Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624238
P. N. Ja'afar, S. M. Idrus, S. Ambran, A. Hamzah, N. Mohamed, A. Kanno, N. Shibagaki, K. Kashima, T. Kawanishi
In this paper, the 3×2-cm dimension of foreign object debris (FOD) simulators is used to characterize the FOD detection. The FOD simulator used as the target is made of metal cylindrical shape. The characterization method to measure the radar cross-section (RCS) of FOD simulators at several locations is proposed. This work was conducted in a real airport runway environment at Kuala Lumpur International Airport (KLIA). Furthermore, the measurements were carried out at 93.1 GHz frequency for a Frequency Modulated Continuous Wave (FMCW) radar detection system. The backscattering characteristics of the radar target, specific design of FOD simulator, the analytical deviation and measured RCS value, and experimental procedures are presented in this paper.
{"title":"Characterization of Foreign Object Debris Detection at 93.1 GHz using Metallic Cylinder Simulators","authors":"P. N. Ja'afar, S. M. Idrus, S. Ambran, A. Hamzah, N. Mohamed, A. Kanno, N. Shibagaki, K. Kashima, T. Kawanishi","doi":"10.23919/eecsi53397.2021.9624238","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624238","url":null,"abstract":"In this paper, the 3×2-cm dimension of foreign object debris (FOD) simulators is used to characterize the FOD detection. The FOD simulator used as the target is made of metal cylindrical shape. The characterization method to measure the radar cross-section (RCS) of FOD simulators at several locations is proposed. This work was conducted in a real airport runway environment at Kuala Lumpur International Airport (KLIA). Furthermore, the measurements were carried out at 93.1 GHz frequency for a Frequency Modulated Continuous Wave (FMCW) radar detection system. The backscattering characteristics of the radar target, specific design of FOD simulator, the analytical deviation and measured RCS value, and experimental procedures are presented in this paper.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a democratic society, a citizen's ability to vote is regarded as one of the most significant legal rights he or she may exercise. For e-voting methods, blockchain presents new possibilities to properly meet transparency, integrity, anonymity and many other security properties. As the need for blockchains keeps rising, demand for bigger, more scalable, more adaptable, and more cost-effective multipurpose chain is also high. Conventional blockchains are incapable of meeting all of these demands. To solve the problems (mostly performance) associated with main blockchains, sidechain technology has recently evolved as a separate chain connected to the main chain that runs in parallel with transactions. Our proposed method is designed to operate on a public blockchain, but we separate the storage of voting information of each candidate using a sidechain to offer a cost-effective blockchain-based voting mechanism by ensuring the security properties such as anonymity, integrity, privacy, security, fairness, receipt freeness and so many. In future, we will broadly discuss and implement this voting system.
{"title":"BSEVOTING: A Conceptual Framework to Develop Electronic Voting System using Sidechain","authors":"Syada Tasmia Alvi, Linta Islam, Tamanna Yesmin Rashme, M.N. Uddin","doi":"10.23919/eecsi53397.2021.9624282","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624282","url":null,"abstract":"In a democratic society, a citizen's ability to vote is regarded as one of the most significant legal rights he or she may exercise. For e-voting methods, blockchain presents new possibilities to properly meet transparency, integrity, anonymity and many other security properties. As the need for blockchains keeps rising, demand for bigger, more scalable, more adaptable, and more cost-effective multipurpose chain is also high. Conventional blockchains are incapable of meeting all of these demands. To solve the problems (mostly performance) associated with main blockchains, sidechain technology has recently evolved as a separate chain connected to the main chain that runs in parallel with transactions. Our proposed method is designed to operate on a public blockchain, but we separate the storage of voting information of each candidate using a sidechain to offer a cost-effective blockchain-based voting mechanism by ensuring the security properties such as anonymity, integrity, privacy, security, fairness, receipt freeness and so many. In future, we will broadly discuss and implement this voting system.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624292
Arief Marwanto, Yahya Hidayatullah, Imam Much Ibnu Subroto
In the network testing method, the use of jumbo frames that are applied in tunneling media poses problems if the communication between two points requires a large bandwidth. This paper discusses the analysis of sending jumbo frame packets that are passed through an IPv6-based tunnel using multiple Mikrotik Routers in an actual environment. The test was carried out using two different operating system platforms, i.e. Windows and Linux, by passing jumbo frame packets on an IPv6-based tunnel network using a traffic generator on a Mikrotik Router and having to go through an intermediate router. Jperf/Iperf is used for sending large and continuous data to meet the entire bandwidth capacity and to measure throughput in a network connection. The test results without using a tunnel show that a connection using MTU 4000 produces the largest throughput and takes 0.01 seconds slower, but with a throughput result that is greater than MTU 1500 bytes and MTU 9000. The packets lost when testing MTU 4000 bytes are only experienced once. In the test using tunneling, MTU 4000 produces large throughput by requiring a slightly faster transmission time of 0.01 seconds compared to MTU 1500 but there is no packet loss compared to MTU 1500 and MTU 9000. These results indicate that by using jumbo frames, the best throughput for interconnection between Windows and Linux in IPv6 tunneling based on Mikrotik Router is achieved by an MTU of 4000 bytes.
{"title":"Experimental Analysis of IPv6 Tunneling of Jumbo Frame Transmission using Mikrotik Routers","authors":"Arief Marwanto, Yahya Hidayatullah, Imam Much Ibnu Subroto","doi":"10.23919/eecsi53397.2021.9624292","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624292","url":null,"abstract":"In the network testing method, the use of jumbo frames that are applied in tunneling media poses problems if the communication between two points requires a large bandwidth. This paper discusses the analysis of sending jumbo frame packets that are passed through an IPv6-based tunnel using multiple Mikrotik Routers in an actual environment. The test was carried out using two different operating system platforms, i.e. Windows and Linux, by passing jumbo frame packets on an IPv6-based tunnel network using a traffic generator on a Mikrotik Router and having to go through an intermediate router. Jperf/Iperf is used for sending large and continuous data to meet the entire bandwidth capacity and to measure throughput in a network connection. The test results without using a tunnel show that a connection using MTU 4000 produces the largest throughput and takes 0.01 seconds slower, but with a throughput result that is greater than MTU 1500 bytes and MTU 9000. The packets lost when testing MTU 4000 bytes are only experienced once. In the test using tunneling, MTU 4000 produces large throughput by requiring a slightly faster transmission time of 0.01 seconds compared to MTU 1500 but there is no packet loss compared to MTU 1500 and MTU 9000. These results indicate that by using jumbo frames, the best throughput for interconnection between Windows and Linux in IPv6 tunneling based on Mikrotik Router is achieved by an MTU of 4000 bytes.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624272
Markus Hermawan, Zaenal Husin, Hera Hikmarika, Suci Dwijayanti, B. Suprapto
Research in the field of autonomous electric vehicle has growth rapidly since they can overcome traffic accidents due to human error. Currently, the method used to identify the road for an autonomous electric vehicle is not in realtime. Thus, this study proposed a method for the autonomous electric vehicle to follow a predetermined route by identifying the road using the Convolutional Neural Network (CNN) as input of the steering control system. The optimal CNN model was obtained using an optimizer of Stochastic Gradient Descent with 150 epoch optimizer that was then used in simulation testing and real-time testing. In simulation testing, from 15 trials conducted, the percentage of success was 93.333%. The success rate to transmit the data from the system to the tool in a real-time manner is 100%. In real-time testing, the autonomous electric vehicle was successfully able to follow the predetermined route accurately. However, the autonomous electric vehicle has not succeeded in avoiding the object in front of it due to the lack of precise steering mechanics and the lack of variation in training data from various conditions that may be passed by the autonomous electric vehicle.
{"title":"Road Identification using Convolutional Neural Network on Autonomous Electric Vehicle","authors":"Markus Hermawan, Zaenal Husin, Hera Hikmarika, Suci Dwijayanti, B. Suprapto","doi":"10.23919/eecsi53397.2021.9624272","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624272","url":null,"abstract":"Research in the field of autonomous electric vehicle has growth rapidly since they can overcome traffic accidents due to human error. Currently, the method used to identify the road for an autonomous electric vehicle is not in realtime. Thus, this study proposed a method for the autonomous electric vehicle to follow a predetermined route by identifying the road using the Convolutional Neural Network (CNN) as input of the steering control system. The optimal CNN model was obtained using an optimizer of Stochastic Gradient Descent with 150 epoch optimizer that was then used in simulation testing and real-time testing. In simulation testing, from 15 trials conducted, the percentage of success was 93.333%. The success rate to transmit the data from the system to the tool in a real-time manner is 100%. In real-time testing, the autonomous electric vehicle was successfully able to follow the predetermined route accurately. However, the autonomous electric vehicle has not succeeded in avoiding the object in front of it due to the lack of precise steering mechanics and the lack of variation in training data from various conditions that may be passed by the autonomous electric vehicle.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133125222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624231
Ike Bayusari, Albert Mario Alfarino, Hera Hikmarika, Zaenal Husin, Suci Dwijayanti, B. Suprapto
Water covers most of the earth's surface compared to the land, including Indonesia. Such an area can be explored using an underwater robot, which is implemented in an autonomous underwater vehicle (AUV). The AUV control system requires a controller to be able to move properly. Thus, a PID controller that has a simple structure and yields great performance can be implemented in the AUV. This study was conducted to control the movement of the surge, heave, and yaw of the AUV using the PID. The AUV modeling simulations were carried out using Simulink to determine the PID gain values. The simulation results for surge movement were Kp = 38.41, Ki = 10.8 and Kd = 58.4, heave movement were Kp = 49.13, Ki =2.56 and Kd= 107.12 and yaw movement were Kp = 3.18, Ki = 0.18 and Kd = 12.11. The results showed that AUV could perform well and maintain the position determined by the set point for 3–4 seconds.
与陆地相比,水覆盖了地球表面的大部分,包括印度尼西亚。这样的区域可以使用水下机器人进行探索,该机器人在自主水下航行器(AUV)中实现。AUV控制系统需要一个能够正确移动的控制器。因此,可以在水下机器人中实现结构简单、性能优异的PID控制器。本研究采用PID控制AUV的浪涌、升沉和偏航运动。利用Simulink对水下航行器进行建模仿真,确定PID增益值。激波运动的仿真结果为Kp = 38.41, Ki = 10.8, Kd= 58.4;升沉运动的仿真结果为Kp = 49.13, Ki =2.56, Kd= 107.12;偏航运动的仿真结果为Kp = 3.18, Ki = 0.18, Kd= 12.11。结果表明,AUV能够很好地发挥作用,并在设定的位置保持3-4秒。
{"title":"Position Control System of Autonomous Underwater Vehicle using PID Controller","authors":"Ike Bayusari, Albert Mario Alfarino, Hera Hikmarika, Zaenal Husin, Suci Dwijayanti, B. Suprapto","doi":"10.23919/eecsi53397.2021.9624231","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624231","url":null,"abstract":"Water covers most of the earth's surface compared to the land, including Indonesia. Such an area can be explored using an underwater robot, which is implemented in an autonomous underwater vehicle (AUV). The AUV control system requires a controller to be able to move properly. Thus, a PID controller that has a simple structure and yields great performance can be implemented in the AUV. This study was conducted to control the movement of the surge, heave, and yaw of the AUV using the PID. The AUV modeling simulations were carried out using Simulink to determine the PID gain values. The simulation results for surge movement were Kp = 38.41, Ki = 10.8 and Kd = 58.4, heave movement were Kp = 49.13, Ki =2.56 and Kd= 107.12 and yaw movement were Kp = 3.18, Ki = 0.18 and Kd = 12.11. The results showed that AUV could perform well and maintain the position determined by the set point for 3–4 seconds.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133510739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624230
I. Ajayi, Y. Medjahdi, F. Kaddour, L. Mroueh
Physical layer security (PLS) is an emerging paradigm that makes use of wireless channel characteristics to provide security. Many PLS schemes require knowledge of the channel state information (CSI). However, CSI is usually imperfect due to factors such as noisy feedback channels, channel estimation errors and outdated CSI. In this paper, we investigate the impact of imperfect CSI on the secrecy and error rate performances of a PLS scheme that combines adaptive matched-filter (MF) precoding and diversity in orthogonal frequency division multiplexing (OFDM). Particularly, we derive the secrecy capacity and error rate expressions for the legitimate and eavesdropper's channels under imperfect CSI assumption. The impact of the imperfect CSI is studied via theoretical as well as numerical techniques in frequency-selective Rayleigh fading wiretap channel. The analysis is done in both frequency division duplex (FDD) and time division duplex (TDD) modes.
{"title":"Impact of Imperfect Channel State Information on Physical Layer Security by Precoding and Diversity","authors":"I. Ajayi, Y. Medjahdi, F. Kaddour, L. Mroueh","doi":"10.23919/eecsi53397.2021.9624230","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624230","url":null,"abstract":"Physical layer security (PLS) is an emerging paradigm that makes use of wireless channel characteristics to provide security. Many PLS schemes require knowledge of the channel state information (CSI). However, CSI is usually imperfect due to factors such as noisy feedback channels, channel estimation errors and outdated CSI. In this paper, we investigate the impact of imperfect CSI on the secrecy and error rate performances of a PLS scheme that combines adaptive matched-filter (MF) precoding and diversity in orthogonal frequency division multiplexing (OFDM). Particularly, we derive the secrecy capacity and error rate expressions for the legitimate and eavesdropper's channels under imperfect CSI assumption. The impact of the imperfect CSI is studied via theoretical as well as numerical techniques in frequency-selective Rayleigh fading wiretap channel. The analysis is done in both frequency division duplex (FDD) and time division duplex (TDD) modes.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624258
Hendra Angga Yuwono, A. H. Saputro, Sabar
The hyperspectral image technology contains information in spectral and spatial forms that produce a huge amount of data. This data becomes an additional load while data is processed. Deep learning is the latest method capable of processing large-scale data with a deep structure of artificial neural network (ANN) and improving the model performance of data analysis. Therefore, this study aims to get a deep learning model into hyperspectral image processing for quantitative measurements of moisture content in dried sea cucumbers study case. The sea cucumber used in this study is the dried sea cucumber (Holothuria scabra), commonly known as Beche-de-mer. This study used the 400–1000 nm wavelength range to measure the moisture content quickly and nondestructively. The proposed model is deep learning which is used to build a predictive model system for moisture content in dried sea cucumbers. The coefficient of determination and the root means square error evaluate the measurement system. The measurement results of moisture content, the coefficient of determination, and the root mean square error values for training data are 0.99 and 0.11%, while testing data are 0.92 and 0.29%.
{"title":"Hyperspectral and Deep Learning-based Regression Model to Estimate Moisture Content in Sea Cucumbers","authors":"Hendra Angga Yuwono, A. H. Saputro, Sabar","doi":"10.23919/eecsi53397.2021.9624258","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624258","url":null,"abstract":"The hyperspectral image technology contains information in spectral and spatial forms that produce a huge amount of data. This data becomes an additional load while data is processed. Deep learning is the latest method capable of processing large-scale data with a deep structure of artificial neural network (ANN) and improving the model performance of data analysis. Therefore, this study aims to get a deep learning model into hyperspectral image processing for quantitative measurements of moisture content in dried sea cucumbers study case. The sea cucumber used in this study is the dried sea cucumber (Holothuria scabra), commonly known as Beche-de-mer. This study used the 400–1000 nm wavelength range to measure the moisture content quickly and nondestructively. The proposed model is deep learning which is used to build a predictive model system for moisture content in dried sea cucumbers. The coefficient of determination and the root means square error evaluate the measurement system. The measurement results of moisture content, the coefficient of determination, and the root mean square error values for training data are 0.99 and 0.11%, while testing data are 0.92 and 0.29%.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624253
Ahmad Luthfi Gifari, Anggunmeka Luhur Prasasti, C. Setianingsih
Strawberry is a subtropical fruit that thrives in Indonesia with soil as its growing media. Soil treatment becomes essential for strawberry farmers, in which the soil has a saturation nature and clump due to routine watering activity. The farmers do watering Grikulan fertilizer as a recovery step to improve soil quality. This study develops a system in the Android software or mobile application that can monitor the level of soil saturation in strawberry plants with output is the information of soil saturation indication based on the results of calculations using Fuzzy Inference System Mamdani method. The application can be connected with the actuator to water Grikulan fertilizer to give order automation. This research produces a feasibility value of 90.14% through the testing of R Validation.
{"title":"Soil Saturation Level Monitoring in Strawberry Plants for Automatizing Grikulan Watering","authors":"Ahmad Luthfi Gifari, Anggunmeka Luhur Prasasti, C. Setianingsih","doi":"10.23919/eecsi53397.2021.9624253","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624253","url":null,"abstract":"Strawberry is a subtropical fruit that thrives in Indonesia with soil as its growing media. Soil treatment becomes essential for strawberry farmers, in which the soil has a saturation nature and clump due to routine watering activity. The farmers do watering Grikulan fertilizer as a recovery step to improve soil quality. This study develops a system in the Android software or mobile application that can monitor the level of soil saturation in strawberry plants with output is the information of soil saturation indication based on the results of calculations using Fuzzy Inference System Mamdani method. The application can be connected with the actuator to water Grikulan fertilizer to give order automation. This research produces a feasibility value of 90.14% through the testing of R Validation.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624250
L. Di Nunzio
{"title":"Embedded Machine Learning for the implementation of Autonomous Mobile Sensor Nodes (AMSNs)","authors":"L. Di Nunzio","doi":"10.23919/eecsi53397.2021.9624250","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624250","url":null,"abstract":"","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-20DOI: 10.23919/eecsi53397.2021.9624309
Evasaria Magdalena Sipayung, Cut Fiarni, M. Febrian
In the last decade, wellness tourism becoming more popular and become competitive value that give impact in the country economic performance. Moreover, the trend of social media and influence also made this type of tourism developing very rapidly. Indonesia as country that rich with its culture and heritage has various beauty and health recipe that become the unique value in the blooming of spa industries. But it also needs to develop their service and strategic objective, primarily in wellness and beauty tourism at both national and international levels. One of its strategic objectives is digital marketing through Search Engine Optimization (SEO), to make the marketing information and websites can be accessed easily. This research was carried out to analyze and develop SEO on Indonesian Health and Beauty Spa, so it could become framework for strategic marketing in these industries. The steps of this research including keywords analytic, improving website structure, and adjusting its architecture. The results of applying SEO techniques made the SPA XYZ website appear on the first page of Google search and increase the number of visitors to the SPA XYZ website by 436%.
{"title":"Implementation of Search Engine Optimization (SEO) in Wellness and Beauty Tourism Industry","authors":"Evasaria Magdalena Sipayung, Cut Fiarni, M. Febrian","doi":"10.23919/eecsi53397.2021.9624309","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624309","url":null,"abstract":"In the last decade, wellness tourism becoming more popular and become competitive value that give impact in the country economic performance. Moreover, the trend of social media and influence also made this type of tourism developing very rapidly. Indonesia as country that rich with its culture and heritage has various beauty and health recipe that become the unique value in the blooming of spa industries. But it also needs to develop their service and strategic objective, primarily in wellness and beauty tourism at both national and international levels. One of its strategic objectives is digital marketing through Search Engine Optimization (SEO), to make the marketing information and websites can be accessed easily. This research was carried out to analyze and develop SEO on Indonesian Health and Beauty Spa, so it could become framework for strategic marketing in these industries. The steps of this research including keywords analytic, improving website structure, and adjusting its architecture. The results of applying SEO techniques made the SPA XYZ website appear on the first page of Google search and increase the number of visitors to the SPA XYZ website by 436%.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}