Program Book ICORIS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 107

1

[Date]
TABLE OF CONTENTS

TABLE OF CONTENTS

TABLE OF CONTENTS ........................................................................................ 2


PREFACETABLE OF
PREFACE................................................................................................................ 3
CONTENTS
COMMITTEES ....................................................................................................... 4

PROGRAM STRUCTURE ................................................................................... 10


TABLE OF CONTENTS
TECHNICAL SESSION SCHEDULE ................................................................. 12

KEYNOTE SPEAKER PROFILE ........................................................................ 31

KEYNOTES ABSTRACT .................................................................................... 33

PRESENTED PAPER ABSTRACTS ................................................................... 34

[Date]

2
PREFACE

COMMITTEESPREF
It is a great honor for us to deliver the proceedings of the Second ICORIS
ACE
Conference to the authors and delegates of the event. In comparison to the last year,
ICORIS 2020 was carried out in the context of a virtual conference due to the
effects of COVID-19. Since there is a global travel constraint, we held this
accessible online conference to bring together specialists and scholars across the
globe with the goal of continuing to disseminate the new advanced studies in their
field. We hope that you will find it useful, exciting and inspiring.
ICORIS2020 aims to provide a platform for discussing the issues, challenges,
opportunities and findings of Cybernetics and Intelligent Systems (CIS). This year
theme is Towards Human Resources Sovereignty using ICT in Society 5.0. The
ever-changing scope and rapid growth of CIS poses new challenges and concerns,
resulting in a real need for the exchange of brilliant ideas and awareness-raising of
this critical research area. We promise CIS to produce a bright image and a
charming landscape, while the support received, and the enthusiasm witnessed have
truly surpassed our expectations. Therefore, on the day of completion of this
journey, we are pleased with a high level of satisfaction and aspiration.
The response to the call-for-papers was immense, both from Indonesia and abroad.
Unfortunately, several manuscripts from reputable universities have not been
accepted due to the findings of the examination and our capacity restrictions. We
would like to express our gratitude and appreciation to all the reviewers who have
helped us to preserve the high standard of the manuscripts used in the proceedings
published by IEEE. We would also like to express our gratitude to the members of
the organizing team for their hard work.
We are now optimistic and full of hope about getting the proceedings of ICORIS
2020 covered by IEEE Xplore in due course. We appreciate that the authors of
ICORIS 2020 may want to maximize the popularity of their papers. And we will
try our best to support them in their endeavors.
Let us wish that all the participants of ICORIS 2020 will have a wonderful and
fruitful time at the conference.

Andrew Tanny Liem, S.Si., M.T., PhD


Organizing Chair
[Date]

3
COMMITTEES

PROGRAM
PROGRAM COMMITTEE
STRUCTURECOMM
1. Prof. Riyanarto Sarno, Ph.D. (Institut Teknologi Sepuluh Nopember (ITS)),
Indonesia ITTEES
2. Prof. Pitoyo Hartono (Chukyo University, Toyota), Japan
3. Prof. Harold Boley (Faculty of Computer Science, University of New
Brunswick, NB), Canada
4. Rafał Dreżewski, PhD. (AGH University of Science and Technology),
Poland
5. Assoc. Prof. Huynh Thi Thanh Binh (Hanoi University of Science and
Technology (HUST)), Viet Nam
6. Prof. Dr. Mustafa Bin Mat Deris (Universiti Tun Hussein Onn Malaysia
(UTHM)), Malaysia
7. Assoc. Prof. Somnuk Phon-Amnuaisuk (Universiti Teknologi Brunei),
Brunei Darussalam
8. Prof. Ir. Arif Djunaidy M.Sc., Ph.D. (Institut Teknologi Sepuluh Nopember
(ITS)), Indonesia
9. Prof. Sri Hartati, M.Sc., Ph.D. (IndoCEIS/UGM)
10. Prof. Dr. Muhammad Zarlis (Universitas Sumatera Utara), Indonesia.
11. Daniel Oranova, S.Kom., M.Sc.PD.Eng. (Institut Teknologi Sepuluh
Nopember (ITS)), Indonesia
12. Arief Setyanto, S.Si., M.T., Ph.D. (AMIKOM Yogyakarta), Indonesia
13. Dr. Muhammad Rusli., MT. (ITB STIKOM Bali), Indonesia
14. Dr. Roy Rudolf Huizen (ITB STIKOM Bali), Indonesia
15. Andrew Tanny Liem, PhD (Universitas Klabat), Indonesia
16. Husni Teja Sukmana, PhD (Universitas Islam Negeri Syarif Hidayatullah),
Indonesia

STEERING COMMITTEE
1. Marthen Sengkey, PhD (Universitas Klabat)
2. Dr. Dadang Hermawan (ITB STIKOM Bali)
3. Dr. Ir. Djoko Soetarno, D.E.A (Binus University)
4. Prof. Dr. M. Suyanto, MM. (AMIKOM Yogyakarta)
5. Prof. Dr. Ir. Harjanto Prabowo, M.M. (Rektor Universitas Bina Nusantara)
6. Prof. Dr. Ir. Edi Noersasongko, M.Kom (Universitas Dian Nuswantoro
Semarang)
7. Dr. Sandy Kosasi, MM., M.Kom. (STMIK Pontianak)
8. Dr. Cucut Susanto, S.Kom., MSi. (STMIK Dipanegara Makassar)
9. Dr. Rika Rosnelly, S.Kom., M.Kom. (Universitas Potensi Utama)
10. Restu Adi wiyono, M.Sc., M.Kom. (STMIK Tasikmalaya)
[Date]

11. Dr. Po Abas Sunarya, M.Si. (STMIK Raharja)


12. Mus Aidah, S.Pd., MM. (STMIK Adhi Guna Palu)

4
13. Dr. Hj. Rosiya–ti Mh Thamrin, SE., MM. (STMIK Sepuluh Nopember
Jayapura)
14. Dr (cand) Agus Setiawan (Multimatics)

ORGANIZING COMMITTEE
General Chair
Andrew Tanny Liem, Ph.D (Universitas Klabat), Indonesia
Program Chair
Husni Teja Sukmana, Ph.D (Universitas Islam Negeri Syarif Hidayatullah), Indonesia
Publication Chair
Oktoverano Lengkong, M.Ds (Universitas Klabat), Indonesia
Secretary
Jacquline Waworundeng, MT (Universitas Klabat), Indonesia
Treasurer
Green Mandias, M.Cs (Universitas Klabat), Indonesia
Committee Members
1. Green Arther Sandag, MS (Universitas Klabat), Indonesia
2. Yuan Mambu, MCIS (Universitas Klabat), Indonesia
3. Stenly Ibrahim Adam, M.Sc (Universitas Klabat), Indonesia
4. Edson Yahuda Putra, M.Kom (Universitas Klabat), Indonesia
5. Jimmy Moedjahedy, MM (Universitas Klabat), Indonesia
6. Reymon Rotikan, MS (Universitas Klabat), Indonesia
7. Reynoldus Sahulata, MM (Universitas Klabat), Indonesia
8. Andria Wahyudi, M.Eng (Universitas Klabat), Indonesia
9. Lidya Laoh, MMSI (Universitas Klabat), Indonesia

TECHNICAL PROGRAM COMMITTEE


Chair
Husni Teja Sukmana, Ph.D (Universitas Islam Negeri Syarif Hidayatullah), Indonesia
Co – Chair
1. I-Shyan Hwang, Ph.D (Yuan Ze University), Taiwan
2. Andrew Tanny Liem, Ph.D (Universitas Klabat), Indonesia

TPC Members
1. Dr. Azrul Azwan Abdul Rahman Universiti Teknikal Malaysia Melaka
[Date]

2. Dr. Azian Azamimi Abdullah Universiti Malaysia Perlis


3. Mr. Wisam Abed University of Diyala
4. Dr. Zainul Abidin Universitas Brawijaya
5
5. Dr. Ala’ Aburumman University of South Australia
6. Dr. Erkan Afacan Gazi University
7. Dr. Naveen Aggarwal Panjab University
8. Dr. Jitendra Agrawal Rajiv Gandhi Proudyogiki Vishwavidyalaya,
Bhopal
9. Ms. Rosliza Ahmad Universiti Selangor
10. Prof. Nada Ahmedzeki University of Baghdad
11. Dr. Ruma Ajeena University of Babylon
12. Prof. Arwa Al-Aama King Abdulaziz University
13. Dr. Ali Qusay Al-Faris University of the People
14. Dr. Ahmad Al-Khalil University of Duhok
15. Dr. Muhammad Raisul Alam University of Toronto
16. Prof. Majida Alasady University of Tikrit
17. Dr. Nidal AlBeiruti University of South Wales
18. Dr. Francesco Alesiani NEC Laboratories Europe
19. Dr. Shahid Ali NCEI
20. Dr. Wisam Ali University of Technology
21. Mr. Irteza Ali Khan National University of Sciences and Technology
22. Prof. Luis Alves Polytechnic Institute of Bragança
23. Mr. Fikri Anza Universitas Indonesia
24. Prof. Eraclito Argolo Universidade Federal do Maranhão
25. Mr. Mohd Rosli Arshad University Kuala Lumpur
26. Dr. Menaka Arthur St Joseph’s Institute of Technology
27. Mr. Arun Ashok Forschungszentrum Jülich
28. Dr. Mehdi Assefi USA
29. Mr. Aditya Awasthi Qualcomm
30. Dr. Asrul Izam Azmi Universiti Teknologi Malaysia
31. Dr. Abdel-Hameed Badawy New Mexico State University
32. Dr. Aslina Baharum Universiti Malaysia Sabah
33. Mrs. Rajitha Bakthula MNNIT Allahabad
34. Dr. Mahdi Baradarannia University of Tabriz
35. Ms. Rashmi C University of Mysore
36. Dr. Cihat Cetinkaya Mugla Sitki Kocman University
37. Dr. Sharkawi Che Din Universiti Teknologi MARA
38. Dr. Uei-Ren Chen Hsiuping University of Science and Technology
39. Prof. Zhe Chen Northeastern University
40. Dr. Chidchanok Choksuchat Prince of Songkla University
41. Mrs. Valentina Colla Scuola Superiore Sant’Anna
42. Mr. Muhammad Cahya Daulay Universitas Multimedia Nusantara
43. Prof. George Dekoulis Aerospace Engineering Institute
44. Mr. Arif Djunaidy Institut Teknologi Sepuluh Nopember
45. Prof. Arif Djunaidy Institut Teknologi Sepuluh Nopember
46. Mr. Yusuf Durachman UIN Syarif Hidayatullah Jakarta
47. Mr. Akhilesh Dwivedi Graphic Era University Dehradun
48. Dr. Hosam El-Sofany King Khalid University
49. Dr. Mir Shahriar Emami The National University of Malaysia
50. Dr. Akaa Eteng University of Port Harcourt
[Date]

51. Dr. Yulong Fu Xidian University

6
52. Dr. Sasanko Gantayat GMR Institute of Technology
53. Prof. Nuno Garcia Universidade da Beira Interior
54. Dr. Marco Gonzalez National Autonomous University of Mexico
55. Dr. Burhan Gulbahar Ozyegin University
56. Dr. Akhil Gupta Lovely Professional University
57. Dr. Nalin Harischandra University of Peradeniya
58. Prof. Sri Hartati Gadjah Mada University
59. Dr. M. Udin Harun Al Rasyid Politeknik Elektronika Negeri Surabaya
(PENS)
60. Mr. Hanny Haryanto Universitas Dian Nuswantoro
61. Dr. Jun He University of New Brunswick
62. Mr. Alexandre Heideker Federal University of ABC
63. Dr. Edwin Hernandez EGLA Communications
64. Dr. Masun Nabhan Homsi Universty of Simón Bolivar
65. Dr. Hugeng Hugeng Universitas Tarumanagara
66. Dr. Roy Huizen STIKOM Bali
67. Dr. Mohammad Rezwanul Huq East West University
68. Mr. Ahmed Hussein Universtiy of Mustansiriyah
69. Mrs. Wan Irma Sabrina Idris Universiti Tunku Abdul Rahman, Petaling
Jaya
70. Dr. Kamarulafizam Ismail Universiti Teknologi Malaysia
71. Dr. Mohammed Jarjees Northern Technical University
72. Mr. Mohammed Kaabar Moreno Valley College
73. Prof. Abdulkareem Kadhim Al-Nahrain University
74. Mr. Nikos Kalatzis Neuropublic S.A.
75. Mr. Keh-Kim Kee University College of Technology Sarawak
76. Dr. Mansoor Khan COMSATS Institute of Information Technology
77. Ms. Pınar Kırcı Istanbul University
78. Dr. Sandy Kosasi STMIK Pontianak
79. Mr. Aswinseshadri Krishnan Satyabhama University – Chennai
80. Mr. Abhishek Kumar Facebook
81. Prof. Dr Eng Harish Kumar King Khalid University
82. Dr. Kusrini Kusrini AMIKOM Yogyakarta University
83. Mr. Beomseok Lee Chung-Ang University
84. Dr. Sang C. Lee DGIST
85. Dr. Xia Li Qualcomm
86. Dr. Shubhankar Majumdar National Institute of Technology Meghalaya
87. Prof. Mustafa Man University Malaysia Terengganu
88. Dr. Juan Martinez University of Murcia
89. Dr. Maslin Masrom UniversitiTeknologi Malaysia
90. Dr. Morcous Massoud FCI Cairo University
91. Dr. Dan Milici University of Suceava
92. Dr. Othman Mohd Universiti Teknikal Malaysia Melaka
93. Mr. Taha Mokfi University of Central Florida
94. Mr. Benoît Muth Benoît Muth
95. Dr. Muhammad Nazir Lahore College for Women University
96. Dr. Nurdin Nurdin Institut Agama Islam Negeri (IAIN) Palu
[Date]

97. Prof. Godwin Nyong Universidade Federal do ABC


98. Mr. Luciano Ogiboski UTFPR
7
99. Dr. Ahmad Fairuz Omar Universiti Sains Malaysia
100. Dr. Varun P. Gopi National Institute of Technology
101. Dr. Ramaswamy Palaniappan University of Kent
102. Prof. Shashikant Patil SVKM NMIMS Mumbai India
103. Dr. Indika Perera University of Moratuwa
104. Dr. Linh Manh Pham Inria Rennes
105. Prof. Anh Huy Phan SKOLKOVO Institute of Science and
Technology
106. Dr. Charalampos Pitas Independent Power Transmission Operator SA
107. Mr. Harry Prabowo Universitas Gadjah Mada
108. Mr. Heru Pranoto Universitas Sumatera Utara
109. Dr. Emil Pricop Petroleum-Gas University of Ploiesti
110. Dr. Betty Purwandari Universitas Indonesia
111. Mr. Anggara Putra Islamic University of Indonesia
112. Dr. M. Mustafa Rafique Rochester Institute of Technology
113. Prof. Grienggrai Rajchakit Maejo University
114. Dr. Karthikeyan Ramasamy Anna University, Chennai
115. Dr. N Ramesh Babu M Kumarasamy College of Engineering
116. Prof. Priya Ranjan Amity University
117. Dr. Muhammad Raza Ul Mustafa University Teknologi PETRONAS
118. Mr. Zairi Rizman Universiti Teknologi MARA
119. Mr. Ahmad Roihan STMIK Raharja
120. Dr. Muhammad Rusli STMIK STIKOM Bali
121. Dr. Heru Agus Santoso Dian Nuswantoro University
122. Dr. Riyanarto Sarno Institut Teknologi Sepuluh Nopember
123. Mr. Arief Setyanto Universitas AMIKOM Yogyakarta
124. Mr. Djoko Setyohadi Universitas Atma Jaya Yogyakarta
125. Dr. Ahmed Shahin Zagazig University
126. Dr. Abhijit Sharma National Institute of Technology Durgapur
127. Dr. Poorani Shivkumar ESEC
128. Dr. Daniel Siahaan Institut teknologi Sepuluh Nopember
129. Mr. Rayinda Pramuditya Soesanto Telkom University
130. Dr. Ir. Djoko Soetarno Universitas Bina Nusantara
131. Dr. Johny W. Soetikno Universitas Dipanegara
132. Mr. Steffen Späthe Friedrich-Schiller-University Jena
133. Dr. A’ang Subiyakto Universitas Islam Negeri Syarif Hidayatullah
Jakarta
134. Dr. Husni Teja Sukmana Syarif Hidayatullah State Islamic University
Jakarta
135. Mr. Yuyan Sun Institute of Information Engineering, Chinese
Academy of Sciences
136. Mr. Andang Sunarto Fakultas Ekonomi dan Bisnis Islam, IAIN
Bengkulu
137. Dr. Cucut Susanto STMIK Dipanegara Makassar, Indonesia
138. Mr. Edhy Sutanta Institut Sains & Teknologi AKPRIND Yogyakarta
139. Prof. Srinivasulu Tadisetty Kakatiya University College of
Engineering and Technology
[Date]

140. Dr. Ashraf Tahat Princess Sumaya University for Technology


141. Mr. Ashutosh Tripathi Vaasankatu,
8
142. Dr. Tram Truong-Huu National University of Singapore
143. Dr. Fasee Ullah UTM
144. Prof. Emma Utami Universitas AMIKOM Yogyakarta
145. Dr. Terlapu Vital jntuK
146. Mr. Kapil Wankhade G. H. Raisoni College of Engineering Nagpur,
INDIA
147. Prof. Wei Wei Xi’an University of Technology
148. Mr. I Made Marthana Yusa STMIK STIKOM Indonesia (STIKI)
149. Dr. S Zafaruddin BITS Pilani
150. Mr. Muhammad Zarlis Universitas Sumatera Utara
151. Prof. Riyanarto Sarno, PhD Institut Teknologi Sepuluh Nopember
(ITS), Indonesia
152. Prof. Pitoyo Hartono Chukyo University, Toyota, Japan
153. Prof. Harold Teja Boley Faculty of Computer Science, University of
New Brunswick, NB, Canada
154. Mr. Rafal Drezewski, PhD AGH University of Science and
Technology, Poland
155. Assoc. Prof. Huynh Thi Thanh Binh Hanoi University of Science and
Technology (HUST)), Vietnam
156. Prof. Dr. Mustafa Bin Mat Deris Universiti Tun Hessein Onn
Malaysia (UTHM), Malaysia
157. Assoc. Prof. Somnu-Amnuaisuk Universiti Teknologi Brunei, Brunei
Darussalam
158. Prof. Ir Arif Djunaidy, MSc, PhD Institut Teknologi Sepuluh
November (ITS), Indonesia
159. Prof. Sri Hartati, MSc, PhD IndoCEIS/Universitas Gadjah Mada,
Indonesia
160. Prof. Dr. Muhammad Zarlis Universitas Sumatera Utara, Indonesia
161. Mr. Daniel Oranova., SKom, MSc, PhD.Eng Institut Teknologi
Sepuluh November (ITS), Indonesia
162. Mr. Arief Setyanto, SSi, MT, PhD AMIKOM Yogyakarta, Indonesia
163. Dr. Muhammad Rusli, MT ITB STIKOM Bali, Indonesia
164. Mr. Aries Susanto, MMSI., Ph.D. UIN Syarif Hidayatullah Jakarta,
Indonesia
165. Mr. Andrew Pakpahan, Ph.D. Universitas Advent Indonesia Bandung,
Indonesia
166. Mr. Andrew Tanny Liem, Ph.D. Universitas Klabat, Indonesia
167. Mr. Stenly Ibrahim Adam, S.Kom, M.Sc Universitas Klabat, Indonesia
[Date]

9
PROGRAM STRUCTURE

TECHNICAL SESSION
TIME
(WIB)
SCHEDULEPROGRAM
SCHEDULE

07.30 – 08.00 Registration STRUCTURE


OPENING CEREMONY
08.00 – 08.05 Opening by MC - Raisa Maringka
08.05 – 08.15 Cultural and dance performances
08.15 – 08.20 National Anthem of Indonesia “Indonesia Raya”
08.20 – 08.25 Montage ICORIS
08.25 – 08.30 Opening Prayer - Pr. Pierson Doringin
Welcoming Remarks
1. Andrew Tanny Liem, Ph.D (Organizing Committee Chair)
08.30 – 08.45
2. Marthen Sengkey, Ph.D (Rector of Universitas Klabat)

Opening Speech
1. Dr. Drs. Agus Fatoni, M.Si (Pjs Governor of North Sulawesi)
08.45 – 09.20 2. Prof. Dr. Jasruddin, M.Si (Head of LLDIKTI WIL IX)
3. Dr. Kemas Muslim Lhaksmana (Executive Committee IEEE,
Indonesian Section)
KEYNOTE SPEECH
Keynote 1
I-Shyan Hwang, PhD (Yuan Ze University), Taiwan
09.20 – 10.20 Title: “A Perspective Fiber-Mobile Convergence Architecture and
Services for 5G/IoT Network”

Keynote 2
Prof. Ir. Zainal Arifin Hasibuan, MLS., Ph.D (University of Indonesia)
10.20 – 11.20

11.20 – 12.00 Q&A


12.00 – 13.00 Break
[Date]

10
PARALLEL SESSIONS
TRACK #1 TRACK #2 TRACK #3 TRACK #4 TRACK #5

VIRTUAL VIRTUAL VIRTUAL VIRTUAL VIRTUAL


ROOM #1 ROOM #2 ROOM #3 ROOM #4 ROOM #5

Session 1
Paper Paper Paper Paper Paper
13.00 - Presentation Presentation Presentation Presentation Presentation
14.00
Session 2
Paper Paper Paper Paper Paper
14.00 - Presentation Presentation Presentation Presentation Presentation
15.00
Session 3
Paper Paper Paper Paper Paper
15.00 - Presentation Presentation Presentation Presentation Presentation
16.00
Session 4
Paper Paper Paper Paper
16.00 - Presentation Presentation Presentation Presentation
17.00
CLOSSING CEREMONY

17.00 – Announcement of the best paper


17.10 Andrew Tanny Liem, Ph.D

17.10 – Announcement of the next ICORIS 2021


17.15 Dr. Ir. Djoko Soetarno, D.E.A

17.15 – Closing Remark by the Rector of Universitas Klabat


17.20 Marthen Sengkey, Ph.D

[Date]

11
TECHNICAL SESSION
SCHEDULE

KEYNOTE SPEAKER
SESSION :1
TRACK :1
PROFILETECHNICAL
TIME : 13.00-14.00 SESSION SCHEDULE
VIRTUAL ROOM : 1
TRACK NAME : Signal Processing and Analysis
SESSION CHAIR : Kusrini

Paper
No Presenter Title
ID#

SimpleNet: Hazardous-Object Detecting


1. 33 Jaewoong Jeong Neural Network in Low-Performance
Devices

Convolutional Neural Network (CNN)


2. 60 Olivia Kembuan for Image Classification of Indonesia
Sign Language Using TensorFlow

Classification of X-ray COVID-19


3. 70 Ronaldus James Image Using Convolutional Neural
Network

The Utilization of Gaussian Filter


4. 109 Al-Khowarizmi Method on Voice Record Frequency
Noise
[Date]

12
SESSION :1
TRACK :2
TIME : 13.00-14.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi

Paper
No Presenter Title
ID#

Student Attendance using Face


1. 35 Jack Febrian Rusdi
Recognition Technology

Information Technology Governance


Andrew Tanny
2. 64 Audit Using the COBIT 5 Framework at
Liem
XYZ University

The Antecedent of Student Academic


3. 8 Sandy Kosasi
Achievement Prediction

Application Of Mathematical Software


On Problem Based Learning Model For
4. 31 Deviana
The Mathematical Conceptual
Understanding

[Date]

13
SESSION :1
TRACK :3
TIME : 13.00-14.00
VIRTUAL ROOM : 3
TRACK NAME : Communication, Networking, Security and Broadcasting /
Power, Energy, and Industry Application
SESSION CHAIR : Evi Triandini

Paper
No Presenter Title
ID#

Research on Double-Channels
Frequency Adjustment System for
1. 6 Yupeng Hou
Passive Underground Detection Based
on Frame Header Feedback

Analysis Voltage Stability in the


2. 20 Langlang Gumilar Interconnection of Battery Charging
Station and Renewable Energy

Intrusion Detection System using


3. 101 Casi Setianingsih Genetic Algorithm and K-NN
Algorithm on Dos Attack

Oktoverano Apps Rating Classification on Play


4. 27
Lengkong Store Using Gradient Boost Algorithm [Date]

14
SESSION :1
TRACK :4
TIME : 13.00-14.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi

Paper
No Presenter Title
ID#

Self-Adaptive Ensemble-Based
1. 13 Haldi Budiman Differential Evolution with Enhanced
Population Sizing

Data Mining For Inventory Forecasting


2. 15 Erfan Hasmin Using Double Exponential Smoothing
Method

Linear Stability Analysis to Determine


Farida Nurmala Boundary Between Stable or Unstable
3. 24
Sihotang Flow in Nonlinear Simulation of
Vorticity Equation

Stock Price Forecasting on


Jimmy H Telecommunication Sector Companies in
4. 186
Moedjahedy Indonesia Stock Exchange Using
Machine Learning Algorithms
[Date]

15
SESSION :1
TRACK :5
TIME : 13.00-14.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA

Paper
No Presenter Title
ID#

Handwritten Text Recognition using


1. 195 Nikitha A
Deep Learning

Evi Dewi Sri Keyword-Based Hadith Grouping Using


2. 163
Mulyani Fuzzy C-Means Method

Lecturer Achievement Index


3. 164 Khoirul Umam Measurement Using Fuzzy Inference
System at STIKOM PGRI Banyuwangi

Muhammad Reza Determination of Rice Quality Using


4. 79
Fahlevi the K-Means Clustering Method

[Date]

16
SESSION :2
TRACK :1
TIME : 14.00-15.00
VIRTUAL ROOM : 1
TRACK NAME : Signal Processing and Analysis
SESSION CHAIR : Kusrini

Paper
No Presenter Title
ID#

Detection of Covid-19 in Chest X-ray


1. 49 Buyut Umri Image using CLAHE and Convolutional
Neural Network

Prototyping of Machine Learning at


2. 167 Michel Tomatala Traditional Market as Solution of Social
Distancing Due To Covid-19 Outbreak

Twitter data analysis use machine


Nugroho Setio
3. 52 learning for evaluation of society in the
Wibowo
prevention the spread of covid-19

4.

[Date]

17
SESSION :2
TRACK :2
TIME : 14.00-15.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi

Paper
No Presenter Title
ID#

The Mediating Role of Learning


1. 11 Sandy Kosasi Analytics to Improve Student Academic
Performance

The Role of Information Technology


Nilam Amalia
2. 16 Assessment in the Ministry of Marine
Pusparani
Affairs and Fisheries

Decision Support System for Employee


3. 168 Mihuandayani Recruitment of A Company Using Multi
Attribute Utility Theory

Blockchain Education Smart Courses Of


4. 217 Fitra Putri Oganda Massive Online Open Course Using
Business Model Canvas

[Date]

18
SESSION :2
TRACK :3
TIME : 14.00-15.00
VIRTUAL ROOM : 3
TRACK NAME : Communication, Networking, Security and Broadcasting /
Power, Energy, and Industry Application
SESSION CHAIR : Evi Triandini

Paper
No Presenter Title
ID#

Influence of Four Types Wind Turbine


Langlang Gumilar Power Plants as Distributed Generation
1. 10
to Charging Electrical Vehicle Batteries
on Electrical Power System

Enabling SDN in Hybrid Xhaul-


Andrew Tanny
2. 215 TWDM-PON Networks for Interactive
Liem
Video Applications

Transient in Electrical Power System


3. 103 Langlang Gumilar under Large Induction Motor Starting
Condition

Analysis of Vulnerability Webserver


Office Management of Information And
4. 146 Agung Wijayanto
Documentation Diskominfo using
OWASP Scanner
[Date]

19
SESSION :2
TRACK :4
TIME : 14.00-15.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi

Paper
No Presenter Title
ID#

The Framework For Political


1. 5 Jufri Communication Text Mining Based On
Twitter

Natural Language Processing on


2. 149 Arif Nur Rohman Marketplace Product Review Sentiment
Analysis

Systematic Literature Review of Hate


3. 153 Rini
Speech Detection with Text Mining

RESTful Web Service Implementation


4. 107 Jeremiah Maramis on Unklab Information System Using
JSON Web Token (JWT)

[Date]

20
SESSION :2
TRACK :5
TIME : 14.00-15.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA

Paper
No Presenter Title
ID#

Deatary Habits for Toddler Growth


1. 26 Casi Setianingsih Development using Particles Swarm
Optimization Algorithms

Predictive Models for Popularity of Solo


Green Arther
2. 43 and Group Singers in Spotify Using
Sandag
Decisison Tree

K - Nearest Neighbor and Naive Bayes


3. 21 Suwanto Raharjo Classifier Comparison for Individual
Character Classification on Twitter

Rainfall Data Analysis Time Series of


4. 37 Cucut Susanto Using Neural Network Method Based
On Optimized Particle Swarm

[Date]

21
SESSION :3
TRACK :1
TIME : 15.00-16.00
VIRTUAL ROOM : 1
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Kusrini

Paper
No Presenter Title
ID#

The Mapping of Organizational Culture


to find a determinant factor for
1. 22 Indra Samsie Behavioral Intention to Use in IT
Utilization among Credit Unions in
Indonesia

Geomath: An Augmented Reality Based


2. 140 Joe Yuan Mambu Geometry Introductory Android-Based
Application with Cuboid Tracking

Health Monitoring with Artificial


3. 76 Benfano Soewito
Intelligence

Nutrition and Lifestyle


Recommendations for Patients
4. 45 Firstyani Rahma
Recovering from Covid-19 in Nusa
Tenggara Barat Province
[Date]

22
SESSION :3
TRACK :2
TIME : 15.00-16.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi

Paper
No Presenter Title
ID#

People Under Surveillance Tracker


Fandy Utomo Prototype Development with Bluetooth
1. 151
Low Energy to Suppress the Covid-19
Spread

The Development of Web Based Tracer-


2. 55 Reymon Rotikan Study Information System at Universitas
Klabat Career Center

Decision Support System for High


3. 165 Yufika Sari Bagi Achieving Students Selection Using
AHP and TOPSIS

4. 218 Untung Rahardja The Blockchain Manifesto

[Date]

23
SESSION :3
TRACK :3
TIME : 15.00-16.00
VIRTUAL ROOM : 3
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Evi Triandini

Paper
No Presenter Title
ID#

Applications of the Material Order


Tri Pujadi
1. 208 Processing based on Time Series
Processing with CB-Predictors

Inter-Structure and Intra-Structure


2. 48 Fatimatus Zulfa Similarity of Use Case Diagram using
Greedy Graph Edit Distance

I Gusti Ngurah Customer Loyalty in Marketplace:


3. 202
Wijaya Structural Equation Modeling Analysis

Hyperion: A Simulation of High Places


Oktoverano
4. 214 in the Form of Virtual Reality for
Lengkong
Acrophobia Sufferers

[Date]

24
SESSION :3
TRACK :4
TIME : 15.00-16.00
VIRTUAL ROOM : 4
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Henderi

Paper
No Presenter Title
ID#

Evaluation of Service Quality of Manado


Edson Yahuda City Government Website with E-
1. 62
Putra GovQual Approach to Calculate
Importance Performance Analysis

Application of the Fisher-Yates Shuffle


2. 42 Yusfrizal Algorithm in the Game Matching the
World Monument Picture

The Effect of Social M edia


3. 162 Fahmi Ajismanto
Effectiveness on MSMEs Marketing

Dedek Indra Expert System Detects Boiler Engine


4. 99
Gunawan Hutasuhut Damage Using Certainty Factors

[Date]

25
SESSION :3
TRACK :5
TIME : 15.00-16.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA

Paper
No Presenter Title
ID#

Dahriani Hakim Optimizing of C4.5 Algorithm for


1. 112
Tanjung Predicting ATM Machine Damage

Classifying User Personality Based on


Media Social Posts Using Support Vector
2. 18 Anggit Hartanto
Machine Algorithm based on DISC
Approach

Determining Priority of Bus fare In


3. 47 Labuan Nababan
Medan By Using Algorithm C4.5 Method

Green Arther Android Application Market Prediction


4. 38
Sandag Based on User Ratings Using KNN

[Date]

26
SESSION :4
TRACK :1
TIME : 16.00-17.00
VIRTUAL ROOM : 1
TRACK NAME : Computing and Processing
SESSION CHAIR : Kusrini

Paper
No Presenter Title
ID#

Data Mining Approach to Predict Air


1. 25 Nurul Aini
Pollution in Makassar

An Expert System For Identifiying Pests


2. 84 Nita Sembiring And Diseases of Cocoa Plants Using
Dempster Shafer Method

Student Prediction of Drop Out Using


Muhammad Ibnu
3. 96 Extreme Learning Machine (ELM)
Sa'ad II
Algorithm

4.

[Date]

27
SESSION :4
TRACK :2
TIME : 16.00-17.00
VIRTUAL ROOM : 2
TRACK NAME : Robotics and Control /
Information System and Multimedia
SESSION CHAIR : Sandy Kosasi

Paper
No Presenter Title
ID#

Jacquline A Prototype of Hazard Detection System


1. 211
Waworundeng using Sensors and IoT

Forecasting Agricultural Land in West


Ni Nyoman
2. 88 Denpasar Using the Semi Averages Methods
Supuwiningsih
Applied in GIS

Ontology of Education Using Blockchain:


3. 219 Marviola Hardini
Time Based Protocol

4.

[Date]

28
SESSION :4
TRACK :3
TIME : 16.00-17.00
VIRTUAL ROOM : 3
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Evi Triandini

Paper
No Presenter Title
ID#

Modeling of e-Commerce Supply Chains


1. 209 Tri Pujadi
Mobile Application

Use of the EPIC Method to Analyze the


Reynoldus Andrias
2. 83 Effectiveness of Sales Promotion in the Go-
Sahulata
Jek Online Transportation Mode

Structural Similarity Measurement using


Hidayatul
3. 57 Graph Edit Distance-Greedy on Statechart
Munawaroh
Diagrams

Ina Sholihah User Experience Evaluation of Egrang


4. 67
Widiati Traditional Game Application

[Date]

29
SESSION :4
TRACK :4
TIME : 16.00-17.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi

Paper
No Presenter Title
ID#

Anneke Annassia A Survey on Microaneurysm Detection in


1. 220
Putri Siswadi Color Fundus Images

Prediction for Diagnosing Liver Disease in


2. 188 H Hartatik Patients using KNN and Naïve Bayes
Algorithms

Android Application Food Delivery


3. 190 Lidya Chitra Laoh
Services

4.

[Date]

30
KEYNOTE SPEAKER
PROFILE

KEYNOTE SPEAKER 1 KEYNOTES


ABSTRACTKEYNOTE
Prof. I-Shyan Hwang received the B.S. and M.S.
SPEAKER
in Electrical and Electronic PROFILE
Engineering from
Chung-Yuan Christian University, Chung-Li,
Taiwan, in 1982 and 1984, respectively, and the
M.S. and Ph.D. in Electrical and Computer
Engineering from the State University of New
York at Buffalo, NY, in 1991 and 1994,
respectively. Since Feb. 2007, he has been
promoted as a Full Professor in the Department of
Computer Science and Engineering at the Yuan Ze
University, Chung-Li, Taiwan. He served as a
chairman of the Department of Computer Science
& Engineering, and the Department of Information
Communication from 2008 to 2011, and 2011 to 2014, respectively. He has
published more than 135 peer-to-peer reviewed journal papers, 230 conference
papers and book chapters. He earned Y.Z. Academic Year Teacher Performance
Research Outstanding Award in 2010, and Y. Z. Hsu Scientific Award in 2013 and
2108. He has served many session chairs, committee member and organized many
international conferences His current research interests are high-speed networks,
fixed mobile convergence over 5G/IoT, heterogeneous multimedia services over
fiber optic networks, NGN, optical-network-based infrastructure over cloud
computing, and SDN. He served as a member of the Editorial Board for Springer’s
Photonic Network Communications Journal.
[Date]

31
KEYNOTE SPEAKER 2

Prof. Zainal A. Hasibuan, Ph.D. was born in Pekan


Baru, Indonesia in 1959. He received BSc. degree in
Statistic from Bogor Institute of Agriculture,
Indonesia, 1986, MSc. and PhD in Information
Science, Indiana University, in 1989 and 1995
respectively. Currently, he is a lecturer and PhD
supervisor at Faculty of Computer Science,
University of Indonesia. He is also the Head of Digital
Library and Distance Learning. His research interests
include e-Learning, Digital Library, Information
Retrieval, Information System, and Software
Engineering.

[Date]

32
KEYNOTES ABSTRACT

PRESENTED PAPER
A Perspective Fiber-Mobile Convergence
ABSTRACTSKEYNOTES
Architecture and Services for 5G/IoT Network
ABSTRACT
(Prof. I-Shyan Hwang)

With the emerging new use case scenarios, 5G/IoT evolves existing technologies
and introduces new capabilities, such as New Radio, a strong reliance on
virtualized functions, the introduction of network slicing (Network Function
Virtualization) and control and user plane separation (Software Defined Network
)to boost capacity, i.e., enhanced Mobile Broadband (eMBB). To host new ultra-
Reliable Low Latency Communication (uRLLC) and massive Machine-Type
Communication (mMTC) applications efficiently, it will need to be able to
integrate regional data centers and distributed compute seamlessly - closer to the
endpoints in the network. Another key attribute of the 5G transport infrastructure
is that, it has to have the capability of easily carving out and reusing its capacity,
compute, be resilient, and guarantee latency by supporting network slicing. In
addition to the pure mobility requirements, operators must also consider how their
network caters to the different classes of services and huge volume of multimedia
data they deliver, such as fixed line and broadband customers, as well as supporting
the different customer types – all regardless of access technology. This talk
Introduces how such a converged Fiber-Mobile-Xhaul transport network for
5G/IoT can be realized, starting with new requirements it must meet; the new
technologies it needs to deploy 5G-capable services; and finally, the design features
necessary to cost-effectively build and operate the newly designed access
technology.
[Date]

33
PRESENTED PAPER
ABSTRACTS

Paper ID #5

The Framework for Political Communication Text


Mining Based on Twitter

Jufri1, Aedah Binti Abd. Rahman2, Suarga3


1
Software Engineering, STMIK Dipanegara Makassar, Indonesia, 2Asia e
University Malaysia, Malaysia, 3Information System, STMIK Dipanegara
Makassar, Indonesia,
1
jufri.ldp@dipanegara.ac.id, 2aedah.abdrahman@aeu.edu.my,
3
ssuarga@hotmail.com

ABSTRACT

In recent years, social media as a medium that is widely used in communication in


the community. The phenomenon of communication on social media is
increasingly being used in political communication. Social networking site services
like Twitter and Facebook are believed to have the potential to increase public
participation in politics. Twitter is an ideal platform for voters, politicians, political
parties and political institutions to disseminate not only public information but also
political opinions to the public through their networks. This research is related to
the effectiveness of social media (Twitter) as a means of political communication
used by the public, especially in the election of the Mayor of Makassar and other
elections in Indonesia. In this study, using two methods for social media analysis
on political communication. Support Vector Machine (SVM) to classify predictable
words or sentences and the K-Means method is used to classify words or sentences
into categories related to political communication. The results of this study can be
used by voters, candidates, political parties and political institutions, as information
and also as a measurement aid in determining the choice of candidates.

Keywords: Social Media, Twitter, SVM, K-Means, Political Communication


[Date]

34
Paper ID #6

Research on Double-Channels Frequency Adjustment


System for Passive Underground Detection Based on
Frame Header Feedback

Yupeng Hou
Beijing University of Technology, China
chumenghao@emails.bjut.edu.cn

ABSTRACT

A double-channels frequency adjustment system for passive underground pipeline


detection based on frame header feedback is introduced to realize the information
interaction between underground electronic tags and the detector on the ground.
Firstly, this paper introduces the whole system architecture of the underground
pipeline detection, studies the changes of the antenna inductance of the
underground electronic tags caused by the pressure and corrosion factors of the soil
buried in the ground and the changes of the antenna inductance of the detector on
the ground caused by the external temperature and humidity. In order to compensate
the changes of the antenna inductance of the underground label and the detector
and improve the robustness of the system, the conception of a double-channels
frequency adjustment system is proposed. The hardware design is introduced, and
the logic analysis is carried out accordingly. Then, the hardware system scheme
and PCB layout of the double-channels frequency adjustment module are shown.
Finally, the feasibility of the system is verified by experiments.

Keywords: Double-channels frequency adjustment, passive underground


detection, frame head feedback
[Date]

35
Paper ID #8

The Antecedent of Student Academic Achievement


Prediction

Sandy Kosasi1, Vedyanto2, I Dewa Ayu Eka Yuliani3, Robertus Laipaka4


1,3,4
Information System STMIK Pontianak, West Kalimantan, Indonesia, 2 English
Teaching Department Santu Petrus Junior High School Pontianak, West
Kalimantan, Indonesia
1
sandykosasi@yahoo.co.id, 2vedy91@gmail.com,
3
dewaayu.ekayuliani@gmail.com, 4rbt99laipaka@gmail.com

ABSTRACT

The research goal was set to determine to what extent the influences of learning
analytics and academic analytics, the antecedent factors in predicting student
academic achievement through the use of big data were. There has been no
discussion on progress, success, retention, or decline of this achievement.
Therefore, this research has significance for the improvement of higher education
institutions. The research was in the form of online surveys involving 203
respondents, i.e., leaders, structural staff, and academic advisors from each of these
institutions in Pontianak. Tests of eight hypotheses were conducted through SEM-
PLS Method, and two of them had no direct influences. The results show that the
two antecedent factors, directly and indirectly, have different influences and
significance values on student academic achievement prediction despite the critical
roles of big data. In addition, results obtained through the application of learning
analytics and academic analytics in relation to big data of higher education
institutions, especially for the need to predict student academic achievement, are
infrequently similar.

Keywords: Learning Analytics, Academic Analytics, Big Data, Student Academic


Achievement, Prediction.
[Date]

36
Paper ID #10

Influence of Four Types Wind Turbine Power Plants as


Distributed Generation to Charging Electrical Vehicle
Batteries on Electrical Power System

Langlang Gumilar1, Mokhammad Sholeh2, Stieven Netanel Rumokoy3,


Dezetty Monika4
1,2
Universitas Negeri Malang, Indonesia, 3Politeknik Negeri Manado, Indonesia,
4
Politeknik Negeri Jakarta Depok, Indonesia
1
langlang.gumilar.ft@um.ac.id, 2mokhammadsholeh76@gmail.com
3
rumokoy@polimdo.ac.id, 4dezetty.monika@elektro.pnj.ac.id

ABSTRACT

Main advantage of electric vehicles (EV) compared to vehicles using fossil fuels is
that does not produce air pollution. One day the existence of conventional vehicles
will be replaced by EV. EV gets electricity supply from batteries. When using EV,
one day the electrical energy in the batteries will run out. To recharge batteries,
important components such as the Electrical Vehicle Charger (EVC) are needed.
During charging batteries, EVC must always be connected to the electric power
system. EVC provides the impact of voltage drop on the electric power system bus
during the charging process. This voltage drop is caused because the power supply
from generators cannot meet the needs of loads, including chargers and batteries.
To maintain the voltage so that it remains at its safe operating voltage, the same bus
with EVC is interconnected with renewable energy sources. Renewable energy
sources used in this study are four types of wind turbine power plants. Safe range
of operating voltage in this research from 95% to 105%. This article analyzes the
change in voltage in the electric power system when the wind power plant fills
EVC. In the research methods section uses several scenarios. The aim is to
determine the effect of each type of wind power plant on the bus voltage and EVC.
Of all the voltage improvement simulation results, scenario 3 has the best results
than the other scenarios. In scenario 3, voltage in bus 12 is 98,08%, voltage in bus
13 is 98,66%, and voltage in bus 14 is 98,42%. All three buses in safe limits of the
operating voltage. In the short circuit simulation, type 1 and type 2 are the largest
contribute to the short circuit current fault in 3 phases, line to line, line to line to
ground fault. While type 3 and type 4 are the largest contribute to the short circuit
current fault on the line to ground fault.

Keywords: Batteries, Charger, Voltage, Power System, Wind Power Plant.


[Date]

37
Paper ID #11

The Mediating Role of Learning Analytics to Improve


Student Academic Performance
Sandy Kosasi1, Vedyanto2, I Dewa Ayu Eka Yuliani3, Utin Kasma4
1,3,4
Information System STMIK Pontianak Pontianak, West Kalimantan,
Indonesia, 2 English Teaching Department Santu Petrus Junior High School
Pontianak, West Kalimantan, Indonesia
1
sandykosasi@yahoo.co.id, 2vedy91@gmail.com,
3
dewaayu.ekayuliani@gmail.com, 4utin.kasma@yahoo.co.id4

ABSTRACT

Recent indicators of the success of every college graduate still refer to the
cumulative academic achievement index. The era of disruption of the digitalization
of education has posed different challenges and problems to universities to improve
student academic performance. The objective of this study was to determine the
extent of influences and relationships of antecedent factors, including soft skills
and learning analytics, the intervening variables in improving this performance.
This study engaged 203 active students taking courses in the fifth and sixth
semesters of universities in Pontianak, West Kalimantan, Indonesia. The research
was in the form of surveys. Questionnaires were distributed online through Google
Form. SEM-PLS Method was conducted for the analysis. Results show strong
influences and relationships between academic, emotional learning and soft skills
through learning analytics in improving student academic performance.
Furthermore, the negative influences of soft skills have insignificance on this
performance. Lastly, a socio-economic factor is irrelevantly linked to learning
analytics and student academic performance. All of these findings indicate that
academic, personal, socio-economic antecedents are no longer relevant to previous
research.

Keywords: Learning Analytics, Soft Skills, Academic Emotional Learning,


Student Academic Performance
[Date]

38
Paper ID #13

Self-Adaptive Ensemble-Based Differential Evolution


with Enhanced Population Sizing
Haldi Budiman1, Shir Li Wang2, Farid Morsidi3, Theam Foo Ng4, Siew Chin
Neoh5
1
Computing and Creative Industry (Universiti Pendidikan Sultan Idris) Fakultas
Teknologi Informasi (Universitas Islam Kalimantan Muhammad Arsyad Al-
Banjari) Banjarmaain, Indonesia, 2,3 Faculty of Art Computing and Creative
Industry (Universiti Pendidikan Sultan Idris) Perak, Malaysia, 4Centre for Global
Sustainability Studies (Unversiti Sains Malasyia) Penang, Malaysia, 5School of
Computer Science, Faculty Science (University Nottingham Malaysia) Selangor,
Malaysia
1
haldibudiman@uniska-bjm.ac.id, 2shirli_wang@fskik.edu.my,
3
farid.mors90@gmail.com, 4tfng@usm.my,
5
SiewChin.Neoh@nottingham.edu.my

ABSTRACT

Differential Evolution recently (DE) is a simple and prominent Evolutionary


Algorithm (EA) for global optimization. In this paper, DE under the influence of
population diversity and dimension size is proposed. In most of the DEs, selection
of control parameters is a vital prerequisite for appropriate balancing between
exploration and exploitation capabilities. The algorithm scheme, known as self-
adaptive ensemble-based differential evolution with enhanced population sizing
(SAEDE-EP), is compared to self-adaptive ensemble-based DE (SAEDE). The
performance is evaluated using 26 benchmark functions consisting of 8 low
dimensions and 18 high dimensions. Experimental results indicate that SAEDE-EP
achieves maximum success rate with better efficiency in 24 out of the 26
benchmark functions.

Keywords: Differential evolution, self-adaptive, ensemble, control parameters,


mutation strategies, population size
[Date]

39
Paper ID #15

Data Mining For Inventory Forecasting Using Double


Exponential Smoothing Method
Erfan Hasmin1, Nurul Aini2
1
Information Engineering, STMIK Dipanegara Makassar, Indonesia, 2Software
Engineering Department, STMIK Dipanegara Makassar, Indonesia
1
erfan.hasmin@dipanegara.ac.id, 2nurulaini.m11@dipanegara.ac.id

ABSTRACT

PT. Sentral 88 Maros is a company engaging in food and house appliances


procurement. In its daily activities, PT. Sentral 88 Maros has problems in
determining its stock, where it is usually available in excess nor it can cause loss
with the additional cost for storage to keep the stock. One way to meet the
availability of the goods is by identifying the number of demand for the following
period, so the company can provide goods without overloading or running out of
stock in the warehouse. Based on this background, the research built a system using
Double Exponential Smoothing method. Forecasting with time series is a
quantitative method in processing the data of some previous periods that were
collected using the right technique. The results of the forecasting were used as a
reference in forecasting value in the next period. The existing data set were used
from April 2019 to September 2019 and the conclusion for forecasting the frozen
food (So Good Bakso Goreng 120gr) was 14 with an error level of MAPE
calculation by 2.1%.

Keywords: data mining, double exponential smoothing, forecasting

[Date]

40
Paper ID #16

The Role of Information Technology Assessment in the


Ministry of Marine Affairs and Fisheries
Nilam Amalia Pusparani1, Lufi Herawan2, Amalia Solicha3, Dian Mentari
Ramadita4
1
University of Indonesia & Ministry of Marine Affairs and Fisheries, Indonesia,
2
University of Indonesia & National Archives of The Republic of Indonesia,
Indonesia, 3,4University of Indonesia, Indonesia
1
vechiabelle@gmail.com, 2lufi.herawan@ui.ac.id, 3amalia.solicha@ui.ac.id,
4
dian.mentari61@ui.ac.id

ABSTRACT

Information technology (IT) has a very important role in supporting the business of
an organization. The role of information technology itself can be assessed. This role
is very important to be assessed and evaluated, so that its position in an organization
can be known. In this study, an assessment of the role of information technology
was carried out on one of the government agencies that had never been assessed
before, that is the Ministry of Marine Affairs and Fisheries (MMAF). The
evaluation was carried out using a table of information technology leadership
impacts on the role of information technology in organizations created by
Applegate, Austin, and Soule. The assessment results are then mapped into the
McFarlan IT Strategic Grid which consists of 4 (four) quadrants, namely: support,
factory, turnaround, and strategic. This mapping is useful to assist MMAF leaders
in measuring information technology capabilities and leadership approaches. Based
on the results of the assessment, the role of information technology in MMAF is in
the factory quadrant (7 points). The recommended step forward is to strengthen the
position of the MMAF information technology role in the factory quadrant (short-
term plan) and move to the strategic quadrant (medium-term plan). The action plan
that will be taken to strengthen the position in the factory quadrant is data
integration.

Keywords: Role of IT, MMAF IT Role, IT Strategic Grid


[Date]

41
Paper ID #18

Classifying User Personality Based on Media Social Posts


Using Support Vector Machine Algorithm based on DISC
Approach
Anggit Dwi Hartanto1, Ema Utami2, Sumarni Adi3, Suwanto Raharjo4,
Mochammad Yusa5
1,2,3
Universitas Amikom Yogyakarta, Indonesia, 4Institut Sains & Teknologi
AKPRIND Yogyakarta, Indonesia, 5University of Bengkulu, Indonesia
1
anggit@amikom.ac.id, 2ema.u@amikom.ac.id, 3sumarni.a@amikom.ac.id,
4
wa2n@akprind.ac.id, 5mochammad.yusa@unib.ac.id

ABSTRACT

Twitter is one of the largest social media with 326 million active users in January
2019 especially in Indonesia. Every day, more than millions of tweets are published
by twitter users. This study tries to analyze Tweets to get the personalities from
chosen twitter accounts by using DISC character approach. The classification
algorithm that will be used is Support Vector Machine with TF-IDF weighting on
the dataset. This research starts with preprocessing stages such as Data Cleansing
and Case Folding. We involved psychologists to validate the personality approach
of 109 Twitter accounts to determine each twitter user character. From 109 twitter
accounts, we considered as the final dataset, we obtain the accuracy of 36.37%,
average precision of 23.11% and an average recall performance of 35.25%.

Keywords: Character Analysis, DISC, Twitter

[Date]

42
Paper ID #20

Analysis Voltage Stability in the Interconnection of


Battery Charging Station and Renewable Energy
Langlang Gumilar1, Mokhammad Sholeh2, Stieven Netanel Rumokoy3,
Dezetty Monika4
1,2
Universitas Negeri Malang, Indonesia, 3Politeknik Negeri Manado, Indonesia,
4
Politeknik Negeri Jakarta Depok, Indonesia
1
langlang.gumilar.ft@um.ac.id, 2mokhammadsholeh76@gmail.com
3
rumokoy@polimdo.ac.id, 4dezetty.monika@elektro.pnj.ac.id

ABSTRACT

The existence of an Electrical Vehicle (EV) depends on the battery charging station
(BCS). If the EV's electrical energy runs out, then to recharge the electrical energy
must go to BCS. BCS is generally interconnected with electric power systems.
However, the existence of BCS can cause the bus voltage to become unstable. This
article aims to analyze voltage stability after BCS interconnection and renewable
energy with electric power systems. The electric power system used is the IEEE 14
bus standard. Renewable energy is a solution to improve voltage instability and role
as distributed generation (DG). The newest types of energy used are photovoltaic
and wind power plants. Stability analysis using the P-V and Q-V curves. The testing
method is carried out by continuing to increase the capacity of BCS. The greater
the active and reactive power on the BCS bus, it will cause the voltage drop to reach
the critical point. Furthermore, four scenarios are made to be compared. All results
of voltage stability are compared, and which scenario is selected has the best
voltage stability. Based on all scenario results, it can be concluded that scenario 3
is better than other scenarios. Scenario 4 has almost the same results as scenario 3.
The power plant that makes scenario 3 better is wind power plants with a capacity
of 2 MVA. The resulting stable area has wider range compared to photovoltaics.

Keywords: Charging Battery Station, Voltage Stability, Photovoltaic, Wind Power


Plant, Active Power, Reactive Power.
[Date]

43
Paper ID #21

K - Nearest Neighbor and Naive Bayes Classifier


Comparison for Individual Character Classification on
Twitter
Suwanto Raharjo1, Anggit Dwi Hartanto2, Ema Utami3, Sumarni Adi4,
Aminudin Noor Ichsan5
1
Institut Sains & Teknologi AKPRIND Yogyakarta, Indonesia, 2,3,4,5Universitas
Amikom Yogyakarta, Indonesia
1
wa2n@akprind.ac.id, 2anggit@amikom.ac.id, 3ema.u@amikom.ac.id,
4
sumarni.a@amikom.ac.id, 5aminudin.ichsan@students.amikom.ac.id

ABSTRACT

Twitter is one of the most commonly used social media, especially in Indonesia.
People use Twitter social media to express their opinions every day. This allows
the DISC method to be applied to find out Twitter user’s character. By knowing
their characters using the DISC method and twitter, this can help parties like the
HRD without spending more effort in selecting employees. Three main processes
are performed in this study, data acquisition, pre-processing and calculation
process. Classification methods, namely Text Naive Bayes Classifier algorithm and
K - Nearest Neighbor are used to classified and mapping tweet data to the DISC
method. As a result, the accuracy of the Naive Bayes Classifier algorithm is 34.16%
while the K – Nearest Neighbor is 28.33%. So, it can be concluded that the Naive
Bayes Classifier algorithm has a higher accuracy of 5.83% compared to K – Nearest
Neighbor in classifying a Twitter account with TF-IDF Weighting into DISC
method.

Keywords: Twitter DISC, Text Mining, Personality Classification, Human


Resources, Profiling Analysis. [Date]

44
Paper ID #22

The Mapping of Organizational Culture to find a


Determinant Factor for Behavioral Intention to Use in IT
Utilization among Credit Unions in Indonesia
Indra Samsie1, Titik Abdul Rahman2, Suarga3
1
STMIK Dipanegara & Asia e University, Indonesia, 2Asia e University,
Malaysia, 3Hasanuddin University, Indonesia
1
indrasamsie@dipanegara.ac.id, 2titik.khawa@aeu.edu.my,
3
ssuarga@hotmail.com

ABSTRACT

Measurement of IT acceptance in the organizational level is no more sufficient if


only based on the individual acceptance factors. There is an attempt to measure IT
acceptance in organizations by considering organizational culture as a determinant
factor. This study used an organizational culture which derived from
Organizational Culture Assessment Instrument (OCAI) and used the value that
influence the chosen quadrant as a determinant factor for behavioral intention to
use IT. The result showed that Credit Union (CU) in Saluampak placed in Hierarchy
quadrant. This result identified four factors: timelines, efficiency, uniformity, and
consistency as a value that will use as a determinant of behavioral intention to use
IT in CU.

Keywords: organizational culture value, OCAI, behavioral intention to use IT

[Date]

45
Paper ID #24

Linear Stability Analysis to Determine Boundary


Between Stable or Unstable Flow in Nonlinear Simulation
of Vorticity Equation
Farida Nurmala Sihotang1, Titania Sari2
1,2
Sekolah Tinggi Teknologi Bandung, Indonesia
farida.nurmalasihotang@gmail.com

ABSTRACT

The nonlinear simulation of the vorticity equation is exciting because it provides a


more realistic view, it is consistent with the previous investment. However, a linear
stability analysis is needed to determine the stability limit of the system, which
serves as a guide in determining the flow limits for stable and unstable flows. We
use numerical methods to solve this linear stability analysis. This analysis utilizes
the Fourier series in the linear form of the vorticity equation, then the vorticity-
stream equation containing the Fourier coefficient will be formed in the matrix.
Next, numerically using MATLAB, we look for the eigenvalues of the matrix to
determine the k, beta and Reynolds number values. If one of the eigenvalues has a
real positive form given k, beta, and Reynolds number, then the equilibrium
solution of the vortex equation is unstable. From graphing the real part of the
eigenvalues, which is a function of the Reynolds number for some beta with 𝑘 =
0.5, we get the critical point of the Reynolds number. By using a Reynolds number
greater than the critical Reynolds number give result in an unstable fluid from the
simulation. Vice versa, simulation using the Reynolds number, which is smaller
than the critical Reynolds number will produce a stable flow. And from the linear
stability curve, we know that for 𝑘 > 1, the flow is stable for every Reynolds
number.

Keywords: eigenvalue, equilibrium, linear stability, Reynold number, vorticity


[Date]

46
Paper ID #25

Data Mining Approach to Predict Air Pollution in


Makassar
Nurul Aini1, Syukuri Mustafa2
1
Software Engineering Departement, 2Information Engineering
Dipanegara Computer Science College
Makassar
nurulaini.m11@dipanegara.ac.id, syukri@dipanegara.ac.id

ABSTRACT

Air pollution level in Makassar has increased based on data from 2018 to 2019.
There were 646 data obtained from the Ministry of Environment and Forestry data
archive. Lack of information on air pollution causes the people to become unaware
on their personal health. There is an effective analysis method for exploring data.
This research used knowledge discovery technique in databases in data mining to
facilitate decision making. Finally, continuing from the results of previous studies
where the prediction of air pollution levels used Naïve Bayes algorithm, this
research predicts the level of air pollution using the K-Nearest Neighbor Algorithm
with an accuracy rate of 96%, a precision value of 97% and a recall value of 100%

Keywords: air pollution, data mining, KNN, prediction. Rapid Miner

[Date]

47
Paper ID #26

Daetary Habits for Toddler Growth Development using


Particles Swarm Optimization Algorithms
Queenisti Dyah Ayu Sulistiani1, Budhi Irawan2 Casi Setianingsih3
1,2,3
Telkom University, Indonesia
1
queenistidyahas@student.telkomuniversity.ac.id,
2
budhiirawan@telkomuniversity.ac.id, 3setiacasie@telkomuniversity.ac.id

ABSTRACT

Fulfillment of diet is a factor that needs to be considered in the period of growth


and development of infants. In preparing a diet, one must pay attention to a
balanced and varied menu in the menu, including the type of food in the appropriate
amount. To meet the body's nutritional needs for the maintenance of cells in the
body and the child's growth process. Therefore an application is made for the
selection of eating patterns using the Particle Swarm Optimization Algorithm. The
results obtained in this thesis research are a diet for toddlers and the number of
calories, carbohydrates, protein, and fat. The system's Testing results have an
accuracy of 90% and have been validated by the doctors.

Keywords: toddler, Nutrition, Particle Swarm Optimization Algorithm.

[Date]

48
Paper ID #27

Apps Rating Classification on Play Store Using Gradient


Boost Algorithm
Oktoverano Lengkong1, Rodney Maringka2
1,2
Universitas Klabat, Indonesia
1
oktoverano@unklab.ac.id, 2s21610035@student.unklab.ac.id

ABSTRACT

The increasing number of Android apps available on Google Play Store with the
developers' advantages has attracted many Android apps developers' attention. To
benefit from developing Android apps is to know the characteristics of high rated
applications on the Google Play Store. This research will explore the features of
Size, installs, reviews, types (free/paid), rating, Category, content rating, and Price
on apps on Google Play Store to find out the characteristics of high rated apps. This
research uses a randomforest classifier to identify the most significant features in
high rated apps on Google Play Store. This research uses the Gradient Boost
Algorithm to identify the most influential attributes in high rating apps on Google
Play Store. To classify the high rated apps, writers use the Gradient Boost algorithm
that performs better than Random Forest, K-NN, and Decision Tree algorithm with
a 99.93% accuracy, 99.91% recall, 99.91% precision, and 0.062 Root Mean
Squared Error.

Keywords: Android Apps, Google Play Store, Characteristics, High Rated,


Random-Forest Classifier

[Date]

49
Paper ID #31

Application Of Mathematical Software On Problem


Based Learning Model For The Mathematical
Conceptual Understanding
Deviana1, I Nyoman Bagus Pramartha2
1,2
STIKOM Bali, Indonesia
1
deviana@stikom-bali.ac.id, 2bagus.paramartha@stikom-bali.ac.id

ABSTRACT

The purpose of this research to determine whether the understanding of


mathematical concepts of students who take part in learning the use of
mathematical software in problem based learning models is better than
understanding the mathematical concepts of students who take conventional
learning. In this study, the type of research used is quasiexperimental research
design is the Post Test Only Control Group Design. The population of this research
is senior high school students. The sample of this study was 2 classes taken using
random sampling technique. Data in this study are the understanding of
mathematical concepts collected using the description test. The research data were
then analyzed using one-tailed t-test with a significance level of 5%. The results
showed that ‫ݐ‬-count = 2.9 and t-table = 1.7 so that the value ‫ݐ‬count> was obtained
was obtained based on that 0‫ ܪ‬was rejected. This means that the understanding of
mathematical concepts of students who follow the use of mathematical software in
the problem based learning model is better than understanding the mathematical
concepts of students who follow conventional learning. In other words, there is a
positive influence of the use of mathematical software in the problem-based
learning model of understanding students' mathematical concepts.

Keywords: Mathematical Software, Problem Based Learning, Mathematical


Conceptual
[Date]

50
Paper ID #33

SimpleNet: Hazardous-Object Detecting Neural Network


in Low-Performance Devices
Jaewoong Jeong
Chadwick International School, South Korea
jjeong2021@chadwickschool.org

ABSTRACT

While the widespread of mobile devices has brought convenience in many aspects,
it has also caused an increase in the number of traffic accidents due to pedestrians
preoccupied with their smartphone devices. In order to solve such problem, this
research proposes a network that allows training of data with reduced number of
layers. SimpleNet algorithm simplifies the process of object classification into the
states of detected or undetected. In order to optimize the configuration for a given
device, two hyperparameters, Repeat Parameter and Feature Parameter, were
adjusted throughout the testing. The test results show that the performance of full-
size SimpleNet is comparable to that of Deep Neural Network. Even after reducing
the model with optimized hyperparameters, SimpleNet exhibited an accuracy of
96.8%. We expect that this algorithm can be implemented in low-performance
devices to detect hazardous objects on streets.

Keywords: Object Detection, Computer Vision, Convolutional Neural Network

[Date]

51
Paper ID #35

Student Attendance using Face Recognition Technology

Jack Febrian Rusdi1, Frans Richard Kodong2, Richardus Indrajit3, Herry


Sofyan4, Abdurrohman Abdurrohman5, Robert Marco6
1
Universiti Teknikal Malaysia Melaka, Malaysia, 2Universitas Pembangunan
Nasional Veteran Yogyakarta, Indonesia & Universiti Teknikal Malaysia Melaka
(UTeM), Malaysia, 3Pradita University, Indonesia, 4UPN Veteran Yogyakarta,
Indonesia, 5Sekolah Tinggi Teknologi Bandung, Indonesia, 6STMIK Amikom
Yogyakarta, Indonesia
1
inijack@gmail.com, frkodong@gmail.com, 3eko.indrajit@pradita.ac.id,
2
4
herrysofyan@gmail.com, 5abdurrohman@sttbandung.ac.id,
6
robertmarco@amikom.ac.id

ABSTRACT

The presence of students in college meetings is an essential element in college


activities. This article discusses the model of student attendance recording that can
become part of the campus academic information system. The technologies used in
recording student attendance include face recognition technology through
Computer Vision and MATLAB. This study discusses the system module and the
factors that affect the accuracy and performance of the system. This model can be
the basis for developing student attendance systems at universities or other
educational institutions. This study proves that the process of recording through
face recognition has the potential to be applied to educational systems in
institutions, both as the primary system or as a support system of an existing system

Keywords: face recognition, attendance system, Computer Vision, student


attendance, machine learning.

[Date]

52
Paper ID #37

Rainfall Data Analysis Time Series of Using Neural


Network Method Based On Optimized Particle Swarm

Cucut Susanto1, Sitti Harlina2, Usman Usman3, Johny Soetikno4


1,2,3,4
STMIK Dipanegara Makassar, Indonesia
1
susanto27dp@gmail.com, 2sitiharlina76@gmail.com,
3
usmanstmikdp@gmail.com, 4cucut@dipanegara.ac.id

ABSTRACT

Rainfall is an element in our daily life. Rainfall is affected the world of shipping,
business, agriculture. The intensity of rainfall is different from one region to
another. Data Mining and economic studies show that the method is suitable for use
given by the Neural Network (NN ) with a fairly low error rate, the ability of Neural
Networks in Universal Approximation has been studied by various researchers for
forecasting time series data on various types of data, so that performance from
Neural Network which is satisfactory in time series data forecasting . To determine
the best model from each previous period, we need to optimize the weights of each
relevant training data variable, so that the Neural Network method based on Particle
Swarm Optimization (PSO) can be applied even though the maximum feasibility
level is not certain. The biggest cost in the response to natural disasters such as
floods, droughts, late planting patterns, help farmers avoid crop failures that can be
caused to one's determining the types of crops grown in those days, in need right
way to predict the amount of rainfall in the coming months, in order to anticipate
unwanted events . Cost suppression can also be done by analyzing the changing
time series patterns of rainfall data sets taken from the Romang Polong Station in
Makassar from 2005-2015 , which facilitates the process of analyzing the prediction
of accuracy generated from the time series data sets, if implemented by combining
the Particle Swarm Optimization (PSO) based on Neural Network (NN) method to
find out the patterns generated from the data set. Thus, saving time and operating
power.

Keywords: Rainfall; Data Analysis, Time series, Neural Network, Method Based
On Optimized Particle swarm
[Date]

53
Paper ID #38

Android Application Market Prediction Based on User


Ratings Using KNN

Green Arther Sandag1, Fidy Gara2, Irfan I3


1,2,3
Universitas Klabat, Indonesia
1
greensandag@unklab.ac.id, 2fidygara@gmail.com, 3irfantdr00@gmail.com

ABSTRACT

Google play store is a digital distribution service operated and developed by


Google. It provides various applications that can be downloaded directly on
Android devices, allowing users to browse and download their desired applications.
When they search for an app, users can see the list of applications with the name
and its rating on its side. It is helping users to choose the best application based on
the application rating. Developers use their strategy in naming their applications
attractively to increase their rating. In this paper, we create a market prediction
modeling based on user rating for Android apps on Google Play Store throughout
2019 using the KKN algorithm. After that, we perform a feature engineering and
an analysis using exploratory data analysis to find information in the dataset. By
doing k=1-20 iteration, we can determine the best k value in KNN. We used 5-fold
cross validation to evaluate model, which is created with 88.68% accurate result, a
recall of 87.46%, a precision of 89.5%, and an RMSE of 0.213. The generated
model has a better performance compared to another algorithm, with a 10%
increased accuracy.

Keywords: KNN, Feature Engineering, Exploratory Data Analysis, 5-fold Cross-


Validation

[Date]

54
Paper ID #42

Application of the Fisher-Yates Shuffle Algorithm in the


Game Matching the World Monument Picture

Yusfrizal1, Deny Adhar2, Ulfah Indriani3, Erwin Panggabean4, Ahmad


Sabir5, Helmi Kurniawan6
1,2,3,4,5
Universitas Potensi Utama Medan, Indonesia
1
yusfrizal80@gmail.com, 2adhardeny@gmail.com, 3batakeraton@gmail.com,
4
erwinpanggabean8@gmail.com, 5ahmad.sabir@mercubuana.ac.id,
6
helmikurniawan77@gmail.com

ABSTRACT

The application of the concept of artificial intelligence is very helpful in various


randomization problems. One example of the application of artificial intelligence
to the problem of randomization is in the game of matching images of world
monuments. In the game matching world monument images, a randomized picture
sequence will appear, and then the player will click on the image to open the image,
and then click on another image for the same or matching image. The picture order
for the new game will be randomized, so the image order display will not be the
same as the previous image order display. In this study, the process of randomizing
this game using randomization algorithms that exist in the science of artificial
intelligence is the Fisher-Yates Shuffle algorithm. Shuffling algorithm Fisher-
Yates Shuffle can randomize the order of data entered into the array. Because this
algorithm is biased (it is unlikely to appear in the same order / position). This game
matching application of world monuments can support learning in honing children's
memory skills. This game consists of 3 levels. At the easy level there are 16 boxes
containing 8 pairs of images, at the moderate level there are 20 boxes containing
10 pairs of images, while at the difficult level contains 24 boxes containing 12 pairs
of images that must be matched.

Keywords: game, world monument, randomization, FisherYates Shuffle


[Date]

55
Paper ID #43

Predictive Models for Popularity of Solo and Group


Singers in Spotify Using Decision Tree
Green Arther Sandag1, Adinda Marcelina Manueke2
1
Universitas Klabat, Indonesia, 2Yuan Ze University, Taiwan
1
greensandag@unklab.ac.id, s1086413@mail.yzu.edu.tw

ABSTRACT

Technology has revolutionized our world over the years, and music is one of them.
Spotify had become one of the music streaming applications that offers the latest
songs in every year. Users can download Spotify from Play Store, App Store, and
the official website. Spotify is a music streaming platform that provides a Freemium
service, which means it is available for free use and a paid premium. Users can
browse the most famous artists or songs easily according to their ratings. The artist,
lyric, and some of the audio features have a significant impact on making the song's
popularity. The purpose of this research is to predict a soloist or group singers using
a decision tree algorithm. We used weighted by information gain method to
determine the most crucial feature in processing singers' popularity. Our model will
help the solo singer, group singers, and song composers make their songs
accessible. The best performance result is the Decision Tree Algorithm with an
Accuracy of 89.5% on cross-validation and 92.3% on independent data.

Keywords: Decision Tree, Spotify, song, prediction, audio feature.

[Date]

56
Paper ID #45

Nutrition and Lifestyle Recommendations for Patients


Recovering from Covid-19 in Nusa Tenggara Barat
Province
Firstyani Imannisa Rahma1, Rizki Mawan2, Harianto Harianto3, Kusrini4
1,2,3,4
AMIKOM Yogyakarta University, Indonesia
1
firstyani.rahma@students.amikom.ac.id, 2rizki.mawan@students.amikom.ac.id,
3
harianto.27@students.amikom.ac.id, 4kusrini@amikom.ac.id

ABSTRACT

Providing nutrition for COVID-19 patients is one of many actions to reduce the risk
due to symptoms of COVID-19. To help meet the nutritional needs of COVID-19
cured patients, we developed a nutritional needs recommendation system and
predicted nutritional needs for COVID-19 recovered patients in West Nusa
Tenggara, Indonesia with Technique for the Order of Preference by Similarity to
Ideal Solution method (TOPSIS). We use data from COVID-19 Task Force in this
province along with The Indonesian Dietary Recommendations to help decide
which nutrition is needed by recovered patients. The criteria used in the prototype
of this system are Age Group weight 3, Vegetable Consumption weight 4, Fat
Consumption weight 4, Salt & Sugar Consumption weight 2, and Sports weight
3.After cranking the two patterns used, the Pattern Preference value is obtained 1 =
0.34980639174099 and Pattern 2 = 0.65019360825901 so that the highest
preference value that can be used as a recommendation is Pattern 2 with a
Preference value of 0.65019360825901.

Keywords: COVID-19, Nutrition Needs, TOPSIS, Decision Support System

[Date]

57
Paper ID #47

Determining Priority of Bus fare In Medan By Using


Algorithm C4.5 Method
Labuan Nababan1, Jane Elnovreny2, Erwin Ginting3, Jernih Donda4
1,2,3,4
Universitas Potensi Utama Medan, Indonesia
1
buannababan7@gmail.com, 2elnovreny311jane@gmail.com,
3
erwinginting82@gmail.com, 4jernihsinurat2104@gmail.com

ABSTRACT

Medan is the capital city of North Sumatra. Population of Medan is growing rapidly
that make the volume of vehicles increase as well. C4.5 Algorithm is an algorithm
classification data of decision tree type. Decision tree of C4.5 algorithm is built
with several stages that contain the selection of attributes as root, create branches
for each value and complete cases in branches. These stages will be repeated for
each branch until all cases in the branch have the same class. From approving the
decision tree, several rules will be obtained. In this case the Author Prioritizes
determining Bus fares. The application of the C4.5 Algorithm can help the
Transportation Agency to determine priority of bus fare.

Keywords: datamining, classification, c4.5 algorithm, decision tree, bus, fare.

[Date]

58
Paper ID #48

Inter-Structure and Intra-Structure Similarity of Use


Case Diagram using Greedy Graph Edit Distance
Fatimatus Zulfa1, Daniel Siahaan2, Reza Fauzan3, Evi Triandini4
1,2
Institut Teknologi Sepuluh Nopember, Indonesia, 3Institut Teknologi Sepuluh
Nopember & Politeknik Negeri Banjarmasin, Indonesia, 4Institut Teknologi dan
Bisnis STIKOM Bali, Indonesia
1
fatimatus15@mhs.if.its.ac.id, 2daniel@if.its.ac.id, 3reza.fauzan@poliban.ac.id,
4
evi.triandini11@gmail.com

ABSTRACT

Use case diagram is one of the behavior diagrams in UML diagrams. It models the
basic needs of users and how users and systems interact to achieve them. Each use
case diagram forms a structure which abides a set of standard notations and
grammar. Therefore, we can measure the structural similarity between the two use
case diagrams. Measuring the similarity of two use case diagram structures can help
in the process of reusing diagrams, detecting clones, and assessing learning results.
This study proposes an advanced method to measure the structural similarity
between the two use case diagrams. Each use case diagram is translated into a
graph. The graph represents the inter-structure and intra-structure of a diagram. The
graph inter-structure models the interaction between the main use cases and their
actors. In comparison, the graph intra-structure models the detailed structure
descriptions of every main use case. The similarity between the two represented
graph calculates using Greedy Graph Edit Distance. Our experimental result shows
that the proposed graph can measure the similarity of the use case structural
diagram. The Greedy Graph Edit Distance also can calculate the similarity other
UML diagrams for the specific purpose.

Keywords: graph edit distance, graph similarity, greedy algorithm, structural


similarity, use case diagram.
[Date]

59
Paper ID #49

Detection of Covid-19 in Chest X-ray Image using


CLAHE and Convolutional Neural Network
Muhammad Wafa Akhyari1, Buyut Umri2, Kusrini3
1,2,3
AMIKOM Yogyakarta University, Indonesia
1
muhammad.1187@students.amikom.ac.id, 2Buyut.u@students.amikom.ac.id,
3
kusrini@amikom.ac.id

ABSTRACT

In 2019, the COVID-19 virus has spread to various parts of the world including
Indonesia. This global pandemic becomes a lethal outbreak since there is no vaccine
to treat or prevent transmission of the virus. Rapid Test is selected as an essential
method to detect Covid-19 in Indonesia because the price is fairly cheap compared
to the SWAB test. The increase in Covid-19 patients tends to lead to limited
capacity for the Covid-19 test available at the hospital so that the latest technology
to detect and overcome this pandemic issue is needed. Thus, the present research
aims to examine the total of 100 X-Ray chest images of the Covid-19 patients and
100 X-ray normal chest images. The application of Contrast Limited Adaptive
Histogram Equalization (CLAHE) and Convolutional Neural Networks (CNN)
methods are implemented to analyze the dataset with two scenarios in obtaining the
detection results. The results of this research reveal that the application of CLAHE
is likely to affect Covid-19 detection accuracy using CNN. In addition, the
application of the CNN basic model shows significant results compared to the
application of VGG16 transfer learning.

Keywords: Detection, Covid-19, Chest X-ray, CLAHE, CNN

[Date]

60
Paper ID #52

Twitter data analysis use machine learning for evaluation


of society in the prevention the spread of covid-19
Nugroho Setio Wibowo1, Rendy Mahardika2, Kusrini3
1,2,3
AMIKOM Yogyakarta University, Indonesia
1
nugroho.wibowo@students.amikom.ac.id,
2
rendy.mahardika@students.amikom.ac.id, 3kusrini@amikom.ac.id

ABSTRACT

The government continues to conduct socialization to invite people to stay at home.


the suggestion to remain at home was also conveyed by the Indonesian president
Joko Widodo. Social media plays an important role in this socialization. Social
media data, especially Twitter in Indonesia, is widely used for the purpose of
delivering information related to the Covid-19 case, the response and status related
to staying at home. On the other hand, the spread of covid-19 cases has also not
shown a decline. It is necessary to evaluate the community compliance compared
to the spread of co-19. This study aims to determine whether the community
adheres and correlates positively with co-19 in Indonesia. This research takes data
from Indonesian twitter. The algorithm used is logistic regression and random
forest combined with an ensemble algorithm, namely bagging. The results of
research with Twitter data with filter keywords: covid19, fixed home, stay-at-home,
going home, psbb location of Indonesia in the period March 3-July 7 2020 as many
as 705 twit shows that community non-compliance increased from mid-June 2020
which is consistent with the covid case data which shows trends increase in covid19
cases in Indonesia

Keywords: covid19; Logistic Regression; Random Forest; Machine learning

[Date]

61
Paper ID #55

The Development of Web Based Tracer-Study


Information System at Universitas Klabat Career Center
Tommy Sijabat1, Wiwandy Dopong2, Reymon Rotikan3, Steven Lolong4
1,2,3
Universitas Klabat, Indonesia, 4University of Tübingen Germany
1
s21610026@student.unklab.ac.id, 2s21610475@student.unklab.ac.id,
3
reymonr@unklab.ac.id, 4steven.lolong@unituebingen.de

ABSTRACT

A web-based information system is used to collect, process, store existing data, and
provide information for decision-making. The use of web-based information
systems can help support various business processes and integrate all the processes.
Universitas Klabat, with the Career Center that carries out alumni tracer study, still
does not have an integrated system in its implementation. An information system
that can integrate every tracer study implementation can encourage productivity
and improve higher education quality in the accreditation process. This study aims
to create a web-based tracer study information system at Universitas Klabat's
Career Center. In developing the system, a PHP based programming language
framework, namely Laravel, was employed to develop the system. The resulting
web-based information system can integrate every process of the tracer study. The
information system has four types of users, namely administrators, operators,
alumni, and employers. The information system can also generate reports needed
by Universitas Klabat and report purposes to the Ministry of Research and
Technology.

Keywords: tracer study, alumni, unklab, information system


[Date]

62
Paper ID #57

Structural Similarity Measurement using Graph Edit


Distance-Greedy on Statechart Diagrams
Hidayatul Munawaroh1, Daniel Siahaan2, Reza Fauzan3, Evi Triandini4
1,2
Institut Teknologi Sepuluh Nopember, Indonesia, 3Institut Teknologi Sepuluh
Nopember & Politeknik Negeri Banjarmasin, Indonesia, 4Institut Teknologi dan
Bisnis STIKOM Bali, Indonesia
1
hidayatul15@mhs.if.its.ac.id, 2daniel@if.its.ac.id, 3reza.fauzan@poliban.ac.id,
4
evi@stikom-bali.ac.id

ABSTRACT

With the emergence of the need for online learning, the automatic grading system
is inevitable requirements in e-learning system. The automatic grading system in
software design courses requires a method for measuring similarity between the
key-answer design and student-answer designs. There have been several efforts to
develop methods for measuring the design similarity. Nevertheless, the purpose of
those methods is to reuse software designs. This study proposes a graph
representation of statechart diagram. The graph models the structural aspects of the
state-chart diagram. This study also proposes the use of Graph Edit Distance (GED)
greedy for calculating the structural similarity between two graphs. The results
show that all parameters used can determine the structural similarity between two
statechart diagrams with graph representation of statechart diagram as input.
Statechart similarity results obtained were 0.83.

Keywords: statechart diagram similarity, structural similarity, Graph Edit Distance


(GED), greedy.

[Date]

63
Paper ID #60

Convolutional Neural Network (CNN) for Image


Classification of Indonesia Sign Language Using
TensorFlow
Olivia Kembuan1, Gladly Rorimpandey2, Soenandar Tengker3
1,2,3
Universitas Negeri Manado, Indonesia
1
oliviakembuan@unima.ac.id, 2gladlycrorimpandey@unima.ac.id,
3
soenandarmilianttengker@unima.ac.id

ABSTRACT

Sign language is a system of communication that consist of a set written symbols


or characters for speech and hearing-impaired society to communicate with other
people. Understanding sign language is challenging because it requires memorizing
a hand poses and gestures. This suggests a demand for an automatic sign language
recognition system that allows everyone to understand this language. We used the
Convolutional Neural Network (CNN) to develop the system recognition and
classification of the Indonesia sign language (BISINDO) dataset which contains
2659 images of twenty-six (26) letters categories. The images are divided into
training and validation datasets. The experimental results show that the model has
achieved an accuracy of 96.67% on the training dataset, and an accuracy of 100%
for the validation dataset.

Keywords: Convolutional Neural Networks, Indonesian Sign Language,


Tensorflow, Google Colaboratory

[Date]

64
Paper ID #62

Evaluation of Service Quality of Manado City


Government Website with E-GovQual Approach to
Calculate Importance Performance Analysis
Edson Yahuda Putra1, Prince George Imanuel2
1,2
Universitas Klabat, Indonesia
1
eyahuda@unklab.ac.id, 2s21510045@student.unklab.ac.id

ABSTRACT

The rapid advancement of information technology along with its potential for
widespread use opens opportunities for accessing, managing and utilizing
information in the global era. In accordance with Presidential Regulations No. 3 of
2003, policies and strategies for e-Government development with its applications,
mainly Manado City Government Official Website, are crucial within each of its
social level adapting in its ever-evolving global changes. Importance Performance
Analysis (IPA) method will be used after the questionnaire approach has been done
to find the result through mapping the attributes with IPA Cartesians diagram.
Based on the results of the analysis of the suitability level, it found a value of
<100% i.e. 91.94% and the results of the gap level with a comparison difference of
-0.09595559. Based upon the IPA quadrant, the result concluded that some quality
attributes are needed to be improved. Therefore, the services in Manado City
Government Website is at its finest and almost reached the expectations to optimize
use of information and communication technology.

Keywords: Quality, Service, e-Government, e-GovQual, IPA

[Date]

65
Paper ID #64

Information Technology Governance Audit Using the


COBIT 5 Framework at XYZ University
Andrew Tanny Liem1, Joe Yuan Mambu2, George Tangka3
1,2,3
Universitas Klabat, Indonesia
1
andrew.heriyana@unklab.ac.id, 2joeyuan.mambu@unklab.ac.id,
3
gmwtangka@gmail.com

ABSTRACT

Information Technology (IT) governance is a collection of processes that aim to


ensure the suitability of IT implementation with its support for achieving
organizational goals. Good IT governance can help support the organization's
success in achieving its goals. To find out the extent to which IT governance is
implemented, IT governance needs to be audited. In its development, IT has been
applied in various places, one of which is the University. IT implemented in the
University is a concept that answers the needs of the organization to guarantee the
return of invested IT. Without IT governance, it can be a waste of IT investment
done. XYZ University is one of several universities that have implemented IT to
support data services and management. The implementation of IT at XYZ
university has never been audited. The purpose of this study was to conduct an audit
of the IT governance that was implemented. IT governance audit is carried out
based on the COBIT 5 framework. This research uses a descriptive method. Based
on the results obtained from the analysis carried out, IT governance at XYZ
university is still at the level of capability level 0 - Incomplete Process with the
acquisition of capability values averaging 0.5. Researchers provide advice for the
University in order to improve IT governance that has been implemented so that in
the future it can achieve a higher level of capability.

Keywords: IT Governance, IT Audit, COBIT 5, Capability Level [Date]

66
Paper ID #67

User Experience Evaluation of Egrang Traditional Game


Application
Ina Sholihah Widiati1, Widiyanto Hadi2, Muhammad Setiyawan3, Widada4
1,2,3,4
STMIK Amikom Surakarta, Indonesia
1
inasw@dosen.amikomsolo.ac.id, 2widiyanto@dosen.amikomsolo.ac.id,
3
muhammadsetiyawan@dosen.amikomsolo.ac.id,
4
widada@dosen.amikomsolo.ac.id

ABSTRACT

Today's modern game that many children play is a mobile-based game. The rapid
development of smartphones makes mobile gaming technology develop too.
Traditional games have been developed in Indonesia. The purpose of elevating
traditional games into mobile game applications is so that children now know the
traditional game of the nation's culture even though it is now in the digital age. One
of the traditional games raised in mobile games is Stilts. This study discusses the
evaluation of traditional Egrang game application users. Respondents from this
study are children aged 7 to 13 years. The tool used for processing and analyzing
respondent data is the User Experience Questionnaire (UEQ). UEQ will measure 6
User Experience scales including Attractiveness, Perspicuity, Efficiency,
Dependability, Stimulation and Novelty. The results of this study obtained
Perspicuity and Novelty Scale data in the Above Average range. Attractiveness,
Efficiency and Dependability scales are in the Below Average range. While the
Stimulation scale is in the Bad range. From these data it can be seen that the
stimulation scale most needs to get more attention in the evaluation or development
of subsequent applications. While the one who gets the highest score is Perspicuity.
So, it can be concluded that respondents said the game was easy to understand when
playing for the first time but was still not motivated to play it repeatedly and tended
to get bored quickly.

Keywords: User Experience, UEQ, Egrang, Traditional Game, Game Application


[Date]

67
Paper ID #70

Classification Of X-ray COVID-19 Image Using


Convolutional Neural Network
Ronaldus Morgan James1, Kusrini2, M. Rudyanto Arief 3
1,2,3
AMIKOM Yogyakarta University, Indonesia
1
ronaldus.1188@students.amikom.ac.id, 2kusrini@amikom.ac.id,
3
rudy@amikom.ac.id

ABSTRACT

The current number of corona virus (COVID19) infections in Indonesia becomes


more and more worrying. According to data on June 11, 2020, the number of
infected people in Indonesia has reached 35,295 people. With these consequences,
it is considered very important to immediately identify infection in order to stop or
minimize the spread of the disease. There have been several ways to detect and
diagnose COVID-19, one of which is using X-ray images. This paper examines the
use of in-depth features and methods to process two-dimensional data from
patients’ X-ray images. Convolutional Neural Network (CNN) is a development of
Multi-Layer Perceptron (MLP), which is specifically designed to process two-
dimensional data or image data. The deep features of the fully connected layer CNN
model are extracted and can be immediately classified without the need for any
additional techniques. CNN method is used because its good performance for large
datasets that will be used for training and testing. In the classification process, the
dataset contains 60 x-ray images and consists of two categories, COVID-19 and
normal, that represents positive or negative classification of Covid-19 infection to
a patient. To get the best accuracy of the classification model, the author changed
several parameters on CNN, such as the distribution of the dataset and the number
of epochs. From the 9 models tested, the model number 5 and 8 with a dataset ratio
of 70:30 and epoch number 30 and 40 respectively, resulted the best accuracy of
97.91%.

Keywords: COVID-19, Coronavirus, Classification, X-ray Images, Convolutional


Neural Network, Deep Learning.
[Date]

68
Paper ID #76

Health Monitoring with Artificial Intelligence


Benfano Soewito1, Devinca Limto2, Christina Yuanita3, Vincent4, Noprianto5
1,2,3,4,5
Bina Nusantara University, Indonesia
1
bsoewito@binus.edu, 2devinca.limto@binus.edu, 3christina.yuanita@binus.edu,
4
vincent.zhang@binus.ac.id, 5noprianto@binus.ac.id

ABSTRACT

Health is very important, but many people don't care about health. In developing
countries, public awareness of the importance of health is minimal. This is because
some people cannot easily consult a doctor about their health problems due to
limited time, money, and much more. Time and money can be an obstacle for
someone when they want to run routine health checks, especially for someone who
has a busy schedule. We have developed an artificial intelligence-based application
that can be used by people to accurately check their health from the symptoms
provided by the user. This application is also designed to be easy to use anywhere
and anytime with the hope that public awareness about health will get better.

Keywords: artificial intelligence, chatbot, classification, symptoms, health


monitoring

[Date]

69
Paper ID #79

Determination of Rice Quality Using the K-Means


Clustering Method
Muhammad Reza Fahlevi1, Dini Ridha Dwiki Putri2, Fetty Ade Putri3,
Maulia Rahman4, Lahmudin Sipahutar5, Muhatri6
1,2,3,4,5,6
Universitas Potensi Utama, Indonesia
1
ezafahlevi72@gmail.com, 2putrydiny11@gmail.com, 3echiputri12@gmail.com,
4
mazrahman18@gmail.com, 5mudinsipa@gmail.com, 6muhatri.3@gmail.com

ABSTRACT

Determination of the quality of good quality rice is very preferred by buyers. One
indicator in determining this quality is rice which is often bought by buyers. This
study aims to classify rice based on clusters, making it easier for buyers to know
the quality of rice and the seller can determine the right price of rice based on
quality. The method used in this study is K-Means Clustering of 206 rice brands,
49 rice brands belong to the very good quality rice group, 131 rice brands belong
to the good quality rice group and 26 rice brands belong to the poor quality rice
group, Results This research can find out the results of the quality of rice quality
and can provide preventive measures to reduce problems in determining the quality
of rice quality.

Keywords: Data Mining, K-means Clustering Method, Rice Quality.

[Date]

70
Paper ID #83

Use of the EPIC Method to Analyze the Effectiveness of


Sales Promotion in the Go-Jek Online Transportation
Mode
Reynoldus Andrias Sahulata1, Lewi Kailola2
1,2
Universitas Klabat, Indonesia
1
rey_sahulata@unklab.ac.id, 2S21610534@studen.unklab.ac.id

ABSTRACT

The internet as a form of information technology advancement has made Go-Jek


increasingly recognized by the public as one of the largest online-based
transportation companies in Indonesia. Tight competition is certainly closely
related to the sales promotion that Go-Jek and its competitors continue to do. This
study aims to measure the effectiveness of sales promotion activities carried out by
Go-Jek using the EPIC model. The data collection process was carried out by
distributing questionnaires to 100 respondents who had been assigned Go-Jek users
in Manado City. The data analysis technique used was quantitative analysis, simple
tabulation analysis and the average score which was then entered into the EPIC
scale range model developed by The Nielsen Company. In it there are four
dimensions, namely empathy, persuasion, impact and communication which are
used to measure the effectiveness of sales promotions. The results of the EPIC
model analysis show that the four dimensions are included in the effective scale
range, where the empathy dimension gets a score of 4.03, the persuasion dimension
gets a score of 3.68, the impact dimension gets a value of 3.96 and the
communication dimension gets a score of 4.07. The EPIC rate, which is the average
value of the four dimensions, is 3.93 and is included in the effective scale so that
the effectiveness of sales promotions carried out by Go-Jek companies in the city
of Manado meets expectations.

Keywords: Quantitative Analysis, EPIC Model, Go-Jek Mode of Transportation


[Date]

71
Paper ID #84

An Expert System For Identifiying Pests And Diseases of


Cocoa Plants Using Dempster Shafer Method
Nita Sembiring1, Mikha Dayan Sinaga2, Siti Aliyah3, Fithry Tahel4, Erwin
Ginting5, Efani Desi6
1,2,3,4,5,6
Universitas Potensi Utama, Indonesia
1
nita.sembiring86@gmail.com, 2mikhadayan88@gmail.com,
3
aliyahsiti478@gmail.com, 4fithrytahel01@gmail.com,
5
erwinginting82@gmail.com, 6efanidesi88@gmail.com

ABSTRACT

Cocoa is more commonly referred to as chocolate fruit because cocoa beans that
have undergone a series of processes can produce cocoa powder. Cocoa plants have
pests and diseases that can interfere with the growth of these plants, such as
caterpillars kilan, vascular streak dieback, etc. Among these diseases and pests have
some of the same symptoms. This can cause uncertainty in determining the right
solution. These problems can be solved by creating a system that has intelligence
in identifying cocoa pests and diseases. This system is called an expert system.
Expert systems can be equipped with methods for tracing. Dempster Shafer which
is one method that can be applied in an expert system has the ability to calculate all
the symptoms that have been entered into the knowledge base and provide the right
identification results. The results of this study are the creation of an expert system
that can identify cocoa pests and diseases.

Keywords: Cocoa, Expert System, Dempster Shafer, Artificial Intelligence

[Date]

72
Paper ID #88

Forecasting Agricultural Land in West Denpasar Using


the Semi Averages Methods Applied in GIS
Ni Nyoman Supuwiningsih1, Shofwan Hanief2
1,2
ITB STIKOM Bali, Indonesia
1
supuwiningsih@stikom-bali.ac.id, 2hanief@stikom-bali.ac.id

ABSTRACT

Agriculture is the main livelihood done in the days of ancestors in Indonesia.


Agricultural land from 2014- 2019 in West Denpasar Subdistrict experienced a
significant decline because it was influenced by several things such as the
conversion of agricultural land to settlements due to overcrowding or population
movement from villages to cities. Another factor is that livelihoods as farmers do
not promise to generate income as they wish so the community uses their land to
build other businesses. Based on these problems, a study was conducted to predict
land area from 2020-2025 using data on agricultural land area in the District of
West Denpasar from 2014-2019. Forecasting methods used are semi-average trend
statistical methods. The results of the forecasting will be implemented in a
Geographic Information System (GIS) using ArcView software. This research can
be used as a decision maker by the government to anticipate the area of agricultural
land in accordance with forecasting results that experienced a decline from 2020-
2025 to maintain the balance of natural ecosystems for the survival of the next
generation of the nation.

Keywords: Agriculture, Semi-average statistical method, forecasting, Geographic


Information System (GIS)

[Date]

73
Paper ID #96

Student Prediction of Drop Out Using Extreme Learning


Machine (ELM) Algorithm
Muhammad Ibnu Sa'ad II1, Kusrini2, M Syukri Mustafa3
1
AMIKOM Yogyakarta & FKIP Universitas Mulawarman, Indonesia, 2AMIKOM
Yogyakarta University, Indonesia, 3STMIK Dipanegara Makassar, Indonesia
1
ibnu@fkip.unmul.ac.id, 2kusrini@amikom.ac.id, 3syukri@dipanegara.ac.id

ABSTRACT

The purpose of this study was to predict students dropping out of the Education
Management Doctoral Program of FKIP Mulawarman University and to evaluate
the Extreme Learning Machine in predicting student dropouts. This research uses
the Extreme Learning Machine algorithm, the feedforward neural network learning
method and the Support Vector Machine algorithm for comparison of the level of
accuracy using the same data. The data used is as much as 110 data according to
the number of students from the class of 2012 to 2018, the data is taken from the
SIA Education Management Study Program of the Mulawarman University
Doctoral Program and then processed. In this case, how to predict student dropouts
using the variable Gender, Semester 3 IP Value, Working Status, Family Status,
Age, and using two DO and NON DO Classes? And calculating the accuracy value
using a confusion matrix ?. From the results of this study, it can be concluded that
students drop out in the Educational Management of the FKIP Mulawarman
University Doctoral Program can be predicted by Extreme Learning Machine using
the training value obtained from semester 3 of the 2012-2018 class. From the results
of testing the predictive accuracy of the Extreme Learning Machine is 72 %.

Keywords: Drop Out, Extreme Learning Machine, Support Vector Machine

[Date]

74
Paper ID #99

Expert System Detects Boiler Engine Damage Using


Certainty Factors
Dedek Indra Gunawan Hutasuhut1, Ommi Alfina2, Nita Syahputri3, Siti
Fatimah Sihotang4, Efani Desi5, Siti Aliyah6
1,2,3,4,5,6
Faculty of Engineering and Computer Science
Universitas Potensi Utama, Medan, Indonesia
1
dedek.indra@gmail.com, 2ny.aroen@gmail.com, 3nieta20d@gmail.com,
4
siti.fatimah.sihotang@gmail.com, 5efanidesi88@gmail.com,
6
aliyahsiti478@gmail.com

ABSTRACT

The boiler machine is one of the important machines in the power generation
industry which functions to convert water into steam which is then used to drive
turbines to produce electrical energy. One of the damages that often occurs in boiler
engines is pipe leakage that causes the engine to not operate and the risk of fire.
From the danger of the resulting effects, an expert system is needed that can
determine the type of damage and how to handle it. The purpose of this study was
to analyze the damage to the boiler engine with the Expert System using the
Certainty Factor method. The result of this research is the highest percentage of
damage on Scale with a confidence level of 83%.

Keywords: Expert System, Certainty Factor, Boiler Engine

[Date]

75
Paper ID #101

Intrusion Detection System using Genetic Algorithm and


K-NN Algorithm on Dos Attack
Muhammad Akmal Fauzi1, Ahmad Tri Hanuranto2, Casi Setianingsih3
1,2,3
Telkom University, Indonesia
1
kemalemal90@gmail.com, 2athanuranto@telkomuniversity.ac.id,
3
setiacasie@telkomuniversity.ac.id

ABSTRACT

Intrusion Detection is the process of monitoring and identifying activity on a host


or network to prove whether the host or network has been successfully attacked or
is still an attempt at aggression. Intrusion Detection System (IDS) helps monitor
the network based on various anomalies (unusual events) that can indicate threats
of hacker aggression, malware, or vulnerabilities in a system. IDS will monitor and
provide a warning of whether an activity is classified as malicious or not.
Furthermore, IDS will organize it into several strata levels of risk. This is very
helpful for prioritizing any activity anomalies that require more attention and
handling. This study analyzed the IDS process with a selection feature using
genetic algorithms and classification using the KNN algorithm and KDD99 as the
dataset. By selecting the best features from 41 to 18, the scenario in this study gets
an average training data accuracy of 99.98% and testing data of 97.52%

Keywords: Intrusion Detection System, K-Nearest Neighbor, Genetic Algorithm,


Security Network.

[Date]

76
Paper ID #103

Transient in Electrical Power System under Large


Induction Motor Starting Condition
Langlang Gumilar1, Mokhammad Sholeh2, Stieven Netanel Rumokoy3,
Dezetty Monika4
1,2
Universitas Negeri Malang, Indonesia, 3Politeknik Negeri Manado, Indonesia,
4
Politeknik Negeri Jakarta Depok, Indonesia
1
langlang.gumilar.ft@um.ac.id, 2mokhammadsholeh76@gmail.com
3
rumokoy@polimdo.ac.id, 4dezetty.monika@elektro.pnj.ac.id

ABSTRACT

The electric power system consists of static load, lump load, and motor. Large
industry requires a large induction motor to run its production. However, the state
of this induction motor has a negative impact on the electric power system. The
starting current on the motor is so high that it can be 5 to 10 times the nominal
current. On the other hand, the motor absorbs a lot of power from the electric power
system and results in a voltage drop on the bus. The purpose of this paper is to
improve the voltage drop on the bus and reduce the starting current of the induction
motor. The analysis in this paper uses a transient curve of changes in voltage and
starting current with time. Starting an induction motor with the Direct on Line
(DOL) method as the basis for determining the voltage drop and the starting current
of the induction motor. Furthermore, using the Capacitor Bank method, Fault
Current Limiting (FCL), and Static Var Compensator (SVC) to improve transients
of voltage drop and motor starting current. All the results of these methods are
compared to find out which method is the best.

Keywords: Starting Current, Voltage, Transient, Induction Motor, Power System.

[Date]

77
Paper ID #107

RESTful Web Service Implementation on Unklab


Information System Using JSON Web Token (JWT)
Stenly Ibrahim Adam1, Jimmy H Moedjahedy2, Jeremiah Maramis3
1,3
Universitas Klabat, Indonesia, 2Universitas Klabat & Universitas AMIKOM
Yogyakarta, Indonesia
1
stenly.adam@unklab.ac.id, 2jimmy@unklab.ac.id,
3
jeremiahmaramis00@gmail.com

ABSTRACT

Student data that are public and stored on Universitas Klabat (Unklab) currently be
stored in a local database and can only be accessed by the database administrator.
A RESTful web service acts as a medium that provides access to the data for those
who have permission, improving the data's accessibility. Any user eligible by the
web service can use the Unklab Information System data to develop a mobile or
another web application without making another similar database, thus eliminating
the redundant process of making a duplicate database. A JSON Web Token (JWT)
is also used in this web service to ensure that the person accessing the web service
is authorized to access the specific data. The agile method is used to develop this
application. In conclusion, the web service can create, read, update, delete (CRUD)
operation regarding the student database and provide it to the user that is authorized
with a valid JWT.

Keywords: Student data, RESTful Web Service, Unklab Information System,


JSON Web Token

[Date]

78
Paper ID #109

The Utilization of Gaussian Filter Method on Voice


Record Frequency Noise
Al-Khowarizmi1, Halim Maulana2
1,2
Universitas Muhammadiyah Sumatera Utara, Indonesia
1
alkhopiliang@gmail.com, 2thekazagami@gmail.com

ABSTRACT

Voice is one of the very common media and is commonly used as communication
by humans with the hope that it must reach the destination clearly and can be
understood by those who receive the voice, but cannot support the delivery of voice
information, because in sending information on the sound provided by the noise
speaking the arrival of sound. One that solves the problem of sound signals that are
disturbed by noise which can be facilitated by digital filters. Gaussian method is
the best method for eliminating noise in the image that has been developed, so that
the gaussian method needs to be done to improve the noise in the sound in order to
issue a clean sound signal from noise and increase the noise that has been
eliminated. This study uses the Gaussian filter method in filtering noise in the sound
record. in the implementation divided into two (2) steps to filter on the frequency
consisting of images and the second to do with voice recording. In carrying out the
filtering on the frequency of the sound that is considered as noise, the sound that
can be released but the sound produced is also reduced so that it sounds soft. In
filtering the Gaussian method to eliminate the noise of the sound record the current
process is combined with obtaining a dynamic range and peak factor with
parameters attack time = 0.01, release time = 0.01, hold time = 0.05, lower limit =
0.0005 and threshold of silence = 0.25. Apart from the results in this paper, the
dynamic range and crest factors in the parameters for filtering require a very long
process and an optimal method of repair is needed.

Keywords: voice, noise, filter, gaussian method.


[Date]

79
Paper ID #112

Optimizing of C4.5 Algorithm for Predicting ATM


Machine Damage
Dahriani Hakim Tanjung
Universitas Potensi Utama, Indonesia
dahri@potensi-utama.ac.id

ABSTRACT

This study aims to provide an evaluation of optimizing damage forecasters on ATM


machines using data mining. Data mining with the C4.5 algorithm is used to predict
damage to ATM machines. It is expected that with the forecasting can help the
technician in taking keputusa. The results of this study are expected to help ATM
management units in optimizing and monitoring ATM machines, so as to provide
optimal service to customers. Algortima C4.5 is an algorithm that is quite effective
to help form a decision tree, the decision tree will then produce a new knowledge.
Based on the test results on the decision tree, it is obtained that the suitability of the
data against the damage data of the ATM machine. The results of the application
of the C4.5 method to the prediction of machine damage The results of the C4.5
algorithm are decision trees that have rules that serve as knowledge and information
that are easier to understand.

Keywords: Data Mining, C4.5, Prediction, ATM Machine Damage

[Date]

80
Paper ID #140

Geomath: An Augmented Reality Based Geometry


Introductory Android-Based Application with Cuboid
Tracking
Joe Yuan Mambu1, Bill G. Wullur2, Andria Wahyudi3, Jeanne Ambana4,
Riani Kumendong5
1,3,4,5
Universitas Klabat, Indonesia
2
School of Education Curtin University Perth, Australia
1
joeyuan.mambu@unklab.ac.id, 2bill.wullur@postgrad.curtin.edu.au,
3
andriawahyudi@unklab.ac.id, 4s21610048@student.unklab.ac.id,
5
s21610248@student.unklab.ac.id

ABSTRACT

Geometry is the lesson we have learned from elementary school level which is
divided into two categories: plane geometry and solid geometry. The shapes of
geometry object can be found in our surrounding environment, such as dice with
cuboid shape, door with rectangular shape, plate with circular shape, etc. Even so,
apparatus used for introducing these shapes are many still in the form of books or
static media or object. In this research, an innovation is made by creating an
application that will shows geometry planes and objects using Augmented Reality
technology and 3D Cuboid Tracking method. This method uses a cuboid-shaped
marker which has 6 sides of marker and can be tracked all at once. By using this
method, the geometry objects can be seen in 3D where users can see every object
in different angle and gives a better haptic feedback as the cube can be hold. In this
research, we use 10 geometry objects that consists 6 solid geometry objects (cube,
rectangular prism, triangular prism, sphere, cylinder, cone) and 4 plane geometry
objects (triangle, rectangle, square, circle). This application shows geometry
objects with its description and the calculation of surface area, volume, and
perimeter and a quite accurate projection with less than 0.5 cm margin error. A test
of the application also has been done on Android smartphone and successfully
installed on Android 5.1 and higher versions

Keywords: Geometry, 3D Cuboid Tracking, Augmented Reality, pedagogy,


smartphone
[Date]

81
Paper ID #146

Analysis of Vulnerability Webserver Office Management


of Information And Documentation Diskominfo using
OWASP Scanner
Agung Wijayanto1, Ema Utami2, Agung Budi Prasetio3
1,2
University of Amikom Yogyakarta, Indonesia, 3Amikom University
Yogyakarta & University Technical Melaka Malaysia, Indonesia
1
agung.1179@students.amikom.ac.id, 2ema.u@amikom.ac.id,
3
agungbp@amikom.ac.id

ABSTRACT

Cases of lost scripts/programs have occurred but the server crashed due to electrical
problems. For problems related to attacks whose impact is felt, namely the type of
defacing attack. But his hopes of this research outside of the attack could secure it
first before another attack case. There are various kinds of attacks, for example,
such as cross-site scripting (XSS) attacks. This case has not yet happened and the
webserver admin hopes to secure it early so there are no cases of data/information
loss. Data/information that is more important on this website than other data is
data/information from the Information Management and Documentation Officer.
Vulnerability is a loophole that is often used by people not responsible for getting
the data and information they need in any way. This research type of research uses
action research methods, the nature of this research uses quasiexperimental
research, and the approach conducted by researchers used a quantitative approach.
The research was carried out using the OWASP scanner approach on the
Diskominfo web server, with the hope of providing solutions or recommendations
to the webserver admin in implementing web server security as needed.

Keywords: XSS, OWASP, Vulnerability, Web Server, Information. [Date]

82
Paper ID #149

Natural Language Processing on Marketplace Product


Review Sentiment Analysis
Arif Nur Rohman1, Rizqa Luviana Musyarofah2, Ema Utami3, Suwanto
Raharjo4
1,2
Magister of Informatic Engineering Universitas Amikom Yogyakarta,
Indonesia, 3Universitas Amikom Yogyakarta, Indonesia, 4Institut Sains &
Teknologi AKPRIND Yogyakarta, Indonesia
1
arif.1075@students.amikom.ac.id, 2rizqa.1074@students.amikom.ac.id,
3
ema.u@amikom.ac.id, 4wa2n@akprind.ac.id

ABSTRACT

Marketplace is a platform that birdges buyer and seller to transact. In January 2020,
Central Bank reported that total transactions in 14 Indonesian marketplaces reached
23.27 trillion rupiahs. At the end of the transaction process, the buyer has the
opportunity to give a review of the product that has been purchased. This research
aims to sentiment analysis on marketplace product reviews. This research applies
Natural Language Processing as a pre-processing of text in the sentiment analysis
of marketplace product reviews using a machine learning approach with the Naive
Bayes and K-NN algorithms. The test scenario obtained an average Naive Bayes
accuracy of 52.4% on the Unigram dataset and an average KNN accuracy of 79.4%
on the Bigram dataset. The utilization of NLP, particularly the word normalizer,
can increase the accuracy of 10% for Naive Bayes and 4% for K-NN. Sentiment
analysis on marketplace product reviews is useful as an opportunity for product
improvement for both seller and competitor, in the other side it is also used as a
reference for other users before buying a product.

Keywords: sentiment analysis, NLP, Text Mining, Naïve Bayes, K-NN.


[Date]

83
Paper ID #151

People Under Surveillance Tracker Prototype


Development with Bluetooth Low Energy to
Suppress the Covid-19 Spread
Fandy Setyo Utomo1, Nandang Hermanto2, Wiga Maulana Baihaqi3, Rizqi
Aulia Widianto4, Dwi Ayu Mutiara5
1,2,4
Faculty of Computer Science, Informatics Department,
3,5
Faculty of Computer Science, Information Technology Department
Universitas Amikom Purwokerto, Indonesia
1
fandy_setyo_utomo@amikompurwokerto.ac.id,
2
nandanghermanto@amikompurwokerto.ac.id, 3wiga@amikompurwokerto.ac.id,
4
kotamangga128980@gmail.com, 5dwiayumutiara270@gmail.com

ABSTRACT

The new coronavirus has infected people around the world. In cases or reports
relating to the coronavirus, there are many terms or diction used by the Indonesian
government, one of which is ODP (Insider Monitoring). Unsupervised ODP is one
of the reasons for the increasing number of positive cases of COVID-19. Based on
existing references, there are no studies that develop applications to monitor ODP.
So that we will build a mobile-based ODP TRACKING prototype that aims to
prevent the COVID-19 that can be caused by ODP by using the Rapid Application
Development (RAD) methodology. The ODP Tracker application requires users
such as the community, COVID-19 Village Handling Task Force, puskesmas, sub-
district & district handling units, and the system administrator. Each of these users
has a different role in the application but is related to one another. Several
prototypes of the ODP Tracker application interface are shown in this study,
including the Registration form interface, the ODP tracking interface, and the ODP
report interface. The ODP Tracker application prototype can help the government
or Covid-19 handling officers in Indonesia to track and monitor the whereabouts
and conditions of people with ODP status.

Keywords: ODP Tracker, covid-19, coronavirus, RAD, prototype


[Date]

84
Paper ID #153

Systematic Literature Review of Hate Speech Detection


with Text Mining
Rini1, Ema Utami2, Anggit Dwi Hartanto3
1
University of Amikom Yogyakarta & PT. Time Excelindo, Indonesia,
2,3
Universitas Amikom Yogyakarta, Indonesia
1
rini@excelindo.co.id, 2ema.u@amikom.ac.id, 3anggit@amikom.ac.id

ABSTRACT

Along with the increasing activity on social media, hate speech is getting out of
control. Hate speech detection can be done by utilizing text mining technology.
There have been many hate speech detect ion studies conducted. To identify and
analyze research trends, data sources, methods and features used in hate speech
detection, this systematic literature review was created. Until early 2020, the topics
of hate speech were found, including hate speech against minorities, religion,
women, the general election agenda, and politics. Sources of data that are widely
used to be used as datasets come from twitter. Hate speech is not only classified
into HS (hate speech) and Non-HS (nonhate speech) but can be further classified
into racism, sexism, offensive, abusive, threats of violence and others. Of the 38
studies that meet inclusion and exclusion, there are 26 algorithms and 28 features
that have been used to detect hate speech. However, these methods and features do
not necessarily guarantee a good hate detection performance. Hate speech
classification performance is also influenced by the dataset, the features chosen, the
number of classes and mutually exclusive classes.

Keywords: hate speech, classification, systematic literature review, text mining.

[Date]

85
Paper ID #162

The Effect of Social Media Effectiveness on MSMEs


Marketing
Fahmi Ajismanto1, Andika Widyanto2
1,2
STMIK Palcomtech, Indonesia
1
fahmi_ajismanto@palcomtech.ac.id, 2andika_widyanto@palcomtech.ac.id

ABSTRACT

This study was conducted to assess and compare the effectiveness of small and
medium-sized food enterprise (MSMEs) advertisements in Palembang on
advertising services on Youtube, Facebook, and Instagram. This assessment and
comparison is carried out to determine the extent of the effectiveness of advertising
promotions and to find out which social media has the highest level of effectiveness
in advertising services. Using random sampling, it was found that 60 research
samples looked at Micro Small Medium Enterprises (MSMEs) promotional
advertising services on Youtube, Facebook, and Instagram. The research stages
started from testing the reliability and validity of the questionnaire, determining the
scale range of the study in assessing the effectiveness, tabulating the data by
looking for the average value of each dimension in the empathy, persuasion,
interest, and communication (EPIC) model, then calculating the EPIC rate to
determine the effectiveness value of advertisements promoted on social media. The
result is that advertisements on the three social media are very effective, seen from
the EPIC rate which is on a very effective scale range. EPIC rate for Instagram is
3.3, Facebook is 3.26, and Youtube is 3.28. The highest EPIC rate of 3.3 on
Instagram means that Instagram is more effective than Youtube, which is in second
place, and the last is Facebook. MSMEs in Palembang are right to choose these
three social media as promotional media.

Keywords: Empathy, Persuasion, Impact, Communication, Effectiveness [Date]

86
Paper ID #163

Keyword-Based Hadith Grouping Using Fuzzy C-Means


Method
Evi Dewi Sri Mulyani1, N Nelis Febriani SM2, Adam Darmawan3, Restu Adi
Wiyono4, Rahadi Deli Saputra5, Dani Rohpandi6
1,2,3,4,5,6
STMIK Tasikmalaya, Indonesia
1
eviajadech@gmail.com, 2nelisfebriani@gmail.com,
3
adamdarmawan@gmail.com, 4restu45@yahoo.com, 5rahadisianipar@gmail.com,
6
danirtms@gmail.com

ABSTRACT

Most of the Islamic documents have been documented and published to Muslims
to be studied and applied in daily activities. One of these documents is a Hadith.
Along with the development of hadith technology not only recorded on sheets of
paper but also stored on digital data storage media in the form of databases.
Document grouping allows users to get better information than using documents in
the same group. Fuzzy techniques allow different membership levels. The purpose
of grouping documents is to get different groups. This is needed for better document
search. The document used in this study is an Indonesian translation of the Sunnan
An Nasa'i Hadith tradition with a grouping technique using a combination of Text
Mining and Fuzzy C-Means algorithm as a method of grouping it.

Keywords: Text Mining, Fuzzy C-Means Clustering, Hadith.

[Date]

87
Paper ID #164

Lecturer Achievement Index Measurement Using Fuzzy


Inference System at STIKOM PGRI Banyuwangi
Khoirul Umam1, Eldy Wibawa2
1,2
Sekolah Tinggi Ilmu Komputer PGRI Banyuwangi, Indonesia
1
umam@stikombanyuwangi.ac.id, 2eldy36sawi@gmail.com

ABSTRACT

As an effort to measure lecturer performance, STIKOM PGRI Banyuwangi


implements the measurement of the Lecturer Achievement Index (LAI). The
measurement is conducted by collecting student ratings of the lecturer's
performance using a Likert scale on nine indicators. However, this method only
produces an average value from the questions. This method has not been able to
describe the quality of a lecturer's performance. Therefore, another mechanism is
needed so that the lecturer's performance quality can be known. One method that
can be used is the Fuzzy Inference System (FIS). The method is used to map the
average scores given by students into three levels of quality, i.e good, adequate, and
poor. By using this method, the LAI value obtained is different from the old
mechanism but can describe the lecturer’s performance quality better than the old
one.

Keywords: Fuzzy Inference System, fuzzy logic, Lecturer Achievement Index

[Date]

88
Paper ID #165

Decision Support System for High Achieving Students


Selection Using AHP and TOPSIS
Yufika Sari Bagi1, Suyono2, Michel Farrel Tomatala3
1,2,3
Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Multicom,
Indonesia
1
kesia.lobud@gmail.com, 2suyono@stmikmulticom.ac.id,
3
mikefarrel7@gmail.com

ABSTRACT

Selection of high achieving students is one of the efforts made by schools to


determine potential students who will be prepared to participate in the selection of
high achieving students at the regional, provincial, national and international levels.
Manual selection activities can have several problems, including it can take a lot of
time when many criteria must be used and many students participate in the selection
and there can be subjective assessments from the selection committee. Based on
those problems, a decision support system is proposed using AHP to determine the
weight of the criteria and TOPSIS to determine the best alternative. Decision
support systems using AHP and TOPSIS can assist the selection committee in
selecting high achieving students. The application of a decision support system
using AHP and TOPSIS in this study can also resolve problems such as reducing
the time required for the selection process and making the selection results more
objective.

Keywords: AHP, TOPSIS, DSS, High Achieving Student

[Date]

89
Paper ID #167

Prototyping of Machine Learning at Traditional Market


as Solution of Social Distancing Due To Covid-19
Outbreak
Michel Tomatala1, Mihuandayani2
1,2
STMIK Multicom Bolaang Mongondow, Indonesia
1
michel@stmikmulticom.ac.id, 2mihuandayani20@gmail.com

ABSTRACT

This study focuses on designing the prototyping of a machine learning application


that is purposely used for sales and purchase transactions in the traditional market.
This prototyping provides an alternative to traditional market traders who are
focused on selling their goods at physical places. This study builds an application
that provides a virtual platform for sales and purchase transactions. This study uses
Convolutional Neural Networks (CNN) as one of the categories in Deep Learning
which is part of Machine Learning. This study finds that the prototyping of machine
learning applications for sales and purchase transactions at traditional markets
might be a proper and beneficial solution for both traders and customers.

Keywords: Machine Learning, CNN, Traditional Market

[Date]

90
Paper ID #168

Decision Support System for Employee Recruitment of A


Company Using Multi Attribute Utility Theory
Mihuandayani1, Rillya Arundaa2, Virginia Tamuntuan3
1,2,3
STMIK Multicom Bolaang Mongondow, Indonesia
1
mihuandayani20@gmail.com, 2rill.christy@gmail.com,
3
virginiaworang@stmikmulticom.ac.id

ABSTRACT

Recruitment is one of the important things in the human resource management of a


company. Selection is part of the recruitment process to decide which applicant or
candidate suitable for a certain position. This research proposes a Decision Support
System (DSS) using the Multi-Attribute Utility Theory (MAUT) approach in the
process of selecting the candidate employee to make the assessment section
simplify in the decision making. There are four criteria used in this research namely
administration test, psychological test, interview, and medical test. The decision
support system can help the stakeholder in the decision making of employee
selection with an accurate and objective result. To measure the accuracy, we
compare our results with the old system measurements of selection data in this
company. The result is compared against the available data and an accuracy of
93.33 % is achieved.

Keywords: Decision Support System, MAUT, Employee

[Date]

91
Paper ID #186

Stock Price Forecasting on Telecommunication Sector


Companies in Indonesia Stock Exchange Using Machine
Learning Algorithms
Jimmy H Moedjahedy1, Wien Fitrian Roshandri2
1
Universitas Klabat & Universitas AMIKOM Yogyakarta, Indonesia
2
STIK Muhammadiyah, Indonesia
1
jimmy@unklab.ac.id, 2wien@stikmuhptk.ac.id

ABSTRACT

Stock investment is a demand - driven and demanding monetary practice, so the


study of stock forecasts or, more precisely, the forecasting of share prices, plays an
important role in the stock market. Mistakes in forecasting share prices have a
significant impact on global finance, thus, require an effective method of predicting
changes in share prices. Machine learning is one of the methods that can be used to
predict the stock price. To predict the stock price of five companies in the
telecommunications sector which are Bakrie Telecom Tbk (BTEL), PT. XL Axiata
Tbk (EXCL), PT. Smartfren Telecom Tbk (FREN), PT. Telekomunikasi Indonesia
Tbl (TLKM), and PT. Indosat Tbk (ISAT), two algorithms are used, Gaussian
Process and SMOreg. The result of this study is SMOreg has the best result with
RMSE value of 0.00005, MAPE 1.88% and MBE 0.00025.

Keywords: Forecasting, Stock Price, Gaussian Process, SMOreg

[Date]

92
Paper ID #188

Prediction for Diagnosing Liver Disease in Patients using


KNN and Naïve Bayes Algorithms
H Hartatik1, Moh Tamam2, Cris William3
1
Amikom Yogyakarta & Universitas Sebelas Maret Surakarta, Indonesia,
2,3
Amikom, Indonesia
1
hartatik.1182@students.amikom.ac.id, 2badri.uimadura@gmail.com,
3
kadex.mg57@gmail.com

ABSTRACT

There is a lot of data on patients who undergo medication or medical examinations


at the hospital and this is information that must be extracted so that it can provide
information for future improvement conditions, meaning that past data can be used
as a prediction basis for liver disease in patients. This is very beneficial for medical
personnel and also for patients if they experience symptoms that match the
symptoms felt by a patient. This project uses machine learning because it involves
big data and past data is used to predict future data. Referring to previous research
in reference that the results of the evaluation are varied. So in this study, The
proposed strategy to performance optimization is carried out based on training data
and variables that affect the model. Based on the results of calculations and
analysis, it was found that the performance evaluation values were area under
curve(AUC) for naïve Bayes algorthm is 72.5% and k-nearest neighbor(KNN) of
63.19%.

Keywords: Bayes, KNN, liver, performa, AUC

[Date]

93
Paper ID #190

Android Application Food Delivery Services


Lidya Chitra Laoh1, Timothy Adithia Pongantung2, Carolin Mulalinda3
1,2,3
Universitas Klabat, Indonesia
1
lidya.laoh@unklab.ac.id, 2timothyadithiap@gmail.com,
3
carolinemulalinda@gmail.com

ABSTRACT

This research aims to offer an android based food delivery service application to
ease customer to meet their order. The setting of this application is Airmadidi, the
capital of North Minahasa area, in the North Sulawesi Province that offers delicious
culinary by restaurants and cafes and well-known culinary destination in North
Sulawesi. The existing application still leave other food and beverages supplier
disconnected with their customers. Thus, some customer still has to come and pick
up their order themselves. As more people use smartphone, the potential to
introduce an android based application to facilitate the order is promising. This
provides an opportunity for the developed app to fill the gap left by the existing
applications in the market.

Keywords: Culinary, smartphone, android

[Date]

94
Paper ID #195

Handwritten Text Recognition using Deep Learning


Nikitha A
Ramaiah Institute of Technology, India
sahithyaniki@gmail.com

ABSTRACT

There are many researchers working on handwritten text recognition (HTR) and
also contributing to HTR domain. Even though many research methods are existing
for HTR, there is a need for some more improvements in the accuracy of the HTR
systems. This paper is a contribution of the application of the Deep Learning
algorithm for the HTR system. In this paper first we will collect the data for training
the handwritten texts, later features have been extracted from those text datasets
and perform training of the model using Deep Learning approach. In this work we
are going to use the strategy to recognize in terms of words rather those characters
so that accuracy will be improved. The built model using LSTM deep model
achieves a very good accuracy. Lastly, this developed approach of the HTR system
is integrated into the OCR system and comparison of results are reported in this
paper. Two approaches have been compared in this paper on IAM handwritten data
set, and found that 2DLSTM based approach outperforms the other approach

Keywords:

[Date]

95
Paper ID #202

Customer Loyalty in Marketplace: Structural Equation


Modeling Analysis
I Gusti Ngurah Satria Wijaya1, Evi Triandini2, Ezra Tifanie Gabriela
Kabnani3
1,2
STIKOM Bali, Indonesia
1
ngurah_satria@stikom-bali.ac.id, 2evi@stikom-bali.ac.id, 3180030695@stikom-
bali.ac.id

ABSTRACT

The rapid development of the three business models, namely online stores via
Facebook and Instagram, ecommerce with the C2C (Consumer to Consumer)
concept, and e-commerce with the B2C (Business to Consumer) concept, caused a
high level of competition so owners must know and fulfill customer wishes. This
challenge was certainly not easy, like a shop that compete for customers from
visiting people, marketplace and e-commerce B2C owners provided the best
service by maintain the quality of the website especially security factor to convince
visitors, so that they gain trust and develop into customer loyalty. Wong, Inkgo,
and Chiu-yiong in their research stated that security, privacy and trust are positively
connected to customer electronic loyalty. The aim of this research was to analyze
the effect of website security on customer loyalty with trust as Shopee.co.id web
moderation variable. Primary data collection technique used in this study is by
spreading questionnaires to the student respondents of the ITB STIKOM Bali
information system study program. Data analysis method used Structural Equation
Model (SEM). Based on the results of the analysis that has been obtained, it is
discovered that the web security had a significant effect on the customer trust, the
web security had a significant effect on the customer loyalty, and the customer trust
variable was not have a significant effect on the customer loyalty variable on the
Shopee.co.id website. The results of this research was considered by Shopee's
management to pay attention to the variables of web security and customer trust
that can shaped customer loyalty so that later the company's goals will be achieved.

Keywords: website security, customer trust, customer loyalty


[Date]

96
Paper ID #208

Applications of the Material Order Processing based on


Time Series Processing with CB-Predictors

Tri Pujadi1, Bachtial H. Simamora2, XimingRuan3, Yosafati Hulu4, Tumar5


1,2,4,5
Bina Nusantara University, Jakarta, Indonesia, 3University of the West of
England United Kingdom
1
tripujadi@binus.edu, bsimamora@binus.edu, 3ximing.ruan@uwe.ac.uk,
2
4
yosafatihulu@binus.ac.id, 5tumar@binus.ac.id

ABSTRACT

Shortage of raw materials may occur in manufacturing companies, which is caused


by inaccurate orders for raw materials, and lack of raw material supplies. This
problem causes inefficient costs due to the production process, the possibility of
having to emergency procurement to fulfill customer orders. The solution to this
problem is to develop a web-based system that supports ordering of raw materials.
The calculation based on the estimated time series with the CB-Predictor. The
methodology in the calculation is collecting historical data on the use of raw
materials, step forecasting raw material needs, step (3) calculating the order
quantity based on forecasting data, by comparing the deterministic method and the
probabilistic method. For calculation of safety stock for each raw material, for
situations outside normal conditions, for example increasing orders. The design
method, the system to be developed uses the Unified Modeling Language (UML)
modeling language based on the concept of Object Oriented Analysis and Design
(OOAD). The result is a web-based system application model to support a more
efficient and accurate calculation of ordering raw materials. With the proposed
application of information systems, the company can estimate raw material needs
more quickly and accurately, and can determine the quantity of orders that are
tailored to the needs. So that the costs associated with ordering and storing raw
materials can be minimized.

Keywords: inventory, forecast, CB predictor, safety stock, unified modeling


language
[Date]

97
Paper ID #209

Modeling of e-Commerce Supply Chains Mobile


Application
Tri Pujadi1, Bachtiar H. Simamora2, Vikas Kumar3, Yosafati Hulu4, Tumar5,
Wihendro6
1,4,5,6
School of Information Systems,
2
Department of Management Binus Business School,
Bina Nusantara University Jakarta, Indonesia
3
Bristol Business School, University of the West of England, Bristol, UK
1
tripujadi@binus.edu, 2bsimamora@binus.edu, 3vikas.kumar@uwe.ac.uk,
4
yosafatihulu@binus.ac.id, 5tumar@binus.ac.id, 6wihendro@binus.edu

ABSTRACT

The purpose of this research is to design a Supply Chain Management application


based on mobile devices as an intermediary between farmers, producers, and
consumers. The first step is identifying issues related to the parties. The methods
of analysis using the Business Model Canvas for identifying business process
requirements. The results of the analysis used a mapping of the system's design
features and finally the design method of an information system based on mobile
devices using UML diagrams. Through the Supply Chain, the channel will be
organized more effectively, and the company will in turn be more competitive.

Keywords: application, mobile, Information Systems, UML

[Date]

98
Paper ID #211

A Prototype of Hazard Detection System using Sensors


and IoT
Jacquline Waworundeng1, Micha Kalalo2, Daniel Lokollo3
1,2,3
Universitas Klabat, Indonesia
1
jacquline.morlav@unklab.ac.id, 2s21610305@student.unklab.ac.id,
3
s21610387@student.unklab.ac.id

ABSTRACT

Dangerous conditions can occur anywhere and anytime even in an indoor


environment. Some of the hazardous situations could come from harmful gases,
fires, earthquakes, abnormal temperatures and humidity. The purpose of this
research is to design and implement a simple prototype as an early warning system
in terms to raise human awareness about the possibilities of hazardous conditions,
especially inside the room. This research is based on the Spiral method which has
the iterative and systematic prototyping properties of the waterfall model. The main
components of the prototype are temperature and humidity sensor, smoke sensor,
flame sensor, Gyroscope, Accelerometer, Wemos D1 board, and Blynk IoT
platform. Those components were set up to build a system which connected to a
smartphone as a user interface which intended to monitor the stimulus in the indoor
environment while performing any detection and alertness function when various
hazardous conditions are detected. The Blynk apps which installed and set up on
the user smartphone could display the gauge values and graph read from each
sensor in real-time and also pop-up message notifications as an alert when a
potentially dangerous condition is detected. The system also provided direct
notifications through LEDs indicators and voice alerts for each hazardous
condition, to give early warnings to the people inside the room or building so that
they can avoid or minimize the effects of any potentially dangerous situations. The
system was tested and well function according to the research purpose.

Keywords: Monitoring System, Sensors, Notification, Blynk.


[Date]

99
Paper ID #214

Hyperion: A Simulation of High Places in the Form of


Virtual Reality for Acrophobia Sufferers
Oktoverano Lengkong1, Jebriella Bororing2
1,2
Universitas Klabat, Indonesia
1
oktoverano@unklab.ac.id, 2s21410246@student.unklab.ac.id

ABSTRACT

Acrophobia is the generally high common phobia. This phobia can make activity
and the lifestyle of the person who had this to be limited because the person is avoid
high places. Acrophobia can be overcome by centrifugal therapy method w hich is
the person who had this phobia is involved to the situation that trigger this phobia
step by step. In virtual reality format and the sound effect, VR can used to simulate
like in the high places in virtual. Scientist used virtual reallity technology to make
application who can visualitation the condition of high places through the option
mode. The purpose of making this application is to reduce acrophobia by using
virtual reallity technology. Simulation of this research is served by showing virtual
enviroment of high places by using accelerometer and gyroscope on smartphone so
the user can interact with the social enviroment. Method used on this research is
prototyping model. Adobe photoshop to make application interface and game
engine unity as authoring tool to build the application. The result of this research,
the user can train by itself or with therapist using the application which is installed
on smartphone android and VR headset.

Keywords: Acrophobia, Virtual Reality, Simulation, Therapy, High Place

[Date]

100
Paper ID #215

Enabling SDN in Hybrid Xhaul-TWDM-PON Networks


for Interactive Video Applications
Andrew Tanny Liem1, I-Shyan Hwang2, Oktoverano Lengkong3,
Elaiyasuriyan Ganesan4
1,3
Universitas Klabat, Indonesia, 2,4Yuan-Ze University, Taiwan
1
andrew.heriyana@unklab.ac.id, 2ishwang@saturn.yzu.edu.tw,
3
oktoverano@unklab.ac.id, 4gelaiyasuriyan.mca1989@gmail.com

ABSTRACT

Nowadays, the latest age of immersive media technologies such as interactive video
application, virtual reality or 3D television, multiplayer online gaming, which has
brought users new technological perspectives, has contributed to a significant
revolution of the broadcast environment in coming years. And most of these
bandwidths will be created by mobile users. It is therefore expected that the Time-
Wavelength Division-Multiplexing Passive Optical Network (TWDM-PON)
would help the integration of wired and wireless networks resulting from hybrid
optical-wireless architecture, which is the best choice for next-generation
architecture design. In this paper, we proposed the Hybrid Xhaul-TWDM-PON
networks with SD local cache management for interactive video applications
mechanisms. OpenFlow controller is also the use of the smart local cache with QoS-
conscious mechanism, to locally track and store the most common video at S-OLT,
to lower end-user latency and increase end-user QoE. Simulation results shows that
the proposed mechanism can improve the overall system performance in terms of
mean packet delay, packet dropping and bandwidth efficiency.

Keywords: Interactive video applications, TWDM-PON, SDN, Local Cache, QoS,


System Performance
[Date]

101
Paper ID #217

Blockchain Education Smart Courses Of Massive Online


Open Course Using Business Model Canva
Fitra Putri Oganda1, Ninda Lutfiani2, Qurotul Aini3, Untung Rahardja4,
Adam Faturahman5
1,2,3,4,5
System University of Raharja Tangerang, Indonesia
1
fitra.putri@raharja.info, 2ninda@raharja.info, 3aini@raharja.info,
4
untung@raharja.info, 5adam.faturahman@raharja.info

ABSTRACT

With the development of internet technology, online education, a new mode of


education, has been very popular. However, this mode of education still has many
problems in terms of credibility, credit certification and certificates, student
privacy, and various courses. The accepted question addressed was whether
universities would discuss blockchain technology in a different way from
traditional research and education. Through a research approach, literature
summary and case analysis as well as Business Model Canvas which provides three
theoretical contributions and guidance on what Blockchain really is by taking
sponsored studies. This study shows the results that integrating blockchain
technology with the MOOC-based Smart Program Education platform is a trend
that is promised on the Internet of online education development. The conclusion
can provide a critique of the technical features and basic applications of Blockchain
and provide solutions to online education problems based on Blockchain
technology. Assistance, discussion, discussion on blockchain and discussion on
how educational institutions work must be approved by Blockchain technology as
digital technology, so that more can be expected in prototypes and will be
developed to provide better replacement.

Keywords: Ontology, MOOC, Blockchain, Smart-courses [Date]

102
Paper ID #218

The Blockchain Manifesto


Untung Rahardja1, Qurotul Aini2, MD Asri Ngadi3, Marviola Hardini4, Fitra
Putri Oganda5
1,2,4,5
System University of Raharja Tangerang, Indonesia
3
Faculty of Engineering Universiti Teknologi of Malaysia, Malaysia
1
untung@raharja.info, 2aini@raharja.info, 3dr.asri@utm.my
4
marviola@raharja.info, 5fitra.putri@raharja.info

ABSTRACT

The process of implementing education globally basically cannot keep up with


current developments. The education sector is currently facing various problems;
in this case, the issue of verification and the existence of a third party in handling
certificates are the micro and macro results of a learning process. A lighthouse
about Blockchain technology is often cited as one of the revolutionary solutions to
educational polemics so far. The combination of educational technology with
blockchain technology will create revolutionary technology in the education
industry. There are various kinds of insight from this problem, but this cannot
explain the blockchain manifesto in detail from education for learning based on
scientific studies. This blockchain manifesto in the future will be useful as a
literature platform for researchers who will begin basic and applied research leading
to blockchain for education. Besides, in terms of cost, storage space, and blockchain
technology speed, a solution will be proposed in the form of a framework. As a
result, this research can also become a new blockchain platform and manifesto as
the blockchain technology-based government's embryo.

Keywords: Blockchain, Blockchain Manifesto, Blockchain for Education.

[Date]

103
Paper ID #219

Ontology of Education Using Blockchain: Time Based


Protocol
Marviola Hardini1, Qurotul Aini2, Untung Rahardja3, Ria Dwi I’zzaty4,
Adam Faturahman5
1,2,3,4,5
System University of Raharja Tangerang, Indonesia
1
marviola@raharja.info, 2aini@raharja.info, 3untung@raharja.info,
4
ria.dwi@raharja.info, 5adam.faturahman@raharja.info

ABSTRACT

Education is a business process that has been a pillar of government for centuries
in building the nation. The method of organizing knowledge globally does not
change according to the times. Various problems currently faced by education
service providers, especially at the tertiary level, in this case, call it the problem of
authentication and certificate verification, which are the micro and macro outputs
of a learning process. People are getting lighthouses about blockchain, the solution
to educational polemic problems. The combination of science between education
and blockchain technology will create a new revolution in the education industry
that is felt to be stagnant and incompatible with current developments. There are
various kinds of insights from this solution. Still, it is not enough to explain the
ontology of education using blockchain, which, as a whole, discusses the existence
of blockchain for education based on scientific studies. Ontology for knowledge
will be useful as a literature platform for young researchers, especially in
universities, to start basic and applied research that leads to blockchain in
education. Besides, blockchain technology has weaknesses and inefficiencies,
namely in terms of cost, storage space, and speed. Solutions will be proposed
through this research regarding on-chain and off-chain protocols in Time Based
Protocol (TBP), which is part of Blockchain technology. As a result, this research
can also become the foundation for new platforms and frameworks as a solution for
the government in launching blockchain-based education, which is a pioneer in
creating a blockchain-based government.

Keywords: Ontology Blockchain, TBP, On-chain, Offchain.


[Date]

104
Paper ID #220

A Survey on Microaneurysm Detection in Color Fundus


Images
Anneke Annassia Putri Siswadi1, Stephanie Bricq2, Fabrice Meriaudeau3
1
Department of Information Technology, Gunadarma University, Indonesia
1,2,3
ImVIA/IFTIM, University of Burgundy, France

ABSTRACT

Early Detection of Microaneurysms (MA) plays a vital role in preventing the


blindness caused by diabetic retinopathy (DR). DR is preventable yet a serious
diabetic problem. Treatment at an earlier stage reduces the risk of blindness.
Microaneurysm is the first sign of DR found in fundus images while doing
screening. Detection of MA is a challenging task mainly because of its size. MA
appears as a tiny red spot ranging from 15μm to 60μm size. The most common
way to detect the MA from a colour fundus image is by classification/segmentation
through machine learning and deep learning approaches. The FROC-based
performance evaluation shows that the existing methods can reach only up to 80%
of sensitivity at 8 False Positive per Image on average. In recent researches,
machine learning and deep learning approaches are equally competing each other
to be better in detecting MA both in lesion level as well as pixel-level.

Keywords: microaneurysm, detection, classification, segmentation, machine


learning, deep learning, performance

[Date]

105
See you again
at
ICORIS 2021

[Date]

106
[Date]

107

You might also like