Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878597
Najirah Umar, B. Asrul
A typical Makassar culinary business that offers a variety of benefits such as typical food is sought after by tourists visiting the city of Makassar, and typical Makassar food has been widely known by the public. Nevertheless, culinary business is not infrequently failing, one of the causes is location. The selection of locations that do not meet certain criteria directly impacts the failure of the culinary business. During this time, the determination of the feasibility of the business location for the object under study still uses conventional methods that require time and cost to conduct a location determination survey, therefore, it is important to choose a method to determine the proper location of the business and supported by the appropriate calculation pattern. In this study, the TOPSIS method was used to build a system that can solve the Multi Criteria Decision Making (MCDM) problem for the feasibility of the best culinary business location, by calculating 5 criteria and 10 alternatives, the positive ideal solution value is 11.66, the negative solution value the ideal is 13.41, and the Closeness Relative value is 0.535.
{"title":"Implementation of TOPSIS Methods in Determining Makassar Special Culinary Business Location","authors":"Najirah Umar, B. Asrul","doi":"10.1109/EIConCIT.2018.8878597","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878597","url":null,"abstract":"A typical Makassar culinary business that offers a variety of benefits such as typical food is sought after by tourists visiting the city of Makassar, and typical Makassar food has been widely known by the public. Nevertheless, culinary business is not infrequently failing, one of the causes is location. The selection of locations that do not meet certain criteria directly impacts the failure of the culinary business. During this time, the determination of the feasibility of the business location for the object under study still uses conventional methods that require time and cost to conduct a location determination survey, therefore, it is important to choose a method to determine the proper location of the business and supported by the appropriate calculation pattern. In this study, the TOPSIS method was used to build a system that can solve the Multi Criteria Decision Making (MCDM) problem for the feasibility of the best culinary business location, by calculating 5 criteria and 10 alternatives, the positive ideal solution value is 11.66, the negative solution value the ideal is 13.41, and the Closeness Relative value is 0.535.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Voice over Internet Protocol (VoIP) has been applied in many application platforms such as WhatsApp and Blackberry Messenger. The application of VoIP technology is applied to payable internet, but its application is not popular in intranet network. Local interconnection allows users to access the internet more easily and cheaply. This study analyzes the application of VoIP on the Intranet network to prove that VoIP can be implemented on the intranet infrastructure. E- Model can be possibly employed in service quality measurement of VoIP technology. E-Model is an objective measure of telecommunication networks. The results of this study show the observation of the average service value of delay 20. 39071ms and the MOS value in two test scenarios worth 1 (Not recommended) and two other scenarios worth 4.3 (satisfied) and 4 (satisfied). This indicates that the implementation of VoIP on the Intranet network can be implemented but the computer network infrastructure must be improved.
VoIP (Voice over Internet Protocol)已被应用于WhatsApp、Blackberry Messenger等众多应用平台。VoIP技术主要应用于付费互联网,但在内部网的应用并不普及。本地互连允许用户更容易、更便宜地访问互联网。通过分析VoIP在企业内网的应用,证明VoIP可以在企业内网的基础设施上实现。E- Model可用于VoIP技术的服务质量测量。E-Model是电信网络的一种客观度量。本研究的结果显示了对延迟20的平均服务值的观察。39071ms,两个测试场景的MOS值为1(不推荐),另外两个场景的MOS值为4.3(满意)和4(满意)。这说明VoIP在Intranet网络上的实现是可以实现的,但需要对计算机网络基础设施进行改进。
{"title":"E-Model for Intranet VoIP Analysis","authors":"Ramdan Satra, Dirgahayu Lantara, Yulita Salim, Huzain Azis, Farniwati Fattah","doi":"10.1109/EIConCIT.2018.8878614","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878614","url":null,"abstract":"Voice over Internet Protocol (VoIP) has been applied in many application platforms such as WhatsApp and Blackberry Messenger. The application of VoIP technology is applied to payable internet, but its application is not popular in intranet network. Local interconnection allows users to access the internet more easily and cheaply. This study analyzes the application of VoIP on the Intranet network to prove that VoIP can be implemented on the intranet infrastructure. E- Model can be possibly employed in service quality measurement of VoIP technology. E-Model is an objective measure of telecommunication networks. The results of this study show the observation of the average service value of delay 20. 39071ms and the MOS value in two test scenarios worth 1 (Not recommended) and two other scenarios worth 4.3 (satisfied) and 4 (satisfied). This indicates that the implementation of VoIP on the Intranet network can be implemented but the computer network infrastructure must be improved.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878660
Erick Alfons Lisangan, Sean Coonery Sumarta
Urban issues become more complicated and complex as the city grows, requiring better management to create a comfortable, safe, sustainable, and sustainable city atmosphere. Implementing the concept of smart city is one solution that can be used to perform better management of the city. Many major cities have started the development of smart city, including Makassar. The development of infrastructure to support the implementation of smart city in Makassar has been going on at this time, such as the addition of Wifi Corner in several points of Makassar. The technology that can be applied in supporting smart city infrastructure is wireless sensor network. This research resulted a design of wireless sensor network by utilizing the wireless public infrastructure that has been available in the city of Makassar today. The design is simulated by involving 2 sensor nodes, 1 gateway sensor node, and public wireless network. Each sensor node obtains the environment values, such as temperature, humidity, CO2, and water level. The environment values are sent to the server by the sink node. The process of sending sensor data based on requests from the server automatically and periodically to avoid network congestion on the wireless public network. All data will be displayed to be a decision support for the Government of Makassar City in anticipating the problems of the city, such as traffic congestion and floods. The design of wireless sensor network is expected to become the main infrastructure as a supporting component of smart city in Makassar using public infrastructure. The obtained data from WSN are expected to be processed using artificial intelligence’s algorithms to provide the useful information to users using the public infrastructure.
{"title":"Proposed Prototype and Simulation of Wireless Smart City: Wireless Sensor Network for Congestion and Flood Detection in Makassar","authors":"Erick Alfons Lisangan, Sean Coonery Sumarta","doi":"10.1109/EIConCIT.2018.8878660","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878660","url":null,"abstract":"Urban issues become more complicated and complex as the city grows, requiring better management to create a comfortable, safe, sustainable, and sustainable city atmosphere. Implementing the concept of smart city is one solution that can be used to perform better management of the city. Many major cities have started the development of smart city, including Makassar. The development of infrastructure to support the implementation of smart city in Makassar has been going on at this time, such as the addition of Wifi Corner in several points of Makassar. The technology that can be applied in supporting smart city infrastructure is wireless sensor network. This research resulted a design of wireless sensor network by utilizing the wireless public infrastructure that has been available in the city of Makassar today. The design is simulated by involving 2 sensor nodes, 1 gateway sensor node, and public wireless network. Each sensor node obtains the environment values, such as temperature, humidity, CO2, and water level. The environment values are sent to the server by the sink node. The process of sending sensor data based on requests from the server automatically and periodically to avoid network congestion on the wireless public network. All data will be displayed to be a decision support for the Government of Makassar City in anticipating the problems of the city, such as traffic congestion and floods. The design of wireless sensor network is expected to become the main infrastructure as a supporting component of smart city in Makassar using public infrastructure. The obtained data from WSN are expected to be processed using artificial intelligence’s algorithms to provide the useful information to users using the public infrastructure.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy efficiency in Data Center Network (DCN) realizes the concept of green computing in saving energy use and costs. Servers and networks are DCN elements that use the most energy. Thus, energy efficiency methods use the Virtual Machine (VM) assignment approach for servers, and traffic engineering for networks. Both of these methods are developed on the concept of DCN as the current network paradigm with a traffic-aware and end-host solution approach. This paper used descriptive method to explain three methods of energy efficiency in DCN applied to SDN network. The methods are ElasticTree, CARPO, and Honeyguide which use Fat-Tree as DCN topology. The ElasticTree and CARPO methods use the traffic-aware solution approach for saving energy on DCN network while the Honeyguide is as an end-host aware solution for combining servers and networks. The result of this paper, we Figure out the relationship between energy efficiency methods in DCN and SDN in Fat-Tree topology, so that it can be the basis for the development of the next method.
{"title":"Energy Efficiency of Data Center Network Based on Software Defined Network","authors":"Farniwati Fattah, Herdianti Darwis, Huzain Azis, Wistiani Astuti, Fitriyani Umar, Erick Irawadi Alwi","doi":"10.1109/EIConCIT.2018.8878624","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878624","url":null,"abstract":"Energy efficiency in Data Center Network (DCN) realizes the concept of green computing in saving energy use and costs. Servers and networks are DCN elements that use the most energy. Thus, energy efficiency methods use the Virtual Machine (VM) assignment approach for servers, and traffic engineering for networks. Both of these methods are developed on the concept of DCN as the current network paradigm with a traffic-aware and end-host solution approach. This paper used descriptive method to explain three methods of energy efficiency in DCN applied to SDN network. The methods are ElasticTree, CARPO, and Honeyguide which use Fat-Tree as DCN topology. The ElasticTree and CARPO methods use the traffic-aware solution approach for saving energy on DCN network while the Honeyguide is as an end-host aware solution for combining servers and networks. The result of this paper, we Figure out the relationship between energy efficiency methods in DCN and SDN in Fat-Tree topology, so that it can be the basis for the development of the next method.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123444841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878549
Sayyidah Hafidhatul Ilmi, A. N. Handayani, A. Wibawa
Water is essential for human life. Regional Water Supplier piping system may provide clean water for people. The company may need a forecasting system to estimate the water production. This paper implemented an Adaptive Neuro-Fuzzy Inference System (ANFIS) with hybrid learning: Least Square Estimator method and Error Backpropagation methods. The dataset used Generalized Bell membership function and clustered by Fuzzy C-Means (FCM). The selected approach produced 0.364% MAPE error value.
{"title":"Water Production Forecasting using Adaptive Neuro-Fuzzy Inference System","authors":"Sayyidah Hafidhatul Ilmi, A. N. Handayani, A. Wibawa","doi":"10.1109/EIConCIT.2018.8878549","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878549","url":null,"abstract":"Water is essential for human life. Regional Water Supplier piping system may provide clean water for people. The company may need a forecasting system to estimate the water production. This paper implemented an Adaptive Neuro-Fuzzy Inference System (ANFIS) with hybrid learning: Least Square Estimator method and Error Backpropagation methods. The dataset used Generalized Bell membership function and clustered by Fuzzy C-Means (FCM). The selected approach produced 0.364% MAPE error value.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122044027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878576
Indra Gunawan, Triyanna Widyaningtyas, A. Wibawa, Haviluddin, Darusalam Darusalam, A. Pranolo
SVM method performs a non-linear mapping of original data space into a high-dimensional feature space. The construction of linear discrimination function is useful for replacing the non-linear function in the original data space. This paper aims to efficiently explore the accuracy of SVM with the feature selection method. The selected feature selection method is Correlation-based Feature Selection (CFS), due to the approach’s simplicity and speed. This research used an illiteracy rate dataset in Indonesia. The research result showed that the optimised method has overcome the original SVM, with 94 % of accuracy.
{"title":"The Performance of Correlation-Based Support Vector Machine in Illiteracy Dataset","authors":"Indra Gunawan, Triyanna Widyaningtyas, A. Wibawa, Haviluddin, Darusalam Darusalam, A. Pranolo","doi":"10.1109/EIConCIT.2018.8878576","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878576","url":null,"abstract":"SVM method performs a non-linear mapping of original data space into a high-dimensional feature space. The construction of linear discrimination function is useful for replacing the non-linear function in the original data space. This paper aims to efficiently explore the accuracy of SVM with the feature selection method. The selected feature selection method is Correlation-based Feature Selection (CFS), due to the approach’s simplicity and speed. This research used an illiteracy rate dataset in Indonesia. The research result showed that the optimised method has overcome the original SVM, with 94 % of accuracy.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878529
N. Saptarini, Rocky Yefrenes Dillak, P. Pakan
Dengue Hemorrhagic Fever (DHF) is a very dangerous disease and has threatened human survival. This disease usually spreads easily and causes of death in children especially those younger than 15 years. The purpose of this research is to develop a system that can be used to predict the number of DHF cases in the city of Kupang, Indonesia accurately using improved Elman Levenberg-Marquardt Neural Network algorithm. This study used four (4) input variables, which are the factors that contribute to the spread of DHF, namely: (i) The average temperature, (ii) The average of rainfall, (iii) The humidity and (iv) The sea level. Based on test results, the model can predict DHF cases with RMSE of 1,384.
{"title":"Dengue Haemorrhagic Fever Outbreak Prediction using Elman Levenberg Neural Network and Genetic Algorithm","authors":"N. Saptarini, Rocky Yefrenes Dillak, P. Pakan","doi":"10.1109/EIConCIT.2018.8878529","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878529","url":null,"abstract":"Dengue Hemorrhagic Fever (DHF) is a very dangerous disease and has threatened human survival. This disease usually spreads easily and causes of death in children especially those younger than 15 years. The purpose of this research is to develop a system that can be used to predict the number of DHF cases in the city of Kupang, Indonesia accurately using improved Elman Levenberg-Marquardt Neural Network algorithm. This study used four (4) input variables, which are the factors that contribute to the spread of DHF, namely: (i) The average temperature, (ii) The average of rainfall, (iii) The humidity and (iv) The sea level. Based on test results, the model can predict DHF cases with RMSE of 1,384.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/eiconcit.2018.8878531
{"title":"EIConCIT 2018 Preface","authors":"","doi":"10.1109/eiconcit.2018.8878531","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878531","url":null,"abstract":"","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132385418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878573
A. Wibawa, Ahmad Khakim Amrullah, Cahya Wahyuning Ilahi, Dyah Ayu Fladya Risky, Nukleon Jefri Nur Rahman, A. Nafalski, F. Dwiyanto, Roni Herdianto
Concerns about scientific publications have been flourishing in Indonesia. Consequently, the number of published journals in e-journal has been rapidly increasing over the past few years. The growing trend of e-journal hence requires a decision support system in its application. The DSS will help the reviewers in determining the eligibility of an article in the journal’s verification process. Several DSS methods such as DEMATEL, SAW, and TOPSIS, among others, are proposed to provide an effective means in the process. This research aims to present a solid comparison of two combined methods, DEMATEL-SAW and DEMATEL-TOPSIS, as they overcome each method’s shortcomings, in determining the eligibility of an article. The eligibility criteria have been determined as a guide. The calculation results show that the DEMATEL-SAW has a relatively higher degree of accuracy compared to that of DEMATEL-TOPSIS when fewer criteria variables are included, whereas the DEMATEL-TOPSIS method has a higher degree of consistency when being utilized on a variable with more criteria.
{"title":"The Performance of DEMATEL Combined Techniques in Determining Eligibility of E-Journal Articles","authors":"A. Wibawa, Ahmad Khakim Amrullah, Cahya Wahyuning Ilahi, Dyah Ayu Fladya Risky, Nukleon Jefri Nur Rahman, A. Nafalski, F. Dwiyanto, Roni Herdianto","doi":"10.1109/EIConCIT.2018.8878573","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878573","url":null,"abstract":"Concerns about scientific publications have been flourishing in Indonesia. Consequently, the number of published journals in e-journal has been rapidly increasing over the past few years. The growing trend of e-journal hence requires a decision support system in its application. The DSS will help the reviewers in determining the eligibility of an article in the journal’s verification process. Several DSS methods such as DEMATEL, SAW, and TOPSIS, among others, are proposed to provide an effective means in the process. This research aims to present a solid comparison of two combined methods, DEMATEL-SAW and DEMATEL-TOPSIS, as they overcome each method’s shortcomings, in determining the eligibility of an article. The eligibility criteria have been determined as a guide. The calculation results show that the DEMATEL-SAW has a relatively higher degree of accuracy compared to that of DEMATEL-TOPSIS when fewer criteria variables are included, whereas the DEMATEL-TOPSIS method has a higher degree of consistency when being utilized on a variable with more criteria.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"12 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878326
As’ad Djamalilleil, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, Herman
Digital images stored in computers or owned smartphones are particularly vulnerable to the danger of theft. Not all digital images can be freely shared to others. If personalized digital images fall into the hands of others then their potential will increase to abuse. There have been many cases where images were spread without permission, thus harming certain parties. Therefore, a method that can be used to secure digital images from the dangers of abuse is required. Cryptographic methods for example have been commonly used to secure various types of digital data. One of the known cryptographic methods is the Transposition Cipher. This method can transpose the content of digital data in text form. So that the original text will be scrambled and no longer meaningful to the reader. This method can be modified in order to encrypt digital images. The result is a scrambled image content that is safe from abuse when the image is stolen.
{"title":"Modified Transposition Cipher Algorithm for Images Encryption","authors":"As’ad Djamalilleil, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, Herman","doi":"10.1109/EIConCIT.2018.8878326","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878326","url":null,"abstract":"Digital images stored in computers or owned smartphones are particularly vulnerable to the danger of theft. Not all digital images can be freely shared to others. If personalized digital images fall into the hands of others then their potential will increase to abuse. There have been many cases where images were spread without permission, thus harming certain parties. Therefore, a method that can be used to secure digital images from the dangers of abuse is required. Cryptographic methods for example have been commonly used to secure various types of digital data. One of the known cryptographic methods is the Transposition Cipher. This method can transpose the content of digital data in text form. So that the original text will be scrambled and no longer meaningful to the reader. This method can be modified in order to encrypt digital images. The result is a scrambled image content that is safe from abuse when the image is stolen.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131377407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}