Professional Documents
Culture Documents
Program Book ICORIS
Program Book ICORIS
Program Book ICORIS
[Date]
TABLE OF CONTENTS
TABLE OF CONTENTS
[Date]
2
PREFACE
COMMITTEESPREF
It is a great honor for us to deliver the proceedings of the Second ICORIS
ACE
Conference to the authors and delegates of the event. In comparison to the last year,
ICORIS 2020 was carried out in the context of a virtual conference due to the
effects of COVID-19. Since there is a global travel constraint, we held this
accessible online conference to bring together specialists and scholars across the
globe with the goal of continuing to disseminate the new advanced studies in their
field. We hope that you will find it useful, exciting and inspiring.
ICORIS2020 aims to provide a platform for discussing the issues, challenges,
opportunities and findings of Cybernetics and Intelligent Systems (CIS). This year
theme is Towards Human Resources Sovereignty using ICT in Society 5.0. The
ever-changing scope and rapid growth of CIS poses new challenges and concerns,
resulting in a real need for the exchange of brilliant ideas and awareness-raising of
this critical research area. We promise CIS to produce a bright image and a
charming landscape, while the support received, and the enthusiasm witnessed have
truly surpassed our expectations. Therefore, on the day of completion of this
journey, we are pleased with a high level of satisfaction and aspiration.
The response to the call-for-papers was immense, both from Indonesia and abroad.
Unfortunately, several manuscripts from reputable universities have not been
accepted due to the findings of the examination and our capacity restrictions. We
would like to express our gratitude and appreciation to all the reviewers who have
helped us to preserve the high standard of the manuscripts used in the proceedings
published by IEEE. We would also like to express our gratitude to the members of
the organizing team for their hard work.
We are now optimistic and full of hope about getting the proceedings of ICORIS
2020 covered by IEEE Xplore in due course. We appreciate that the authors of
ICORIS 2020 may want to maximize the popularity of their papers. And we will
try our best to support them in their endeavors.
Let us wish that all the participants of ICORIS 2020 will have a wonderful and
fruitful time at the conference.
3
COMMITTEES
PROGRAM
PROGRAM COMMITTEE
STRUCTURECOMM
1. Prof. Riyanarto Sarno, Ph.D. (Institut Teknologi Sepuluh Nopember (ITS)),
Indonesia ITTEES
2. Prof. Pitoyo Hartono (Chukyo University, Toyota), Japan
3. Prof. Harold Boley (Faculty of Computer Science, University of New
Brunswick, NB), Canada
4. Rafał Dreżewski, PhD. (AGH University of Science and Technology),
Poland
5. Assoc. Prof. Huynh Thi Thanh Binh (Hanoi University of Science and
Technology (HUST)), Viet Nam
6. Prof. Dr. Mustafa Bin Mat Deris (Universiti Tun Hussein Onn Malaysia
(UTHM)), Malaysia
7. Assoc. Prof. Somnuk Phon-Amnuaisuk (Universiti Teknologi Brunei),
Brunei Darussalam
8. Prof. Ir. Arif Djunaidy M.Sc., Ph.D. (Institut Teknologi Sepuluh Nopember
(ITS)), Indonesia
9. Prof. Sri Hartati, M.Sc., Ph.D. (IndoCEIS/UGM)
10. Prof. Dr. Muhammad Zarlis (Universitas Sumatera Utara), Indonesia.
11. Daniel Oranova, S.Kom., M.Sc.PD.Eng. (Institut Teknologi Sepuluh
Nopember (ITS)), Indonesia
12. Arief Setyanto, S.Si., M.T., Ph.D. (AMIKOM Yogyakarta), Indonesia
13. Dr. Muhammad Rusli., MT. (ITB STIKOM Bali), Indonesia
14. Dr. Roy Rudolf Huizen (ITB STIKOM Bali), Indonesia
15. Andrew Tanny Liem, PhD (Universitas Klabat), Indonesia
16. Husni Teja Sukmana, PhD (Universitas Islam Negeri Syarif Hidayatullah),
Indonesia
STEERING COMMITTEE
1. Marthen Sengkey, PhD (Universitas Klabat)
2. Dr. Dadang Hermawan (ITB STIKOM Bali)
3. Dr. Ir. Djoko Soetarno, D.E.A (Binus University)
4. Prof. Dr. M. Suyanto, MM. (AMIKOM Yogyakarta)
5. Prof. Dr. Ir. Harjanto Prabowo, M.M. (Rektor Universitas Bina Nusantara)
6. Prof. Dr. Ir. Edi Noersasongko, M.Kom (Universitas Dian Nuswantoro
Semarang)
7. Dr. Sandy Kosasi, MM., M.Kom. (STMIK Pontianak)
8. Dr. Cucut Susanto, S.Kom., MSi. (STMIK Dipanegara Makassar)
9. Dr. Rika Rosnelly, S.Kom., M.Kom. (Universitas Potensi Utama)
10. Restu Adi wiyono, M.Sc., M.Kom. (STMIK Tasikmalaya)
[Date]
4
13. Dr. Hj. Rosiya–ti Mh Thamrin, SE., MM. (STMIK Sepuluh Nopember
Jayapura)
14. Dr (cand) Agus Setiawan (Multimatics)
ORGANIZING COMMITTEE
General Chair
Andrew Tanny Liem, Ph.D (Universitas Klabat), Indonesia
Program Chair
Husni Teja Sukmana, Ph.D (Universitas Islam Negeri Syarif Hidayatullah), Indonesia
Publication Chair
Oktoverano Lengkong, M.Ds (Universitas Klabat), Indonesia
Secretary
Jacquline Waworundeng, MT (Universitas Klabat), Indonesia
Treasurer
Green Mandias, M.Cs (Universitas Klabat), Indonesia
Committee Members
1. Green Arther Sandag, MS (Universitas Klabat), Indonesia
2. Yuan Mambu, MCIS (Universitas Klabat), Indonesia
3. Stenly Ibrahim Adam, M.Sc (Universitas Klabat), Indonesia
4. Edson Yahuda Putra, M.Kom (Universitas Klabat), Indonesia
5. Jimmy Moedjahedy, MM (Universitas Klabat), Indonesia
6. Reymon Rotikan, MS (Universitas Klabat), Indonesia
7. Reynoldus Sahulata, MM (Universitas Klabat), Indonesia
8. Andria Wahyudi, M.Eng (Universitas Klabat), Indonesia
9. Lidya Laoh, MMSI (Universitas Klabat), Indonesia
TPC Members
1. Dr. Azrul Azwan Abdul Rahman Universiti Teknikal Malaysia Melaka
[Date]
6
52. Dr. Sasanko Gantayat GMR Institute of Technology
53. Prof. Nuno Garcia Universidade da Beira Interior
54. Dr. Marco Gonzalez National Autonomous University of Mexico
55. Dr. Burhan Gulbahar Ozyegin University
56. Dr. Akhil Gupta Lovely Professional University
57. Dr. Nalin Harischandra University of Peradeniya
58. Prof. Sri Hartati Gadjah Mada University
59. Dr. M. Udin Harun Al Rasyid Politeknik Elektronika Negeri Surabaya
(PENS)
60. Mr. Hanny Haryanto Universitas Dian Nuswantoro
61. Dr. Jun He University of New Brunswick
62. Mr. Alexandre Heideker Federal University of ABC
63. Dr. Edwin Hernandez EGLA Communications
64. Dr. Masun Nabhan Homsi Universty of Simón Bolivar
65. Dr. Hugeng Hugeng Universitas Tarumanagara
66. Dr. Roy Huizen STIKOM Bali
67. Dr. Mohammad Rezwanul Huq East West University
68. Mr. Ahmed Hussein Universtiy of Mustansiriyah
69. Mrs. Wan Irma Sabrina Idris Universiti Tunku Abdul Rahman, Petaling
Jaya
70. Dr. Kamarulafizam Ismail Universiti Teknologi Malaysia
71. Dr. Mohammed Jarjees Northern Technical University
72. Mr. Mohammed Kaabar Moreno Valley College
73. Prof. Abdulkareem Kadhim Al-Nahrain University
74. Mr. Nikos Kalatzis Neuropublic S.A.
75. Mr. Keh-Kim Kee University College of Technology Sarawak
76. Dr. Mansoor Khan COMSATS Institute of Information Technology
77. Ms. Pınar Kırcı Istanbul University
78. Dr. Sandy Kosasi STMIK Pontianak
79. Mr. Aswinseshadri Krishnan Satyabhama University – Chennai
80. Mr. Abhishek Kumar Facebook
81. Prof. Dr Eng Harish Kumar King Khalid University
82. Dr. Kusrini Kusrini AMIKOM Yogyakarta University
83. Mr. Beomseok Lee Chung-Ang University
84. Dr. Sang C. Lee DGIST
85. Dr. Xia Li Qualcomm
86. Dr. Shubhankar Majumdar National Institute of Technology Meghalaya
87. Prof. Mustafa Man University Malaysia Terengganu
88. Dr. Juan Martinez University of Murcia
89. Dr. Maslin Masrom UniversitiTeknologi Malaysia
90. Dr. Morcous Massoud FCI Cairo University
91. Dr. Dan Milici University of Suceava
92. Dr. Othman Mohd Universiti Teknikal Malaysia Melaka
93. Mr. Taha Mokfi University of Central Florida
94. Mr. Benoît Muth Benoît Muth
95. Dr. Muhammad Nazir Lahore College for Women University
96. Dr. Nurdin Nurdin Institut Agama Islam Negeri (IAIN) Palu
[Date]
9
PROGRAM STRUCTURE
TECHNICAL SESSION
TIME
(WIB)
SCHEDULEPROGRAM
SCHEDULE
Opening Speech
1. Dr. Drs. Agus Fatoni, M.Si (Pjs Governor of North Sulawesi)
08.45 – 09.20 2. Prof. Dr. Jasruddin, M.Si (Head of LLDIKTI WIL IX)
3. Dr. Kemas Muslim Lhaksmana (Executive Committee IEEE,
Indonesian Section)
KEYNOTE SPEECH
Keynote 1
I-Shyan Hwang, PhD (Yuan Ze University), Taiwan
09.20 – 10.20 Title: “A Perspective Fiber-Mobile Convergence Architecture and
Services for 5G/IoT Network”
Keynote 2
Prof. Ir. Zainal Arifin Hasibuan, MLS., Ph.D (University of Indonesia)
10.20 – 11.20
10
PARALLEL SESSIONS
TRACK #1 TRACK #2 TRACK #3 TRACK #4 TRACK #5
Session 1
Paper Paper Paper Paper Paper
13.00 - Presentation Presentation Presentation Presentation Presentation
14.00
Session 2
Paper Paper Paper Paper Paper
14.00 - Presentation Presentation Presentation Presentation Presentation
15.00
Session 3
Paper Paper Paper Paper Paper
15.00 - Presentation Presentation Presentation Presentation Presentation
16.00
Session 4
Paper Paper Paper Paper
16.00 - Presentation Presentation Presentation Presentation
17.00
CLOSSING CEREMONY
[Date]
11
TECHNICAL SESSION
SCHEDULE
KEYNOTE SPEAKER
SESSION :1
TRACK :1
PROFILETECHNICAL
TIME : 13.00-14.00 SESSION SCHEDULE
VIRTUAL ROOM : 1
TRACK NAME : Signal Processing and Analysis
SESSION CHAIR : Kusrini
Paper
No Presenter Title
ID#
12
SESSION :1
TRACK :2
TIME : 13.00-14.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi
Paper
No Presenter Title
ID#
[Date]
13
SESSION :1
TRACK :3
TIME : 13.00-14.00
VIRTUAL ROOM : 3
TRACK NAME : Communication, Networking, Security and Broadcasting /
Power, Energy, and Industry Application
SESSION CHAIR : Evi Triandini
Paper
No Presenter Title
ID#
Research on Double-Channels
Frequency Adjustment System for
1. 6 Yupeng Hou
Passive Underground Detection Based
on Frame Header Feedback
14
SESSION :1
TRACK :4
TIME : 13.00-14.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi
Paper
No Presenter Title
ID#
Self-Adaptive Ensemble-Based
1. 13 Haldi Budiman Differential Evolution with Enhanced
Population Sizing
15
SESSION :1
TRACK :5
TIME : 13.00-14.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA
Paper
No Presenter Title
ID#
[Date]
16
SESSION :2
TRACK :1
TIME : 14.00-15.00
VIRTUAL ROOM : 1
TRACK NAME : Signal Processing and Analysis
SESSION CHAIR : Kusrini
Paper
No Presenter Title
ID#
4.
[Date]
17
SESSION :2
TRACK :2
TIME : 14.00-15.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi
Paper
No Presenter Title
ID#
[Date]
18
SESSION :2
TRACK :3
TIME : 14.00-15.00
VIRTUAL ROOM : 3
TRACK NAME : Communication, Networking, Security and Broadcasting /
Power, Energy, and Industry Application
SESSION CHAIR : Evi Triandini
Paper
No Presenter Title
ID#
19
SESSION :2
TRACK :4
TIME : 14.00-15.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi
Paper
No Presenter Title
ID#
[Date]
20
SESSION :2
TRACK :5
TIME : 14.00-15.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA
Paper
No Presenter Title
ID#
[Date]
21
SESSION :3
TRACK :1
TIME : 15.00-16.00
VIRTUAL ROOM : 1
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Kusrini
Paper
No Presenter Title
ID#
22
SESSION :3
TRACK :2
TIME : 15.00-16.00
VIRTUAL ROOM : 2
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Sandy Kosasi
Paper
No Presenter Title
ID#
[Date]
23
SESSION :3
TRACK :3
TIME : 15.00-16.00
VIRTUAL ROOM : 3
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Evi Triandini
Paper
No Presenter Title
ID#
[Date]
24
SESSION :3
TRACK :4
TIME : 15.00-16.00
VIRTUAL ROOM : 4
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Henderi
Paper
No Presenter Title
ID#
[Date]
25
SESSION :3
TRACK :5
TIME : 15.00-16.00
VIRTUAL ROOM : 5
TRACK NAME : Computing and Processing
SESSION CHAIR : TBA
Paper
No Presenter Title
ID#
[Date]
26
SESSION :4
TRACK :1
TIME : 16.00-17.00
VIRTUAL ROOM : 1
TRACK NAME : Computing and Processing
SESSION CHAIR : Kusrini
Paper
No Presenter Title
ID#
4.
[Date]
27
SESSION :4
TRACK :2
TIME : 16.00-17.00
VIRTUAL ROOM : 2
TRACK NAME : Robotics and Control /
Information System and Multimedia
SESSION CHAIR : Sandy Kosasi
Paper
No Presenter Title
ID#
4.
[Date]
28
SESSION :4
TRACK :3
TIME : 16.00-17.00
VIRTUAL ROOM : 3
TRACK NAME : Information System and Multimedia
SESSION CHAIR : Evi Triandini
Paper
No Presenter Title
ID#
[Date]
29
SESSION :4
TRACK :4
TIME : 16.00-17.00
VIRTUAL ROOM : 4
TRACK NAME : Computing and Processing
SESSION CHAIR : Henderi
Paper
No Presenter Title
ID#
4.
[Date]
30
KEYNOTE SPEAKER
PROFILE
31
KEYNOTE SPEAKER 2
[Date]
32
KEYNOTES ABSTRACT
PRESENTED PAPER
A Perspective Fiber-Mobile Convergence
ABSTRACTSKEYNOTES
Architecture and Services for 5G/IoT Network
ABSTRACT
(Prof. I-Shyan Hwang)
With the emerging new use case scenarios, 5G/IoT evolves existing technologies
and introduces new capabilities, such as New Radio, a strong reliance on
virtualized functions, the introduction of network slicing (Network Function
Virtualization) and control and user plane separation (Software Defined Network
)to boost capacity, i.e., enhanced Mobile Broadband (eMBB). To host new ultra-
Reliable Low Latency Communication (uRLLC) and massive Machine-Type
Communication (mMTC) applications efficiently, it will need to be able to
integrate regional data centers and distributed compute seamlessly - closer to the
endpoints in the network. Another key attribute of the 5G transport infrastructure
is that, it has to have the capability of easily carving out and reusing its capacity,
compute, be resilient, and guarantee latency by supporting network slicing. In
addition to the pure mobility requirements, operators must also consider how their
network caters to the different classes of services and huge volume of multimedia
data they deliver, such as fixed line and broadband customers, as well as supporting
the different customer types – all regardless of access technology. This talk
Introduces how such a converged Fiber-Mobile-Xhaul transport network for
5G/IoT can be realized, starting with new requirements it must meet; the new
technologies it needs to deploy 5G-capable services; and finally, the design features
necessary to cost-effectively build and operate the newly designed access
technology.
[Date]
33
PRESENTED PAPER
ABSTRACTS
Paper ID #5
ABSTRACT
34
Paper ID #6
Yupeng Hou
Beijing University of Technology, China
chumenghao@emails.bjut.edu.cn
ABSTRACT
35
Paper ID #8
ABSTRACT
The research goal was set to determine to what extent the influences of learning
analytics and academic analytics, the antecedent factors in predicting student
academic achievement through the use of big data were. There has been no
discussion on progress, success, retention, or decline of this achievement.
Therefore, this research has significance for the improvement of higher education
institutions. The research was in the form of online surveys involving 203
respondents, i.e., leaders, structural staff, and academic advisors from each of these
institutions in Pontianak. Tests of eight hypotheses were conducted through SEM-
PLS Method, and two of them had no direct influences. The results show that the
two antecedent factors, directly and indirectly, have different influences and
significance values on student academic achievement prediction despite the critical
roles of big data. In addition, results obtained through the application of learning
analytics and academic analytics in relation to big data of higher education
institutions, especially for the need to predict student academic achievement, are
infrequently similar.
36
Paper ID #10
ABSTRACT
Main advantage of electric vehicles (EV) compared to vehicles using fossil fuels is
that does not produce air pollution. One day the existence of conventional vehicles
will be replaced by EV. EV gets electricity supply from batteries. When using EV,
one day the electrical energy in the batteries will run out. To recharge batteries,
important components such as the Electrical Vehicle Charger (EVC) are needed.
During charging batteries, EVC must always be connected to the electric power
system. EVC provides the impact of voltage drop on the electric power system bus
during the charging process. This voltage drop is caused because the power supply
from generators cannot meet the needs of loads, including chargers and batteries.
To maintain the voltage so that it remains at its safe operating voltage, the same bus
with EVC is interconnected with renewable energy sources. Renewable energy
sources used in this study are four types of wind turbine power plants. Safe range
of operating voltage in this research from 95% to 105%. This article analyzes the
change in voltage in the electric power system when the wind power plant fills
EVC. In the research methods section uses several scenarios. The aim is to
determine the effect of each type of wind power plant on the bus voltage and EVC.
Of all the voltage improvement simulation results, scenario 3 has the best results
than the other scenarios. In scenario 3, voltage in bus 12 is 98,08%, voltage in bus
13 is 98,66%, and voltage in bus 14 is 98,42%. All three buses in safe limits of the
operating voltage. In the short circuit simulation, type 1 and type 2 are the largest
contribute to the short circuit current fault in 3 phases, line to line, line to line to
ground fault. While type 3 and type 4 are the largest contribute to the short circuit
current fault on the line to ground fault.
37
Paper ID #11
ABSTRACT
Recent indicators of the success of every college graduate still refer to the
cumulative academic achievement index. The era of disruption of the digitalization
of education has posed different challenges and problems to universities to improve
student academic performance. The objective of this study was to determine the
extent of influences and relationships of antecedent factors, including soft skills
and learning analytics, the intervening variables in improving this performance.
This study engaged 203 active students taking courses in the fifth and sixth
semesters of universities in Pontianak, West Kalimantan, Indonesia. The research
was in the form of surveys. Questionnaires were distributed online through Google
Form. SEM-PLS Method was conducted for the analysis. Results show strong
influences and relationships between academic, emotional learning and soft skills
through learning analytics in improving student academic performance.
Furthermore, the negative influences of soft skills have insignificance on this
performance. Lastly, a socio-economic factor is irrelevantly linked to learning
analytics and student academic performance. All of these findings indicate that
academic, personal, socio-economic antecedents are no longer relevant to previous
research.
38
Paper ID #13
ABSTRACT
39
Paper ID #15
ABSTRACT
[Date]
40
Paper ID #16
ABSTRACT
Information technology (IT) has a very important role in supporting the business of
an organization. The role of information technology itself can be assessed. This role
is very important to be assessed and evaluated, so that its position in an organization
can be known. In this study, an assessment of the role of information technology
was carried out on one of the government agencies that had never been assessed
before, that is the Ministry of Marine Affairs and Fisheries (MMAF). The
evaluation was carried out using a table of information technology leadership
impacts on the role of information technology in organizations created by
Applegate, Austin, and Soule. The assessment results are then mapped into the
McFarlan IT Strategic Grid which consists of 4 (four) quadrants, namely: support,
factory, turnaround, and strategic. This mapping is useful to assist MMAF leaders
in measuring information technology capabilities and leadership approaches. Based
on the results of the assessment, the role of information technology in MMAF is in
the factory quadrant (7 points). The recommended step forward is to strengthen the
position of the MMAF information technology role in the factory quadrant (short-
term plan) and move to the strategic quadrant (medium-term plan). The action plan
that will be taken to strengthen the position in the factory quadrant is data
integration.
41
Paper ID #18
ABSTRACT
Twitter is one of the largest social media with 326 million active users in January
2019 especially in Indonesia. Every day, more than millions of tweets are published
by twitter users. This study tries to analyze Tweets to get the personalities from
chosen twitter accounts by using DISC character approach. The classification
algorithm that will be used is Support Vector Machine with TF-IDF weighting on
the dataset. This research starts with preprocessing stages such as Data Cleansing
and Case Folding. We involved psychologists to validate the personality approach
of 109 Twitter accounts to determine each twitter user character. From 109 twitter
accounts, we considered as the final dataset, we obtain the accuracy of 36.37%,
average precision of 23.11% and an average recall performance of 35.25%.
[Date]
42
Paper ID #20
ABSTRACT
The existence of an Electrical Vehicle (EV) depends on the battery charging station
(BCS). If the EV's electrical energy runs out, then to recharge the electrical energy
must go to BCS. BCS is generally interconnected with electric power systems.
However, the existence of BCS can cause the bus voltage to become unstable. This
article aims to analyze voltage stability after BCS interconnection and renewable
energy with electric power systems. The electric power system used is the IEEE 14
bus standard. Renewable energy is a solution to improve voltage instability and role
as distributed generation (DG). The newest types of energy used are photovoltaic
and wind power plants. Stability analysis using the P-V and Q-V curves. The testing
method is carried out by continuing to increase the capacity of BCS. The greater
the active and reactive power on the BCS bus, it will cause the voltage drop to reach
the critical point. Furthermore, four scenarios are made to be compared. All results
of voltage stability are compared, and which scenario is selected has the best
voltage stability. Based on all scenario results, it can be concluded that scenario 3
is better than other scenarios. Scenario 4 has almost the same results as scenario 3.
The power plant that makes scenario 3 better is wind power plants with a capacity
of 2 MVA. The resulting stable area has wider range compared to photovoltaics.
43
Paper ID #21
ABSTRACT
Twitter is one of the most commonly used social media, especially in Indonesia.
People use Twitter social media to express their opinions every day. This allows
the DISC method to be applied to find out Twitter user’s character. By knowing
their characters using the DISC method and twitter, this can help parties like the
HRD without spending more effort in selecting employees. Three main processes
are performed in this study, data acquisition, pre-processing and calculation
process. Classification methods, namely Text Naive Bayes Classifier algorithm and
K - Nearest Neighbor are used to classified and mapping tweet data to the DISC
method. As a result, the accuracy of the Naive Bayes Classifier algorithm is 34.16%
while the K – Nearest Neighbor is 28.33%. So, it can be concluded that the Naive
Bayes Classifier algorithm has a higher accuracy of 5.83% compared to K – Nearest
Neighbor in classifying a Twitter account with TF-IDF Weighting into DISC
method.
44
Paper ID #22
ABSTRACT
[Date]
45
Paper ID #24
ABSTRACT
46
Paper ID #25
ABSTRACT
Air pollution level in Makassar has increased based on data from 2018 to 2019.
There were 646 data obtained from the Ministry of Environment and Forestry data
archive. Lack of information on air pollution causes the people to become unaware
on their personal health. There is an effective analysis method for exploring data.
This research used knowledge discovery technique in databases in data mining to
facilitate decision making. Finally, continuing from the results of previous studies
where the prediction of air pollution levels used Naïve Bayes algorithm, this
research predicts the level of air pollution using the K-Nearest Neighbor Algorithm
with an accuracy rate of 96%, a precision value of 97% and a recall value of 100%
[Date]
47
Paper ID #26
ABSTRACT
[Date]
48
Paper ID #27
ABSTRACT
The increasing number of Android apps available on Google Play Store with the
developers' advantages has attracted many Android apps developers' attention. To
benefit from developing Android apps is to know the characteristics of high rated
applications on the Google Play Store. This research will explore the features of
Size, installs, reviews, types (free/paid), rating, Category, content rating, and Price
on apps on Google Play Store to find out the characteristics of high rated apps. This
research uses a randomforest classifier to identify the most significant features in
high rated apps on Google Play Store. This research uses the Gradient Boost
Algorithm to identify the most influential attributes in high rating apps on Google
Play Store. To classify the high rated apps, writers use the Gradient Boost algorithm
that performs better than Random Forest, K-NN, and Decision Tree algorithm with
a 99.93% accuracy, 99.91% recall, 99.91% precision, and 0.062 Root Mean
Squared Error.
[Date]
49
Paper ID #31
ABSTRACT
50
Paper ID #33
ABSTRACT
While the widespread of mobile devices has brought convenience in many aspects,
it has also caused an increase in the number of traffic accidents due to pedestrians
preoccupied with their smartphone devices. In order to solve such problem, this
research proposes a network that allows training of data with reduced number of
layers. SimpleNet algorithm simplifies the process of object classification into the
states of detected or undetected. In order to optimize the configuration for a given
device, two hyperparameters, Repeat Parameter and Feature Parameter, were
adjusted throughout the testing. The test results show that the performance of full-
size SimpleNet is comparable to that of Deep Neural Network. Even after reducing
the model with optimized hyperparameters, SimpleNet exhibited an accuracy of
96.8%. We expect that this algorithm can be implemented in low-performance
devices to detect hazardous objects on streets.
[Date]
51
Paper ID #35
ABSTRACT
[Date]
52
Paper ID #37
ABSTRACT
Rainfall is an element in our daily life. Rainfall is affected the world of shipping,
business, agriculture. The intensity of rainfall is different from one region to
another. Data Mining and economic studies show that the method is suitable for use
given by the Neural Network (NN ) with a fairly low error rate, the ability of Neural
Networks in Universal Approximation has been studied by various researchers for
forecasting time series data on various types of data, so that performance from
Neural Network which is satisfactory in time series data forecasting . To determine
the best model from each previous period, we need to optimize the weights of each
relevant training data variable, so that the Neural Network method based on Particle
Swarm Optimization (PSO) can be applied even though the maximum feasibility
level is not certain. The biggest cost in the response to natural disasters such as
floods, droughts, late planting patterns, help farmers avoid crop failures that can be
caused to one's determining the types of crops grown in those days, in need right
way to predict the amount of rainfall in the coming months, in order to anticipate
unwanted events . Cost suppression can also be done by analyzing the changing
time series patterns of rainfall data sets taken from the Romang Polong Station in
Makassar from 2005-2015 , which facilitates the process of analyzing the prediction
of accuracy generated from the time series data sets, if implemented by combining
the Particle Swarm Optimization (PSO) based on Neural Network (NN) method to
find out the patterns generated from the data set. Thus, saving time and operating
power.
Keywords: Rainfall; Data Analysis, Time series, Neural Network, Method Based
On Optimized Particle swarm
[Date]
53
Paper ID #38
ABSTRACT
[Date]
54
Paper ID #42
ABSTRACT
55
Paper ID #43
ABSTRACT
Technology has revolutionized our world over the years, and music is one of them.
Spotify had become one of the music streaming applications that offers the latest
songs in every year. Users can download Spotify from Play Store, App Store, and
the official website. Spotify is a music streaming platform that provides a Freemium
service, which means it is available for free use and a paid premium. Users can
browse the most famous artists or songs easily according to their ratings. The artist,
lyric, and some of the audio features have a significant impact on making the song's
popularity. The purpose of this research is to predict a soloist or group singers using
a decision tree algorithm. We used weighted by information gain method to
determine the most crucial feature in processing singers' popularity. Our model will
help the solo singer, group singers, and song composers make their songs
accessible. The best performance result is the Decision Tree Algorithm with an
Accuracy of 89.5% on cross-validation and 92.3% on independent data.
[Date]
56
Paper ID #45
ABSTRACT
Providing nutrition for COVID-19 patients is one of many actions to reduce the risk
due to symptoms of COVID-19. To help meet the nutritional needs of COVID-19
cured patients, we developed a nutritional needs recommendation system and
predicted nutritional needs for COVID-19 recovered patients in West Nusa
Tenggara, Indonesia with Technique for the Order of Preference by Similarity to
Ideal Solution method (TOPSIS). We use data from COVID-19 Task Force in this
province along with The Indonesian Dietary Recommendations to help decide
which nutrition is needed by recovered patients. The criteria used in the prototype
of this system are Age Group weight 3, Vegetable Consumption weight 4, Fat
Consumption weight 4, Salt & Sugar Consumption weight 2, and Sports weight
3.After cranking the two patterns used, the Pattern Preference value is obtained 1 =
0.34980639174099 and Pattern 2 = 0.65019360825901 so that the highest
preference value that can be used as a recommendation is Pattern 2 with a
Preference value of 0.65019360825901.
[Date]
57
Paper ID #47
ABSTRACT
Medan is the capital city of North Sumatra. Population of Medan is growing rapidly
that make the volume of vehicles increase as well. C4.5 Algorithm is an algorithm
classification data of decision tree type. Decision tree of C4.5 algorithm is built
with several stages that contain the selection of attributes as root, create branches
for each value and complete cases in branches. These stages will be repeated for
each branch until all cases in the branch have the same class. From approving the
decision tree, several rules will be obtained. In this case the Author Prioritizes
determining Bus fares. The application of the C4.5 Algorithm can help the
Transportation Agency to determine priority of bus fare.
[Date]
58
Paper ID #48
ABSTRACT
Use case diagram is one of the behavior diagrams in UML diagrams. It models the
basic needs of users and how users and systems interact to achieve them. Each use
case diagram forms a structure which abides a set of standard notations and
grammar. Therefore, we can measure the structural similarity between the two use
case diagrams. Measuring the similarity of two use case diagram structures can help
in the process of reusing diagrams, detecting clones, and assessing learning results.
This study proposes an advanced method to measure the structural similarity
between the two use case diagrams. Each use case diagram is translated into a
graph. The graph represents the inter-structure and intra-structure of a diagram. The
graph inter-structure models the interaction between the main use cases and their
actors. In comparison, the graph intra-structure models the detailed structure
descriptions of every main use case. The similarity between the two represented
graph calculates using Greedy Graph Edit Distance. Our experimental result shows
that the proposed graph can measure the similarity of the use case structural
diagram. The Greedy Graph Edit Distance also can calculate the similarity other
UML diagrams for the specific purpose.
59
Paper ID #49
ABSTRACT
In 2019, the COVID-19 virus has spread to various parts of the world including
Indonesia. This global pandemic becomes a lethal outbreak since there is no vaccine
to treat or prevent transmission of the virus. Rapid Test is selected as an essential
method to detect Covid-19 in Indonesia because the price is fairly cheap compared
to the SWAB test. The increase in Covid-19 patients tends to lead to limited
capacity for the Covid-19 test available at the hospital so that the latest technology
to detect and overcome this pandemic issue is needed. Thus, the present research
aims to examine the total of 100 X-Ray chest images of the Covid-19 patients and
100 X-ray normal chest images. The application of Contrast Limited Adaptive
Histogram Equalization (CLAHE) and Convolutional Neural Networks (CNN)
methods are implemented to analyze the dataset with two scenarios in obtaining the
detection results. The results of this research reveal that the application of CLAHE
is likely to affect Covid-19 detection accuracy using CNN. In addition, the
application of the CNN basic model shows significant results compared to the
application of VGG16 transfer learning.
[Date]
60
Paper ID #52
ABSTRACT
[Date]
61
Paper ID #55
ABSTRACT
A web-based information system is used to collect, process, store existing data, and
provide information for decision-making. The use of web-based information
systems can help support various business processes and integrate all the processes.
Universitas Klabat, with the Career Center that carries out alumni tracer study, still
does not have an integrated system in its implementation. An information system
that can integrate every tracer study implementation can encourage productivity
and improve higher education quality in the accreditation process. This study aims
to create a web-based tracer study information system at Universitas Klabat's
Career Center. In developing the system, a PHP based programming language
framework, namely Laravel, was employed to develop the system. The resulting
web-based information system can integrate every process of the tracer study. The
information system has four types of users, namely administrators, operators,
alumni, and employers. The information system can also generate reports needed
by Universitas Klabat and report purposes to the Ministry of Research and
Technology.
62
Paper ID #57
ABSTRACT
With the emergence of the need for online learning, the automatic grading system
is inevitable requirements in e-learning system. The automatic grading system in
software design courses requires a method for measuring similarity between the
key-answer design and student-answer designs. There have been several efforts to
develop methods for measuring the design similarity. Nevertheless, the purpose of
those methods is to reuse software designs. This study proposes a graph
representation of statechart diagram. The graph models the structural aspects of the
state-chart diagram. This study also proposes the use of Graph Edit Distance (GED)
greedy for calculating the structural similarity between two graphs. The results
show that all parameters used can determine the structural similarity between two
statechart diagrams with graph representation of statechart diagram as input.
Statechart similarity results obtained were 0.83.
[Date]
63
Paper ID #60
ABSTRACT
[Date]
64
Paper ID #62
ABSTRACT
The rapid advancement of information technology along with its potential for
widespread use opens opportunities for accessing, managing and utilizing
information in the global era. In accordance with Presidential Regulations No. 3 of
2003, policies and strategies for e-Government development with its applications,
mainly Manado City Government Official Website, are crucial within each of its
social level adapting in its ever-evolving global changes. Importance Performance
Analysis (IPA) method will be used after the questionnaire approach has been done
to find the result through mapping the attributes with IPA Cartesians diagram.
Based on the results of the analysis of the suitability level, it found a value of
<100% i.e. 91.94% and the results of the gap level with a comparison difference of
-0.09595559. Based upon the IPA quadrant, the result concluded that some quality
attributes are needed to be improved. Therefore, the services in Manado City
Government Website is at its finest and almost reached the expectations to optimize
use of information and communication technology.
[Date]
65
Paper ID #64
ABSTRACT
66
Paper ID #67
ABSTRACT
Today's modern game that many children play is a mobile-based game. The rapid
development of smartphones makes mobile gaming technology develop too.
Traditional games have been developed in Indonesia. The purpose of elevating
traditional games into mobile game applications is so that children now know the
traditional game of the nation's culture even though it is now in the digital age. One
of the traditional games raised in mobile games is Stilts. This study discusses the
evaluation of traditional Egrang game application users. Respondents from this
study are children aged 7 to 13 years. The tool used for processing and analyzing
respondent data is the User Experience Questionnaire (UEQ). UEQ will measure 6
User Experience scales including Attractiveness, Perspicuity, Efficiency,
Dependability, Stimulation and Novelty. The results of this study obtained
Perspicuity and Novelty Scale data in the Above Average range. Attractiveness,
Efficiency and Dependability scales are in the Below Average range. While the
Stimulation scale is in the Bad range. From these data it can be seen that the
stimulation scale most needs to get more attention in the evaluation or development
of subsequent applications. While the one who gets the highest score is Perspicuity.
So, it can be concluded that respondents said the game was easy to understand when
playing for the first time but was still not motivated to play it repeatedly and tended
to get bored quickly.
67
Paper ID #70
ABSTRACT
68
Paper ID #76
ABSTRACT
Health is very important, but many people don't care about health. In developing
countries, public awareness of the importance of health is minimal. This is because
some people cannot easily consult a doctor about their health problems due to
limited time, money, and much more. Time and money can be an obstacle for
someone when they want to run routine health checks, especially for someone who
has a busy schedule. We have developed an artificial intelligence-based application
that can be used by people to accurately check their health from the symptoms
provided by the user. This application is also designed to be easy to use anywhere
and anytime with the hope that public awareness about health will get better.
[Date]
69
Paper ID #79
ABSTRACT
Determination of the quality of good quality rice is very preferred by buyers. One
indicator in determining this quality is rice which is often bought by buyers. This
study aims to classify rice based on clusters, making it easier for buyers to know
the quality of rice and the seller can determine the right price of rice based on
quality. The method used in this study is K-Means Clustering of 206 rice brands,
49 rice brands belong to the very good quality rice group, 131 rice brands belong
to the good quality rice group and 26 rice brands belong to the poor quality rice
group, Results This research can find out the results of the quality of rice quality
and can provide preventive measures to reduce problems in determining the quality
of rice quality.
[Date]
70
Paper ID #83
ABSTRACT
71
Paper ID #84
ABSTRACT
Cocoa is more commonly referred to as chocolate fruit because cocoa beans that
have undergone a series of processes can produce cocoa powder. Cocoa plants have
pests and diseases that can interfere with the growth of these plants, such as
caterpillars kilan, vascular streak dieback, etc. Among these diseases and pests have
some of the same symptoms. This can cause uncertainty in determining the right
solution. These problems can be solved by creating a system that has intelligence
in identifying cocoa pests and diseases. This system is called an expert system.
Expert systems can be equipped with methods for tracing. Dempster Shafer which
is one method that can be applied in an expert system has the ability to calculate all
the symptoms that have been entered into the knowledge base and provide the right
identification results. The results of this study are the creation of an expert system
that can identify cocoa pests and diseases.
[Date]
72
Paper ID #88
ABSTRACT
[Date]
73
Paper ID #96
ABSTRACT
The purpose of this study was to predict students dropping out of the Education
Management Doctoral Program of FKIP Mulawarman University and to evaluate
the Extreme Learning Machine in predicting student dropouts. This research uses
the Extreme Learning Machine algorithm, the feedforward neural network learning
method and the Support Vector Machine algorithm for comparison of the level of
accuracy using the same data. The data used is as much as 110 data according to
the number of students from the class of 2012 to 2018, the data is taken from the
SIA Education Management Study Program of the Mulawarman University
Doctoral Program and then processed. In this case, how to predict student dropouts
using the variable Gender, Semester 3 IP Value, Working Status, Family Status,
Age, and using two DO and NON DO Classes? And calculating the accuracy value
using a confusion matrix ?. From the results of this study, it can be concluded that
students drop out in the Educational Management of the FKIP Mulawarman
University Doctoral Program can be predicted by Extreme Learning Machine using
the training value obtained from semester 3 of the 2012-2018 class. From the results
of testing the predictive accuracy of the Extreme Learning Machine is 72 %.
[Date]
74
Paper ID #99
ABSTRACT
The boiler machine is one of the important machines in the power generation
industry which functions to convert water into steam which is then used to drive
turbines to produce electrical energy. One of the damages that often occurs in boiler
engines is pipe leakage that causes the engine to not operate and the risk of fire.
From the danger of the resulting effects, an expert system is needed that can
determine the type of damage and how to handle it. The purpose of this study was
to analyze the damage to the boiler engine with the Expert System using the
Certainty Factor method. The result of this research is the highest percentage of
damage on Scale with a confidence level of 83%.
[Date]
75
Paper ID #101
ABSTRACT
[Date]
76
Paper ID #103
ABSTRACT
The electric power system consists of static load, lump load, and motor. Large
industry requires a large induction motor to run its production. However, the state
of this induction motor has a negative impact on the electric power system. The
starting current on the motor is so high that it can be 5 to 10 times the nominal
current. On the other hand, the motor absorbs a lot of power from the electric power
system and results in a voltage drop on the bus. The purpose of this paper is to
improve the voltage drop on the bus and reduce the starting current of the induction
motor. The analysis in this paper uses a transient curve of changes in voltage and
starting current with time. Starting an induction motor with the Direct on Line
(DOL) method as the basis for determining the voltage drop and the starting current
of the induction motor. Furthermore, using the Capacitor Bank method, Fault
Current Limiting (FCL), and Static Var Compensator (SVC) to improve transients
of voltage drop and motor starting current. All the results of these methods are
compared to find out which method is the best.
[Date]
77
Paper ID #107
ABSTRACT
Student data that are public and stored on Universitas Klabat (Unklab) currently be
stored in a local database and can only be accessed by the database administrator.
A RESTful web service acts as a medium that provides access to the data for those
who have permission, improving the data's accessibility. Any user eligible by the
web service can use the Unklab Information System data to develop a mobile or
another web application without making another similar database, thus eliminating
the redundant process of making a duplicate database. A JSON Web Token (JWT)
is also used in this web service to ensure that the person accessing the web service
is authorized to access the specific data. The agile method is used to develop this
application. In conclusion, the web service can create, read, update, delete (CRUD)
operation regarding the student database and provide it to the user that is authorized
with a valid JWT.
[Date]
78
Paper ID #109
ABSTRACT
Voice is one of the very common media and is commonly used as communication
by humans with the hope that it must reach the destination clearly and can be
understood by those who receive the voice, but cannot support the delivery of voice
information, because in sending information on the sound provided by the noise
speaking the arrival of sound. One that solves the problem of sound signals that are
disturbed by noise which can be facilitated by digital filters. Gaussian method is
the best method for eliminating noise in the image that has been developed, so that
the gaussian method needs to be done to improve the noise in the sound in order to
issue a clean sound signal from noise and increase the noise that has been
eliminated. This study uses the Gaussian filter method in filtering noise in the sound
record. in the implementation divided into two (2) steps to filter on the frequency
consisting of images and the second to do with voice recording. In carrying out the
filtering on the frequency of the sound that is considered as noise, the sound that
can be released but the sound produced is also reduced so that it sounds soft. In
filtering the Gaussian method to eliminate the noise of the sound record the current
process is combined with obtaining a dynamic range and peak factor with
parameters attack time = 0.01, release time = 0.01, hold time = 0.05, lower limit =
0.0005 and threshold of silence = 0.25. Apart from the results in this paper, the
dynamic range and crest factors in the parameters for filtering require a very long
process and an optimal method of repair is needed.
79
Paper ID #112
ABSTRACT
[Date]
80
Paper ID #140
ABSTRACT
Geometry is the lesson we have learned from elementary school level which is
divided into two categories: plane geometry and solid geometry. The shapes of
geometry object can be found in our surrounding environment, such as dice with
cuboid shape, door with rectangular shape, plate with circular shape, etc. Even so,
apparatus used for introducing these shapes are many still in the form of books or
static media or object. In this research, an innovation is made by creating an
application that will shows geometry planes and objects using Augmented Reality
technology and 3D Cuboid Tracking method. This method uses a cuboid-shaped
marker which has 6 sides of marker and can be tracked all at once. By using this
method, the geometry objects can be seen in 3D where users can see every object
in different angle and gives a better haptic feedback as the cube can be hold. In this
research, we use 10 geometry objects that consists 6 solid geometry objects (cube,
rectangular prism, triangular prism, sphere, cylinder, cone) and 4 plane geometry
objects (triangle, rectangle, square, circle). This application shows geometry
objects with its description and the calculation of surface area, volume, and
perimeter and a quite accurate projection with less than 0.5 cm margin error. A test
of the application also has been done on Android smartphone and successfully
installed on Android 5.1 and higher versions
81
Paper ID #146
ABSTRACT
Cases of lost scripts/programs have occurred but the server crashed due to electrical
problems. For problems related to attacks whose impact is felt, namely the type of
defacing attack. But his hopes of this research outside of the attack could secure it
first before another attack case. There are various kinds of attacks, for example,
such as cross-site scripting (XSS) attacks. This case has not yet happened and the
webserver admin hopes to secure it early so there are no cases of data/information
loss. Data/information that is more important on this website than other data is
data/information from the Information Management and Documentation Officer.
Vulnerability is a loophole that is often used by people not responsible for getting
the data and information they need in any way. This research type of research uses
action research methods, the nature of this research uses quasiexperimental
research, and the approach conducted by researchers used a quantitative approach.
The research was carried out using the OWASP scanner approach on the
Diskominfo web server, with the hope of providing solutions or recommendations
to the webserver admin in implementing web server security as needed.
82
Paper ID #149
ABSTRACT
Marketplace is a platform that birdges buyer and seller to transact. In January 2020,
Central Bank reported that total transactions in 14 Indonesian marketplaces reached
23.27 trillion rupiahs. At the end of the transaction process, the buyer has the
opportunity to give a review of the product that has been purchased. This research
aims to sentiment analysis on marketplace product reviews. This research applies
Natural Language Processing as a pre-processing of text in the sentiment analysis
of marketplace product reviews using a machine learning approach with the Naive
Bayes and K-NN algorithms. The test scenario obtained an average Naive Bayes
accuracy of 52.4% on the Unigram dataset and an average KNN accuracy of 79.4%
on the Bigram dataset. The utilization of NLP, particularly the word normalizer,
can increase the accuracy of 10% for Naive Bayes and 4% for K-NN. Sentiment
analysis on marketplace product reviews is useful as an opportunity for product
improvement for both seller and competitor, in the other side it is also used as a
reference for other users before buying a product.
83
Paper ID #151
ABSTRACT
The new coronavirus has infected people around the world. In cases or reports
relating to the coronavirus, there are many terms or diction used by the Indonesian
government, one of which is ODP (Insider Monitoring). Unsupervised ODP is one
of the reasons for the increasing number of positive cases of COVID-19. Based on
existing references, there are no studies that develop applications to monitor ODP.
So that we will build a mobile-based ODP TRACKING prototype that aims to
prevent the COVID-19 that can be caused by ODP by using the Rapid Application
Development (RAD) methodology. The ODP Tracker application requires users
such as the community, COVID-19 Village Handling Task Force, puskesmas, sub-
district & district handling units, and the system administrator. Each of these users
has a different role in the application but is related to one another. Several
prototypes of the ODP Tracker application interface are shown in this study,
including the Registration form interface, the ODP tracking interface, and the ODP
report interface. The ODP Tracker application prototype can help the government
or Covid-19 handling officers in Indonesia to track and monitor the whereabouts
and conditions of people with ODP status.
84
Paper ID #153
ABSTRACT
Along with the increasing activity on social media, hate speech is getting out of
control. Hate speech detection can be done by utilizing text mining technology.
There have been many hate speech detect ion studies conducted. To identify and
analyze research trends, data sources, methods and features used in hate speech
detection, this systematic literature review was created. Until early 2020, the topics
of hate speech were found, including hate speech against minorities, religion,
women, the general election agenda, and politics. Sources of data that are widely
used to be used as datasets come from twitter. Hate speech is not only classified
into HS (hate speech) and Non-HS (nonhate speech) but can be further classified
into racism, sexism, offensive, abusive, threats of violence and others. Of the 38
studies that meet inclusion and exclusion, there are 26 algorithms and 28 features
that have been used to detect hate speech. However, these methods and features do
not necessarily guarantee a good hate detection performance. Hate speech
classification performance is also influenced by the dataset, the features chosen, the
number of classes and mutually exclusive classes.
[Date]
85
Paper ID #162
ABSTRACT
This study was conducted to assess and compare the effectiveness of small and
medium-sized food enterprise (MSMEs) advertisements in Palembang on
advertising services on Youtube, Facebook, and Instagram. This assessment and
comparison is carried out to determine the extent of the effectiveness of advertising
promotions and to find out which social media has the highest level of effectiveness
in advertising services. Using random sampling, it was found that 60 research
samples looked at Micro Small Medium Enterprises (MSMEs) promotional
advertising services on Youtube, Facebook, and Instagram. The research stages
started from testing the reliability and validity of the questionnaire, determining the
scale range of the study in assessing the effectiveness, tabulating the data by
looking for the average value of each dimension in the empathy, persuasion,
interest, and communication (EPIC) model, then calculating the EPIC rate to
determine the effectiveness value of advertisements promoted on social media. The
result is that advertisements on the three social media are very effective, seen from
the EPIC rate which is on a very effective scale range. EPIC rate for Instagram is
3.3, Facebook is 3.26, and Youtube is 3.28. The highest EPIC rate of 3.3 on
Instagram means that Instagram is more effective than Youtube, which is in second
place, and the last is Facebook. MSMEs in Palembang are right to choose these
three social media as promotional media.
86
Paper ID #163
ABSTRACT
Most of the Islamic documents have been documented and published to Muslims
to be studied and applied in daily activities. One of these documents is a Hadith.
Along with the development of hadith technology not only recorded on sheets of
paper but also stored on digital data storage media in the form of databases.
Document grouping allows users to get better information than using documents in
the same group. Fuzzy techniques allow different membership levels. The purpose
of grouping documents is to get different groups. This is needed for better document
search. The document used in this study is an Indonesian translation of the Sunnan
An Nasa'i Hadith tradition with a grouping technique using a combination of Text
Mining and Fuzzy C-Means algorithm as a method of grouping it.
[Date]
87
Paper ID #164
ABSTRACT
[Date]
88
Paper ID #165
ABSTRACT
[Date]
89
Paper ID #167
ABSTRACT
[Date]
90
Paper ID #168
ABSTRACT
[Date]
91
Paper ID #186
ABSTRACT
[Date]
92
Paper ID #188
ABSTRACT
[Date]
93
Paper ID #190
ABSTRACT
This research aims to offer an android based food delivery service application to
ease customer to meet their order. The setting of this application is Airmadidi, the
capital of North Minahasa area, in the North Sulawesi Province that offers delicious
culinary by restaurants and cafes and well-known culinary destination in North
Sulawesi. The existing application still leave other food and beverages supplier
disconnected with their customers. Thus, some customer still has to come and pick
up their order themselves. As more people use smartphone, the potential to
introduce an android based application to facilitate the order is promising. This
provides an opportunity for the developed app to fill the gap left by the existing
applications in the market.
[Date]
94
Paper ID #195
ABSTRACT
There are many researchers working on handwritten text recognition (HTR) and
also contributing to HTR domain. Even though many research methods are existing
for HTR, there is a need for some more improvements in the accuracy of the HTR
systems. This paper is a contribution of the application of the Deep Learning
algorithm for the HTR system. In this paper first we will collect the data for training
the handwritten texts, later features have been extracted from those text datasets
and perform training of the model using Deep Learning approach. In this work we
are going to use the strategy to recognize in terms of words rather those characters
so that accuracy will be improved. The built model using LSTM deep model
achieves a very good accuracy. Lastly, this developed approach of the HTR system
is integrated into the OCR system and comparison of results are reported in this
paper. Two approaches have been compared in this paper on IAM handwritten data
set, and found that 2DLSTM based approach outperforms the other approach
Keywords:
[Date]
95
Paper ID #202
ABSTRACT
The rapid development of the three business models, namely online stores via
Facebook and Instagram, ecommerce with the C2C (Consumer to Consumer)
concept, and e-commerce with the B2C (Business to Consumer) concept, caused a
high level of competition so owners must know and fulfill customer wishes. This
challenge was certainly not easy, like a shop that compete for customers from
visiting people, marketplace and e-commerce B2C owners provided the best
service by maintain the quality of the website especially security factor to convince
visitors, so that they gain trust and develop into customer loyalty. Wong, Inkgo,
and Chiu-yiong in their research stated that security, privacy and trust are positively
connected to customer electronic loyalty. The aim of this research was to analyze
the effect of website security on customer loyalty with trust as Shopee.co.id web
moderation variable. Primary data collection technique used in this study is by
spreading questionnaires to the student respondents of the ITB STIKOM Bali
information system study program. Data analysis method used Structural Equation
Model (SEM). Based on the results of the analysis that has been obtained, it is
discovered that the web security had a significant effect on the customer trust, the
web security had a significant effect on the customer loyalty, and the customer trust
variable was not have a significant effect on the customer loyalty variable on the
Shopee.co.id website. The results of this research was considered by Shopee's
management to pay attention to the variables of web security and customer trust
that can shaped customer loyalty so that later the company's goals will be achieved.
96
Paper ID #208
ABSTRACT
97
Paper ID #209
ABSTRACT
[Date]
98
Paper ID #211
ABSTRACT
99
Paper ID #214
ABSTRACT
Acrophobia is the generally high common phobia. This phobia can make activity
and the lifestyle of the person who had this to be limited because the person is avoid
high places. Acrophobia can be overcome by centrifugal therapy method w hich is
the person who had this phobia is involved to the situation that trigger this phobia
step by step. In virtual reality format and the sound effect, VR can used to simulate
like in the high places in virtual. Scientist used virtual reallity technology to make
application who can visualitation the condition of high places through the option
mode. The purpose of making this application is to reduce acrophobia by using
virtual reallity technology. Simulation of this research is served by showing virtual
enviroment of high places by using accelerometer and gyroscope on smartphone so
the user can interact with the social enviroment. Method used on this research is
prototyping model. Adobe photoshop to make application interface and game
engine unity as authoring tool to build the application. The result of this research,
the user can train by itself or with therapist using the application which is installed
on smartphone android and VR headset.
[Date]
100
Paper ID #215
ABSTRACT
Nowadays, the latest age of immersive media technologies such as interactive video
application, virtual reality or 3D television, multiplayer online gaming, which has
brought users new technological perspectives, has contributed to a significant
revolution of the broadcast environment in coming years. And most of these
bandwidths will be created by mobile users. It is therefore expected that the Time-
Wavelength Division-Multiplexing Passive Optical Network (TWDM-PON)
would help the integration of wired and wireless networks resulting from hybrid
optical-wireless architecture, which is the best choice for next-generation
architecture design. In this paper, we proposed the Hybrid Xhaul-TWDM-PON
networks with SD local cache management for interactive video applications
mechanisms. OpenFlow controller is also the use of the smart local cache with QoS-
conscious mechanism, to locally track and store the most common video at S-OLT,
to lower end-user latency and increase end-user QoE. Simulation results shows that
the proposed mechanism can improve the overall system performance in terms of
mean packet delay, packet dropping and bandwidth efficiency.
101
Paper ID #217
ABSTRACT
102
Paper ID #218
ABSTRACT
[Date]
103
Paper ID #219
ABSTRACT
Education is a business process that has been a pillar of government for centuries
in building the nation. The method of organizing knowledge globally does not
change according to the times. Various problems currently faced by education
service providers, especially at the tertiary level, in this case, call it the problem of
authentication and certificate verification, which are the micro and macro outputs
of a learning process. People are getting lighthouses about blockchain, the solution
to educational polemic problems. The combination of science between education
and blockchain technology will create a new revolution in the education industry
that is felt to be stagnant and incompatible with current developments. There are
various kinds of insights from this solution. Still, it is not enough to explain the
ontology of education using blockchain, which, as a whole, discusses the existence
of blockchain for education based on scientific studies. Ontology for knowledge
will be useful as a literature platform for young researchers, especially in
universities, to start basic and applied research that leads to blockchain in
education. Besides, blockchain technology has weaknesses and inefficiencies,
namely in terms of cost, storage space, and speed. Solutions will be proposed
through this research regarding on-chain and off-chain protocols in Time Based
Protocol (TBP), which is part of Blockchain technology. As a result, this research
can also become the foundation for new platforms and frameworks as a solution for
the government in launching blockchain-based education, which is a pioneer in
creating a blockchain-based government.
104
Paper ID #220
ABSTRACT
[Date]
105
See you again
at
ICORIS 2021
[Date]
106
[Date]
107