{"title":"Classification of subjects of Mild Cognitive Impairment and Alzheimer’s Disease through Neuroimaging modalities and Convolutional Neural Networks","authors":"Ahsan Bin Tufail, Yong-Kui Ma, Qiu-Na Zhang","doi":"10.1109/ICoICT49345.2020.9166286","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166286","url":null,"abstract":"Alzheimer’s Disease (AD) is an irreversible neurodegenerative disorder that is affecting the elderly population worldwide. The staggering costs associated with this disease merits further research in the diagnosis and prognosis of this disease. Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET) are widely used modalities to capture the structural changes in the brain caused by AD in its early stages. Early diagnosis of AD is important from clinical perspective to improve the life of an individual who is at the risk of developing memory deficits. Deep learning architectures such as 2D and 3D Convolutional Neural Networks (CNNs) have shown promising performances in extracting features and building useful representations of data for computer vision tasks. This study is geared towards understanding the performance differences between these architectures. We used transfer and non-transfer learning approaches to study the underlying disease phenomenon. In our experiments on binary classification of early stages of AD, we found the performance of 3D architectures to be better in comparison to their 2D counterparts. For instance, the 3D-CNN architecture which is trained on PET modality data achieved an accuracy of 71.728%, specificity of 73.196%, and sensitivity of 70.213% on the AD class while its 2D-CNN counterpart achieved an accuracy of 56.901%, specificity of 59.764%, and sensitivity of 53.947% on the same class. Further, we found the performance of 3D architecture trained on PET neuroimaging modality data to be the best in terms of performance metrics which shows superior diagnostic power of this type of architecture.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Wicaksono, Ghina Arih Juliani, E. Wahyuni, Y. M. Cholily, Hari Windu Asrini, Budiono
{"title":"Analysis of Learning Management System Features based on Indonesian Higher Education National Standards using the Feature-Oriented Domain Analysis","authors":"G. Wicaksono, Ghina Arih Juliani, E. Wahyuni, Y. M. Cholily, Hari Windu Asrini, Budiono","doi":"10.1109/ICoICT49345.2020.9166459","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166459","url":null,"abstract":"Various studies on the Learning Management System (LMS) have not examined the suitability of LMS features with the educational standards applicable in a country/region. This study aims to measure the suitability of LMS features with the National Higher Education Standards/Standar Nasional Pendidikan Tinggi (SN-Dikti) in Indonesia using the Feature-Oriented Domain Analysis (FODA) method. This research identifies explicitly LMS features in the assignment and assessment functions. Besides, this study recommends previous LMS features for future LMS development based on the assessment standards applicable in Indonesia. The results of the analysis in this study found the suitability of the three LMS and recommended LMS features for Lecturer and Student users.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Detected Nutrient Deficiency in Chili Plant","authors":"A. Bahtiar, Pranowo, A. Santoso, Jujuk Juhariah","doi":"10.1109/ICoICT49345.2020.9166224","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166224","url":null,"abstract":"Chili is a staple commodity that also affects the Indonesian economy due to high market demand. Proven in June 2019, chili is a contributor to Indonesia’s inflation of 0.20% from 0.55%. One factor is crop failure due to malnutrition. In this study, the aim is to explore Deep Learning Technology in agriculture to help farmers be able to diagnose their plants, so that their plants are not malnourished. Using the RCNN algorithm as the architecture of this system. Use 270 datasets in 4 categories. The dataset used is primary data with chili samples in Boyolali Regency, Indonesia. The chili we use are curly chili. The results of this study are computers that can recognize nutrient deficiencies in chili plants based on image input received with the greatest testing accuracy of 82.61% and has the best mAP value of 15.57%.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Anonymization Method to Mitigate Identity Attack in Transactional Database Publishing","authors":"Dedi Gunawan","doi":"10.1109/ICoICT49345.2020.9166262","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166262","url":null,"abstract":"Publishing transactional database becomes more recognized for many institutions such as retails and groceries. Many of them share or publish their data to other institutions as an effort to gain more revenue for their business. However, publishing such a database is problematic since irresponsible parties may associate records in database with specific individuals to disclose personal identity known as identity attack. Data anonymization is an effective technique to protect database from the threat. Unfortunately, applying data anonymization method in transaction database using generalization and suppression based techniques may reduce data utility significantly and cause severe distortion to database properties. A solution to mitigate such drawbacks has been proposed by replacing item with another item instead of applying those techniques. However, selecting an item to replace another item causes other problems specifically when the selected item for the replacement process is not the optimum one. Therefore, in this paper we propose a data anonymization method which performs item replacement that utilizes weighted scoring method to select an optimal item with respect to minimize information loss and maintaining database properties. Experimental results show that the proposed method guarantee higher privacy protection compared with an existing method and it successfully generates an anonymized database while at the same time it maintains data utility by minimizing information loss more than 50% compared with that of an existing method. In addition, the data property of the anonymized database can be well maintained.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129447685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying the Polarity of Online Media on the Indonesia Presidential Election 2019 Using Artificial Neural Network","authors":"Muhammad Afif Farisi, K. Lhaksmana","doi":"10.1109/ICoICT49345.2020.9166254","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166254","url":null,"abstract":"The 2019 presidential election is one of the mandatory national agendas that is covered by all of the mainstream news media in Indonesia. The function of news media as an information provider reaps criticism because they are suspected of having polarity towards certain candidates. In this paper, the polarity of news media is analyzed by performing sentiment assessment towards every news regarding each candidate. Since manual sentiment analysis is costly and time-consuming, because of the large amount of data that needs to be processed, we adopt a machine learning method to automate the sentiment analysis process. This research employs Artificial Neural Network (ANN) to classify scraped news texts from online media and TF-IDF weighting method for feature extraction. We found that the observed online media kompas.com, liputan tan6.com, republika.co.id, and tempo.co do not have significant polarity toward one of the candidates. In addition to ANN, we also compared other methods to investigate the appropriate methods for our dataset. Our experiment shows that on average, ANN obtains the best accuracy at 84.57%, compares to Decision Tree C4.5 (83.34%), Naive Bayes (SO.42%), and SVM (79.04%).","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rahmatulloh, F. M. S. Nursuwars, I. Darmawan, Galih Febrizki
{"title":"Applied Internet of Things (IoT): The Prototype Bus Passenger Monitoring System Using PIR Sensor","authors":"A. Rahmatulloh, F. M. S. Nursuwars, I. Darmawan, Galih Febrizki","doi":"10.1109/ICoICT49345.2020.9166420","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166420","url":null,"abstract":"Monitoring passenger data in bus transportation fleets using the IoT concept. Factors that influence passenger monitoring are human counting errors and the accuracy of objects detected by sensors. The IoT system uses PIR (passive infrared) sensors and monitoring with mobile apps is a solution to overcome this, because the use of PIR sensors in the IoT system can only detect movements made by humans alone. The developed IoT system also implements a GPS module to be able to find out the location of the bus. Wemos D1 R2 will automatically send data collected from the results of detection by the PIR sensor and coordinates obtained by the GPS module to the Firebase database via the internet network. The monitoring application will display data stored on firebase on a mobile device. So that monitoring of bus passengers can be done quickly. Experiments on the research show that when the object’s motion approaches the PIR sensor, it will not consistently detect the presence of passengers.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Learning in Predicting Financial Distress of Indonesian Public Company","authors":"Dyah Sulistyowati Rahayu, H. Suhartanto","doi":"10.1109/ICoICT49345.2020.9166246","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166246","url":null,"abstract":"Predicting financial distress can avoid firm bankruptcy. That is an important issue in matters of company sustainability and the economic growth in general. Indonesia as a developing country needs a reliable system that is able to predict the bankruptcy of a company because it can affect the overall economic condition at different levels. The ensemble learning which is built to achieve better performance of prediction can be implemented to forecast the unhealthy company conditions. Random forest ensemble learning and AdaBoost have been proven superior to the single one. Both methods are applied to Indonesia Public Company data with 6 variables based on Altman Z-Score and one additional variable. The accuracy, precision, recall, and f1-score have an average of 91% regardless of the data imbalance. The ensemble score determines its superiority to the single machine learning.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114830327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hapnes Toba, Christopher Starry Jomei, Lotanto Setiawan, Oscar Karnalim, Hui Il
{"title":"Predicting Users’ Revisitation Behaviour Based on Web Access Contextual Clusters","authors":"Hapnes Toba, Christopher Starry Jomei, Lotanto Setiawan, Oscar Karnalim, Hui Il","doi":"10.1109/ICoICT49345.2020.9166179","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166179","url":null,"abstract":"Most modern browsers record all previously visited web pages for future revisitation. However, not all users utilize such feature. One of the reasons is that the records are displayed at once as a single list, which may overwhelm the users. This paper proposes a predictive model to decide whether a web page will be revisited in the future based on a particular visit. The model can be used to filter web records so that only web pages that may be re-visited are presented. According to our evaluation, the model is considerably effective. It can generate 53.195% accuracy when measured with 10-fold cross-validation and 95% meaningful topic identification. Further, attributes rooted from the same website’ access frequency are the most salient ones for prediction. In addition, contextual similarities based on k-means clustering and cosine similarity (which are used for defining some attributes) are considerably effective.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. D. Setyorini, H. Mahmudah, Okkie Puspitorini, N. Siswandari, A. Wijayanti
{"title":"Accuracy Improvement on Learning Vector Quantization (LVQ) Using Exponential Smoothing for Driving Activity Classification","authors":"P. D. Setyorini, H. Mahmudah, Okkie Puspitorini, N. Siswandari, A. Wijayanti","doi":"10.1109/ICoICT49345.2020.9166370","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166370","url":null,"abstract":"Identification of driving activities is important to find out abnormal driving conditions such as accidents. In this work, identifying driving activities is carried out using the LVQ (Learning Vector Quantization) algorithm. This algorithm creates a prototype that is easily interpreted for experts in each application domain. The dataset for each driving activity is obtained from the accelerometer sensor and the android smart gyroscope. The exponential smoothing method is used in the sensor dataset to improve the accuracy of classification results. The best accuracy is obtained from the classification of the gyroscope sensor dataset after smoothing with an accuracy of 90.429%.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124346779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evidence-Based Technical Process for OpenFlow-Based SDN Forensics","authors":"S. Mugitama, N. Cahyani, Parman Sukamo","doi":"10.1109/ICoICT49345.2020.9166215","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166215","url":null,"abstract":"Globally planning packets forwarding based on the operator’s objectives by a centralized controller is possible in Software Defined Network (SDN). The chief purpose of the SDN architecture is to manage the network due to centralized control of the network easily. The SDN architecture does not focus on network security since the beginning of its emergence. That matter has created some vulnerabilities due to centralized control of the network. Vulnerability is caused by attacks causing the packet overload on the controller (such as DoS attack). Hence, the controller runs into a race condition. Another vulnerability existed in the controller is the topology poisoning attack utilizing spoofed packet and exploiting LLDP packets in the network. Forensics in a traditional network does not have the capability to deeply analyze the attack because the tools ignore evidence existed in the control and application layer of SDN. This research focuses on technical processes in running forensics on SDN architecture comprehensively and develops modules needed to retrieve log’s evidence existed in the controller by applying forensics’ principles. The result shows DoS attack and topology poisoning can be investigated by utilizing these technical processes. Evidence in the controller can be utilized to create analyses, attribution, and presentation. The technical processes of this study are expected to help forensic investigators in revealing crime incidents in the OpenFlow-based SDN environment.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}