Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan
{"title":"Fingerprint clustering algorithm for data profiling using pentaho data integration","authors":"Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan","doi":"10.1109/ICITISEE.2017.8285528","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285528","url":null,"abstract":"Data profiling is an abnormality in the search process data that undermine the value of the data. Type of data profiling analysis techniques to detect duplication of text within a single paragraph can by using a text cluster. In this paper aims at doing text algorithm transformation cluster with fingerprint method using Pentaho Data Integration (PDI). As for methods used to conduct implementation text cluster with Pentaho Data Integration is to do a mapping algorithm fingerprint method on component contained in Pentaho, then perform a transformation per component, and further evaluation of the results of a text cluster with open source data profiling tool. Implementation of text clusters with Pentaho Data Integration successfully done but there is still some rudimentary logic. The results from implementation of clusters number on the transformation by using Pentaho Data Integration is greater than a number of text clusters by using the OpenRefine tool.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On part of speech tagger for Indonesian language","authors":"R. S. Yuwana, A. R. Yuliani, H. Pardede","doi":"10.1109/ICITISEE.2017.8285530","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285530","url":null,"abstract":"In this paper we present an evaluation of six popular methods for Part-of-Speech (POS) tagging tasks of Indonesian language. They are Unigram, Hidden Markov Model, TnT, Brills, Naive Bayes, and Maximum Entropy taggers. Indonesian language, while is one of most spoken language in the world has very limited data for POS tagging tasks. Therefore, it is interesting to investigate and evaluate some popular approaches in POS tagging when dealing for such conditions. The results of our experiments show that Maximum Entropy provides the highest accuracy of all methods. It is consistently better even when the size of the training data is varied.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous and transparent access control framework for electronic health records: A preliminary study","authors":"M. Jayabalan, T. O'Daniel","doi":"10.1109/ICITISEE.2017.8285487","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285487","url":null,"abstract":"The thrust of technological advancement in healthcare today lies in improving the quality and timeliness of patient services. Medical information is accessed through various means that require efficient methods for protecting patient privacy and security. Healthcare providers implement a set of information security mechanisms such as access control, authentication, log analysis etc. to protect disclosure of data to the unauthorized person. This research proposes a continuous and transparent access control framework based on a preliminary study. The proposed framework has three core components: adaptive authentication, risk analysis and data transparency mapped with Role Based Access Control. The adaptive authentication validates the user through behavior profiling, risk analysis measures the amount of risk in user data access, and data transparency allows patients and administrators to monitor data consumption and detect deviation from patient consent.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of embedded zigbee machine to machine smart street lighting system","authors":"D. A. Widodo, N. Iksan, Alfa Faridh Suni","doi":"10.1109/ICITISEE.2017.8285536","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285536","url":null,"abstract":"Energy monitoring and controlling systems of smart street lighting system were highly dependent on the gateway in order to perform the communication between sensors and actuators to the users. M2M technology allows the process of device control more effectively because it is not centered on the Gateway but on the devices to device related. Congestion, delays and communication errors to be a challenge in the development of M2M technology. This research proposed M2M technology to make direct communication between devices and users with less congestion, delays and communication errors. The design of embedded zigbee using M2M technology was developed as dimmer control for LED lights and communication between devices. Furthermore, zigbee communication performance have been evaluated using received signal strength (RSSI) and network throughput. The ideal distance between zigbee in barrier area is approximately 30m and −83 dBm of RSSI. In loss area is approximately 65m and −80 dBm of RSSI. Performance of zigbee device communications shows the use of direct configuration is better than using a router. So that, on configuration via router, the number of transmitting nodes should be minimized.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi
{"title":"Spatial flood risk mapping in east Java, Indonesia, using analytic hierarchy process — natural breaks classification","authors":"A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi","doi":"10.1109/ICITISEE.2017.8285539","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285539","url":null,"abstract":"East Java is one of the provinces in Indonesia that is often hit by floods. Recorded about 170 data flood disaster since 2011 to 2015 that hit the 31 districts and cities in East Java. The government's efforts in dealing with flood disaster require a decision support system in determining the areas to be targeted in the flood disaster mitigation process. National Disaster Management Agency, called BNPB, has issued guidance documents in conducting disaster risk mapping in Indonesia based on threat, vulnerability and capacity level. Index method is used to calculate the risk value based on a threshold nominal value of the certain range, even though some of the criterias involve preference values. This research proposes a new hybrid analytic hierarchy process (AHP) — natural break classification strategy to calculate flood risk index to solve the combination of nominal and preferences values of criterias that produce Spatial Decision Support System (SDSS). AHP method is used to calculate priority value of assessment according to hazard, vulnerability and capacity indexes. The priority value that is obtained from AHP method is classified by natural break into three level of flood risk consist of low, medium and high Flood risk mapping with AHP method — natural break obtain an effective classification than the index method.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123084421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning analysis and control of inventory goods pt. x with material requirement planning method","authors":"Denny Andwiyan, M. Irsan, D. F. Murad, Djamaludin","doi":"10.1109/ICITISEE.2017.8285510","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285510","url":null,"abstract":"Material Requirement Planning is a method to decide what, when and how many component and material needed for the production planning. This research studies how far the Material Requirement Planning's application could control material stock investment at PT. X, where the company is currently experiencing an increase in finished goods inventory. PT.X has two categories, namely Special Lighting lamps (SP) and General Lighitng. Among the two types of light bulbs that SP has increased quite significant inventory when compared with GL lights. Dengan rata-rata stock perbulan 4,505,864 pcs atau IDR 42. 78 Miliar Therefore, the author intends to find out more about the good and the control system to calculate and analyze the level of finished goods inventory optimum using the ABC method of analysis as a determinant of sales by product category, methods ordering quantity EOQ to see the finished product and Re Order Point is to an order goods so that the goods may ultimately be used in accordance with the expected. Dari Analisa diatas dapat disimpulkan bahwa dari total produk 267 pc yang hanya masuk kedalam kategori A dan B hanya 85 pcs. Sedangkan dilihat dari persediaan yang ada dapat diturunkan menjadi 66,8 % dari total persediaan yang ada dengan rata-rata perbulannya 4,505,864 pcs.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of flood detector using wireless sensor network with mamdani's fuzzy logic method","authors":"A. Pratama, R. Munadi, Ratna Mayasari","doi":"10.1109/ICITISEE.2017.8285493","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285493","url":null,"abstract":"In this paper, we build the prototype system using Wireless Sensor Network (WSN) for flood detector for flooding area. In a flooding area, power consumption and reliability of network become an important thing. Therefore, the performance of devices and algorithm of this system must work properly. The system is created using Fuzzy Logic to calculate the output, in order to make the system work properly. With Zigbee technology, WSN can be useful for monitoring a small area with many nodes. WSN can be combined with another application, e.g. cloud, android, virtual private network, etc. The objective of this paper is to design flood detector system with WSN on two scenarios that are single hop and multi hop, then find two of these which the best. Single hop means no router node between coordinator node and end node and multi hop means there is router node between coordinator node and end node. After some test, this system has a maximum range in single hop at a distance of 95.1 meters and 185.5 meters when using multi hop's scenario. Error for fuzzy logic compare between manual calculation and prototype system is 3.04417493% and error overall system for its result is 5%. In the examination of the quality of the network, values of throughput obtained fairly stable but the result of delay values is unstable, the further the distance the higher the values of delay, on the contrary values of throughput getting lower. The power consumption is only 0.083 Watt/hour when the system in single hop and 0.06525 Watt/hour when the system in multi hop.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Wahab, Sulistyaningsih, Y. P. Saputera, E. Amin
{"title":"Software development for ultra wide band radar detector","authors":"M. Wahab, Sulistyaningsih, Y. P. Saputera, E. Amin","doi":"10.1109/ICITISEE.2017.8285490","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285490","url":null,"abstract":"In this paper, the research and development on display software for a radar detector that has an ability to receive and process data from Ultra-Wide Band (UWB) signals with a frequency range of 2–18 GHz is presented. This software design consists of three parts: processing module software, data logging module software, and data flow module software. The radar detector is able to extract the primary parameter information from the received signal: frequency, pulse width, TOA (time of arrival), direction of arrival (DOA), level, and modulation type.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sugiarto, E. Prakasa, R. Wardoyo, R. Damayanti, Krisdianto, L. M. Dewi, H. Pardede, Y. Rianto
{"title":"Wood identification based on histogram of oriented gradient (HOG) feature and support vector machine (SVM) classifier","authors":"B. Sugiarto, E. Prakasa, R. Wardoyo, R. Damayanti, Krisdianto, L. M. Dewi, H. Pardede, Y. Rianto","doi":"10.1109/ICITISEE.2017.8285523","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285523","url":null,"abstract":"Forest areas in Indonesia covered about 2/3 of total land areas which has about 4000 wood species. Wood identification plays a key role in wood utilization not only for determining appropriate use but also for supporting legal timber trade. However, the identification process requires high expertise and complex method which can be done in the laboratory. In order to simplify the identification process, we develop wood identification using computer vision by using Histogram of Oriented Gradient (HOG) to extract the species of wood and Support Vector Machines (SVM) to classify wood species. These methods combination will improve the accuracy of wood identification process. The result showed that the HOG method can extract the texture of woods and SVM classifier can generate the boundary decision after executing the training process. By doing the testing process of SVM classifier, the result showed that the accuracy from the identification is 70.5% for using positive testing image and 77.5% for using negative testing image. This accuracy value can be reached because the texture for each training image has different texture pattern especially the number and location of vessels.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126806989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Push notification based login using BLE devices","authors":"G. Varshney, M. Misra","doi":"10.1109/ICITISEE.2017.8285554","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285554","url":null,"abstract":"Due to the consistent number of phishing attacks there is a need to develop secure authentication schemes. These days phishing is mostly carried out using malicious browser extensions or other sophisticated credential stealing techniques such as CR/RT MITM phishing attack. Therefore, it is required to develop secure authentication schemes for handling these attacks. A set of popular authentication schemes has been analyzed in this paper and it is found that they are unsafe against credential stealing attacks such as CR/RT MITM phishing, malicious browser extensions, key loggers and malwares. A novel push notification based scheme that uses BTADDR as the user identification token and performs real time modification and verification of BLE device (Bluetooth 4.0+ Version) descriptor value for user authentication has been proposed in this paper. The scheme is better in terms of security provided by the existing two factor authentication schemes (OTP/PIN, QR Code/Barcode, Graphical password/ CAPTCHA) and the usual push notification based login authentication schemes that uses username as the user identification token. Scheme has been compared with other popular schemes using the Bonneau et al. assessment framework in terms of usability, deployability and security. The results obtained are promising which suggest Bluetooth based push notification schemes can be a good option for future web authentication.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}