2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

筛选
英文 中文
Applying rough set theory for filtering large number of coronary artery disease (CAD) rules 应用粗糙集理论对大量冠心病(CAD)规则进行过滤
Alfiah Fajriani, N. A. Setiawan, T. B. Adji
{"title":"Applying rough set theory for filtering large number of coronary artery disease (CAD) rules","authors":"Alfiah Fajriani, N. A. Setiawan, T. B. Adji","doi":"10.1109/ICITISEE.2017.8285531","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285531","url":null,"abstract":"This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of birds detector and repellent using frequency based arduino uno with android system 基于频率的arduino与android系统的鸟类探测器与驱蚊器设计
Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis
{"title":"Design of birds detector and repellent using frequency based arduino uno with android system","authors":"Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis","doi":"10.1109/ICITISEE.2017.8285503","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285503","url":null,"abstract":"Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction 非线性自回归外生模型(NARX)在股价指数预测中的应用
Antoni Wibowo, Harry Pujianto, D. R. S. Saputro
{"title":"Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction","authors":"Antoni Wibowo, Harry Pujianto, D. R. S. Saputro","doi":"10.1109/ICITISEE.2017.8285507","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285507","url":null,"abstract":"The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of intrusion detection system (IDS) based on computer network 基于计算机网络的入侵检测系统分类
D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan
{"title":"Classification of intrusion detection system (IDS) based on computer network","authors":"D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan","doi":"10.1109/ICITISEE.2017.8285566","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285566","url":null,"abstract":"Intrusion Detection System (IDS) is made as one of the solutions to handle security issues on the network in order to remain assured free of attack. IDS's work is developed by 2 models that using signature-based detection, how it works is limited to the pattern of attack behavior that has been defined in the database. The next is the Anomaly-based IDS model. It works by detects unusual activity of network in the normal conditions, but this model gives a lot of false positiv messages. Several previous studies have shown that the IDS approach with machine learning techniques can provide high accuracy results. The first step that must be done in the application of mechine learning technique is preprocessing the selection of features / attributes to optimize the performance of learning algorithms. In this study, intrusion detection system with mechine learning classification technique is proposed by using naivebayes algorithm with NSL-KDD dataset. The processes in this reseach start from normalization of data, discretization features continuous variables with k-means method and the selection of features using Information Gain algorithm. The result of this reseach shows that the application of k-means clustering method for continuous variabe discretization and feature selection can optimize the performance of naivebayes algorithm in classifying intrusion types.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster 在计算机集群中使用hadoop-BAM在map-reduce框架中处理下一代测序数据
Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni
{"title":"Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster","authors":"Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni","doi":"10.1109/ICITISEE.2017.8285542","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285542","url":null,"abstract":"Next-Generation Sequencing in bioinformatics produce a massive amount of data volume. Big data technologies are needed to reduce computation time in data processing. In this paper, we implement Hadoop Map-Reduce framework for processing Next-Generation Sequencing using Hadoop-BAM library. Our implementation process a Binary Alignment Map (BAM) file which contains a reference sequence and many aligned/not-aligned reads by spitting the BAM file into Hadoop data blocks. To process the BAM file in a computer cluster, we implement a mapper and a reducer of Hadoop Map-Reduce framework. The mapper processes the BAM file to produce key value pairs. While, the reducer summary the key value pairs into a meaningful output. Here the mapper and reducer are created to summarize the number of bases in a BAM file. We conduct the experiment in a LIPI Hadoop cluster. The cluster consists of 96 CPU cores. The result of our experiments show that our map-reduce implementations are gaining speed-up compare to serial Next-Generation Sequencing with Picard tools.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm 采用3-DES、DWT和LSB混合方法的安全图像隐写算法
Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto
{"title":"Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm","authors":"Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto","doi":"10.1109/ICITISEE.2017.8285505","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285505","url":null,"abstract":"Public networks such as the Internet are becoming more sophisticated, faster, and cheaper, so that more and more used for information exchange. This may increase the likelihood of confidential information from being stolen and exploited by unauthorized persons. This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons. Messages are encrypted using the 3-DES method. On the other side of the cover image is decomposed into four subbands by using DWT. LH, HL, and HH subbands are chosen to embed encrypted message using LSB method. The last step, done Inverse DWT (IDWT) to get the stego image reconstruction. From the proposed method is then measured its quality with PSNR and MSE. As for message encryption results are measured using entropy. From the experiment results obtained PSNR results with a value of 55.30 dB for image messages size 64 ∗ 64 and 49.23 dB for messages size 128 ∗ 128. The extraction process can also be done perfectly with NC 1 and the average of Entropy of encrypted messages are 7.95754 for 64∗64 and 7.98904 for 128∗128.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
MPPT-current fed push pull converter for DC bus source on solar home application mpt馈流推挽变换器在太阳能家用直流母线电源中的应用
Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto
{"title":"MPPT-current fed push pull converter for DC bus source on solar home application","authors":"Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto","doi":"10.1109/ICITISEE.2017.8285532","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285532","url":null,"abstract":"This paper presents the design of MPPT-current fed push-pull converter. Because of the high step-up transformer ratio and the transformer works at high frequencies, the converter is suitable for low voltage photovoltaic applications. Photovoltaic is a renewable energy that has several advantages, i.e., no pollution (no emissions), no noise, little maintenance and an abundant resource. The photovoltaic used in this study was 300Wp with a DC Bus of 400V. To optimize the working of photovoltaic used MPPT technique. The MPPT technique chosen is Perturbation and Observe. In the proposed converter, an inductor installed on the input side serves as a voltage boost so that the transformer ratio is not too high.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Arabic speech recognition using MFCC feature extraction and ANN classification 基于MFCC特征提取和ANN分类的阿拉伯语语音识别
E. S. Wahyuni
{"title":"Arabic speech recognition using MFCC feature extraction and ANN classification","authors":"E. S. Wahyuni","doi":"10.1109/ICITISEE.2017.8285499","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285499","url":null,"abstract":"This research addresses a challenging issue that is to recognize spoken Arabic letters, that are three letters of hijaiyah that have indentical pronounciation when pronounced by Indonesian speakers but actually has different makhraj in Arabic, the letters are sa, sya and tsa. The research uses Mel-Frequency Cepstral Coefficients (MFCC) based feature extraction and Artificial Neural Network (ANN) classification method. The result shows the proposed method obtain a good accuracy with an average acuracy is 92.42%, with recognition accuracy each letters (sa, sya, and tsa) prespectivly 92.38%, 93.26% and 91.63%.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Improving organizational agility of micro, small, and medium enterprises through digital marketing strategy 通过数字营销策略提高中小微企业的组织敏捷性
Sandy Kosasi, Vedyanto, I. Yuliani
{"title":"Improving organizational agility of micro, small, and medium enterprises through digital marketing strategy","authors":"Sandy Kosasi, Vedyanto, I. Yuliani","doi":"10.1109/ICITISEE.2017.8285561","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285561","url":null,"abstract":"The business success of Micro, Small, and Medium Enterprises (MSMEs) is determined by capital assets and capabilities to adopt innovation of social media technology to formulate digital marketing strategy improving organizational agility. The vastly developing content of social media becomes an opportunity ensuring more agile organizations in the accessibility of target markets. Problems of this research proposal are formulated (a) to propose a new research model on influences of innovation adoption of social media technology on digital marketing strategy in improving organizational agility of MSMEs and (b) to design hypothetical tests to cognize the influence of each latent variable. The research aims to identify and analyze to what extent digital marketing strategy can improve organizational agility of MSMEs in Pontianak, Indonesia. The combination of a convergent triangulation model and a follow-up, explanatory design is used. The sample including 55 MSMEs is determined by using Slovin Formula and a simple random sampling technique. 5 informants are selected at a sampling site by using a purposive sampling technique. The novelty of this research is on influences of antecedent variables aiming to improve organizational agility of businesses of MSMEs digitally.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Heuristic evaluation of online satisfaction survey system for public healthcare service: Applying analytical hierarchical process 公共卫生服务在线满意度调查系统的启发式评价:应用层次分析法
S. Yusoh, Sureena Matayong
{"title":"Heuristic evaluation of online satisfaction survey system for public healthcare service: Applying analytical hierarchical process","authors":"S. Yusoh, Sureena Matayong","doi":"10.1109/ICITISEE.2017.8285551","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285551","url":null,"abstract":"This paper aims to evaluate usability factors of online satisfaction survey system for public healthcare service. The evaluation was performed to analyze issues of usability factors, which is relevant to user interface design by applying Analysis Hierarchy Process (AHP) to prioritize their level of challenges. The study focuses on 10 Jakob Nielsen's heuristics principles as main usability factors. Based on main factors, 43 sub-factors are determined. Relevant data was collected through questionnaires by surveying 24 persons, including programmers, system analyst, students, lecturers, and general users. Next, researchers calculated values of data by using Expert Choice. The result shows the first 5 levels of usability factors that are challenges in a form of percentage rate respectively. The factors of recognition rather than recall (81%); help users recognize, diagnose, and recover from errors (78%); match between system and real world (77%); user control and freedom (76%) and consistency and standards (74%). The challenge rate of all usability factors reveal 72% while non-challenge rate is only 28%. From the result of this study we can conclude that existing online applications of satisfaction survey system for public healthcare service need to be improved. The improvement can be taken by prioritizing the usability factors based on level of challenges that found in this study.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信