:: Abstract List ::
Page 16 (data 451 to 480 of 1039) | Displayed ini 30 data/page << PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 NEXT >>
451 |
Computer Science |
ABS-32 |
Simple Computer Technology for Nationality Character Song Teaching in Elementary School Prana Dwija Iswara (a*), J. Julia (a), Sandie Gunara (b), Tedi Supriyadi (c)
a) PGSD, Universitas Pendidikan Indonesia
Jalan Mayor Abdurahman No. 211, Sumedang, Indonesia
*iswara[at]upi.edu
b) Music Edication, Universitas Pendidikan Indonesia
Jalan Dr. Setiabudhi No. 229, Bandung, Indonesia
c) PGSD Penjas, Universitas Pendidikan Indonesia
Jalan Mayor Abdurahman No. 211, Sumedang, Indonesia
Abstract
Some of the Indonesian people who struck by the crisis of national character must get proper handling. Some of these national crises lead to acts of global terrorism. One effort to deal with the national character crisis, especially at the level of elementary school students, is to teach songs with national character. In the period of 2017 until the beginning of 2019 the learning of songs with national character was held as part of the national character campaign. The study found a number of simple computer technology instruments that can be used in learning songs in the classroom. Several technology package options can be used. In this study also found a number of procedures that must be prepared by teachers in learning songs with simple technology in class. However, if the teacher is not good enough in teaching learning material, those simple technology can become less effective.
Keywords: computer technology; national character building; song; lyrics; elementary school
PermaLink
| Plain Format
| Corresponding Author (Prana Dwija Iswara)
|
452 |
Computer Science |
ABS-291 |
Comparison Weighted Product, Analytical Hierarchy Process, Simple Additive Weighting and TOPSIS for selecting Multiple Intelligences on children Moh Ahsan (a*), Meme Susilowati (b), Abdul Aziz (a)
a) Informatics Study Program, Fakulty of Science and Technology, Universitas Kanjuruhan Malang, Jl. S. Supriadi, No. 48 Malang Jawa Timur 65148, Indonesia. *ahsan[at]unikama.ac.id
b) Program Studi Sistem Informasi, Fakultas Sain dan Teknologi, Universitas Ma Chung Malang, Jl. Villa Puncak Tidar Blok N No. 1, Dau, Malang, Jawa Timur 65151
Jawa Timur 65151
Abstract
Multiple intelligence is intelligence possessed by every human, among these intelligences are linguistic intelligence, musical intelligence, naturalist intelligence, visual-spatial intelligence, logic-mathematical intelligence, interpersonal intelligence, intrapersonal intelligence, and kinaesthetic intelligence. Various ways are carried out by researchers to find out intelligence such as through numbers, pictures, music, words, physical and social-emotional activities. The purpose of this study is to develop a decision support system to determine intelligence on children by using the Weighted Product method, Analytical Hierarchy Process, Simple Additive Weighting and TOPSIS. Comparison of the four methods used to find the best results among the methods used in determining childrens intelligence. The Weighted Product method has the highest preference value of 0.176400366 namely Kinaesthetic Intelligence, Analytical Hierarchy Process Method has the highest preference value 0.690048152 Kinaesthetic Intelligence, Simple Additive Weighting Method has the highest preference value 0.890555556 Kinaesthetic Intelligence and TOPSIS method has the highest value 0.134598738 namely Musical Intelligence. To evaluate the suitability of the right decisions in determining intelligence, the results of these methods are compared with the results of the decisions of a psychologist to produce a valid decision. The results show that the four methods that have been compared and the results of experiments validated by experts show that the intelligence suitability of children with the Weighted Product method, Analytical Hierarchy Process, Simple Additive Weighting has the right preference value with the highest value of each result obtained. It can be concluded that the decision of the decision support system is valid and successful represents expert judgment
Keywords: Multiple Intelligence; decision support system; children
PermaLink
| Plain Format
| Corresponding Author (Moh Ahsan)
|
453 |
Computer Science |
ABS-803 |
THE USE OF NAÏVE BAYES CLASSIFIER ALGORITHM TO DETECT CUSTOMERS INTERESTS IN BUYING INTERNET TOKEN Dedy Rahman Prehanto, Aries Dwi Indriyanti, I Kadek Dwi Nuryana, Ahmad Syahrul Mubarok
Universitas Negeri Surabaya
Abstract
Determining possible technology used in calculating customer buying interest is important for the company as it relates to marketing strategies and policies. The Naïve Bayes Classifier is a possible method to measure customer buying interest. This study aims to analyze the accuracy of this method in calculating customer buying interest of internet token. Data were obtained from past sales and then analyzed using the Naïve Bayes Classifier to predict future opportunities by defining the class of attributes. The classifications used were operator, internet quota, token active period, and product price. This study found that the Naïve Bayes Classifier was provably accurate in calculating customer buying interest as well as comparing the prediction with actual results aside the data training. Results showed that this method successfully classifies 10 products of 858 transactions as data training and 10 products of 115 transactions as data test. Here indicates that all data test and data training analysis showed eight of the tenth meaning that eight of ten predictions were correct or it had 80% accuracy. This study is expected becoming a reference in analyzing data sales and predicting future sales conditions, so it will help to determine appropriate strategy of product development.
Keywords: naïve bayes classifier, internet token sales
PermaLink
| Plain Format
| Corresponding Author (Dedy Rahman Prehanto)
|
454 |
Computer Science |
ABS-1062 |
DEVELOPMENT OF ACCOUNTING LEARNING MODULE USING SAINTIFIC APPROACH THROUGH INTERACTIVE VIDEO Lilik Sri Hariani (1), Rusno (2)
Economic Education Study Program, Universitas Kanjuruhan Malang
Abstract
This is a research development of accounting learning modules on financial reporting material using a scientific approach through interactive videos. The purpose of this study is to produce an accounting learning module that can be used to support learning activities. The procedure of development research applied in this study uses steps: (1) potential and problems; (2) data collection; (3) product design; (4) design validation; (5) design revisions; (6) product testing; (7) product revisions; and (8) testing the use of learning modules. The subjects of this study were 35 students of Kanjuruhan University management students. Data collection techniques used in this study were observation, interviews, and questionnaires. The results of the feasibility obtained for the validation of the learning module are included in very valid criteria or can be used to support accounting learning activities. The results of the effectiveness of the learning modules obtained through competency tests are obtained from the average value of students included in the good category
Keywords: module development, scientific, interactive video
PermaLink
| Plain Format
| Corresponding Author (Lilik Sri Hariani)
|
455 |
Computer Science |
ABS-40 |
A Proposed Framework in an Intelligent Recommender System for the College Student Dede Kurniadi (a,b*), Edi Abdurachman (a), Harco Leslie Hendric Spits Warnars (a), Wayan Suparta (a)
a) Department of Computer Science, Graduate Program Doctor of Computer Science, Bina Nusantara University, Jakarta, Indonesia
*dede.kurniadi[at]binus.ac.id
b) Department of Informatics, Sekolah Tinggi Teknologi Garut, Garut, Indonesia
Abstract
This article aims to proposed framework an intelligent recommender system (IRS) for students in higher education institutions. This conceptual framework includes problems in predicting student performance, the possibility of graduating on time, and recommends choosing subjects according to performance, and career interests, which are useful for assisting pedagogical interventions in future student development. The success in the development and implementation of the proposed IRS framework is inseparable from using data mining and machine learning techniques in predicting and providing recommendations. Data analysis consisted of clustering techniques, association rules, and classification using support vector machine (SVM), Naïve Bayes, and k-Nearest Neighbor (k-NN). These techniques are used to solve problems related to students and to provide appropriate recommendations. The result is an IRS conceptual framework for the college student that can be used as smart agents to provide student guidance and suggestions to support the process of education in higher education.
Keywords: framework; recommender system; prediction; student problem
PermaLink
| Plain Format
| Corresponding Author (Dede Kurniadi)
|
456 |
Computer Science |
ABS-1064 |
GOST Enhancement Key Processing with Triple Transposition Key Robbi Rahim, Suprianto, Mochammad Tanzil Multazam,
Universiti Malaysia Perlis,
Universitas Muhammadiyah Sidoarjo
Abstract
The GOST algorithm is an algorithm that has good encryption and decryption speeds because the encryption and decryption process is simple with the use of keys that are not too good. Security in cryptographic ciphertext results is one of the factors that depends on the use of a good key too, one of the techniques that can be used is the Triple Transposition Key that processes keys as much as 3 x rounds with the transposition function. The Triple Transposition Key and GOST algorithms are combined during the key formation process so that the key obtained from the process of using the Triple Transposition Key algorithm is quite strong and minimizes the brute force attack. The use of the Triple Transposition Key algorithm on GOST can be used as an alternative to increase security on the key so that it does not have to have a combination of 2 or more algorithms that will only consume process resources and also do not significantly affect the speed of encryption and decryption.
Keywords: GOST algorithms, Triple Transposition Key, cryptographic ciphertext
PermaLink
| Plain Format
| Corresponding Author (Mochammad Tanzil Multazam)
|
457 |
Computer Science |
ABS-553 |
Combination Base64 and GOST Algorithm for Security Process Robbi Rahim(a)*, Sumarno(b), Mochammad Tanzil Multazam(b), Suyono Thamrin(c), Siswo Hadi Sumantri(c)
1. School of Computer and Communication Engineering, Universiti Malaysia Perlis, Arau, Malaysia
2. Universitas Muhammadiyah Sidoarjo, Sidoarjo, Indonesia
3. Indonesia Defense University, Indonesia
Abstract
Cryptography in various communications both online and offline is very necessary and generally cryptography is used to secure data in the form of text while non-text data requires special algorithms. Base64 is an encoding algorithm that can convert non-text data into binary data so that the data can be secured with cryptographic algorithms such as the GOST algorithm. The combination of the BASE64 and GOST algorithms is expected to be able to secure all types of data that exist and have the ease of returning to their original form without damaging the original data, besides this combination will increase data security because the combination of these two algorithms produces ciphertext that is difficult to know if the process is done cryptanalyst by third parties. The results of the combination of Base64 and GOST algorithms are expected to be able to deliver dynamic security contributions to various existing data objects so that they can be used both online and offline.
Keywords: Base64, Cryptography, Ciphertext, Encoding, GOST
PermaLink
| Plain Format
| Corresponding Author (Robbi Rahim)
|
458 |
Computer Science |
ABS-810 |
SIMPLE ADDITIVE WEIGHTING ALGORITHM TO AID THE ADMINISTRATOR DECISION MAKING OF THE UNDERPRIVILAGED SCHOLARSHIP Aries Dwi Indriyanti, Dedy Rahman Prehanto, I Gusti Lanang Eka Putra Prismana, Soeryanto, Bambang Sujatmiko, Johan Fikandda
Universitas Negeri Surabaya
Abstract
Underprivileged scholarships are assistance provided by the government or institutions to students from poor families. Scholarships can be given to all students at the education level from elementary school to higher education with certain conditions and criteria. However, in reality many scholarships are given that are not on target. This is because of the number of students who register as scholarship recipients. Therefore, it is necessary to have a decision support system in order to aid the selection process. This study aims to find appropriate system to aid the underprivilaged scholarship selection. This study proposed a system which was built using PHP for programming languages and using MySQL as its database using the Simple Additive Weighting (SAW) method. Data is taken from SMK Sultan Agung 1 Jombang. Data is then analyzed and tested using the Blackbox testing method. The results of the study prove that Simple Additive Weighting can be used as a support system to help implement students in prospective scholarship recipients.
Keywords: Decision Support System, Simple Additive Weighting, Scholarship
PermaLink
| Plain Format
| Corresponding Author (Aries Dwi Indriyanti)
|
459 |
Computer Science |
ABS-812 |
The Counting Game uses the Fuzzy Tsukamoto Method Ekojono Ekojono, Rizkyna Cahyaningrum, Kadek Sarjuna Batubulan, Anugrah Nur Rahmanto
Politeknik Negeri Malang
Abstract
Learning to count on elementary school students must be trained in how to memorize, many practice questions are done repeatedly. This counting exercise needs to be stimulated so that students have the motivation to learn, this kind of training is mostly done by the teacher to students by giving questions in turns in one class as if the students are in a game playing condition. Counting exercises can be applied in the form of games with applied counting operations learning to train students to count quickly. The approach with attractive application visualization is expected to be able to help the learning of elementary school level students, especially class 1. Tsukamoto Method, in each rule is represented using a fuzzy set, using a monotonous membership function. To be able to determine the value of crisp output or firm results. By using the Unity 3D game engine that is capable of making 2D games, the Fuzzy Tsukamoto method is used to determine the final game score. Tests that have been done show that the results of the questionnaire that game 2d on the functionality aspect get a result of 3.97 on a scale of 5.
Keywords: game, count Fuzzy Tsukamoto
PermaLink
| Plain Format
| Corresponding Author (Ekojono .)
|
460 |
Computer Science |
ABS-301 |
Natural Disaster Topic Selection using Decision Tree Classification Ade Sutedi
Sekolah Tinggi Teknologi Garut
Abstract
Social media like Twitter used as a reference for popular and trusted news today. This condition caused users shared out the information to another about anything around them. This opportunity could be useful information about natural disasters that occur in certain condition related to their locations. This study aims to select the topic that related to the natural disasters that occur in Indonesia based on Twitter user timeline. The topic will use as a reference to ascertain events, conditions of victims and location, and positions of disaster locations. For the validity of disaster information, the data takes from the official Twitter account of @BNPB_Indonesia and @infoBMKG. The data extracted and divided into two main classes, then grouped into types of disasters and locations, and determine the position of location that can be used as a safe point after disasters. In this, study a decision tree classification was used to assist the topic selection process related to natural disaster events.
Keywords: Social Media, Natural Disaster, Decision Tree, Classification
PermaLink
| Plain Format
| Corresponding Author (Ade Sutedi)
|
461 |
Computer Science |
ABS-303 |
ANALYSIS OF CLASSIFICATION ALGORITHM IN PENSION TYPES OF GOVERNMENT EMPLOYEES Arif Senja Fitrani*, Mochamad Alfan Rosid
Universitas Muhammadiyah Sidoarjo
Abstract
The concept of data mining in its implementation is used in handling and analyzing data in large capacity - steps to extract information and to gain knowledge in supporting decision making. Data mining, in its implementation, can be used in various sectors of data analysis, namely about the condition of the type of pension. The purpose of this study is to provide information, where a civil servant within the retirement limit is taken normally or earlier. The technique of using the classification method, with the decision tree C4.5 (J48), Naive Bayes and k Nearest Neighbor algorithm. Presentation of assets of 1,316 pension data in 2012 and 2013 from Bukopin Bank customers, which are divided into training data by 65% and data testing by 35%. From the testing of three algorithms, the highest classification was produced, namely Naive Bayes with 91%. The results of the three classifications indicate the quality of attribute determination can affect the results. And the predictive level of the three algorithms shows different results. For classification techniques with better results, improvements are needed to determine attributes and develop existing datasets
Keywords: Data Mining;Classification;Pension Data;Algorithm Classification;Classification;Comparative Analysis
PermaLink
| Plain Format
| Corresponding Author (Arif Senja Fitrani)
|
462 |
Computer Science |
ABS-49 |
Geographical Information System Of Fire Incidents Data Monitoring Leni Fitriani (a*), Dewi Tresnawati (a)
a) Department of Informatics, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu no 1, Garut, 44151, INDONESIA
*leni.fitriani[at]sttgarut.ac.id
Abstract
This geographic information system is built as a tool to monitor fire incidents data, taken from the reports of the fire department. In addition to monitoring role, this application can also be used to manage fire incidents data so that it can facilitate firefighters to monitor areas that have high occurance of fires. Therefore, they can prevent fires from occurring. The information system is expected to have benefit in decreasing the rate of fire incidents, mostly by socializing to the publics the prevention of fires in areas where it often occurs. This research was conducted by using the Unified Software Development Process methodology; starting from the analysis model stage, design model, deployment model, implementation model, and testing model. The design model used in this research is Unified Modeling Language which is tested by using the blackbox method. The result of this study is the implementation of geographic information system that can monitor fire incidents data through the location of the incident. Moreover, this system can improve the performance of firefighters in anticipating and preventing the incidents.
Keywords: Fire Incidents; Information; Geographical; Monitoring; System
PermaLink
| Plain Format
| Corresponding Author (leni fitriani)
|
463 |
Computer Science |
ABS-50 |
Career Counseling Forum For University Leni Fitriani (a*), Dede Kurniadi (a)
a) Department of Informatics, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu no 1, Garut, 44151, INDONESIA
*leni.fitriani[at]sttgarut.ac.id
Abstract
One of the many alumni problems that occurs after graduation is a lack of knowledge about working world and careers that they can take. There are still many universities that do not have career counseling for managing their students career. This problem happens because of the lack of students awareness to come to the career center to take part in career counseling. The purpose of this study is to create a student forum that contains career counseling with alumni. This forum is expected to be useful for alumni who need information about the working world. The methodology used in this study is the Unified Software Development Process whose stages are analysis model, design model, implementation model, deployment model, and testing model. Furthermore, it is modeled by using the Unified Modeling Language diagram, in the form of use case diagrams, activities, sequences, and class diagrams. This study took a sample from the Career Development Center of Sekolah Tinggi Teknologi Garut. The result of this study is the existence of a web-based career counseling forum that can help students and alumni interact with each other to share information and knowledge about the working world. Additionally, this career counseling is expected to help students and alumni to better understand their working world.
Keywords: Applications; Counseling; College students; University; Web.
PermaLink
| Plain Format
| Corresponding Author (leni fitriani)
|
464 |
Computer Science |
ABS-52 |
The TIGER Society Framework in the scope of Information Technology Infrastructure Rinda Cahyana
Sekolah Tinggi Teknologi Garut
Jl Mayor Syamsu 1, Garut, 44151, Indonesia
Abstract
The tourism industry activities in the information society are related to interactions between tourism actors and information technology in a variety of services. The TIGER society is centered on the tourism industry business (T) and other accompanying industries (I) with full support from the government (G). Its service quality is influenced by the education process (E) and service development, based on local wisdom in the form of religious values and norms (R). This research aims to create a TIGER society framework in which resources fill the layers of information technology infrastructure. Research provides examples of TIGER society resources using the framework.
Keywords: Information Technology; Resources; Society; Tourism
PermaLink
| Plain Format
| Corresponding Author (Rinda Cahyana)
|
465 |
Computer Science |
ABS-1079 |
Designing MOOCS with Virtual Microscopic Simulation (VMS) for Increasing of Student’s Levels of Understanding Firmanul Catur Wibowo* and Bambang Heru Iswanto**
*Department of Physics Education, Universitas Negeri Jakarta, Jakarta 13220, Indonesia
**Department of Physics, Universitas Negeri Jakarta, Jakarta 13220, Indonesia
Abstract
The purpose of this research is to develop a design for MOOCS with Virtual Microscopic Simulation (VMS) for students levels of understanding. The research method used is the Embedded Experiment Design with the research subjects as many as 45 students’ in one of campus in Banten Province, Indonesia. The results showed that the Level of Comprehensive Understanding (CU) was 76.67%, Level of Understanding of Partial Understanding (PU) was 15.56%, and Level of Misunderstanding (MU) was 5.56%, Level of Not Understand (NU) of 2.22% and the lowest level of No Answered (NA) of 0%. It was concluded that the average level of understanding experienced a significant increase with learning through MOOCS with VMS on the concept of electricity.
Keywords: MOOCS; Virtual Microscopic Simulation (VMS); levels of understanding
PermaLink
| Plain Format
| Corresponding Author (BAMBANG HERU ISWANTO)
|
466 |
Computer Science |
ABS-568 |
Comparative Analysis of Decision Tree Algorithms: Random Forest and C45 for Airlines Customer Satisfaction Classification Wiyoga Baswardono (a*), Dede Kurniadi (a), Asri Mulyani (a), Dudy Mohammad Arifin (b)
a) Department of Informatics, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia
*wiyoga.b[at]sttgarut.ac.id
b) Department of Industrial Engineering, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia
Abstract
This article aims to a comparative analysis of decision tree algorithms between random forest and c45 for airlines customer satisfaction classification. The comparative study predicts both algorithms have better accuracy, precision, recall AUC (area under the curve) for analyzing data set of customer satisfaction on airlines, which are useful for later if have some same kind set of data set and problem. In this particular comparative analysis, first, need to select the dataset and transform so it can be used for data mining technique classification after choosing the algorithm to analyze the data set. The analyzing of the dataset it will through validation, testing and also result for each algorithm used. Then will compare the result from each algorithm, to determine which algorithm are best to use in this particular dataset or problem for customer satisfaction for airlines. The results of the comparative analysis are the best alternative algorithm choice for use in airline customer satisfaction classifications.
Keywords: comparative analysis; classification; algorithm; deccision tree; customer satisfaction
PermaLink
| Plain Format
| Corresponding Author (Wiyoga Baswardono)
|
467 |
Computer Science |
ABS-58 |
Classification of Sundanese Language Used in Social Media: Case Studies on Twitter Users Ade Sutedi
Sekolah Tinggi Teknologi Garut
Abstract
Language is an element of culture in every nation. The contributions to maintaining this element are to be a good and consistent speaker in daily conversations. Along with the history of the Sundanese tradition, language has an important role to show the existence of Sundanese culture, especially in Banten and West Java. Today, the use of Sundanese language become less frequent due to a competition of regional languages with national languages even with foreign languages. This issue becomes popular in the last decade due to the death of a language issue. The existence of Sundanese language will reflect the strength of the mother tongue uses that becomes characteristic of a region culture, especially for Sundanese language. The objectives of this study are: (1) to classify the Sundanese and not Sundanese language that usually used in social media; (2) to analyze the sentiment of the vocabulary that used in Sundanese language. Classification process takes several types of words from Sundanese vocabulary which divided into three levels: Loma (Ribaldry level), Hormat ka sorangan (Standard level), and Hormat ka batur (Polite level). This process will evaluate the existence of Sundanese language used by users in social media. In this research, the data was taken randomly from Twitter users based on their area, especially in Banten and West Java Provinces.
Keywords: Classification, Sundanese, Death of Language, Social Media, Twitter.
PermaLink
| Plain Format
| Corresponding Author (Ade Sutedi)
|
468 |
Computer Science |
ABS-826 |
Improving Second Grade Elementary Students’ Writing and Storytelling Skills Through Digital Literacy Azizah Zahra Jenar Suwarni, Rahman, Prana Dwija Iswara
Universitas Pendidikan Indonesia
Abstract
The aims of this study was to improve writing and storytelling skills of second grade elementary school students. Through digital literacy, students can have a meaningful experience when they learn to make and tell a story they have made. Students will be able to explore their competences while using a lot of audiovisual media for finishing writing and storytelling assignment. This research conducted with a qualitative research design by using observation and students’ assessment as research instruments. Based on the findings, a conclusion can be drawn that digital literacy is able to improving second grade students’ writing and storytelling skills
Keywords: digital literacy, elementary student, writing skills, storytelling skills
PermaLink
| Plain Format
| Corresponding Author (Azizah Zahra Jenar Suwarni)
|
469 |
Computer Science |
ABS-573 |
Design of Human Resource Information System for Micro Small and Medium Enterprises Wiyoga Baswardono (*), Asri Mulyani, Dede Kurniadi, Yosep Septiana
Department of Informatics, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia
*wiyoga.b[at]sttgarut.ac.id
Abstract
The articles aim to analyze and design of human resource information system (HRIS) for micro small and medium enterprises in Indonesia. The problem some times occurred happen in human resource when business starts to grow. To solve this start with analyzing and design in this HRIS system using RUP (Rational Unified Process) to handle a problem such as attendance, payroll, manage employee and other Human resource problem in the scope of small or medium business. The result is a design of HRIS that can be a start for a blueprint and can be implemented for micro small and medium enterprises with condition and regulation that fit in Indonesia.
Keywords: information system; HRIS; design system; enterprise system
PermaLink
| Plain Format
| Corresponding Author (Wiyoga Baswardono)
|
470 |
Computer Science |
ABS-66 |
Lecturing Simulation Game using Decision Tree Algorithm W B Zulfikar, D R Ramdania, A Afif, W Uriawan
Department of Informatics, UIN Sunan Gunung Djati, Jl. A.H. Nasution No.105 Bandung, Indonesia
Abstract
Nowadays, students is one big assets of a university. A Student must be assign to several lecturing process for example study plan, lecturing, mid test, final test, etc. Therefore, some student especially new entry student did not understand whom the primary and secondary flow of lecturing and it terms. There is many ways to explain about lecturing plot into student, like put it on academic guide book, inform in official website, social media, and so on. Unfortunatelly, most of studends are not awared it. The purpose of this work is to create a lecturing simulation game to interest student in order to understanding lecturing process. In this work we implement decision tree algorithm on storyline to make a conclusion in the game. In limited test we ask several student to play this simulation game. The result, 80% of student get more knowledge about lecturing process.
Keywords: Simulation Game, Lecturing, Decision Tree
PermaLink
| Plain Format
| Corresponding Author (Wildan Budiawan Zulfikar)
|
471 |
Computer Science |
ABS-322 |
Framework Indeks security information to support evaluation, adoption and improvement of methods in developing variables Faiz M Kaffah(1*) Cepy Slamet(1) Aedah Bt. Abdul Rahman(2) Khaerul Manaf (3) Beki Subaeki (3)
(1) Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
(2) School of ICT Asian E-University Kuala Lumpur, Malaysia
(3) Department of Information System Sangga Buana YPKP University Bandung, Indonesia
Abstract
The governance of information security in the Indonesian Government has not been completely improved. Many related variables components are not measured. This study aims to observe an evaluation for application of information security index framework in Indonesian government institutions as the implementation of electronic government. The analysis is carried out by adopting an information security index framework produced in the rank of e-government. The study uses a triangulation approach within a mixed method. This study results in a novel adoption model of information security index framework equipped by two new variables. Therefore, a proper policy of the Indonesian government is required for its implementation.
Keywords: Security information, e-goverment, framework
PermaLink
| Plain Format
| Corresponding Author (faiz muqorrir kaffah)
|
472 |
Computer Science |
ABS-834 |
DESIGN AND IMPLEMENTATION OF KEYCODE ENCRYPTION FOR ELECTRIC DOOR LOCK EMBEDDED SYSTEM USING RSA AND AES Yuri Ariyanto, Kadek Suarjuna Batubulan, Deddy Kusbianto Purwoko A, Nugroho Ardi Sutrisno
State Polytechnic of Malang
Abstract
In this digital era the usage of locks are no longer only relies on traditional key systems, but also relies on usage of electronic sensors that can improve security system. Raspberry pi is a mini computer that can be used for various needs. In this research utilizing a raspberry pi and a servo motor as a locking device, a web server as a data storage center, a mobile device software aplication as a user interface.The password will be sent over internet from mobile device to web server and raspberry pi will give a command to the servo to unlock and lock. Now the threat to keyless locking system does not only come from physical sources but also come from non-physical or digital sources. This treat can be prevented by using cryptography to hide digital data in the system. This study will compare between combination of RSA, 3DES, AES 128 bit, and 256bit AES algorithms to obtain an algorithm that could be operated optimally on the system based on encryption and decryption speed. The final result of this study is a method to implement cryptographic algorithms on smart key systems to obtain better security.
Keywords: Raspberry Pi, Cryptography, AES, RSA, Security, IoT
PermaLink
| Plain Format
| Corresponding Author (Yuri Ariyanto)
|
473 |
Computer Science |
ABS-1091 |
Implementation of Advanced Encryption Standard for File Security in Stego-Object Sy. Yuliani(1,2), Aldy Rialdy Atmadja(1,*), Y S Nurjanah(1), Deny Fauzy(1), Rio Guntur Utomo(1)
1Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
2Faculty of Information and Technology, Universiti Teknikal Malaysia Melaka, Malaysia
Abstract
Security issues and data confidentiality are very important in the digital and internet era today. Important files circulating on the internet, both in the form of documents, images, and videos need to be supported with good security. This article aims to secure files by utilizing steganography technology, both in encryption and decryption of the file. The method used is the Advanced Encryption Standard (AES) which is applied to Stego-Object. Experiments are done on document files with extensions .doc, .xlsx, .pdf, and .txt, also on image files with extensions .jpeg, .png, and .bitmap. The experimental results show that AES can encrypt and decrypt quite effectively without changing the quality of files both images and documents. This research can develop for video files.
Keywords: Security, Encryption, Advanced Encryption Standard, document
PermaLink
| Plain Format
| Corresponding Author (Aldy Rialdy Atmadja)
|
474 |
Computer Science |
ABS-69 |
COMPARISON OF ALGORITHM SUPPORT VECTOR MACHINE AND C4.5 FOR IDENTIFICATION OF PEST AND DISEASE ON CHILI PLANTS Mohamad Irfan, Nur Lukman, Abdul Aziz Alfauzi, Jumadi
Departement of Informatics Engineering UIN Sunan Gunung Djati Bandung
Abstract
Data from the Central Bureau of Statistics of the population working in the agricultural sector continued to decline from 39.22 million in 2013 to 38.97 million in 2014, the number dropped back to 37.75 million in 2015. According to the MIT G-Lab Team (global entrepreneurship program) concludes five factors that make it difficult to raise agricultural productivity to compete in the domestic market, namely the low education of farmers in dealing with pests, the difficulty of access to finance for rural areas, lack of skills, lack of access to information and lack of application of agricultural technology. Chili plants are plants that are very susceptible to pests so BPS noted a decrease in chili production reaching 25%. Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. By using each training data and testing data as many as 30 data. The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. The final result of this study was that the accuracy of the C4.5 method was better.
Keywords: Chili pest, algorithm, SVM, C4.5
PermaLink
| Plain Format
| Corresponding Author (Mohamad Irfan)
|
475 |
Computer Science |
ABS-72 |
Thesis Topic Recommendation using Simple Multi Attribute Rating Technique Cepy Slamet (a); Fahmi Mahmud Maliki (a); Undang Syaripudin (a); Abdusy Syakur Amin (b); Muhammad Ali Ramdhani (*, a)
(*) m_ali_ramdhani[at]uinsgd.ac.id
(a) Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
(b) Department of Industrial Engineering, Universitas Pasundan, Indonesia
Abstract
The purpose of this study is to design information systems that can recommend the selection of final project (thesis) topics based on the competencies possessed by students. The analytical model integrated into this system is the Simple Multi Attribute Rating Technique (SMART), with student competency data taken based on the grade score of the subjects relevant to the selection of the final project theme clusters. The design of the information system in this study uses a prototype model, with the main stages consisting of needs analysis, design, testing, and evaluation. The system designed successfully runs well and can provide recommendations on the selection of thesis topics. This recommendation is expected to provide an overview of the strength of competencies that are superior to students what have relevance to the cluster of the thesis main topics.
Keywords: competence, final project, SMART, thesis
PermaLink
| Plain Format
| Corresponding Author (Muhammad Ali Ramdhani)
|
476 |
Computer Science |
ABS-335 |
Mapping Landslide Prone Areas Using Geographic Information Systems with Polygon Thiessen Method Kristoko Hartomo, Bambang Ismanto, Agus Nugraha, Sri Yulianto, Dhimas Affan
Information Technology Faculty, Satya Wacana Christian University, Jalan Diponegoro 52-60, Salatiga, Indonesia
Abstract
Landslides are an activity of the process of disturbance of balance which causes the movement of the soil and rocks from higher ground to lower ground. Boyolali District is one of 35 cities / regencies that have a high level of vulnerability to the occurrence of landslides. In this research, the mapping of landslide-prone areas using landslide-causing parameters such as thiessen rainfall, soil type, drainage, slope, and land cover. From these parameters will be processed and analyzed by using the scoring method, where scoring is a calculation system that can be used as a control system and problem solving that can be used to detect landslide areas in Boyolali District. In the process of analysis is done by using the features of spatial analysis tools in the form of Overlay software Qgis and R Studio. Then we will get the result of the map of landslide vulnerability level that has 3 classes of vulnerability, including low vulnerability class, medium vulnerability class, and high vulnerability class.
Keywords: Landslides; mapping, thiessen, spatial
PermaLink
| Plain Format
| Corresponding Author (kristoko hartomo)
|
477 |
Computer Science |
ABS-337 |
Circle Hough Transform (CHT) Method Applied to Coin Identifier and Recognition Based on Computer Vision and Android Developer Moechammad Sarosa, Nailul Muna, Erfan Rohadi, Mochammad Junus, Awan Setiawan, Izzil Muhiqqin
State Polytechnic of Malang, Soekarno-Hatta Street No. 9, Malang 65141, Indonesia
Abstract
Coin recognition system is a very important role in currency processing systems, which is aims to minimize human miscalculation and time to calculate coin values. Coin identifier and recognition to calculate the value of Indonesian coins based on android developer presented in this paper. There are two coin parameters used for coin recognition including radius and color of the coins. Circle Hough Transform (CHT) is used to calculate radius parameters, based on android developer and computer vision. After the radius value is obtained, the average RGB value of the coins is detected to determine the color parameters. By calculating the diameter and knowing the color, the coins can be recognized and the total value of the coins in the input image can be known. The experimental results show that the system has been obtained indicate that the system successfully recognizes coins based on determined algorithm. That is mean the application using computer vision can recognition coin and count the value of coins.
Keywords: Coin identifier and recognition, Circle Hough Transform (CHT), Calculate value
PermaLink
| Plain Format
| Corresponding Author (Nailul Muna)
|
478 |
Computer Science |
ABS-82 |
Expected Likelihood based Inquery for Active Learning of Gaussian Mixture Models Classifiers Bambang Heru Iswanto
Department of Physics, Universitas Negeri Jakarta, Jakarta 13220, Indonesia
Abstract
In the supervised machine learning framework sufficient labeled data are needed to achieve satisfying performance. In many domains, however, the labeled data are often expensive to obtain and requires laborious human effort. In this paper, we propose a query technique by introduce the expected log-likelihood as a criterion to minimize the training data in active machine learning framework. In this scenario, the expected log-likelihood is calculated for all unlabeled data points then an instant with highest value is chosen to be labeled. Some experiments were conducted to test the effectiveness of the method using the Gaussian mixture model classifiers with different number of kernels for each class. The method was applied on a training and test data set generated from the two normal distributions with the same proportion for each class. The result of the experiments using the proposed method show a significant reducing of the labeled data compared with the passive learning method. On the data set, the passive learning reached an error rate of 4.50% after 81 queries, meanwhile the same error was reached after 36 queries by the active learning technique or 1,25 times faster than passive learning.
Keywords: supervised learning, active learning, Gaussian mixture models, log-likelihood, classification
PermaLink
| Plain Format
| Corresponding Author (BAMBANG HERU ISWANTO)
|
479 |
Computer Science |
ABS-83 |
Revealing Student Satisfaction related to Academic Information Services using the Kano Model Rinda Cahyana
Informatic Departement, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu 1, Garut, 44151, Indonesia
Abstract
Information technology is one of the campus facilities. The information system department periodically evaluates its utilization by measuring user satisfaction. This study uses the Kano model to describe student satisfaction related to the utilization and improvement of academic information, as well as its services and information technology platforms. Representation of Kano quality categories generated by this study shows that the availability of conventional academic information and services affects the increase in student satisfaction. The existence of a platform that provides self-service practices without space and time constraints can further enhance student satisfaction.
Keywords: Academic Information; Campus Information System; Information Technology Services; User Satisfaction
PermaLink
| Plain Format
| Corresponding Author (Rinda Cahyana)
|
480 |
Computer Science |
ABS-339 |
Study On The Utilization of Leveled Fuzzy Logic for More Precision Results Jamaaluddin Jamaaluddin; Emy Rosnawati
Universitas Muhammadiyah Sidoarjo
Abstract
The use of Fuzzy logic in the forecasting process, problem analysis and decision making of a process are often used. The development of this fuzzy logic by widening the foot of the membership function as interval fuzzy type 2, fuzzy signature or carried out hybrid between fuzzy logic and other artificial intelligence systems or hybrid algorithm has also got quite good results. At this time, a multilevel fuzzy logic method is proposed. This multilevel Fuzzy Logic is interesting behind the input of a process in fuzzy logic which is the output of the previous fuzzy logic or the output of a fuzzy logic analysis is input into the next stage of fuzzy logic. This multilevel fuzzy logic can be done up to several levels of depth according to the variables to be analyzed. If the final analysis has the equation X(i) + Y(i) = Z(i), then the value of X (i) can be the result of Z(i-1), where Z(i-1) is the result of the Fuzzy Logic X(i-1) + Y(i-1), by performing multilevel fuzzy Logic is expected to have the value of forecasting errors or problem analysis and decision making will be better and more precise.
Keywords: Fuzzy Logic, Multilevel Fuzzy Logic, Interval Fuzzy Type-2
PermaLink
| Plain Format
| Corresponding Author (jamaaluddin jamaaluddin)
|
Page 16 (data 451 to 480 of 1039) | Displayed ini 30 data/page << PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 NEXT >>
|