AASEC 2019
Conference Management System
Main Site
Submission Guide
Register
Login
Participant List
Abstract List
Access Mode
Contact
:: Abstract List ::

Page 16 (data 451 to 480 of 1039) | Displayed ini 30 data/page
<< PREV 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 NEXT >>

451 Computer Science ABS-32

Simple Computer Technology for Nationality Character Song Teaching in Elementary School
Prana Dwija Iswara (a*), J. Julia (a), Sandie Gunara (b), Tedi Supriyadi (c)

a) PGSD, Universitas Pendidikan Indonesia
Jalan Mayor Abdurahman No. 211, Sumedang, Indonesia
*iswara[at]upi.edu
b) Music Edication, Universitas Pendidikan Indonesia
Jalan Dr. Setiabudhi No. 229, Bandung, Indonesia
c) PGSD Penjas, Universitas Pendidikan Indonesia
Jalan Mayor Abdurahman No. 211, Sumedang, Indonesia


Abstract

Some of the Indonesian people who struck by the crisis of national character must get proper handling. Some of these national crises lead to acts of global terrorism. One effort to deal with the national character crisis, especially at the level of elementary school students, is to teach songs with national character. In the period of 2017 until the beginning of 2019 the learning of songs with national character was held as part of the national character campaign. The study found a number of simple computer technology instruments that can be used in learning songs in the classroom. Several technology package options can be used. In this study also found a number of procedures that must be prepared by teachers in learning songs with simple technology in class. However, if the teacher is not good enough in teaching learning material, those simple technology can become less effective.

Keywords: computer technology; national character building; song; lyrics; elementary school

PermaLink | Plain Format | Corresponding Author (Prana Dwija Iswara)


452 Computer Science ABS-291

Comparison Weighted Product, Analytical Hierarchy Process, Simple Additive Weighting and TOPSIS for selecting Multiple Intelligences on children
Moh Ahsan (a*), Meme Susilowati (b), Abdul Aziz (a)

a) Informatics Study Program, Fakulty of Science and Technology, Universitas Kanjuruhan Malang, Jl. S. Supriadi, No. 48 Malang Jawa Timur 65148, Indonesia. *ahsan[at]unikama.ac.id
b) Program Studi Sistem Informasi, Fakultas Sain dan Teknologi, Universitas Ma Chung Malang, Jl. Villa Puncak Tidar Blok N No. 1, Dau, Malang, Jawa Timur 65151
Jawa Timur 65151


Abstract

Multiple intelligence is intelligence possessed by every human, among these intelligences are linguistic intelligence, musical intelligence, naturalist intelligence, visual-spatial intelligence, logic-mathematical intelligence, interpersonal intelligence, intrapersonal intelligence, and kinaesthetic intelligence. Various ways are carried out by researchers to find out intelligence such as through numbers, pictures, music, words, physical and social-emotional activities. The purpose of this study is to develop a decision support system to determine intelligence on children by using the Weighted Product method, Analytical Hierarchy Process, Simple Additive Weighting and TOPSIS. Comparison of the four methods used to find the best results among the methods used in determining childrens intelligence. The Weighted Product method has the highest preference value of 0.176400366 namely Kinaesthetic Intelligence, Analytical Hierarchy Process Method has the highest preference value 0.690048152 Kinaesthetic Intelligence, Simple Additive Weighting Method has the highest preference value 0.890555556 Kinaesthetic Intelligence and TOPSIS method has the highest value 0.134598738 namely Musical Intelligence. To evaluate the suitability of the right decisions in determining intelligence, the results of these methods are compared with the results of the decisions of a psychologist to produce a valid decision. The results show that the four methods that have been compared and the results of experiments validated by experts show that the intelligence suitability of children with the Weighted Product method, Analytical Hierarchy Process, Simple Additive Weighting has the right preference value with the highest value of each result obtained. It can be concluded that the decision of the decision support system is valid and successful represents expert judgment

Keywords: Multiple Intelligence; decision support system; children

PermaLink | Plain Format | Corresponding Author (Moh Ahsan)


453 Computer Science ABS-803

THE USE OF NAÏVE BAYES CLASSIFIER ALGORITHM TO DETECT CUSTOMERS INTERESTS IN BUYING INTERNET TOKEN
Dedy Rahman Prehanto, Aries Dwi Indriyanti, I Kadek Dwi Nuryana, Ahmad Syahrul Mubarok

Universitas Negeri Surabaya


Abstract

Determining possible technology used in calculating customer buying interest is important for the company as it relates to marketing strategies and policies. The Naïve Bayes Classifier is a possible method to measure customer buying interest. This study aims to analyze the accuracy of this method in calculating customer buying interest of internet token. Data were obtained from past sales and then analyzed using the Naïve Bayes Classifier to predict future opportunities by defining the class of attributes. The classifications used were operator, internet quota, token active period, and product price. This study found that the Naïve Bayes Classifier was provably accurate in calculating customer buying interest as well as comparing the prediction with actual results aside the data training. Results showed that this method successfully classifies 10 products of 858 transactions as data training and 10 products of 115 transactions as data test. Here indicates that all data test and data training analysis showed eight of the tenth meaning that eight of ten predictions were correct or it had 80% accuracy. This study is expected becoming a reference in analyzing data sales and predicting future sales conditions, so it will help to determine appropriate strategy of product development.

Keywords: naïve bayes classifier, internet token sales

PermaLink | Plain Format | Corresponding Author (Dedy Rahman Prehanto)


454 Computer Science ABS-1062

DEVELOPMENT OF ACCOUNTING LEARNING MODULE USING SAINTIFIC APPROACH THROUGH INTERACTIVE VIDEO
Lilik Sri Hariani (1), Rusno (2)

Economic Education Study Program, Universitas Kanjuruhan Malang


Abstract

This is a research development of accounting learning modules on financial reporting material using a scientific approach through interactive videos. The purpose of this study is to produce an accounting learning module that can be used to support learning activities. The procedure of development research applied in this study uses steps: (1) potential and problems; (2) data collection; (3) product design; (4) design validation; (5) design revisions; (6) product testing; (7) product revisions; and (8) testing the use of learning modules. The subjects of this study were 35 students of Kanjuruhan University management students. Data collection techniques used in this study were observation, interviews, and questionnaires. The results of the feasibility obtained for the validation of the learning module are included in very valid criteria or can be used to support accounting learning activities. The results of the effectiveness of the learning modules obtained through competency tests are obtained from the average value of students included in the good category

Keywords: module development, scientific, interactive video

PermaLink | Plain Format | Corresponding Author (Lilik Sri Hariani)


455 Computer Science ABS-40

A Proposed Framework in an Intelligent Recommender System for the College Student
Dede Kurniadi (a,b*), Edi Abdurachman (a), Harco Leslie Hendric Spits Warnars (a), Wayan Suparta (a)

a) Department of Computer Science, Graduate Program Doctor of Computer Science, Bina Nusantara University, Jakarta, Indonesia
*dede.kurniadi[at]binus.ac.id
b) Department of Informatics, Sekolah Tinggi Teknologi Garut, Garut, Indonesia


Abstract

This article aims to proposed framework an intelligent recommender system (IRS) for students in higher education institutions. This conceptual framework includes problems in predicting student performance, the possibility of graduating on time, and recommends choosing subjects according to performance, and career interests, which are useful for assisting pedagogical interventions in future student development. The success in the development and implementation of the proposed IRS framework is inseparable from using data mining and machine learning techniques in predicting and providing recommendations. Data analysis consisted of clustering techniques, association rules, and classification using support vector machine (SVM), Naïve Bayes, and k-Nearest Neighbor (k-NN). These techniques are used to solve problems related to students and to provide appropriate recommendations. The result is an IRS conceptual framework for the college student that can be used as smart agents to provide student guidance and suggestions to support the process of education in higher education.

Keywords: framework; recommender system; prediction; student problem

PermaLink | Plain Format | Corresponding Author (Dede Kurniadi)


456 Computer Science ABS-1064

GOST Enhancement Key Processing with Triple Transposition Key
Robbi Rahim, Suprianto, Mochammad Tanzil Multazam,

Universiti Malaysia Perlis,
Universitas Muhammadiyah Sidoarjo


Abstract

The GOST algorithm is an algorithm that has good encryption and decryption speeds because the encryption and decryption process is simple with the use of keys that are not too good. Security in cryptographic ciphertext results is one of the factors that depends on the use of a good key too, one of the techniques that can be used is the Triple Transposition Key that processes keys as much as 3 x rounds with the transposition function. The Triple Transposition Key and GOST algorithms are combined during the key formation process so that the key obtained from the process of using the Triple Transposition Key algorithm is quite strong and minimizes the brute force attack. The use of the Triple Transposition Key algorithm on GOST can be used as an alternative to increase security on the key so that it does not have to have a combination of 2 or more algorithms that will only consume process resources and also do not significantly affect the speed of encryption and decryption.

Keywords: GOST algorithms, Triple Transposition Key, cryptographic ciphertext

PermaLink | Plain Format | Corresponding Author (Mochammad Tanzil Multazam)


457 Computer Science ABS-553

Combination Base64 and GOST Algorithm for Security Process
Robbi Rahim(a)*, Sumarno(b), Mochammad Tanzil Multazam(b), Suyono Thamrin(c), Siswo Hadi Sumantri(c)

1. School of Computer and Communication Engineering, Universiti Malaysia Perlis, Arau, Malaysia
2. Universitas Muhammadiyah Sidoarjo, Sidoarjo, Indonesia
3. Indonesia Defense University, Indonesia


Abstract

Cryptography in various communications both online and offline is very necessary and generally cryptography is used to secure data in the form of text while non-text data requires special algorithms. Base64 is an encoding algorithm that can convert non-text data into binary data so that the data can be secured with cryptographic algorithms such as the GOST algorithm. The combination of the BASE64 and GOST algorithms is expected to be able to secure all types of data that exist and have the ease of returning to their original form without damaging the original data, besides this combination will increase data security because the combination of these two algorithms produces ciphertext that is difficult to know if the process is done cryptanalyst by third parties. The results of the combination of Base64 and GOST algorithms are expected to be able to deliver dynamic security contributions to various existing data objects so that they can be used both online and offline.

Keywords: Base64, Cryptography, Ciphertext, Encoding, GOST

PermaLink | Plain Format | Corresponding Author (Robbi Rahim)


458 Computer Science ABS-810

SIMPLE ADDITIVE WEIGHTING ALGORITHM TO AID THE ADMINISTRATOR DECISION MAKING OF THE UNDERPRIVILAGED SCHOLARSHIP
Aries Dwi Indriyanti, Dedy Rahman Prehanto, I Gusti Lanang Eka Putra Prismana, Soeryanto, Bambang Sujatmiko, Johan Fikandda

Universitas Negeri Surabaya


Abstract

Underprivileged scholarships are assistance provided by the government or institutions to students from poor families. Scholarships can be given to all students at the education level from elementary school to higher education with certain conditions and criteria. However, in reality many scholarships are given that are not on target. This is because of the number of students who register as scholarship recipients. Therefore, it is necessary to have a decision support system in order to aid the selection process. This study aims to find appropriate system to aid the underprivilaged scholarship selection. This study proposed a system which was built using PHP for programming languages and using MySQL as its database using the Simple Additive Weighting (SAW) method. Data is taken from SMK Sultan Agung 1 Jombang. Data is then analyzed and tested using the Blackbox testing method. The results of the study prove that Simple Additive Weighting can be used as a support system to help implement students in prospective scholarship recipients.

Keywords: Decision Support System, Simple Additive Weighting, Scholarship

PermaLink | Plain Format | Corresponding Author (Aries Dwi Indriyanti)


459 Computer Science ABS-812

The Counting Game uses the Fuzzy Tsukamoto Method
Ekojono Ekojono, Rizkyna Cahyaningrum, Kadek Sarjuna Batubulan, Anugrah Nur Rahmanto

Politeknik Negeri Malang


Abstract

Learning to count on elementary school students must be trained in how to memorize, many practice questions are done repeatedly. This counting exercise needs to be stimulated so that students have the motivation to learn, this kind of training is mostly done by the teacher to students by giving questions in turns in one class as if the students are in a game playing condition. Counting exercises can be applied in the form of games with applied counting operations learning to train students to count quickly. The approach with attractive application visualization is expected to be able to help the learning of elementary school level students, especially class 1. Tsukamoto Method, in each rule is represented using a fuzzy set, using a monotonous membership function. To be able to determine the value of crisp output or firm results. By using the Unity 3D game engine that is capable of making 2D games, the Fuzzy Tsukamoto method is used to determine the final game score. Tests that have been done show that the results of the questionnaire that game 2d on the functionality aspect get a result of 3.97 on a scale of 5.

Keywords: game, count Fuzzy Tsukamoto

PermaLink | Plain Format | Corresponding Author (Ekojono .)


460 Computer Science ABS-301

Natural Disaster Topic Selection using Decision Tree Classification
Ade Sutedi

Sekolah Tinggi Teknologi Garut


Abstract

Social media like Twitter used as a reference for popular and trusted news today. This condition caused users shared out the information to another about anything around them. This opportunity could be useful information about natural disasters that occur in certain condition related to their locations. This study aims to select the topic that related to the natural disasters that occur in Indonesia based on Twitter user timeline. The topic will use as a reference to ascertain events, conditions of victims and location, and positions of disaster locations. For the validity of disaster information, the data takes from the official Twitter account of @BNPB_Indonesia and @infoBMKG. The data extracted and divided into two main classes, then grouped into types of disasters and locations, and determine the position of location that can be used as a safe point after disasters. In this, study a decision tree classification was used to assist the topic selection process related to natural disaster events.

Keywords: Social Media, Natural Disaster, Decision Tree, Classification

PermaLink | Plain Format | Corresponding Author (Ade Sutedi)


461 Computer Science ABS-303

ANALYSIS OF CLASSIFICATION ALGORITHM IN PENSION TYPES OF GOVERNMENT EMPLOYEES
Arif Senja Fitrani*, Mochamad Alfan Rosid

Universitas Muhammadiyah Sidoarjo


Abstract

The concept of data mining in its implementation is used in handling and analyzing data in large capacity - steps to extract information and to gain knowledge in supporting decision making. Data mining, in its implementation, can be used in various sectors of data analysis, namely about the condition of the type of pension. The purpose of this study is to provide information, where a civil servant within the retirement limit is taken normally or earlier. The technique of using the classification method, with the decision tree C4.5 (J48), Naive Bayes and k Nearest Neighbor algorithm. Presentation of assets of 1,316 pension data in 2012 and 2013 from Bukopin Bank customers, which are divided into training data by 65% and data testing by 35%. From the testing of three algorithms, the highest classification was produced, namely Naive Bayes with 91%. The results of the three classifications indicate the quality of attribute determination can affect the results. And the predictive level of the three algorithms shows different results. For classification techniques with better results, improvements are needed to determine attributes and develop existing datasets

Keywords: Data Mining;Classification;Pension Data;Algorithm Classification;Classification;Comparative Analysis

PermaLink | Plain Format | Corresponding Author (Arif Senja Fitrani)


462 Computer Science ABS-49

Geographical Information System Of Fire Incidents Data Monitoring
Leni Fitriani (a*), Dewi Tresnawati (a)

a) Department of Informatics, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu no 1, Garut, 44151, INDONESIA
*leni.fitriani[at]sttgarut.ac.id


Abstract

This geographic information system is built as a tool to monitor fire incidents data, taken from the reports of the fire department. In addition to monitoring role, this application can also be used to manage fire incidents data so that it can facilitate firefighters to monitor areas that have high occurance of fires. Therefore, they can prevent fires from occurring. The information system is expected to have benefit in decreasing the rate of fire incidents, mostly by socializing to the publics the prevention of fires in areas where it often occurs. This research was conducted by using the Unified Software Development Process methodology; starting from the analysis model stage, design model, deployment model, implementation model, and testing model. The design model used in this research is Unified Modeling Language which is tested by using the blackbox method. The result of this study is the implementation of geographic information system that can monitor fire incidents data through the location of the incident. Moreover, this system can improve the performance of firefighters in anticipating and preventing the incidents.

Keywords: Fire Incidents; Information; Geographical; Monitoring; System

PermaLink | Plain Format | Corresponding Author (leni fitriani)


463 Computer Science ABS-50

Career Counseling Forum For University
Leni Fitriani (a*), Dede Kurniadi (a)

a) Department of Informatics, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu no 1, Garut, 44151, INDONESIA
*leni.fitriani[at]sttgarut.ac.id


Abstract

One of the many alumni problems that occurs after graduation is a lack of knowledge about working world and careers that they can take. There are still many universities that do not have career counseling for managing their students career. This problem happens because of the lack of students awareness to come to the career center to take part in career counseling. The purpose of this study is to create a student forum that contains career counseling with alumni. This forum is expected to be useful for alumni who need information about the working world. The methodology used in this study is the Unified Software Development Process whose stages are analysis model, design model, implementation model, deployment model, and testing model. Furthermore, it is modeled by using the Unified Modeling Language diagram, in the form of use case diagrams, activities, sequences, and class diagrams. This study took a sample from the Career Development Center of Sekolah Tinggi Teknologi Garut. The result of this study is the existence of a web-based career counseling forum that can help students and alumni interact with each other to share information and knowledge about the working world. Additionally, this career counseling is expected to help students and alumni to better understand their working world.

Keywords: Applications; Counseling; College students; University; Web.

PermaLink | Plain Format | Corresponding Author (leni fitriani)


464 Computer Science ABS-52

The TIGER Society Framework in the scope of Information Technology Infrastructure
Rinda Cahyana

Sekolah Tinggi Teknologi Garut
Jl Mayor Syamsu 1, Garut, 44151, Indonesia


Abstract

The tourism industry activities in the information society are related to interactions between tourism actors and information technology in a variety of services. The TIGER society is centered on the tourism industry business (T) and other accompanying industries (I) with full support from the government (G). Its service quality is influenced by the education process (E) and service development, based on local wisdom in the form of religious values and norms (R). This research aims to create a TIGER society framework in which resources fill the layers of information technology infrastructure. Research provides examples of TIGER society resources using the framework.

Keywords: Information Technology; Resources; Society; Tourism

PermaLink | Plain Format | Corresponding Author (Rinda Cahyana)


465 Computer Science ABS-1079

Designing MOOCS with Virtual Microscopic Simulation (VMS) for Increasing of Student’s Levels of Understanding
Firmanul Catur Wibowo* and Bambang Heru Iswanto**

*Department of Physics Education, Universitas Negeri Jakarta, Jakarta 13220, Indonesia
**Department of Physics, Universitas Negeri Jakarta, Jakarta 13220, Indonesia


Abstract

The purpose of this research is to develop a design for MOOCS with Virtual Microscopic Simulation (VMS) for students levels of understanding. The research method used is the Embedded Experiment Design with the research subjects as many as 45 students’ in one of campus in Banten Province, Indonesia. The results showed that the Level of Comprehensive Understanding (CU) was 76.67%, Level of Understanding of Partial Understanding (PU) was 15.56%, and Level of Misunderstanding (MU) was 5.56%, Level of Not Understand (NU) of 2.22% and the lowest level of No Answered (NA) of 0%. It was concluded that the average level of understanding experienced a significant increase with learning through MOOCS with VMS on the concept of electricity.

Keywords: MOOCS; Virtual Microscopic Simulation (VMS); levels of understanding

PermaLink | Plain Format | Corresponding Author (BAMBANG HERU ISWANTO)


466 Computer Science ABS-568

Comparative Analysis of Decision Tree Algorithms: Random Forest and C45 for Airlines Customer Satisfaction Classification
Wiyoga Baswardono (a*), Dede Kurniadi (a), Asri Mulyani (a), Dudy Mohammad Arifin (b)

a) Department of Informatics, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia
*wiyoga.b[at]sttgarut.ac.id
b) Department of Industrial Engineering, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia


Abstract

This article aims to a comparative analysis of decision tree algorithms between random forest and c45 for airlines customer satisfaction classification. The comparative study predicts both algorithms have better accuracy, precision, recall AUC (area under the curve) for analyzing data set of customer satisfaction on airlines, which are useful for later if have some same kind set of data set and problem. In this particular comparative analysis, first, need to select the dataset and transform so it can be used for data mining technique classification after choosing the algorithm to analyze the data set. The analyzing of the dataset it will through validation, testing and also result for each algorithm used. Then will compare the result from each algorithm, to determine which algorithm are best to use in this particular dataset or problem for customer satisfaction for airlines. The results of the comparative analysis are the best alternative algorithm choice for use in airline customer satisfaction classifications.

Keywords: comparative analysis; classification; algorithm; deccision tree; customer satisfaction

PermaLink | Plain Format | Corresponding Author (Wiyoga Baswardono)


467 Computer Science ABS-58

Classification of Sundanese Language Used in Social Media: Case Studies on Twitter Users
Ade Sutedi

Sekolah Tinggi Teknologi Garut


Abstract

Language is an element of culture in every nation. The contributions to maintaining this element are to be a good and consistent speaker in daily conversations. Along with the history of the Sundanese tradition, language has an important role to show the existence of Sundanese culture, especially in Banten and West Java. Today, the use of Sundanese language become less frequent due to a competition of regional languages with national languages even with foreign languages. This issue becomes popular in the last decade due to the death of a language issue. The existence of Sundanese language will reflect the strength of the mother tongue uses that becomes characteristic of a region culture, especially for Sundanese language. The objectives of this study are: (1) to classify the Sundanese and not Sundanese language that usually used in social media; (2) to analyze the sentiment of the vocabulary that used in Sundanese language. Classification process takes several types of words from Sundanese vocabulary which divided into three levels: Loma (Ribaldry level), Hormat ka sorangan (Standard level), and Hormat ka batur (Polite level). This process will evaluate the existence of Sundanese language used by users in social media. In this research, the data was taken randomly from Twitter users based on their area, especially in Banten and West Java Provinces.

Keywords: Classification, Sundanese, Death of Language, Social Media, Twitter.

PermaLink | Plain Format | Corresponding Author (Ade Sutedi)


468 Computer Science ABS-826

Improving Second Grade Elementary Students’ Writing and Storytelling Skills Through Digital Literacy
Azizah Zahra Jenar Suwarni, Rahman, Prana Dwija Iswara

Universitas Pendidikan Indonesia


Abstract

The aims of this study was to improve writing and storytelling skills of second grade elementary school students. Through digital literacy, students can have a meaningful experience when they learn to make and tell a story they have made. Students will be able to explore their competences while using a lot of audiovisual media for finishing writing and storytelling assignment. This research conducted with a qualitative research design by using observation and students’ assessment as research instruments. Based on the findings, a conclusion can be drawn that digital literacy is able to improving second grade students’ writing and storytelling skills

Keywords: digital literacy, elementary student, writing skills, storytelling skills

PermaLink | Plain Format | Corresponding Author (Azizah Zahra Jenar Suwarni)


469 Computer Science ABS-573

Design of Human Resource Information System for Micro Small and Medium Enterprises
Wiyoga Baswardono (*), Asri Mulyani, Dede Kurniadi, Yosep Septiana

Department of Informatics, Sekolah Tinggi Teknologi Garut, Jalan Mayor Syamsu 1, Garut, Indonesia
*wiyoga.b[at]sttgarut.ac.id


Abstract

The articles aim to analyze and design of human resource information system (HRIS) for micro small and medium enterprises in Indonesia. The problem some times occurred happen in human resource when business starts to grow. To solve this start with analyzing and design in this HRIS system using RUP (Rational Unified Process) to handle a problem such as attendance, payroll, manage employee and other Human resource problem in the scope of small or medium business. The result is a design of HRIS that can be a start for a blueprint and can be implemented for micro small and medium enterprises with condition and regulation that fit in Indonesia.

Keywords: information system; HRIS; design system; enterprise system

PermaLink | Plain Format | Corresponding Author (Wiyoga Baswardono)


470 Computer Science ABS-66

Lecturing Simulation Game using Decision Tree Algorithm
W B Zulfikar, D R Ramdania, A Afif, W Uriawan

Department of Informatics, UIN Sunan Gunung Djati, Jl. A.H. Nasution No.105 Bandung, Indonesia


Abstract

Nowadays, students is one big assets of a university. A Student must be assign to several lecturing process for example study plan, lecturing, mid test, final test, etc. Therefore, some student especially new entry student did not understand whom the primary and secondary flow of lecturing and it terms. There is many ways to explain about lecturing plot into student, like put it on academic guide book, inform in official website, social media, and so on. Unfortunatelly, most of studends are not awared it. The purpose of this work is to create a lecturing simulation game to interest student in order to understanding lecturing process. In this work we implement decision tree algorithm on storyline to make a conclusion in the game. In limited test we ask several student to play this simulation game. The result, 80% of student get more knowledge about lecturing process.

Keywords: Simulation Game, Lecturing, Decision Tree

PermaLink | Plain Format | Corresponding Author (Wildan Budiawan Zulfikar)


471 Computer Science ABS-322

Framework Indeks security information to support evaluation, adoption and improvement of methods in developing variables
Faiz M Kaffah(1*) Cepy Slamet(1) Aedah Bt. Abdul Rahman(2) Khaerul Manaf (3) Beki Subaeki (3)

(1) Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
(2) School of ICT Asian E-University Kuala Lumpur, Malaysia
(3) Department of Information System Sangga Buana YPKP University Bandung, Indonesia


Abstract

The governance of information security in the Indonesian Government has not been completely improved. Many related variables components are not measured. This study aims to observe an evaluation for application of information security index framework in Indonesian government institutions as the implementation of electronic government. The analysis is carried out by adopting an information security index framework produced in the rank of e-government. The study uses a triangulation approach within a mixed method. This study results in a novel adoption model of information security index framework equipped by two new variables. Therefore, a proper policy of the Indonesian government is required for its implementation.

Keywords: Security information, e-goverment, framework

PermaLink | Plain Format | Corresponding Author (faiz muqorrir kaffah)


472 Computer Science ABS-834

DESIGN AND IMPLEMENTATION OF KEYCODE ENCRYPTION FOR ELECTRIC DOOR LOCK EMBEDDED SYSTEM USING RSA AND AES
Yuri Ariyanto, Kadek Suarjuna Batubulan, Deddy Kusbianto Purwoko A, Nugroho Ardi Sutrisno

State Polytechnic of Malang


Abstract

In this digital era the usage of locks are no longer only relies on traditional key systems, but also relies on usage of electronic sensors that can improve security system. Raspberry pi is a mini computer that can be used for various needs. In this research utilizing a raspberry pi and a servo motor as a locking device, a web server as a data storage center, a mobile device software aplication as a user interface.The password will be sent over internet from mobile device to web server and raspberry pi will give a command to the servo to unlock and lock. Now the threat to keyless locking system does not only come from physical sources but also come from non-physical or digital sources. This treat can be prevented by using cryptography to hide digital data in the system. This study will compare between combination of RSA, 3DES, AES 128 bit, and 256bit AES algorithms to obtain an algorithm that could be operated optimally on the system based on encryption and decryption speed. The final result of this study is a method to implement cryptographic algorithms on smart key systems to obtain better security.

Keywords: Raspberry Pi, Cryptography, AES, RSA, Security, IoT

PermaLink | Plain Format | Corresponding Author (Yuri Ariyanto)


473 Computer Science ABS-1091

Implementation of Advanced Encryption Standard for File Security in Stego-Object
Sy. Yuliani(1,2), Aldy Rialdy Atmadja(1,*), Y S Nurjanah(1), Deny Fauzy(1), Rio Guntur Utomo(1)

1Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
2Faculty of Information and Technology, Universiti Teknikal Malaysia Melaka, Malaysia


Abstract

Security issues and data confidentiality are very important in the digital and internet era today. Important files circulating on the internet, both in the form of documents, images, and videos need to be supported with good security. This article aims to secure files by utilizing steganography technology, both in encryption and decryption of the file. The method used is the Advanced Encryption Standard (AES) which is applied to Stego-Object. Experiments are done on document files with extensions .doc, .xlsx, .pdf, and .txt, also on image files with extensions .jpeg, .png, and .bitmap. The experimental results show that AES can encrypt and decrypt quite effectively without changing the quality of files both images and documents. This research can develop for video files.

Keywords: Security, Encryption, Advanced Encryption Standard, document

PermaLink | Plain Format | Corresponding Author (Aldy Rialdy Atmadja)


474 Computer Science ABS-69

COMPARISON OF ALGORITHM SUPPORT VECTOR MACHINE AND C4.5 FOR IDENTIFICATION OF PEST AND DISEASE ON CHILI PLANTS
Mohamad Irfan, Nur Lukman, Abdul Aziz Alfauzi, Jumadi

Departement of Informatics Engineering UIN Sunan Gunung Djati Bandung


Abstract

Data from the Central Bureau of Statistics of the population working in the agricultural sector continued to decline from 39.22 million in 2013 to 38.97 million in 2014, the number dropped back to 37.75 million in 2015. According to the MIT G-Lab Team (global entrepreneurship program) concludes five factors that make it difficult to raise agricultural productivity to compete in the domestic market, namely the low education of farmers in dealing with pests, the difficulty of access to finance for rural areas, lack of skills, lack of access to information and lack of application of agricultural technology. Chili plants are plants that are very susceptible to pests so BPS noted a decrease in chili production reaching 25%. Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. By using each training data and testing data as many as 30 data. The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. The final result of this study was that the accuracy of the C4.5 method was better.

Keywords: Chili pest, algorithm, SVM, C4.5

PermaLink | Plain Format | Corresponding Author (Mohamad Irfan)


475 Computer Science ABS-72

Thesis Topic Recommendation using Simple Multi Attribute Rating Technique
Cepy Slamet (a); Fahmi Mahmud Maliki (a); Undang Syaripudin (a); Abdusy Syakur Amin (b); Muhammad Ali Ramdhani (*, a)

(*) m_ali_ramdhani[at]uinsgd.ac.id
(a) Department of Informatics, UIN Sunan Gunung Djati Bandung, Indonesia
(b) Department of Industrial Engineering, Universitas Pasundan, Indonesia


Abstract

The purpose of this study is to design information systems that can recommend the selection of final project (thesis) topics based on the competencies possessed by students. The analytical model integrated into this system is the Simple Multi Attribute Rating Technique (SMART), with student competency data taken based on the grade score of the subjects relevant to the selection of the final project theme clusters. The design of the information system in this study uses a prototype model, with the main stages consisting of needs analysis, design, testing, and evaluation. The system designed successfully runs well and can provide recommendations on the selection of thesis topics. This recommendation is expected to provide an overview of the strength of competencies that are superior to students what have relevance to the cluster of the thesis main topics.

Keywords: competence, final project, SMART, thesis

PermaLink | Plain Format | Corresponding Author (Muhammad Ali Ramdhani)


476 Computer Science ABS-335

Mapping Landslide Prone Areas Using Geographic Information Systems with Polygon Thiessen Method
Kristoko Hartomo, Bambang Ismanto, Agus Nugraha, Sri Yulianto, Dhimas Affan

Information Technology Faculty, Satya Wacana Christian University, Jalan Diponegoro 52-60, Salatiga, Indonesia


Abstract

Landslides are an activity of the process of disturbance of balance which causes the movement of the soil and rocks from higher ground to lower ground. Boyolali District is one of 35 cities / regencies that have a high level of vulnerability to the occurrence of landslides. In this research, the mapping of landslide-prone areas using landslide-causing parameters such as thiessen rainfall, soil type, drainage, slope, and land cover. From these parameters will be processed and analyzed by using the scoring method, where scoring is a calculation system that can be used as a control system and problem solving that can be used to detect landslide areas in Boyolali District. In the process of analysis is done by using the features of spatial analysis tools in the form of Overlay software Qgis and R Studio. Then we will get the result of the map of landslide vulnerability level that has 3 classes of vulnerability, including low vulnerability class, medium vulnerability class, and high vulnerability class.

Keywords: Landslides; mapping, thiessen, spatial

PermaLink | Plain Format | Corresponding Author (kristoko hartomo)


477 Computer Science ABS-337

Circle Hough Transform (CHT) Method Applied to Coin Identifier and Recognition Based on Computer Vision and Android Developer
Moechammad Sarosa, Nailul Muna, Erfan Rohadi, Mochammad Junus, Awan Setiawan, Izzil Muhiqqin

State Polytechnic of Malang, Soekarno-Hatta Street No. 9, Malang 65141, Indonesia


Abstract

Coin recognition system is a very important role in currency processing systems, which is aims to minimize human miscalculation and time to calculate coin values. Coin identifier and recognition to calculate the value of Indonesian coins based on android developer presented in this paper. There are two coin parameters used for coin recognition including radius and color of the coins. Circle Hough Transform (CHT) is used to calculate radius parameters, based on android developer and computer vision. After the radius value is obtained, the average RGB value of the coins is detected to determine the color parameters. By calculating the diameter and knowing the color, the coins can be recognized and the total value of the coins in the input image can be known. The experimental results show that the system has been obtained indicate that the system successfully recognizes coins based on determined algorithm. That is mean the application using computer vision can recognition coin and count the value of coins.

Keywords: Coin identifier and recognition, Circle Hough Transform (CHT), Calculate value

PermaLink | Plain Format | Corresponding Author (Nailul Muna)


478 Computer Science ABS-82

Expected Likelihood based Inquery for Active Learning of Gaussian Mixture Models Classifiers
Bambang Heru Iswanto

Department of Physics, Universitas Negeri Jakarta, Jakarta 13220, Indonesia


Abstract

In the supervised machine learning framework sufficient labeled data are needed to achieve satisfying performance. In many domains, however, the labeled data are often expensive to obtain and requires laborious human effort. In this paper, we propose a query technique by introduce the expected log-likelihood as a criterion to minimize the training data in active machine learning framework. In this scenario, the expected log-likelihood is calculated for all unlabeled data points then an instant with highest value is chosen to be labeled. Some experiments were conducted to test the effectiveness of the method using the Gaussian mixture model classifiers with different number of kernels for each class. The method was applied on a training and test data set generated from the two normal distributions with the same proportion for each class. The result of the experiments using the proposed method show a significant reducing of the labeled data compared with the passive learning method. On the data set, the passive learning reached an error rate of 4.50% after 81 queries, meanwhile the same error was reached after 36 queries by the active learning technique or 1,25 times faster than passive learning.

Keywords: supervised learning, active learning, Gaussian mixture models, log-likelihood, classification

PermaLink | Plain Format | Corresponding Author (BAMBANG HERU ISWANTO)


479 Computer Science ABS-83

Revealing Student Satisfaction related to Academic Information Services using the Kano Model
Rinda Cahyana

Informatic Departement, Sekolah Tinggi Teknologi Garut
Jl. Mayor Syamsu 1, Garut, 44151, Indonesia


Abstract

Information technology is one of the campus facilities. The information system department periodically evaluates its utilization by measuring user satisfaction. This study uses the Kano model to describe student satisfaction related to the utilization and improvement of academic information, as well as its services and information technology platforms. Representation of Kano quality categories generated by this study shows that the availability of conventional academic information and services affects the increase in student satisfaction. The existence of a platform that provides self-service practices without space and time constraints can further enhance student satisfaction.

Keywords: Academic Information; Campus Information System; Information Technology Services; User Satisfaction

PermaLink | Plain Format | Corresponding Author (Rinda Cahyana)


480 Computer Science ABS-339

Study On The Utilization of Leveled Fuzzy Logic for More Precision Results
Jamaaluddin Jamaaluddin; Emy Rosnawati

Universitas Muhammadiyah Sidoarjo


Abstract

The use of Fuzzy logic in the forecasting process, problem analysis and decision making of a process are often used. The development of this fuzzy logic by widening the foot of the membership function as interval fuzzy type 2, fuzzy signature or carried out hybrid between fuzzy logic and other artificial intelligence systems or hybrid algorithm has also got quite good results. At this time, a multilevel fuzzy logic method is proposed. This multilevel Fuzzy Logic is interesting behind the input of a process in fuzzy logic which is the output of the previous fuzzy logic or the output of a fuzzy logic analysis is input into the next stage of fuzzy logic. This multilevel fuzzy logic can be done up to several levels of depth according to the variables to be analyzed. If the final analysis has the equation X(i) + Y(i) = Z(i), then the value of X (i) can be the result of Z(i-1), where Z(i-1) is the result of the Fuzzy Logic X(i-1) + Y(i-1), by performing multilevel fuzzy Logic is expected to have the value of forecasting errors or problem analysis and decision making will be better and more precise.

Keywords: Fuzzy Logic, Multilevel Fuzzy Logic, Interval Fuzzy Type-2

PermaLink | Plain Format | Corresponding Author (jamaaluddin jamaaluddin)


Page 16 (data 451 to 480 of 1039) | Displayed ini 30 data/page
<< PREV 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 NEXT >>

AASEC 2019 - Conference Management System

Powered By Konfrenzi 1.832K-Build4 © 2025 All Rights Reserved