{"title":"Macroscopic Wood Blurred Image Analysis to Determine The Factors of Causing Blur","authors":"D. T. Barus, P. H. Gunawan, E. Prakasa","doi":"10.1109/ICoICT49345.2020.9166205","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166205","url":null,"abstract":"This paper presents an analysis of what factors cause blur on an image, especially macroscopic images of wood. The image is divided into 6x6 sub-images (blocks), which will then be determined factors causing blur based on patterns and variations of Laplacian calculated from each block. Validation is conducted using two different datasets. The first dataset is Wood Species Dataset that is given a median blur, and testing is performed to validate the proposed algorithm. The second dataset is a dataset collected directly using a smartphone camera, and testing is carried out to determine what factors influence the occurrence of blur in wood macroscopic images. The test results show the proposed algorithm produces a pattern that can determine the factors causing blur.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile-Based Hospital Recommendation According To Patient Needs Using SAW Method (Case Study: Banda Aceh)","authors":"Raedi Alwafi Isril, D. Junaedi, A. Herdiani","doi":"10.1109/ICoICT49345.2020.9166365","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166365","url":null,"abstract":"To get the appropriate treatment, there are still obstacles in determining which hospital should be chosen, because it often does not suit the needs/conditions of the patient. Also, more time is needed to determine the hospital. So, a tool is needed to choose a hospital by considering the patient’s needs and speeding up the process of determining the destination hospital. Several criteria are taken into consideration in choosing a hospital, namely: facilities, insurance, fees, availability of specialist doctors and distance. Simple Additive Weighting is used because it can make recommendations from several criteria and has a faster processing time than other methods. This system is built on a mobile basis because most people already have a smartphone, in addition to getting information on the value of the distance from the user’s location to the hospital. Based on the results of testing, the average time needed by the system to produce hospital recommendations is 28.99 seconds. Based on the comparison of recommendations from experts and systems for 51 test cases, the similarity level was 88.24%. With these results, the system managed to provide hospital recommendations based on patient needs.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeyhan Aliyah, R. M. R. Pambudhi, Abdan Hafidh Ahnafi, H. Nuha, Sidik Prabowo
{"title":"Comparison of Earliest Deadline First and Rate Monotonic Scheduling in Polling Server","authors":"Zeyhan Aliyah, R. M. R. Pambudhi, Abdan Hafidh Ahnafi, H. Nuha, Sidik Prabowo","doi":"10.1109/ICoICT49345.2020.9166334","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166334","url":null,"abstract":"Scheduling is an activity to complete the process on a real-time system. In this project, an analysis aimed to evaluate the scheduling of EDF and RMS algorithms in the case of a polling server. A number of comparisons were made to evaluate which algorithm was better for real-time scheduling as seen from the average of the Turn Around Time (TAT), Waiting Time (WT), and Utilization. From the experiments carried out, EDF produced an average of TAT values at a faster time compared to RMS. In other words, the scheduling of EDF will work faster than RMS. Meanwhile, the utilization value of the two algorithms produced the same results.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implicit Aspect Extraction in Product Reviews Using FIN Algorithm","authors":"Diah Hevyka Maylawati, W. Maharani, I. Asror","doi":"10.1109/ICoICT49345.2020.9166296","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166296","url":null,"abstract":"Online transactions are growing very rapidly right now. Every online transaction is often accompanied by a review. Product reviews from buyers can be used by sellers as feedback. Product reviews provide information as a consideration for decision making for potential buyers to find out the strengths and weaknesses of the product. Identifying specific product features from reviews written by buyers becomes a solution to make it easier to find information. Aspect-based extraction in sentiment analysis is divided into two, explicit aspects and implicit aspects. The explicit aspect is the explicit aspect in the sentence while the implicit aspect is the aspect that is implied in the sentence. The extraction carried out in this study is based on implicit aspects to determine its features because the majority of existing studies extract explicit aspects. Implicit extraction aspects of product reviews using the FIN algorithm in association rule mining. The dataset is in English text where to extract features using TF-IDF and select features using Particle Swarm optimization. Selected features are grouped using k-Means. After features are grouped based on their value, an associative rule is made using the FIN algorithm. The minimum support value applied and the number of sentence variations cause the accuracy value obtained by 0.678.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127271391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimization Model of Vertical Evacuation Scenario on Tsunami Disaster Mitigation","authors":"R. D. Prayogo, N. Ikhsan","doi":"10.1109/ICoICT49345.2020.9166429","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166429","url":null,"abstract":"This paper proposes an optimization model to determine the best scenario of tsunami vertical evacuation. The purpose of this study is to mitigate the number of victims in evacuation zones within the available time before tsunami waves reach the coast. The tsunami is wave propagation at high speed as an impact after the earthquakes occurred under the sea. The population in the coastal areas are at risk from tsunami impact. In this study, Padang City is chosen as a case study. In the evacuation plan, the refugees are evacuated to the vertical evacuation structures that have enough height to raise refugees higher than the level of tsunami tide. An optimization model is formulated with linear programming using Matlab, by the objective function is to minimize the evacuation time with the constraints of the estimated time of tsunami arrival, the capacity of each vertical evacuation structures, and the number of refugees. The simulation results show that all refugees are successfully evacuated according to the proportions within available evacuation time. The results of this study can be implemented to support the tsunami disaster mitigation by the Government in Padang City.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeremiah Hasudungan Sihombing, K. A. Laksitowening, Eko Darwiyanto
{"title":"Personalized E-Learning Content Based On Felder-Silverman Learning Style Model","authors":"Jeremiah Hasudungan Sihombing, K. A. Laksitowening, Eko Darwiyanto","doi":"10.1109/ICoICT49345.2020.9166452","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166452","url":null,"abstract":"A Personalization of E-learning can be done by personalize E-learning features, which are learning content and learning activities provided. In this study, E-learning content personalization was carried out based on the Felder Silverman Learning Style Model (FSLSM). FSLSM is a method of classifying learning styles into 4 dimensions, namely perception, processing, input and understanding. FSLSM classifies learning styles using the Index of Learning Styles (ILS) questionnaire, consisting of 44 questions. In the system that was built, the ILS questionnaire was digitized to map E-learning users, based on their learning style. Afterwards, content personalization algorithms were designed, so users could access content that were suitable to their learning styles while using the system, after that learning content was designed for each dimension of the FSLSM with ADDIE modelling, which was the stage for creating E-learning content. To test the designed algorithm, Delphi method was used, which is a method that collects expert opinion on a problem. For system test, System Usability Scale (SUS) method was used to measure acceptance of user. The results of this research, getting agreement on the accuracy of the design of content personalization algorithms from 3 E-learning experts, the system that was built got SUS 75.33 which was acceptable with grade B, means the system was accepted as a learning tools to help them in learning process based on SUS assessment.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Exploratory of Temporal Sampling Forest in Forest Fire Regression and Classification","authors":"Yee Jian Chew, S. Ooi, Y. Pang","doi":"10.1109/ICoICT49345.2020.9166231","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166231","url":null,"abstract":"Temporal Sampling Forest (TS-F) has been devoted to tackle the sequential data classification problem. It extends the robustness of random forest (RF) in handling the sequential data classification. However, it has not been used in the area of forest fire detection. Forest fire can be seen as a temporal phenomenon where it does not form in one day, but subsequently occurred due to the sequential changes of climates, human factors, and other affecting factors. Therefore, this paper is aim to tackle the data of forest fire from two perspectives, which are regression analysis and classification problem by using TS-F. The root mean square error (RMSE) obtained for regression analysis in the 1st dataset is 61.35 while the classification accuracy of the 2nd dataset is 84.18 %.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Concave n-Square Salient Wood Image-based Quality Assessment","authors":"Risnandar, E. Prakasa, I. M. Erwin","doi":"10.1109/ICoICT49345.2020.9166302","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166302","url":null,"abstract":"We make an offer of a state-of-the-art method of the deep salient wood image-based quality assessment (DS-WIQA) for no-reference image appraisal. We explore a five-layer deep convolutional neural network (DCNN) for the salient wood image map. The DS-WIQA uses the concave n-square method. The outcomes allow that DS-WIQA model has a greater achievement on Zenodo and Lignoindo datasets, respectively. We appraise a salient wood image map by extracting in small wood image patches. The DS-WIQA has an admirable performance of other recent methods on Zenodo and Lignoindo datasets, respectively. DS-WIQA outdoes other recent techniques by 14.29% and 19.96% more advanced than other techniques with respect to SROCC and LCC measurement, respectively. DS-WIQA shows up to be more significant than the other DCNN methods.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Programming of Churn Prediction Using Gaussian Naïve Bayes","authors":"D. T. Barus, R. Elfarizy, F. Masri, P. H. Gunawan","doi":"10.1109/ICoICT49345.2020.9166319","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166319","url":null,"abstract":"This paper presents churn predictions with the Gaussian Naïve Bayes method. Churn prediction is a forecasting method to predict customer decisions in a company’s service or product (churn). With high public enthusiasm and an increasing number of customers in the Big Data era, a fast computing process is needed to predict churn as quickly as possible. In this paper, computing is accelerated by the OpenMP platform parallel algorithm. Churn prediction experiments are performed with different amounts of test data, ranging from 100, 300, 500, 700, to 900 data. The results obtained show that implementing OpenMP in predicting churn is faster than serial processing. The obtained speedup and efficiency reached more than 1.49 and 37%, even for test data of 300 and 500, based on the tests, the speedup and efficiency reached 1.99 and 50%.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Object Security towards On-off Attack Using Trustworthiness Management","authors":"A. Nasution, V. Suryani, Aulia Arif Wardana","doi":"10.1109/ICoICT49345.2020.9166169","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166169","url":null,"abstract":"Internet of Things (IoT) can create the world with the integration of the physical things with the seamlessly network of information purposely to give a sophisticated and smart service for human life. A variety of threats and attacks to IoT object, however, can lead to the misuse of data or information to the IoT objects. One of the attacks is On-off Attack in which the attacker acts not only as an object with a good manner by sending the valid trust value but also sometimes as a bad object by sending invalid one. To respond this action, there is a need for the object security to such attacks. Here the writer used the Trustworthiness Management as a method to cope with this attack. Trustworthiness Management can use the aspect of trust value security as a reference for detecting an attack to the object. In addition, with the support of security system using the authentication provided by MQTT, it is expected that it can provide an additional security. The approach used in this research was the test on On-Off Attack detection directly to the object connected to the network. The results of the test were then displayed on the webpage made using PHP and MySQL database as the storage of the values sent by the object to the server. The test on the On-off Attack detection was successfully conducted with the success level of 100% and the execution to detection took 0.5518318 seconds. This then showed that Trustworthiness Management can be used as one of the methods to cope with On-off Attack.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}