complex. One of the most important aspects in the world of education in a university is making
a fast, precise, accurate and sparingly. No organization or group that released from the performance measurements. With
the increasing demand of quality education in particular, both in terms of discipline Staff, Lecturers and Students.
Academic Universities in Raharja need a method that can answer all the needs in the form of information thats fast,
accurate and appropriate and in decision-making, where information is fast, precise, accurate and sparing is one of the
Critical Success Factor (CSF) from an institution education. This study, entitled Measuring Delone and Mclean Model
of Information System Effectiveness Academic Performance. Discuss the effectiveness of information systems that can
monitor the performance of each part such as the performance studies program Kapala, Performance and Lecturers
Students active, this data can be detected from the users perception and behavior in use in Universities Raharja. This
study aims to determine the factors that affect the information received or not the effectiveness of academic performance
by the user. Also want to know the relationship between factors that influence the effectiveness of information systems
acceptance Academic. Model used with the DeLone and McLean model. Information System is expected to serve in the
function effectively. This shows that the effectiveness of the development of information systems success. The success of
Information Systems marked with the satisfaction by the user (user Satisfaction), but this success will not mean much
when we apply the system can not improve the performance of individuals and Organization. Statistical test performed
with Structural Equation Modeling (SEM)
Keywords: Effectiveness, Critical Success Factor, user satisfaction
Introduction
E-commerce and Internet are the two main components in
the era of digital economy. Internet as a backbone and
enabler of e-commerce which is a collection of processes
and business models are based on the network. Both grow
rapidly extraordinary, mutually related, and affect a variety
of organizations in a way that is very diverse [BIDGOLI
2004].
Recently, IT has been a dramatic race in both capability
and affordability, and recognized ability to process data to
capture, store, process, retrieve, and communicate knowledge. Thus, many development organizations that is designed specifically to facilitate knowledge management.
183
184
185
186
quality and impact of information on user satisfaction results that provide quality information and have a relationship significant to the satisfaction of users. So, when the
quality of information improved the user satisfaction will
also increase. Testing the relationship between the use
and influence of user satisfaction and vice versa, to provide results that have a relationship and a significant influence on user satisfaction as well as vice versa. Both
these variables affect each other, so that when one variable is increasing the other variable will also increase. Testing the relationship between the use and influence to the
impact of individual results that the use and effect relationship has a significant impact on the individual. So,
when the impact of increased use of the individual will
also be increased. Testing the relationship between satisfaction and the influence of the user to the impact of individual returns that user satisfaction and the relationship
has a significant influence on individual impact. So, improved user satisfaction when the individual will also impact increased.
REFERENCES
[Almutairi 2005] Almutairi, Helail, An Empirical Application of the DeLone and McLean Model in the Kuwaiti
Private Sector, Journal of Computer Information Systems,
ProQuest Computing, 2005.
[Banker 1998] Banker, Rajiv D., et.al., Software Development Practices, Software Complexity and Software Maintenance Performance: A Field Study, Journal of Management Science, ABI / Inform Global, 1998.
[DeLone 1992] DeLone, William H. and Ephraim R. McLean,
Information Systems Success: The Quest for dependent
Variable, Journal of Information Systems Research, The
Institute of Management Sciences, 1992.
[DeLone 2003] DeLone, William H. and Ephraim R. McLean,
The DeLone and McLean Model of Information Systems
Success: A Ten-Year Update, Journal of Management Information Systems, ME Sharpe Inc., 2003.
[Doll 1994] Doll, William J., et.al., A Confirmatory Factor
Analysis of the End-User Computing Satisfaction Instrument, MIS Quarterly, University of Minnesota, 1994.
[Ghozali 2004] Imam Ghozali, Structural Equation Model,
Theory, Concepts and Applications with the Program Lisrel
8:54, Publisher Undip, Semarang, 2004.
[Goodhue 1995] Goodhue, Dale L. and Ronald L. Thompson, Task-Technology Fit and Individual Performance,
MIS Quarterly, University of Minnesota, 1995.
[OBrian 2003] James A. OBrien, Introduction to Information System, Eleventh Edition, Mc Graw Hill, 2003
[OBrien 2005] OBrien, James A., Introduction to Information Systems, 12th ed., McGraw-Hill, New York, 2005.
[Pasternack 1998] Pasternack, Andrew, Hung Up on Response Time, Journal of Hospitals & Health Networks,
ABI / Inform Global, 1998.
[Rai 2002] Rai, Arun, et.al., Assessing the Validity of IS
Success Models: An Empirical Test and Theoritical Analysis, Journal of Information Systems Research, ProQuest
Computing, 2002.
[Tonymx 60] F. Neuschen Management, by system, (second edition, New York: McGrawhill, 1960).
[Riduwan 2004] Riduwan, Method & Technique Developing Thesis, First Printed, Alfabeta, Bandung, 2004.
[Sandjaja 2006] Sandjaja, B, and Albertus Heriyanto, Research Guide, Reader Achievements, Jakarta, 2006.
[Satzinger 1998] Satzinger, John W. and Lorne Olfman,
User Interface Consistency Across End-User Applications: The Effects on Mental Models, Journal of Management Information Systems, ABI / Inform Global, 1998.
[Seddon 1994] Seddon, Peter B. and Min Yen Kiew, A
Partial Test and Development of DeLone and McLeans
Model of IS Success, University of Melbourne, 1994.
187
Paper
Saturday, August 8, 2009
16:00 - 16:20
Room L-210
The Concept of Model-View-Controler (MVC) as Solution Software Development
(case study on the development of solutions Software on-line test)
Ermatita, Huda Ubaya, Dwiroso Indah
Computer Science Faculty of Sriwijaya University Palembang-Indonesia.
E-mail: ermatitaz@yahoo.com
Abstract
Software development is a complex task and requires adaptation to accommodate the needs of the user. To make it easier
to changes the software, in maintenance, now has developed concept in the development of the software, the modelview-controller pattern, which is the architecture that can help facilitate in the development and maintenance of software, because in this architecture for a three-layer model, namely, the view and controller in development done independently, so that it can provide convenience in the development and maintenance. In addition, this architecture can also
view a simple and interesting for the user. Software system on-line test is software that requires interaction with the user,
and maintenance of adaptive software. Because the test system on-line requires the development of software to accommodate the needs of this growing quickly. This paper to analyse the Model-View-Controller and try development, to apply
it in the development of software system test on-line.
Keywords: Model-view controller, architecture, pattern on-line test
I. INTRODUCTION
1.1.Background
Software development is a complex task. Software
development process, from concept to implementation,
known by the term System Development Life Cycle (SDLC)
which includes stages such as requirement analysis,
design, code generation, implementation, testing and
maintenance (Pressman, 2002; 37-38). In the software
development also requires architecture or pattern that can
help in the development of software.
Currently, many software development utilizing a
concept of programming by using the Model-viewcontroller pattern, which is the architecture with a lot of
help in the development of software that is easy to
maintenance, especially those based interaction with the
GUI (Graphical User Interface) and the web. This is in
accordance with the statement Ballangan (2007) : MVC
pattern is one of the common architecture especially in
the development of rich user interactions GUI Application.
Its main idea is to decouple the model. The interaction
between the view and the model is managed by the
controller.
In addition Boedy, B (2008) [1] states that: MVC is a
programming concept that applied to many of late. By
188
189
190
191
IV. CONCLUSION
Results from this research are:
1. Development of software can be divide in several
layers.
2. Divide layer in the development of software
architecture with the concept of Model-ViewController can assist in system maintenance and
evolution
3. Software development Testing system
architecture apply online with the ModelController-View very helpful in further
development, because the software system test
online this very need for reliability Users
interface.
REFERENCES
[1] Boedy, B, 2008, Model-View-controller, avalable on
http; / / MVC / Model-view-controller.html
192
Paper
Saturday, August 8, 2009
13:55 - 14:15
Room AULA
Safaruddin A. Prasad
Staf Pengajar Fisika, FMIPA, UNHAS, Makassar
Al-Bahra L.B.
Staf Pengajar STMIK Raharja, Tangerang
E-mail : ausanaprasad@yahoo.com, au3sa4na5@yahoo.co.id
E-mail : hudzaifah.alba@yahoo.com
Abstract.
In this paper, we propose an identification method of the land cover from remote sensing data with combining neuro-fuzzy
and expert system. This combining then is called by Neuro-Fuzzy Expert System Model (NFES-Model). A Neural network
(NN) is a part from neuro-fuzzy has the ability to recognize complex patterns, and classifies them into many desired
classes. However, the neural network might produce misclassification. By adding fuzzy expert system into NN using
geographic knowledge based, then misclassification can be decreased, with the result that improvement of classification
result, compared with a neural network approximation. An image data classification result may be obtained the secret
information with the inserted by steganography method and other encryption. For the known of secret information, we
use a fast fourier transform method to detection of existence of that information by signal analyzing technique.
Keywords: steganography, knowledge-based, neuro-fuzzy, expert system, signal analyzing.
1. Introduction
Neuro-fuzzy expert system model (NFES Model) can be
divided into two sub-systems which consist of neuro-fuzzy
system and expert system. Neuro-fuzzy system is a combination of neural networks and fuzzy systems, where each
has independent areas. The connections to each other are
merely marginal but both bring benefit for the solution of
many problems.
Lotfi A. Zadeh introduced the concept of fuzzy sets in
1965. In 1974, E.H. Mamdani invented a fuzzy inference
procedure, thus setting the stage for initial development
and proliferation of fuzzy system applications. Logic programming also played an important role in disseminating
the idea of fuzzy inference, as it emphasizes the importance of non-numerical knowledge over traditional mathematical models [4].
Expert systems are computer programs which use symbolic knowledge to simulate the behavior of human experts, and they are a topical issue in the field of artificial
intelligence (AI). However, people working in the field of
AI continue to be confused about what AI really is proposed by Schank [6]. In other words, there are attempts to
conf properties (or attributes) to a computer system under
the guise of AI, but the practitioners find difficulty in defining these properties! It is generally accepted that an
expert system is useful when it reaches the same conclusion as an expert [7].
The most recent wave of fuzzy expert system technology
uses consolidated hybrid architectures, what we call Synergetic AI. These architectures developed in response to
the limitations of previous large-scale fuzzy expert systems.
193
The NFES-Model is developed and implemented to analyze of land cover classification on the field of Maros District on South Sulawesi Province, Indonesia.
The fuzzy logic is used to analyze of remote sensed data
for land cover classification since Maros District is complex geography, the remotely sensed image has various
geometrical distortions caused by an effect the complex
earth surface, such as the shadow of hills.
Remotely sensed image data sampled from a satellite includes specific problems such as large image data size,
difficulty in extracting characteristics of image data and a
quantity of complex geographical information in a pixel
due to its size of 30 m2. In the past, we have used a statistical method such as a maximum likelihood method without
considering these problems. The maximum likelihood
method identifies a recognition structure by a statistical
method using the reciprocal relation of density value distribution per one category. This method is based on an
assumption that image data follows the Gaussian distribution.
yi(1) = xi(1)
Layer-2 : The fuzzification layer. Neurons in this layer represent fuzzy sets used in the antecedents of fuzzy rules. A
fuzzification neuron receives a crisp input and determines
the degree to which this input belongs to the neurons
fuzzy set. The activation function of a membership neuron
is set to the function that specifies the neurons fuzzy set.
We use triangular sets, and therefore, the activation functions for the neurons in layer-2 are set to the triangular
membership functions. A triangular membership function
can be specified by two parameters {a, b} as follows:
194
In a neuro-fuzzy system, intersection can be implemented by the product operator. Thus, the output of neuron I in layer-3 is obtained as:
(4)
Oi
= R 2 R 3 R 4 R 6 R 7 R 8 = O1
Which,
N = number of pixels in the j-th class
x = value of pixel in the classification image
G = value of pixel in the ground-truth image.
Then index of three (3) showed the input data is
consist of three channels.
Step-4 : IF j > t THEN return to step-2 (t = tolerance)
Step-5 : make the step-4 until km iteration
Step-6 : IF j > t THEN return to step-1
d ( x1 , x2 )
= x1 x2
{(x x ) (x x )}
1/ 2
1/ 2
N 2
2
= x1i x2 i
i =1
(1)
Where N is number of spectral components.
(x
3
j =
k =1 i =1
k
i
Gik
3* N
195
(x M ) (x M )
t
SSE
C i xC i
xM
C i xC i
2
i
(2)
Where Mi is the mean of the i-th cluster and xCi is a pattern assigned to that cluster [6][7].
3.2. Pattern Recognition by Neuro-Fuzzy System
In this part, do it processing in to four steps. The first step
is fuzzification processing of crisp value. The second step
is editing of membership function, include to determining
of number of membership function for each input. The
thirth step is training and testing process. The fourth step
is defuzzification processing for pre-classified requirement.
The next step is checking the pre-classified result. What it
optimal classification or not? If pre-classified result or next
classified result is not optimal yet, then the up-dated of
knowledge base and then checking classified in loop.
Optimalization of classified is doing by seek number of
misclassification. If the value of misclassification to reaches
is desire, then the checking is stopped. Then we obtained
the final classification. From the final classification result,
we are checking it image about the existing of signal noise
196
With the premis category for production rules, then attribute items to become what the pixel value to be appropriated with the mean symbol in table-1?. And because
f (t ) =
F e
n =
jn o t
, o =
2
T
(3)
197
=
in which n is an integer,
(9)
Where B(r) and C(r) will be recognized as the discrete Fourier transform of the sequences Y(k) and Z(k).
T /2
Fn =
1
f (t )e jn ot dt
T T / 2
(4)
F ( ) =
f (t )e
jt
dt
(5)
Let the sequence (k ) , k = 0,,K-1 be the set of K
samples taken of f(t) over the sampling period 0 to To. The
samples correspond to times
. The continuous
(6)
with
.
(7)
It is convenient to consider the reduced form of (6):
, r = 0,,K-1
(8)
Assume K is even; in fact the algorithm to follow will require K to be expressible as K = 2m where m is an integer.
From form two sequences Y(k) and Z(k) each of K/2
samples. The first contains the even numbered samples of
and second the odd numbered samples,
Y(k): f(0), f(2), , f(K-2)
Z(k): f(1), f(3), , f(K-1)
So that
Y(k) = f(2k)
Z(k) = f(2k + 1) , k = 0,, (K/2)-1.
5. Conclusion
198
REFERENCES
[1] Funabashi, M. et al., Fuzzy and neural hybrid expert
system: Synergetic AI, IEEE Expert, 1995, pp. 32-40.
[2] Skidmore et al, An operational GIS expert system for
mapping forest soil, Photogrammetric Engineering
& Remote Sensing, 1996, Vol.62, No.5, pp. 501-511.
199
Paper
Saturday, August 8, 2009
16:00 - 16:20
Room L-212
Abstract
As a combinatorial problem, university examination timetabling problem is known to be NPcomplete, and is defined as
the assignment of a set of exams to resources (timeslots and rooms) subject to a set of constraints. The set of constraints
can be categorized into two types; hard and soft. Hard constraints are those constraints that must by compulsory
fulfilled. Soft constraints are non-compulsory requirements: even though they can be violated, the objective is to
minimize the number of such violations. The focus of this paper is on the optimization problem, where the objective is to
find feasible solution i.e. solution without hard constraint violation, with minimum soft constraint violations. Some
heuristics based on the simulated annealing (SA) are developed using three neighborhood structures to tackle the
problem. All heuristics contain three phases, first a feasible solution is sought using a constructive heuristic, followed
by the implementation of SA heuristics using single neighborhood. In Phase 2, a hybrid SA is used to further minimize
the soft constraint violations. In Phase 3 the hybrid SA is run again several times using different random seeds to
proceed on the solution provided by Phase 1. The heuristics are tested in the instances found in the literature and the
results are compared with several other authors. In most cases the performance of the heuristics are comparable to the
current best results and they even can improve the state-of-the art results in many instances.
Keyword: Computational Intelligence, Simulated Annealing, Heuristic/ Metaheuristic, Algorithm, University
Examination Timetabling, Timetabling/ scheduling, Combinatorial Optimization
1. INTRODUCTION
The goal of an Examination Timetabling Problem (ExTP) is
the assignment of exams to timeslots and rooms, and the
main requirement is that no students nor invigilators
should be assigned to more than one room at the same
time. Among the most representative variants of ExTPs, it
must be cited the uncapacitated and capacitated ones. In
the uncapacitated version, the number of students and
exams in any time slot is unlimited. Meanwhile, the
capacitated version imposes limitations on the number of
students assigned to every timeslot. Also, another point
worthy of mention is that the uncapacitated version of
examination timetabling is divided into two problems, i.e
uncapacitated with and without cost. The uncapacitated
without cost problem can be transformed into a Graph
Coloring Problem and has been addressed by the authors
in [16]. In this paper the uncapacitated with cost problem
will be addressed. A more complete list of examination
timetabling variants can be found in[12].
200
179
4. SA-based Heuristics
In this work the timetabling process is carried out in three
phases.
4.1 Phase 1. Constructive Heuristic (CH) + Single SA.
A Constructive Heuristic (CH) that is similar to the one in
[15,16] is used to find initial feasible solutions.
The feasible solutions found by this heuristic will be
further processed by a SA-based method to minimize the
number of soft constraint violations. Many kinds of SA
using the following three neighborhood structures are
tested.
180
201
10
9
T1 T2
1
2
5
8
9
3
4
6
7
10
T1 T2
and Kempe SA each of which uses simple, swap and
Kempe chain neighborhood respectively. This group of
SAs is referred to as single SA as they use only one
neighborhood structure. After conducting some tests it
becomes clear that the SA using the Kempe chain
neighborhood structure is the most suitable SA to be used
in this Phase. The use of the CH followed by Kempe SA
will be referred to as Phase 1 heuristic.
4.2 Phase 2. Hybrid Simulated Annealing
The use of Single SAs and a Hybrid SA called HybridSA
are tested in this Phase. HybridSA is a SA using two
neighborhood structures, embedded by the Kempe Chain
Hill Climbing Heuristics ( KCHeuristics).
The neighborhood used in the SA part are simple
neighborhood and swap neighborhood. The pseudocode
for Hybrid SA is presented in Figure 3.
Figure 3. The pseudocode for HybridSA Based on some
tests, the SA process using a Kempe chain neighborhood
- in the first stage, followed by the HybridSA in the second
stage seems to be the best combination for the problem.
The implementation of Phase 1 heuristic followed by the
HybridSA will be called Phase 2 heuristic.
4.3 Phase 3. Extended HybridSA
The Extended HybridSA is essentially an extension of
Phase 2. In this phase the Hybrid SA in the second phase
is rerun several times fed by the same good solution
provided by the Phase 1 heuristic. That is, after running
Phase 1 and Phase 2 several times, the solution found by
the Phase 1 heuristic which gives the best solution in
Phase 2 will be recorded. Subsequently, the HybridSA is
rerun 10 times using the recorded solution with different
random seeds. This will be referred to as
Phase 3 heuristic.
The reason behind this experiment is that the solutions
produced by the Kempe SA in the first phase must be
good solutions representing a promising area.
202
5. Computational Experiments
5.1 The Instances
The instances used for the examination timetabling
problem derive from real problems taken from institutions
worldwide and can be downloaded from http://
www.cs.nott.ac.uk/~rxq/data.htm. These instances were
introduced by Carter et al. [8] in 1996 and in turn were
taken from eight Canadian academic institutions; from the
King Fahd University of Petroleum and Minerals in
Dhahran; and from Purdue University, Indiana, USA. The
number of exams are ranging from 81 to 2419 and the
number of students that are to be scheduled ranging from
181
182
203
6. CONCLUSION
With this data set the HybridSA in collaboration with the
Phase 1 heuristic performed well and the results were
comparable to other methods. However, this approach was
not robust enough to handle the problem.
The extended HybridSA seemed to be a better choice for
this kind of problem. It could match the best cost found
so far in the literature, and even improve the quality of the
solutions for many instances.
7. REFERENCES
[1] S. Abdullah, E.K. Burke, B. McCollum, 2005, An
Investigating of Variable NeighborhoodSearch for
University Course Timetabling, in Proceeedings
of Mista 2005: The 2nd Multidisciplinary
Conference on Scheduling: Theory and
Applications, New York, pp.413-427.
[2] S. Abdullah, S. Ahmadi, E.K. Burke, M. Dror,(2007),
Investigating Ahuja-Orlins Large Neighborhood
Search Approach for Examination Timetabling,
Operation Research Spectrum 29) pp.351-372.
[3] H. Asmuni, E.K. Burke, J. Garibaldi and B. McCollum,
in: E. Burke and M. Trick (Eds.): PATAT
2004,Lecture Notes in Computer Science, 3616,
Springer-Verlag Berlin Heidelberg 2005, (2005) pp.
334-353.
[4] E.K. Burke, A.J. Eckersley, B. McCollum, S. Petrovic, R.
Qu, ,(2006).Hybrid Variable Neighborhood
Approaches to University Exam Timetabling,
Technical Report NOTTCS-TR-2006-2, School of
CSiT University of Nottingham.
204
183
184
205
Paper
Saturday, August 8, 2009
16:25 - 16:45
Room L-212
Tri Kuntoro P.
School of Computer Science, Gajah Mada University, Yogyakarta, Indonesia
mastri@ugmgtw.ugm.ac.id
Abstract
A convergence of IP and Television networks, known as IPTV, gains popularity. Unfortunately, todays IPTV has limitation, such as using dedicated private IPv4 network, and mostly not considering quality of service. With the availability
of higher speed Internet and the implementation of IPv6 protocol with advanced features, IPTV will become broadly
accessible with better quality. IPv6 has a feature of Quality of Service through the use of its attributes of traffic class or
flowlable. Existing implementation of current IPv6 attributes is only to differentiate multicast multimedia stream and non
multicast one, or providing the same Quality of Service on a single multicast stream along its deliveries regardless
number of subscribers. Problem arose when sending multiple multicast streams on allocated bandwidth capacity and
different number of subscribers behind routers. Thus, it needs a quality of service which operates on priority based for
multiple multicast streams. This paper proposes a QoS mechanism to overcome the problem. The proposed QoS mechanism consists of QoS structure using IPv6 QoS extension header (generated by IPTV provider) and QoS algorithm in
executed in routers. By using 70% configuration criteria level and five mathematical function models for number of
subscribers, our experiment showed that the proposed mechanism works well with acceptable throughput.
Index Terms IPTV, IPv6, Multiple Multicast Streams, QoS Mechanism
I. INTRODUCTION
A convergence of two prominent network technologies,
which are Internet and television, as known as Internet
Protocol Television (IPTV), gains popularity in recent years,
as in July 2008 Reuters television survey reported that
one out of five American people watched online television
[1]. With the availability of higher speed Internet connection, the IPTV becomes greatly supported for better quality.
IPTV provides digital television programs which are distributed via Internet to subscribers. It is different from conventional television network, the advantage of operating
an IPTV is that subscribers can interactively select television programs offered by an IPTV provider as they wish
[2]. Subscribers can view the programs either using a computer or a normal television with a set top box (STB) connected to the Internet.
206
207
(1)
where :
Ndw
: Number of all subscribers only under the router
Ntot
: Number of total subscribers request-
208
b. Queue
Queue consists of N number of queue priority levels. Every level is a queue which can hold incoming multicast
stream to be forwarded. The priority queue levels are based
on QoS value. These levels are shown in Figure 4.
c. Scheduling
Scheduling for datagram forwarding is to select a queue
from which a dequeuing process to forward a queued
multicast datagram to corresponding link occurs. The algorithm is shown in Figure 5.
IV. ExperimentS
The experiments are conducted by using NS-3 network
simulator to measure IPTV performance with regard to QoS
measurements (delay, jitter and throughput). However,
before doing experiments, some steps are carried out which
include configuring network topology, setting up QoS
mechanism for each router, and configuring five mathematical function models to represent the models of the numbers of subscribers joining multicast streams.
IV.1 Network Topology
The network topology for our simulation is configured as
in Figure 6.
V.
209
210
VI. CONCLUSION
The proposed QoS mechanism works well as expected.
Based on the experiments, with 70% criteria level and five
mathematical function models for subscribers, all type of
traffic can be successfully forwarded with various throughputs which are about 35% to 74%. However, throughputs
of unicast traffic are less than multicast streams, because
the unicast traffic is placed into the lowest queue priority
level.
References
[1]Reuters, 2008, Fifth of TV viewers watching online:
survey, 29 July 2008, [online], www.reuters.com/
a r t i c l e / i n t e r n e t N e w s /
idUSN2934335520080729?sp=true
211
Paper
Saturday, August 8, 2009
16:25 - 16:45
Room L-210
Abstract
A control system uses sampling frequency (or time) to set the time interval between two consecutive processes. At least
there are two alternatives for this sequence. First, the controller reads the present value from sensor and calculates the
control action then sends actuation signal. The other alternative is the controller reads the present value, send the
actuation signal based on the previous calculation and calculates the present control action. Both techniques have their
own advantages and disadvantages. This paper evaluates which the best alternative for slow response plant, i.e. room
control system. It is controlled by AVR microcontroller connected to PC via RS-232 for data acquisition. The experiment
shows that the order of processes has no effect for the slow response plant
Keywords sampling, temperature, control
I. Introduction
Sampling frequency is used to set the time interval between two consecutive actions. For 1 kHz, the time interval is 1ms. This time interval must be less than the dynamic behavior of the plant. Good control system must
choose appropriate sampling frequency in order to get
good performance but this is not enough. The order of the
action on one sampling time must be considered also.
This paper evaluates the idea in [1].
The goal of the experiment is to implement the idea in [1]
and compare it with the ordinary order.
The sampling time might be disturbed by the delay for
some reasons. This makes the system has sampling jitter,
control latency jitter, etc. When the delay is equal to the
sampling time then we have a problem [2].
If the processes inside one sampling time have periods,
then we discuss the multirate sampling control [3]. Here,
each process has its own sampling time so we can insert
acceptable delay time to compensate the control action.
But what if the delay time exceeds the limit?
Since sampling time and processes give a lot of influences,
we have to choose the sampling time appropriately and
consider the processes and the possibility of delay in the
212
This alternative guarantees that the time interval as discussed in above section is constant for all processes. But
the controller uses previous result of control action calculation for current situation. It looks like it does not make
sense for the current situation is handled with calculation
which is made based from previous situation.
Figure 1. Alternative 1
Figure 2. Alternative 2
213
Next is experiment with high priority Interrupt Service Routine (ISR). It is simulated with random delay and its value
will not exceed certain limit such that all processes is still
within one sampling time and it will be called interrupt type
1.
Figure 8a. Interrupt type 1, method 1 with disturbance (dry
ice)
Now the random delay is set more than one sampling time.
This kind of interrupt will be called as interrupt type 2.
Figure 7a. Interrupt type 1, method 1 with disturbance (window)
214
Experiment in figure 10a and 10b need 5.1 and 5.4 minutes
to handle this disturbance for method 1 and 2.
IV. Discussion
215
V. Conclusions
From the experiments the authors conclude that the order
of the process in one sampling time has no effect for this
plant. This will be the same also for other slow response
plant. The sampling time used in this project is small enough
compare to the dynamic behavior of the plant. It is interesting to use bigger sampling time because the 2nd method
use actuated signal from the previous sampling.
[6] Fairchild Semiconductor, MOC3020 Datasheet. Accessed on March 18, 2006 <http://
w w w. a l l d a t a s h e e t . c o m / p d f / 2 7 2 3 5 / T I /
MOC3020.html>
The disturbance signals, i.e. window and dry ice give different result. The authors recommended dry ice for this is
more stable than by opening the window. In order to have
faster response for the heating process, it is necessary to
change the bulbs with heater.
References
[1] Amerongen, J., T. J. A. De Vries. Digital Control Engineering. Faculty EE-Math-CS, Department of Electrical Engineering, Control Engineering Research
Group, University of Twente. 2003
[2] Gambier, A. Real-time Control System: A Tutorial. Proceeding of 5th Asian Control Conference. Australia,
2004
[3] Fujimoto, H and Y. Hori. Advanced Digital Motion
Control Based on Multirate Sampling Control. Proceeding of 15th Triennial World Congress of the International Federation of Automatic Control
(IFAC), Barcelona, Spain, 2002.
216
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-212
Suryo Guritno
Untung Rahardja
Hidayati
Ilmu Komputer
Universitas Gadjah Mada
Indonesia
suryoguritno@ugm.ac.id
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
untung@pribadiraharja.com
STMIK RAHARJA
Raharja Enrichment Centre (REC)
Tangerang - Banten, Republic of Indonesia
hida@pribadiraharja.com
Abstract
In support of continuing prosperous evolution of information technology, statistic multivariate field of study has always
been one the fundamental platform needed in laying the principal foundation of the knowledge. Destination information
system implementation in various companies in general, namely to help improve performance and service to the customer
more effective and efficient. Universities in the world, for example, to avoid errors and data redundancy, system information is used to form one Schedule Plan Study (JRS) students each semester. But it was not expected, because of problems
with regard to space and time conflicts occur everywhere. To anticipate, while the experiment is done using the concept
of permutation combination, which is the application of the science branch of multivariate statistics in IT. The concept is
enough to help decrease the number of conflicts more than 50% of all conflicts. However, the concept is less effective and
not in accordance with their needs, can not be detected even earlier if the status of permanent conflicts. Method is known
as Auto Generated Probabilistic Combination (AGPC). AGPC is a method that combines sequence difference from the
objects that is to be done without repeating the object of every order, and the sequence criteria are based on the status of
conflicts, permutation for each item per-item conflict. In this article have also identified at least 4 issues in regard to the
fundamental concept of permutation combination, defines the method Auto Generated Probabilistic Combination (AGPC)
as a means of tackling the new conflicts, and that is the last AGPC in the SIS-OJRS in Raharja Universities. AGPC this
method is very important to be developed especially in the process of JRS, because its function is to provide effective
warning in the status of the conflicts that are permanent, and to make the process of re-permutation. It can be said that
this method AGPC erase the operational work in approximately 80% of the original work and does not need to do to
cancel the entire schedule conflicts manually.
Index Terms JRS, Conflicts, Permutation Combination, AGPC
I. Introduction
Preparation of Schedule Study Plan (JRS) is made as one
of the regular agenda that is run each semester in the university environment. Preparation activities that are conducted on all students to take a course or determine who is
taken in each semester. The process is a complex schedule
in determining whether the determination of the schedule
and schedule students to take enough lecturers and improves as the concentration of which is dominant for all
time at that time. In order to avoid errors and data redundancy, the University set a policy to use a system informa-
217
218
Card
Box
a * c d [b] [ ] [ ] [ ]
^ 3 choice: a, c, d
Because two cards have been used, then for the third, we
have two options to stay.
Card
Box
a * c * [b] [d] [ ] [ ]
^ 2 choice: a, c
The last one, we only have a choice.
Car d
Box
a * * * [b] [d] [c] [ ]
^ 1 choice: a
Last condition of all boxes are filled.
Card
Box
* * * * [b] [d] [c] [a]
In each step, we have a number of options that are reduced. So the number of all possible permutation is 4 3
2 1 = 24 units. If the number of card 5, the same way that
there can be 5 4 3 2 1 = 120 possibilities. So if the
generalization, the number of permutation of n elements is
n!.
III. Problems
Scanning may permutation combination method can overcome these conflicts, has even succeeded in lowering the
number of conflicts more than 50% of the original. But
after that the result be not the maximum, it is not effective
and not in accordance with their needs. Permutation combination method has a job that is sort objects into a sequence that is not the same as the previous order. Thus,
this method only reorder subjects, without looking at the
number of classes devoted to each subject. Basically if
you have 2 subjects, while the second course is open only
1 class, schedule conflicts and coincidences, even if the
permutation is done how many times the results are certainly conflicts. This is the reason why the method is said
permutation combination is not effective. Because you can
not detect the fact that the earlier status conflicts are permanent. Not only that, permutation method can be any
combination does not comply with the requirement due
course sequence generated does not match that should
be. This means, if there is a student taking 4 subjects ABCD,
and accidental conflicts in the 2 subjects, namely subjects
C and D. Then the permutation is done so that the order be
BACD, whether the status of conflicts may be missing?
The answer, most likely state conflicts will not be lost.
Because that is clear is that conflicts subjects C and D,
and the beginning of the permutation B subjects, the subjects are clearly B is not conflicts, so it does not need to
change a schedule. Now the problem is why this combination permutation method does not comply with the said
requirement, because this method is less sensitive to the
status of conflicts.
Based on the contention that there are 4 issues preference
of making this article, namely:
1. Such as whether the method can be effectively used to
overcome conflicts?
2. Such as whether the method can inform the status of
earlier conflicts that are permanent?
3. Such as whether the method can be sensitive to the
status of conflicts and permutation for subjects who
have conflicts?
4. Such as whether the method can not only stop permu
tation to sort the subjects, but also sort by class opened
per-course?
IV. Troubleshooting
To overcome the problems as described above, can be
done through the application of the method Auto Generated Probabilistic Combination (AGPC). Here are 5 characteristics of the Auto Generated Probabilistic Combination
(AGPC) that is applied in the process of handling conflicts
Schedule Study Plan (JRS):
1. Data required classes for each subject that are con
flicts.
2.
219
220
221
222
div>
Permutation Run
elseif Nom3 > 1 then
jika = 2
if Nom3b=2 then
Nom5=1
seleksi kelas yg No=1
Sql9a=select distinct * from CT_List where
NIM=&trim(strnim)& and No=1 order by Ke
set rs9a=conn.execute(Sql9a)
while not rs9a.eof
seleksi kelas yg No=2
Sql9b=select distinct * from CT_List where
NIM=&trim(strnim)& and No=2 order by Ke
set rs9b=conn.execute(Sql9b)
while not rs9b.eof
insert kode_mk untuk No=1
Sql10a=insert
into
CT_List2(Ke,Kode_MK,Kelas,NIM,No,Jml_Kelas)
vaules(&Nom5&,&rtm
i (rs9a(Kode_MK)&,&rs9a(Keals)&,&rtm
i (srtnm
i )&,&rs9a(No)&,&rs9a(Jm_lKeals)&)
set rs10a=conn.execute(Sql10a)
insert kode_mk untuk No=2
Sql10b=insert
into
CT_List2(Ke,Kode_MK,Kelas,NIM,No,Jml_Kelas)
vaules(&Nom5&,&rtm
i (rs9b(Kode_MK)&,&rs9b(Keals)&,&rtm
i (srtnm
i )&,&rs9b(No)&,&rs9b(Jm_lKeals)&)
set rs10b=conn.execute(Sql10b)
Insert MK yg lainnya
Sql11=select distinct Kode_MK from CT_11_7_12_2
where NIM=&trim(strnim)& and Bentrok=0"
set rs11=conn.execute(Sql11)
Nom6=3
while not rs11.eof
cari jumlah kelas yg dibuka untuk kode_mk tersebut yg
tidak penuh
Sql12=select COUNT(Kelas) as jum2 FROM (select TOP
100 PERCENT Kelas from CT_11_7_12_2 where
(Kode_MK=&trim(rs11(Kode_MK))& and NIM is
null) GROUP BY Kelas ORDER BY Kelas) DERIVEDTBL
set rs12=conn.execute(Sql12)
insert kode_mk nya
Sql13=Insert
into
CT_List2(Ke,Kode_MK,NIM,No,Jml_Kelas)
Values(&Nom5&,&trim(rs11(Kode_MK))&,&trim(strnim)&,&Nom6&,&rs12(jum2)&)
set rs13=conn.execute(Sql13)
Nom6=Nom6+1
rs11.movenext
wend
cari kstnya
cari data mhsnya
Sql14=select * from sumber_mahasiswa where
NIM=&trim(strnim)&
set rs14=conn.execute(Sql14)
223
224
V. Conclusion
Auto Generated Probabilistic Combination (AGPC) is an
important part in the process of schedule Plan Study (JRS).
How it works is sensitive to the status of conflicts based
on the permutation AGPC make this exactly right to handle
conflicts core problem. In addition AGPC can provide early
warning status if the conflicts are permanent, so that the
permutation does not need to be done. This is very helpful
because in addition to saving hard drive capacity, AGPC
also provide a clear status of the schedule can not be lost
status conflicts.
References
[1]Andi (2005). Aplikasi Web Database ASP Menggunakan
Dreamweaver MX 2004. Yogyakarta: Andi Offset.
[2]Bernard, R, Suteja (2006). Membuat Aplikasi Web
Interaktif Dengan ASP. Bandung: Informatika.
[3]Untung Rahardja (2007). Pengembangan Students
InformationServices di Lingkungan Perguruan Tinggi
Raharja. Laporan Pertanggung Jawaban. Tangerang:
Perguruan Tinggi Raharja.
[4]Anonim (2009). Standar Operating Procedure (SOP) Institute Pertanian Bogor.
[5]Anonim (2009). Standar Operating Procedure (SOP)
Penyusunan KRS dan KPRS UIN Sunan Kalijaga.
[6]Santoso (2009). Materi I : Permutasi dan Kombinasi.
Diakses pada tanggal 5 Mei 2009 dari : http://
ssantoso.blogspot.com/2009/03/materi-i-permutasidan-kombinasi.html
Paper
Saturday, 8 August 2009
15:10 - 15:30
Room M-AULA
ABSTRACT
Dignity Pembangunan Jaya school that bernaungan with Dignity Education Foundation, in carry on its business
process doesnt take down from ITs support. That ITs purpose especially in back up service to student / schoolgirl and
oldster. So far was become sumberdaya ITs change supporting. Changing that generally is mark sense commutation or
application Pembangunan Jaya, changing supporting infrastructure, etc.. This changed effort is meant to be able to more
get ITs point, so gets to back up service process eminently. Research that worked by it does analisis to set brings off IT and
develops solution proposal get bearing by set to bring off IT, by use of default COBIT (Control Objectives Information and
related Technolgy), with emphasis on domain deliver and support (DS), one that constitutes forwarding needful service
sooth. This research is deep does data collecting, with pass through kuesioners purpose to get data about system which
walks and interview be utilized to know next expectation.
Key word: Manner brings off IT, COBIT
1. BACKGROUND
Information technology (IT) presto amends, and it gives
its exploit opportunity. That developing gets to give opportunity will innovate product or new service gets ITs
support basis, so gets to make firm more amends or last
regular. ITs purpose to back up firm business process,
slated that happening process appropriate one is expected.
But such, ITs purpose not only wreaks benefit, but can
also evoke jeopardy. In result qualified information service, information adjusment of technology (IT) constituting absolute requirement needful. In a general way implement IT will be espoused a cost requirement consequence
that tingi, well of procurement facet hardware ,
Pembangunan Jaya software , implementation and system
preserve as a whole. That thing did by expectation gets to
be reached its strategical and ITs strategy already been
defined in particular and plan and firm business strategy
as a whole.
To the effect firm will be reached if IT Diimplementasikans
planning and strategy ala in harmony with planning and
225
purpose especially in back up service to student / schoolgirl and oldster. So far was become sumberdaya ITs change
supporting. Changing that generally is mark sense commutation or application Pembangunan Jaya, changing supporting infrastructure, and doesnt mark sense audit IT.
This changed effort is meant to be able to more get ITs
point, so gets to back up service process eminently. Infrastructure hardware and also software one that available
at all unit which is PC (workstation), server, printer etc.,
generally difungsikan to carry on application that prop
knockabout operational.
That implementation sets to bring off IT happens effective, organization needs to assess insofar which sets to
bring off IT that present happens and identify step-up
who can be done. That thing is prevailing on all process
which needs to be brought off that consists in IT and
manner process brings off IT Is alone. Model purpose
maturity (maturity) in this case will make easy estimation
by pragmatic approaching most structure to easy scale
apprehended and consistent.
226
3. STUDY
So far to evaluate manner brings off IT who is engaged
hardware and software exploit at Schooled Dignity
Pembangunan Jaya was done precisely, for it to need marks
sense measurement to that default. Default that is utilized
is COBIT (Control Objectives Informatioan and Related
Technology).
Respondent determination to be adjusted by ITs service
in its bearing with service on user. Respondent in this
case will involve indigenous respondent a part or logistic
IT and structural management. Respondent involvement
that originates function upon because function TI acts as
provider of ITs service, meanwhile another function as
user of service.
Respondent is agglomerated bases ITs function and non
IT. ITs respondent is differentiated group up senior and
staff group. ITs group intended senior is range structural
management and functional pro at IT. ITs group staff here
fathoms a meaning is ITs staff that gets bearing face to
face with performing services IT that current happens.
Meanwhile group non IT, ranging structural management
at deep Foundation job unit Dignity Education.
This respondent agglomeration is meant for gets to get
view that adequately medley da helps in do ITs process
elect its following. There is amount even respondent
wholly being pointed out as it were on III. table 1 hereunder.
Respondent
Total
TI is Staff Non IT 6 4
Total
10
Respondent i. table on elect processes
This indentifikasis performing will result elected process,
and it constitutes legiatan or elect activity processes,
where in aktvitas this will choose ITs processes from domain DS
3.1 Sample Elect method
Tech snow ball sampling which is data collecting which is
begun of some bodies that criterion pock to be made subject, be next that subject as information source about men
which can make sample.
227
228
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
Manage Problems
DS11
Manage is Data
DS12
DS13
Manage Operations
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
Manage Problems
Manage is Data
Manage the Physical Environment
DS13
Manage Operations
Maturitys attribute
Requirement On Processes(%)
now
one that is expected
AC
Awareness and Communication
PSP
Policies, Standards and Procedures
TA
Tools and Automation
ONE
Skills and Exepertise
RA
Responsibility and Accountability
GSM
setting and Measurements field goal
Averagely Totaled
Table IV.. Measurement result increases maturity on DS is
chosen
Respondent
Total
SPJS principal 1
Spv IT 1
IT is TKs Unit 1
TU is TKs unit 1
IT is SDs Unit 1
TU is SDs Unit 1
IT is SMPS Unit 1
TU is SMPS Unit1
IT is SMAS Unit 1
TU is SMAS Unit
TOTAL 10
229
DS7
0%
DS8
10%
DS9
0%
DS10
0%
DS11
30%
DS12
0%
DS13
0%
230
kuisioners recapitulation result on Table upon can be simplified by merges requirement zoom So not necessarily ,
Not necessarily and Applicable as requirement zoom
Not Necessarily , and merges requirement zoom Need
and Really Need as requirement zoom Need .
Moderation result increases that requirement ditun jukkan
on this following Table:
Code Process
inessential
essential
DS1
Define and brings off service zoom 0%
100%
DS2
Bringing off third party service
0%
100%
DS3
Bringing off Performance and capacity
10%
90%
DS4
Ensuring sustainable service
20%
80%
DS5
Ensuring systems security
0%
100%
DS6
Doing identification and cost allocation
0%
100%
DS7
Teach and coaches user 10%
90%
DS8
Adjoin and gives tips to user
10%
90%
DS9
Bringing off configuration 0%
100%
DS10
Bring off about problem and incident
0%
100%
DS11
Bringing off data 0%
100%
DS12
Bringing off facility
0%
100%
DS13
Bringing off operation
0%
100%
Table VII. Recapitulation moderation result kuisioner management awareness base requirement zoom to process
Graphic appearance of yielding recapitulation management
awareness base requirement zoom to TIs processes Dignity Pembangunan Jaya Schools can be seen on this following image
d.
3 -Defined Process, process have most documentation and documents, observation and alae uncommitted reporting periodic.
e.
4 -Managed and Measurable , process most
keeps company and be measured.
f.
5 -Optimized, best practice , was applied deep
management process.
ITs processes whatever available is evaluated by use of
maturity model then as compared to maturity zoom targets
that concluded of vision, target and interview result, therefore gets to be concluded that for gets to back up Schooled
aim attainment Dignity Pembangunan Jaya at least maturity zoom that is done has available on zoom 4( Managed
and Measurable).
Base interview result with respondent, gotten by answer
and statement those are proposed while do measurement
interview increases maturity can be seen on attachment B.
Level maturity already most ranging identification on level
maturity 1 (Ad Hoc Initial /) until 4( Managed and Measurable). Estimation result increases kamatangan that can
be seen on Table IV. 5 its followings:
Code
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
TIs process
Maturity zoom
Define and brings off service zoom 4
Bringing off third party service
4
Bringing off Performance and capacity
Ensuring sustainable service
2
Ensuring system security 3
Doing identification and cost allocation
Teach and coaches user 4
Adjoin and gives tips to user
2
Bringing off configuration 2
Bring off about problem and incident
Bringing off data 2
Bringing off facility
3
Bringing off operation
1
231
232
233
234
5. SHELL
Base examination already being done to hypothesises, have
resulted severally conclusion as follows:
1. IT s processes on domain DS that basically been
needed for gets to be applied. It pointed out by tall
estimation result on option 4 (essential) and 5
(momentously) on each IT s process.
2. Entirely domans deep process Delivery and Support
need for is done in TIs management Dignity
Pembangunan Jaya School. Largely ITs processes
better handled by TIs job Unit Dignity Pembangunan
Jaya Schools.
3. Largely increases current process maturity havent
reached expected target. To get up to target which is
expected therefore needed by penyetaraans steps that
doing to pass through recommendation application on
each process which have maturity zoom gap.
4. Base gap whatever available, therefore prescribed re
medial target that covers to process DS3, DS3, DS5,
DS6, DS8, DS9, DS10, DS11, DS12, and DS13.
5. Process who will be inserted deep model management
IT will choose to base process that has to increase
smallest maturity and ekspektasi is largest management.
DS13S process (Doing indentifikasi and cost
allocation) constituting process that has to increase
smallest maturity and ekspektasi is largest management.
235
LITERATURE
1. [IGI 2000] he COBIT Steering Committee and the IT Governance Institute, COBIT (3rd Edition) Implementation Tools Set, IT Governance is Institute, 2000 .
10. [ROBERT 2003] obert a., Accounting Information Systems (Prentices new jersey Hall, 2003)
3. [IGI 2005] he IT Governance Institute, COBIT 4.0: Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2005.
4. [GULDENTOPS2003]
Guldentops, E. (2003), Maturity Measurement First
the Purpose, Then the Method, Information Systems Control Journal Volume 4, Information Systems Audits and Control Association, 2003.
5. [INDRAJIT 2000] ndrajit, Echo r.., Information System
management and Information Technology, Gramedia,
Jakarta, 2000.
236
Paper
Saturday, August 8, 2009
16:50 - 17:10
Room L-212
Abstraction
Use of remote control system has been increasing in line with the globalization era in which human movement and the
broad and quick movement. At this time the public has known that for the controlling of an electronic home appliances
from remote can be done using the remote control. The problem of remote control by the limited distance between the
signal emanated by the remote and the signal received by the electronic home appliances, when the distance between
home electronic appliances which are controlled by a remote/controller through limit tolerance. To solve the problem
then the system must be designed using network technology that can be accessed anywhere and at anytime during the
availability of network. Internet network used by TCP/IP-based module starter kit network NM7010A-LF as a bridge
between the AVR microcontroller system with a computer network for controlling the electronic equipment, AVR
microcontroller system works as a web server. The result is a prototype of electronic home appliances that can control
home electronic appliances from a remote that is not barred by the distance, place and time so that ultimately improve the
effectiveness, efficiency and comfort in control.
Keywords : NM7010A, TCP/IP, AVR, ElectronicHome Appliances
I. INTRODUCTION
In general, people with tools such as remote controller
remote that can control an electronic equipment, such as
television, audio, video, cars, and so forth. Remote control
using constrained by the limited ability of the remote in a
signal that will be shed by the recipient. So that the use of
remote control is limited by distance, when distance between equipment is controlled with a controller that passes
the tolerance limit, then the equipment can not function
according to the desired.
Internet is an extensive network of global interconnect
and use TCP/IP protocol as the exchange of packets (packet
switching communication protocol) that can be accessed
by anyone, anywhere, can be used for various purposes.
Internet also has a large influence on the science, and
views the world.
To solve the problems of limited distance from the remote
control, the internet is a technology solution to be imple-
237
A. PROBLEMS
The limited distance control through the remote control is
caused by the limited power scattered from a remote control, the control can not be done from a distance as far
more extreme is the place or city. To control remotely the
electronic equipment, the distance between the means of
control and that control must be in the range of the remote
control coverage distance. Internet is an appropriate solution, because it is not by the distance, where there are the
internet connection controlling can be made.
To make communication between equipment that will be
controlled with the control, needed a tool that can control
the IP-based communications, and that tool is Wiznet
NM7010A module. Next problem is how the modules
(Wiznet NM7010A) can communicate with microcontroller
which is a tool to control actuator (electronic home appliances).
II. DISCUSSION
Internet technology can be used to overcome the distance
in a remote controlling system, for example in the case of
controlling the equipment in an electricity industry. Without being restricted by space and time, controlling the
process can be done from anywhere from a place that has
internet access. By controlling the system remotely
through internet, system controlling is no longer only for
the local scope, but global.
Process control can be done anywhere, anytime without
the officer / operator to come. System control can be done
via the Internet to test and supervision so that more practical and efficient. The diagrams for remote controlling
system via the internet protocol (IP) can be seen below.
Each sub-system in this design has the function and tasks
that related with one another, there are 6 sub-blocks of the
system will be described in relation with the system that
will be developed as follows :
Computer
Power Supply
RS 485 Converter
Microcontroller AVR
Driver
Electronic home appliances
Computer
Electronic home appliances
AVR Microcontroller
Driver
RS 485 Converter
Power Supply
238
Each component requires DC power, both of RS 485 converter, microcontroller and driver. Therefore, the system
require power supply. The schema for power supply can
be seen below
239
Each clock pulse that generate (on SCL path) are for every
bits data (on SDA path) that tranfer. So to allow 8-bit will
have 9 pulse to be generated in clock pulse (1 bit for ACK).
The chronology for the receiver device before provide signal ACK is as follows: when the sender is finished to send
the last bit (8th bit), sender release the SDA line to the pullup (remember the description open drain) so that a HIGH.
When such conditions occur, recipients must provide conditions LOW to SDA when the 9th clock pulse is located in
the HIGH condition.
If the SDA remains in HIGH conditions when in the 9th
clock pulse reach, then this signal is defined as a Not Acknowledge (NACK). Master device can generate a STOP
signal to finish the transfer, or repeat the START signal to
start a new data transfer.
240
To implement I2C protocol, will take samples from the routine of Peter Fleurys and CodeVision AVR I2C routine (using the C language). The first thing that happened in the
communication is server send START signal. This will inform slave devices are connected in I2C path that will have
data transfer to be done by the master device and the slave
devices must be ready to monitor whos address will be
called. Then the master device will send data such as address of slave device who want to access. Slave device
with the appropriate address given by master device will
forward the transaction data, the other slave device can
heed the transaction and wait until the next signal. After
get the slave device that match to the address, its time for
the master device to inform the internal address or registers
number to be written to or read from the slave device. Number of locations or registers number is dependent on the
slave device is accessed. After sending data forming the
slave device address and then the address of register internal slave who want to access, now is time to send the
master data bytes. Master device can continue to send
data bytes to slave device and byte by byte will be stored
in the register after that the slave device will automatically
increase the internal register address after each byte. When
the master device has finished writing all data to the slave
device, the master device will send a STOP signal to terminate data transaction. For the implementation of the I2C
code, used for examples I2C routines for AVR from Peter
Fleurys routine and I2C routines provided in CodeVision
AVR.
A. DESIGN
In the module NM7010A, Set DIP Switch J3 on the TCP/IP
Starter Kit for the I2C address = CCH, set the switch 2, 3, 6,
7 to OFF position and switch 4, 5, 8 to ON position. After
the module connected and share resources with the correct, open NM7010A.BAS using the BASCOM-AVR and
change line 50 on the program to fit the computer network
that will be used. For example:
For the computer network that dont have gateway, and the network setting value:
Subnet Mask
: 255.255.255.0
IP modul : 192.168.1.88 (nomor IP dari modul TCP/IP Starter
Kit)
241
the program open the port 80h socket 0 and start listening
to the network from socket 0, then the program returns to
step 3.
1.
242
243
III. SUMMARY
Based on test and design to the control module can be
244
summerized that:
a) DC motor as the electronic home appliances controlled
through the internet media with NM7010A network
module. Contolling the DC motor remotely can be done
By pressing F5 button on computers keyboard and
the computer connected to internet. We can control
the direction of its (DC Motor) rotation.
b) By using TCP/IP Starter Kit based on NM7010A net
work module as a bridge between DT-AVR Low Cost
Micro with Network or Internet, controlling the elec
tronic home appliances can be done remotely without
any barrier in distance and time.
LITERATURES
1. Asep Saefullah, Bramantyo Yudi W, (2008), Perancangan
Sistem Timer Lampu Lalu Lintas Dengan
Mikrokontroler AVR, CCIT Journal, Vol.2 No.1,
STMIK Raharja
245
Paper
Saturday, August 8, 2009
15:10 - 15:30
Room L-210
Abstract
Diagnostic system of Dermatitic based on Fuzzy logic constructed with seven indication variables. These variables
have different intervals and used for determining status of domains in membership function of variables. The domains
classification identified as : very light, light, medium, heavy, chronic. The classification obtained from intuition and
confirmed to the expert. Membership function which built based on fuzzy rule base; consist of 193 rule and part of
Fuzzyfication input. System implemented with using MATLAB 7.0. Output was Dermatitic diagnostic-divided into :
Static Dermatitic (10-20%), Seboreic (21-35%), Perioral Dermatitic (36-45%), Numular Dermatitic (46-55%),
Herphetymorfic Dermatitic (66-80%), Athopic Dermatitic (81-90%), Generalyseate Expoliate Dermatitic (91-97%).
Keywords: dermatitic, fuzzy logic, domain, membership function, fuzzy rule base.
1. INTRODUCTION
The application of computer for disease diagnostic is
helpful with fast and accurate result. In disease diagnostic,
paramedics often seem to be doubt full since some of
diseases have indication that almost the same. Therefore
model of Fuzzy logic needed to solve the problem.
Fuzzy logic (obscure logic) is a logic which faced with
half of true concept between 0 and 1. Development of
theories shows that fuzzy logic can be used to model any
systems including Dermatitic Diagnostic
Crisp input converted into fuzzy data with fuzzy
membership function by fuzzyfication, on contrary
convertion output of defuzzyfication into wanted data ie.
Result of Dermatitic diagnostic.
Selected language programme is MATLAB 7.0 fullfilled
fuzzy logic toolbox which form fuzzy inference system
(FIS). Facilitating interaction between users and system,
MATLAB 7.0 provides Graphic User Interface (GUI) using
script*.m.files.
2. PROBLEM ANALYZING
Diagnostic of Dermatitic based on physical indication
examination and medical patient complaint, then defined
246
247
248
249
250
Paper
Saturday, August 8, 2009
14:20 - 14:40
Room AULA
ABSTRACT
A precision targeting for torpedo using simple PID controller has been performed to get a solution model. The system has
been assumed to have two-dimansional character, such that the mechanical control mechanism would be performed
solely by rudder. A GPS/IMU system was employed in the model to provide the exact location and current trajectory
direction and will be used to compared between the instataneous correct direction and instataneous current direction.
This difference would drive PID control system to give correct angle deflection of the rudder. Some parameters of the PID
controller has to be well-tunned employing several schemes including the Routh-Hurwitz stability criterion.
Keywords: Torpedo, UUV, PID Controller, Precision Targeting
Nomenclature:
:
G
:
F
:
T
:
Rx
:
Ry
:
J
:
:
:
:
drift angle
centre of grafity
rudder force
propeller thrust
resistance (drag)
additional resistance due to turning
motion
Moment inertia polar from M to G
= 0 1.
rudder deflection angle
instantaneous radial curvature
Introduction
About two-third of the earth are covered by oceans. About
37% of the world population lives within 100 km of the
ocean (Cohen, et al., 1007). The ocean is generally overlooked as we focus our attention on land and atmospheric
issues, we have not been able to explore the full depth of
the ocean and its abundance living and non-living resources. However a number of complex issues due to the
251
INS integrated navigation system give reasonable navigation performance even when anomalous GPS data was provided.
Koh et al. (2006) have discussed a design of control module for UUV. Using modelling, simulation and experiment,
the vehicles model and its parameters have been identified. The mode cotroller gain values was designed using
non-linear optimizing approach. Swimming pool tests have
shown that the control module was able to provide reasonable depth and heading action keeping.
Yuh (2000) has surveyed some key areas in current stateof-the-art underwater robotic technology. Great efforts has
been made in developing AUVs to overcome challenging
scientific and engineering problems caused by the unstructured and hazardous ocean environment. In 1990, 30 new
AUV have been built worldwide. With the development of
new materials, advanced computing and sensory technologies, as well as theoretical advancement, R&D activities in
the AUV community increased. However, this is just the
beginning for more advanced, yet practical and reliable
AUVs.
PROBLEM DEFINITION
The focal point of this paper is the development of Indonesia defense technology. The Indonesia defense technology should not depend strongly on foreign technology, we had to develop our own technology. The components of our military technology should be able to be found
in the open market without any fear becoming the victim of
embargo.
Fig. 2. Several possible trajectory for UUV which its
current direction 1 toward the reference direction 0. The
response could be a) the wrong trajectory due to not enough
correction capability, b) and c) provide enough coorection
in such away the response could be smooh character or
sinusoidal character, and d) the wrong trajectory due to
too much correction capability.
Therefore we have to initiate our basic defense technology ourshelves, in which we had to create product based
on alternatif strategy, avoiding of further advancement of
foreign technology but further strengthen on our basic
military technology.
In this paper we present the development of basic torpedo
steering control using simple controller but the end result
should have high precision capability.
Rudder Lift
Rudder Drag
Abdel-Hamid et al. (2006) have employed offline pre-defined fuzzy model to improve the performance of integrated
inertial measurement units (IMU) utilizing micro-electromechanical-sensors (MEMS). The fuzzy model has been
used to predict the position and velocity error, which were
an input to a Kalman filter during GPS signal outage. The
test results indicates that the proposed fuzzy model can
age.
Fig.1. A torpedo is one of the unmanned underwater
vehicles, one of the branch of defence technology
252
v i2
sin + Rx + Fx T = 0 ..(4)
mODELING SOLUTIONS
The torpedo system have the hull, where it had centre of
gravity, centrifugal force and acceleration have taken place.
The system, is assumed to have only two-dimensional in
character, has a rudder into which the resulting control
action is operated to have movement direction toward the
right target
a. The Governing Equations
The complete system of the forces acting on the torpedo
vessel at any instant are shown on Fig. 4. The was the
instantaneous radius of curvature of the path. Let the components of F and R in the direction of the X and Y axes
denoted by the corres subscripts and let the inertia forces
be denoted as shown, then we have the governing equations (Rossell and Chapman, 1958)
vi
dvi
M
cos = M
sin + Rx + Fx T (1)
dt
d. Controlled System
The negative feedback controlled system for the whole
torpedo system are illustrated on Fig. 5. The flow for unmanned underwater vehicle dynamics, such as torpedo,
have been modelled as input () output () system.
In the torpedo vehicles we could use several difference
ways to measure current direction (1) such as using GPS
and IMU system. The result of current direction (1) would
be compared with reference direction (0) and then one
can find the instataneous angle difference
= 0 - 1
We use combination of GPS / IMU to determine the current torpedo direction, by calculating the reference direction between the target reference point and the current
torpedo location measured by GPS/IMU syatenm.
The current torpedo direction are measure as the tangent
line of current trajectory. The resulting instantaneous di-
253
CONCLUSIONS
d. Sensitivity criteria
The complete control system using simple PID controller
to control the flow of torpedo dynamics in order to hit the
target precisely are presented in Fig. 5.
The instantaneous direction angle difference ()to drive
the PID controller to produce precise rudder deflection
angle () have been illustrated in Fig. 6.
In conclusion, precision targeting for unmanned underwater vehicles such as torpedo using simple controller
have been designed. It consists of PID controllers manipulating the control surface to get the right direction
toward the target precisely.
The process block diagram have to be analyzed using fluid
flow dynamics force balances. The resulting fluid dynamics for torpedo syatem, the ID controller can be designed
and tunned using Routh-Huruwich stability criteriaon.
REFERENCES
Hwang, Oh, Lee, Park, and Rizos (2005) Design of a lowcost attitude determination GPS-INS integrated navigation
syatem, GPS Solution, Vol. 9, pp. 294-311.
modeling, GPS Solution, Vol. 10, pp. 1-11.
Cohen, JE, Small, C. (1997) Estimates of coastal populations, Science, Vol. 278, pp. 1211-1212
Huang, YW and Chiang, KW (2008) An intelligent and
tem, GPS Solution, Vol. 12, pp. 135-146.
Koh, Lau, Seet, and Low (2006) A Control module Scheme
for UUV, J. Intell. Robot System, Vol. 46, pp. 43-45.
Rossell, HE and Chapman, LB (1958) Principles of Naval
Architechture, Vol II, New York
Yuh, J (2000) Design and control of Autonomous Under
24.
(Footnotes)
1
254
Paper presented on the International Conference on Creative Communication and Innovative Technology 2009
(ICCIT-09), August 8 th , 2009, Jl. Jenderal Sudirman No.
40, Tangerang Banten Indonesia.
Paper
Saturday, August 8, 2009
16:45 - 17:10
Room L-210
Suryo Guritno
Ilmu Komputer Universitas Gadjah Mada; suryoguritno@ugm.ac.id
Retantyo Wardoyo
Ilmu Komputer Universitas Gadjah Mada; rw@ugm.ac.id
Ahmad Ashari
Elektronika dan Instrumentasi Universitas Gadjah Mada; ashari@ugm.ac.id
Abstract
Website is the realization of the internet technology. Nowadays, as seen from the usage trend, the website has evolved. At
the beginning, website merely adopts the need for searching and browsing information. The initial step of the raise of this
website is often recognized as web 1.0 technology. At present, web 2.0 technology, which enables well web-to-web
interaction, has come. Kinds of interaction such as changing information (sharing), in the form of document (slideshare),
picture (flickr), or video (youtube), information exploitation (wikipedia), and also online communities creation (weblog,
web forum) are principally a service that involve communities (the core of web 2.0). These matters bring impacts caused
by the raise of social interactions in virtual world wide (the internet) that is followed by the appearance of learning
interaction and training anywhere-anytime which is termed as e-Learning. Basically, online learning requires selflearning method and learning habit, which is unfortunately- possessed by a few Indonesian human resources. This
condition is being worst by the present e-Learning system that focuses merely on the delivery process of the same learning
substance content toward the learner, abandon the cognitive aspect and it does not offer approach or an interactive selflearning experience and also abandon the adaptation aspect of user with the system. Therefore, successful e-Learning in
Indonesia needs e-Learning system that applies web 2.0 technology which urges the learner to actively participate and
the system which stresses the personalization such as comprehensive ability, adaptive to levels learner capability and
possessing knowledge resources support.
Within the constructed e-Learning system, ontology is going to be applied as the representation of meaning of knowledge
formed by the learner who uses the system.
Keywords: e-Learning, personalization e-Learning, adaptive e-Learning, ontology
1. Background
The vast use of internet in the present time by people in
developed countries and developing countries like Indonesia has changed the way of living especially in each
operational activity. According to Internet World Stat, Indonesian netters reach 20 million up to 2007 and this number is recorded on the list number 14 after Canada. Internet
has changed the paradigm of place and distance that is
previously seemed far to be nearer. Therefore the use is
badly needed in Indonesia that geographically has thousands island.
255
256
2. Theoretical Review
2.1. e-Learning and Content
Electronic learning or e-Learning is a self-learning process facilitated and supported through the use of
ICT [1]. Generally, from the developing e-Learning system
nowadays, e-Learning based on the interactivity- is classified into 2 groups:
Static learning. The system user can download the
needed learning substance only (content). While the
adminis trator can upload substance files only. The ac
tual learning situation like communication is absent on
this system. The system is useful for those who can
learn by themselves from readers supplied on the sys
tem in the form of HTML, Power Point, PDF, or video. If
pedagogy attributes) and later be organized into ontology, so it will be easier in distribution, discovery and the
content use in such a better way. Through this way, it s
not only human can easily find and organized needed content but also smart agent. Smart agent in the application
will find and organize the content from heterogenic content source and then combine them to be customized
courseware with specific criteria and other rules. This customized courseware refers to groups of content (sourced
from heterogenic content) where related content and pedagogy are supported (Renaldy and Azhari, 2008)
2.2. e-Learning standardization
There is e-Leaning standardization that must be
used as a reference of system development:
2.2.1. LTSC
It is invented by Institute of Electrical and Electronic Engineers (IEEE) that has created many standard of technology for electrical, Information Technology and Science.
The aim of LSC is to form accreditation of technical standard, giving training recommendation, and a reference in
learning technology.
257
2.2.2. IMS
IMS is an important organization in e-Learning community since consortium among academic institution, company and government to build and support open specification for learning distribution and content development
and also student exchange among the different systems.
2.2.3. ADL
ADL create Shareable Courseware Object Reference
Model (SCORM). SCORM is a standard specification for
reusability and interoperability from learning content [7].
SCORM focuses on to two important aspects in
interoperability from learning content:
-
258
259
user adaptation
Receiving parameter from user that is related with adap
tive transformation toward system.
auto composition
Being responsible to assign task as users response
education ontology.
Involve ontology activity & ontology substance
service modul
Dynamic model used to boost learning distribution.
content modul.
Dynamic model used to boost learning content distri
bution..
Smart agent development or intelligent based on production of e-Learning system personalization participates in
the occurrence of e-Learning evolution itself. Agent has
the capability to do the task in capacity for something or
for somebody else. Therefore, by penetrating intelligent
agent concept that is assigned to analyze profile, knowledge quality and learner capacity into e-Learning system,
a more personal / understandable e-learning system is
possible to be gained. The penetrated intelligent agent
analyzes existing learning models; therefore it can be categorized as intelligent tutoring system. Intelligent tutoring system applies learning strategy pedagogically, explaining content consecutively, kinds of received feedback and
how is learning substance delivered / explained.
The agent manages knowledge resources of existing web
2.0 technology on knowledge repository and its
representation into the system based on ontology of the
learner as well as theteacher.
260
261
262
3.2.
Ontology-based e-Learning system design
The system is build based on Object Oriented programming by using LAMP technology and the use of Prado
framework. Class diagram of the system are as follows:
263
down line class of class TModule. Class ELearningDataModule is used to fulfill the need of connection with database.
3. System Implementation
At the beginning of operation, the system will request
user authentication. Each registered account will have different access right and ontology creation from formed
knowledge on each learning level of the user.
Picture 24. Tampilan Profile Pengguna
4.1. The management of exercises and examinations
The following part is the implementation user interface
manages exercises and e-Learning application that will be
developed. The present exercise is collaborated with analyses from the ontology agent towards learner capability
and formed knowledge repository. So, the exercise gained
by the learner will meet the grade of learner adaptation.
264
Appendices
[1]Arouna Woukeu, Ontological Hypermedia in Education: A framework for building web-based educational portals, 2003
[2]Chakkrit Snae and Michael Brueckner, Ontology-Driven
E-Learning Sistem Based on Roles and Activities
for Thai Learning Environment, 2007
[3]Cui Guangzuo, Chen Fei, Chen Hu, Li Shufang,
OntoEdu: A Case Study of Ontology-based Education Grid Sistem for E-Learning, 2004.
[4]Emanuela Moreale and Maria Vargas-Vera, Semantic
Services in e-Learning: an Argumentation Case
Study, 2004
[5]I Wayan Simri Wicaksana, dkk, Pengujian Tool Ontology Engineering, 2006.
[6]Kerstin Zimmermann, An Ontology Framework for eLearning in the Knowledge Society, 2006
4. Conclusion
Ontology that is made in this research can create wellorganized e-Learning especially in the use of e-Learning
content. In future, the efforts are expected to broaden or
the development of ontology domains in order to create
good integrity of e-Learning system itself or others.
The architecture of e-Learning prototype may use ontology on education, especially teaching and learning.
The following are conclusion of the use of ontology within
e-Learning development system:
265
Paper
Saturday, August 8, 2009
16:25 - 16:45
Room L-211
Abstract:
TMR&D is developing a millimeter-wave point-to-point (PTP) Wireless Gigabit Ethernet Communication System. A 60
GHz Low Temperature Co-Fired Ceramics (LTCC) System-On-Package (SoP) Transceiver capable of gigabit data rate
has been built and demonstrated with a size of 17.76 x 17.89 mm2. A direct Amplitude-Shift Keying (ASK) modulation
and demodulation scheme is adopted for the 60GHz-band transceiver. A BER of 110-12 for data rate of 1.25 gigabit-persecond (Gbps) on 2.2 GHz bandwidth at 1.4 km was demonstrated. This paper reports a new PTP link that has been
installed at TMR&D site to demonstrate wireless gigabit operation and performance of its key components. The link will
operate at the 57.65-63.35 GHz band incorporating TMR&Ds designed millimeter-wave LTCC SoP RF Transceiver
module. This LTCC SoP RF Transceiver is suitable for short-range wireless networking systems, security camera TV, video
conferencing, streaming video like HDTV (high definition television) and wireless downloading systems for small power
application.
Key-Words: - PTP link, Wireless gigabit, LTCC, SoP, RF Transceiver.
1 Introduction
Every new generation of wireless networks require more
and more cell-sites that are closer and closer together combined with the fast growing demand for the capacity of the
transmission links. Millimeter-wave (MMW) radio has recently attracted a great deal of interest from scientific world,
industry, and global standardisation bodies due to a number of attractive features of MMW to provide multi-gigabit transmission rate. Wireless broadband access is attractive to operators because of its low construction cost,
quick deployment, and flexibility in providing access to
different services. It is expected that the MMW radios can
find numerous indoor and outdoor applications in residential areas, offices, conference rooms, corridors, and libraries. It is suitable for in-home applications such as audio/video transmission, desktop connection, and support
of portable devices while for the outdoor PTP MMW systems, connecting cell-sites at one kilometer distance or
closer, it will offer a huge backhaul capacity.
266
The increasing demands for high-data rate communications have urged to develop MMW broadband wireless
systems. Demands for high-speed multimedia data communications, such as a huge data file transmission and
real-time high definition TV signal streaming, are markedly
increasing, e.g., Gigabit Ethernet networks are now beginning to be widely used. Wireless transmission with 1Gbps
and greater data rates is very attractive [1-2]. Carrier frequencies of wireless communications are also increasing
from 2.4 GHz and 5 GHz to MMW such as 60 GHz bands
[3]. For wireless communications applications, there has
been a tremendous interest in utilising the 60 GHz band of
frequency spectrum because of the unlicensed wide bandwidth available, maximisation of frequency reuse due to
absorption by oxygen (O2), and the short wavelength that
allows very compact passive devices. However, commercial wireless PTP links started to become available in the
57-64 GHz band [4] and, in the 71-76 and 81-86 GHz bands.
PTP links at 60 GHz can be used in wireless backhaul for
mobile phone networks and able to provide up to 1 Gbps
Nowadays the 60 GHz band is considered to provide wireless broadband communication and the R&D for 60 GHz
technology is very competitive in worldwide. The research
and development for 60 GHz band is mandatory and urgent for national broadband system in future.
267
TMR&Ds advanced ASK (Amplitude Shift Keying) transceiver module has the best quality and superior performance to transmit ultra high speed digital data in millimeter
wave. The maximum data rate is 1.25Gbps on 2.2 GHz of
bandwidth for Gigabit Ethernet applications. We have developed low-cost multi-chip modules (MCMs) based on
the multilayer LTCC technologies; 60GHz-transmission
lines (CPW, MSL, eMSL), BPFs, patch antennas, active
modules (PA, LNA, multiplier (MTL), Tx, and Rx), and Lband LPFs. Utilising these technologies, we have developed 60 GHz-band broadband wireless transceiver namely
MyTraX (LTCC SoP Transceiver). The block diagram
shown in figure 4 includes the antenna, diplexer and ASK
LTCC SoP Transceiver with the optical transceiver being
connected.
268
TMR&D develops several kinds of LTCC (Low Temperature Co-Fired Ceramics) MMW modules in 60GHz band.
These LTCC modules have superior RF performance so
that the whole systems equipped with the module can
operate more stable. Using multi-layer LTCC based SoP
technology, various research efforts have been made for
compact SoP RF systems. For 1.25Gbps wireless Ethernet
link, fabricated 60GHz Tx and Rx modules were downsized
into 13.82 x 6.55 mm2 (Figure 6) and 11.02 x 4.31 mm2 (Figure 7), respectively. The integration of Tx and Rx will produce the LTCC SoP Transceiver with a size of 17.76 x 17.89
mm2.
Fig. 8: Frequency response of peak output power for Tx
module
269
4 Conclusion
270
References:
[6] http://www.gigabeam.com
[1] K. Ohata, K. Maruhashi, M. Ito, and T. Nishiumi, Millimeter-Wave Broadband Transceivers NEC Journal of
Advanced Technology, Vol. 2, No. 3, July 2005, pp. 211-216.
271
Paper
Saturday, August 8, 2009
14:45 - 15:05
Room M-AULA
Untung Rahardja
Faculty of Information System
Raharja University
Tangerang, Indonesia
untung@pribadiraharja.com
Siti Julaeha
Faculty of Information System
Raharja University
Tangerang, Indonesia
Sitijulaeha@pribadiraharja.com
Abstract
Science & Technology development is followed by the development of the age, demanding each student not only has a
good intellectual acumen, but also must have the discipline and dedication that is very high, not least, students also must
be committed to the rule does not apply because when the student was sliding and eliminated competition from the world
of work. Unfortunately universities in general less attention to this problem. To date, the university is only a list value that
contains the Cumulative Performance Index (IPK) as one of the students received in describing or determining success
after 4 (four) year course in universities. To answer the challenges the world of work, list the value of IMK must be side
by side with a list of values in the GPA provides a comprehensive assessment of students. Therefore in this article
presented some problems breaking methodology, including identifying at least have some problems with regard to the
fundamental methods of assessment of students a long time, defines the methods through the list of EQ assessment IMK
value, design value IMK through the list of flowchart, and the last is to build a list of values through IMK Macromedia
Dreamweaver MX. The end result of this article, namely a draft assessment was born discipline students who we call the
term IMK. IMK is the average value of the Index Quality Students (IMM) each semester. IMK that this is a role in
measuring a students EQ continuously for 4 (four) years which should capture the value in the form of a list of IMK.
Keywords: EQ, a list of values IMK, IMM, IPK.
I. Introduction
At this time about the old paradigm that intellect
intellectual (IQ) as the only measure decline that ingenuity
is often used as parameters of success and the success of
the performance of human resources, the emergence of
the paradigm has finish by other intelligences in the success and to determine the success of someone in his life.
Based on a survey conducted Lohr, written by Krugman in
272
II. PROBLEMS
In order to answer the challenge of quality graduates,
universities need a system of assessment that lead to behavior, discipline and commitment to rules that are running. This is a challenge that must be faced in the current
era of globalization where the company does not always
take the assessment only in terms of versatility and ability
to absorb lecture material but also in terms of discipline
someone. Therefore, the required measurement facilities
EQ practical, smoothly and accurately, where the results
mirror the value of EQ is a student for 4 (four) year course
in universities. [Raha3072]
Need to realize that until this time there is no EQ
is capable of measuring accurately. However, during 4 (four)
years educating students, universities and the opportunities that have a great potential to educate as well as measure the students EQ.
Based on the contention that there are 2 issues preference
that is making this article:
1. How can be able IMK measure as a tool in educational
measurement?
2. Such as whether the output should be received by the
students as a form of measuring the value of EQ for a
student in the university?
273
IV. TROUBLESHOOTING
274
With the list of values IMK this list with a combined value
of GPA, it is expected that universities have been able to
challenge all the world of work. The graduate of the user,
there is no need to test the filter to know the graduate level
EQ, because the EQ is clearly envisaged in the list of values measured by the IMK management of the entire university to its students for 4 (years old).
A. Designing Algorithms
1. Algorithm update the list of values IMK
Var
Main ()
{
Select Database Genap 20072008
Select NIM, Nama_Mhs, Kode_Kelas, Mata_Kuliah, Sks,
IMM Into DMQ from A_View_IMM_All_Detail
Select Database Ganjil 20072008
Select NIM, Nama_Mhs, Kode_Kelas, Mata_Kuliah, Sks,
IMM from A_View_IMM_All_Detail
Repeat Until
Select NIM,Kode_Kelas from DMQ where NIM ,Kode
If
Add data on DMQ
If
Update data DMQ where NIM ,Kode_Kelas
If then
Else
}
2.
Algoritma Daftar nilai IMK
Figure 1. Flowchart Register Value IMK
Var
Char strNIM
Float AM, Total_AM, Total_SKS, IMK
Main ()
{
strNIM = request(NIM)
Select NIM, Nama_Mhs, Kode_Kelas, Mata_Kuliah, Sks,
IMM where NIM = strNIM
Repeat until
AM=IMM*SKS
Total_AM=Total_AM+AM
If
Select sum(sks) as jum_sks where NIM = strNIM
Total_SKS = jum_sks
IMK = Total_AM / Total_SKS
}
B. Designing Through Program Flowchart
C. Applications Program
Software used to create a program list that is the value of
IMK ASP, ASP Because a framework that can be used to
create dynamic web. ASP is used for many applications
related to the database, using either Microsoft Access
database to SQL server or Oracle database. Scripting the
most widely used in writing are ASP VBScript. [Raha207]
ASP is Macromedia Dreamweaver MX, which is dynamic
using the database connection. To connect between ASP
with SQL database is used (Structured Query Language).
ASP (Active Server Pages) is an object more precisely
Component Object Model (COM), not a programming language that we often see. ASP ISAPI was developed on the
basis that consists of 6 (six) simple objects. However, because the structures are combined with other Microsoft
technology, the object is to be useful. Sixth object is the
Application, Session, Response, Request, Server and Object Context. [Andi05]
SQL is the abbreviation of Structured Query Language.
This language is a standard that is used to access the
Relational database. At this time a lot of software that uses
SQL as a language to access the sub data. This software is
usually called RDMS (Relational Database Management
System).
275
V. IMPLEMENTATION
The concept of assessment of student discipline through
Quality Index Students (IMM) has been implemented on
the University Raharja. IMM is a result of fusion between
the program Raharja Multimedia Edutaiment (RME) versions 1 and On-line attendance (AO).
276
THE SCREEN
The screen (interface) Quality Index Students (IMM) has
been integrated with some system information such as
Raharja Multimedia Edutainment (RME) versions 1, Online attendance (AO), and Panel Chair. The interface - the
interface consists of:
a. IMM on RME Interface
277
REFERENCES
[1]Andi. Aplikasi Web Database ASP Menggunakan
Dreamweaver MX 2004. Yogyakarta: Andi Offset.
2005.
[2]Fourali, Chahid. Using Fuzzy Logic In Educational
Measurement. London : Research Department.
1997.
[3]Rahardja, Untung. Thesis Program Studi Magister
Teknologi Informasi. Analisis Kelayakan Investasi
Digital Dashboard pada Manajemen Akademik
Perguruan Tinggi: Studi Kasus pada Perguruan
Tinggi Raharja. Jakarta: Fakultas Ilmu Komputer.
Universitas Indonesia. 2007.
[4]Rahardja, Untung., Maimunah., Hidayati. Artikel CCIT
Journal Edisi 1 Vol. 1. Metode Pencarian Data
dengan Menggunakan Intelligence Auto Find
System (IAFS). Tangerang: Perguruan Tinggi
Raharja. 2007.
[5]Rahardja, Untung., Fitria Murad, Dina. Usul Penelitian
Hibah Bersaing Perguruan Tinggi. Tangerang:
Perguruan Tinggi Raharja. 2007.
VI. CONCLUSION
Based on the description above, the Register
concluded that the value IMK is suitable to be developed
dilingkungan Universities. Register Value Through IMK,
university can prove to the users graduates, graduates
that they actually have a competency that is not only measured by the value of intellectual but also based on the
value emosionalnya.
References
278
Paper
Saturday, August 8, 2009
16:25 - 16:45
Room L-211
Abstract
Strategic information systems planning is done to set the policy planning and implementation of information technology
as support Bussiness process solutions and the problem with a high level of accuracy and know the possibilities of a
system procedure which is less precise. To achieve these purposes, information systems planning strategy an organization should be done through the stages: goal and poblem, Succes critical factor (CSFs), SWOT analysis, technology
analysis and impact analysis of the strategy vision system, and review of the business model proccess organization. At the
higher, strategic planning and information system model was developed through the stages, and includes information
services to be provided. Determination of information system strategic planning and the selection model developed next
is determined by the specific needs and determine the factors. This paper discusses the foundations and stages of strategic
information systems planning Universities as organizations in general. To clarify the discussion, in this paper also
explained briefly about the implementation of information systems strategy in the Universities as a university organization.
1. INTRODUCTION
The development of social economy and technology have
any impact on the education sector pekembangan. The
development of this form including environmental education to be very competitive. This is to encourage educational institutions to improve its ability to compete to win
the competition or at least able to survive. Utilization of
information technology is one aspect which the determination is in competition.
Response to these changes will impact the organizational
structure, corporate culture, organizational strategy, regulations, procedures that have been there, information technology, management and business process Universities.
This comes as universities strive to be charged is able to
get a potential students academic and funding aspects of
the way ensuring access for all prospective students.
In addition to ease access for prospective students, the
use of information technology should be widely useful for
business process performance and Universities. The suc-
2. SCOPE
study was conducted to discuss the stages in
the foundation and create a strategic information systems
planning Universities, which can be used as a reference
for the development of information systems can improve
the performance of value and competitive organization.
279
3. DISCUSSION
3.1 Strategic Planning of Information System
Strategic planning of information system functions
as a framework for the creation or development of
information systems in organizations that
terkomputerisasi, which in its implementation can be
executed separately and developed or modified using
the appropriate tool bantu. Approach to planning
information system and a wide right in the end allows
the company achieve coordination between the
systems built in, to give maximum facilities to the
development of the next system information, giving
ease of long-term changes in the system, and in turn
is able to identify the precise use of the computer to
reach the target organization.
In strategic planning information system, a
university should be able to see the strategic
information needed to effectively run the
organization and the most possible, and show how
the strategic information technology can be used to
improve the ability of the organization. Planning must
also be related to the encouragement top
managements strategic objectives and critical
success factors (CSFs), related to how information
technology is used to create new opportunities and
provide competitive advantage. The idea of planning
a strategic information system universities to load
high-level view of the university functions, and need
to data and informations.
3.1.1 Pyramid for Strategic Information System Planning
A methodology that can be used in formulating a strategic
perspective the information required universities are using the pyramid with the strategic planning of information
system which consists of: (a) goal and problem analysis,
(b) The critical success factor analysis, (c) technology
impact analysis, (d) strategy vision system [2]. Stages of
the method is implemented with the principles of top down
and consists of a top management perspective and the
perspective of MIS (management information system) is
depicted in the form of a pyramid as follows:
Figure 1.b. Pyramid for Stategic Planning of System information Perspective MIS planner
a. Goals and problems Analysis Conducted to obtain
structured representation of goals and problems of a
university where the next is associated with: (1) units
from university or department, (2) The motivation of
individual managers (MBO), (3) The need and the in
formation systems.
b. Critical success factor (CSFs) Analysis
Identify a field or section should be done with the uni
versities so that both run smoothly. Analysis of CSFs
can again be described: (1) Critical assumption set (set
of assumptions is critical), (2) Critical decision set (set
of decisions is critical), (3) Citical information set (set
of information is critical ). Critical means must be
considered as very beperan or affect / determine the
success or failure.
c. Technology Impact Analysis Analysis of the impact of
technology is conducted to examine links between
changes very quickly from tekonologi with business
opportunities and Universities ancamannya. From this
study obtained Identify priorities and sequence of op
portunities and threats (which determines the priority
must be used the opportunity and determine the
priority threats by others who need / look for a
solution), so that executives can view and make
decisions or take appropriate action.
d. View of the Strategic Systems (Strategy Systems
Vision) It is to do in order to assess strategic
opportunities to create or develop a new system so
that the university can better compete. Strategic
systems that can be obtained from the restructuring or
changes in business Universities.
e. The Model of Function-The Higher Educations
Review is intended to map the business functions of
the Universities and correlates it with the
organizational unit, location, and entity, where the data
stored. Mapping is done with matrik the computer
systems.
Figure 1. a. Pyramid for strategic information systems planning perspective of the top management
280
281
282
4. Conclusion
To be able to build and implement information systems
that match the specific needs of higher education so that
the work needs to serve the academic sivitas, the high
pergurun must make perecanaan strategic information systems with attention to goals and problems Peguruan High
(goal and problems), critical success faktors (CSFs) , technology impact analysis, strategy vision system, and review of the model functions of the higher educations.
Strategic planning of information system universities are
expected to become a reference in building the information
system both in terms of university management at all levels of ease in monitoring and decision making. From the
outside world (society), should provide clear information
on the activities undertaken and services offered to the
public so that for example if you choose a university, already know about the purpose of education, curriculum,
facilities and so forth. In terms of all consumers, should
make it easier for service information. Real implementation
in the field still has its own challenges, because in many
cases, brought many changes and it requires resources
that are not less.
REFERENCES
[1] Laudon C. Kenneth, Laudon P. Jane, 2002, Management Informatioan System: Managing The Digital
Firm, Prenhall International, Inc. New York
[2] Martin James : Information Engineering, Book II Planning and Analysis, Prentice Hall, Englewood Cliffs
New Jersey, 1990
[3]Liem Inggriani : Model Information System for Universities, Development of Materials upgrading SIM
Kopertis Region IV, Bandung 2003
[4] Inmon W. H, Imhoff C & Sousa : Corporate Information Factory, Wiley Computer Publishing, 1998
[5] Henderi : MIS : Tools For College In The Healthy
Facing competitors, Seminar Papers Scientific
Raharja University, December 2003.
283
Author Index
E
A
Aan Kurniawan
66
Edi Winarko
72, 167
Abdul Manan
159
Agus Sunarya
246
Ermatita
167, 188
Ahmad Ashari
255
174, 279
193
Aris Martono
148
Aris Sunantyo
251
Armanda C.C
206
Asef Saefullah
246
32
Augury El Rayeb
237
Handy Wicaksono
212
Azzemi Ariffin
266
Hany Ferdinando
212
Henderi
B
Bernard Renaldy Suteja
Bilqis Amaliah
255
99
Heru SBR
251
Hidayati
217
Huda Ubaya
188
C
Chastine Fatichah
87, 99
45, 92
174
D
Danang Febrian
Darmawan Wangsadiharja
61
212
M
Maimunah
Diah Arianti
99
Mauritsius Tuga
Diyah Puspitaningrum
52
225
200
40
Mohammad Irsan
225
266
80
Djoko Purwanto
40
Muhamad Yusup
Dwiroso Indah
188
284
119, 148
72
Muhammad Tajuddin
159
M. Givi Efgivia
193
Author Index
U
N
Nenet Natasudian Jaya
159
266
87
Untung Rahardja
V
Valent Setiatmi
45
P
Padeli
183
Primantara H.S
206
Widodo Budiharto
40
Wiwik Anggraeni
61
R
Rahmat Budiarto
Schedule
Retantyo Wardoyo
206
109, 167, 255
Y
Yeni Nuraeni
126
Young Chul Lee
Safaruddin A. Prasad
193
Saifuddin Azwar
272
Salizul Jaafar
266
Zainal A. Hasibuan
Sarwosri
133
Shakinah Badar
109
Siti Julaeha
272
92
Sri Setyaningsih
246
Sugeng Santoso
Sugeng Widada
279
Suhandi Bujang
266
Suryo Guritno
Sutrisno
66, 159
80
Sfenrianto
Sri Darmayanti
266
217, 255
251
T
Tri Kuntoro Priyambodo
Tri Pujadi
206, 251
103
285
286
Schedule
Schedule
287
288
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
289
290
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
291
292
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
293
294
Location
DRIVING DIRECTIONS TO GREEN CAMPUS RAHARJA TANGERANG BY CAR
Location
295