{"title":"Applying rough set theory for filtering large number of coronary artery disease (CAD) rules","authors":"Alfiah Fajriani, N. A. Setiawan, T. B. Adji","doi":"10.1109/ICITISEE.2017.8285531","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285531","url":null,"abstract":"This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of birds detector and repellent using frequency based arduino uno with android system","authors":"Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis","doi":"10.1109/ICITISEE.2017.8285503","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285503","url":null,"abstract":"Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction","authors":"Antoni Wibowo, Harry Pujianto, D. R. S. Saputro","doi":"10.1109/ICITISEE.2017.8285507","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285507","url":null,"abstract":"The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan
{"title":"Classification of intrusion detection system (IDS) based on computer network","authors":"D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan","doi":"10.1109/ICITISEE.2017.8285566","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285566","url":null,"abstract":"Intrusion Detection System (IDS) is made as one of the solutions to handle security issues on the network in order to remain assured free of attack. IDS's work is developed by 2 models that using signature-based detection, how it works is limited to the pattern of attack behavior that has been defined in the database. The next is the Anomaly-based IDS model. It works by detects unusual activity of network in the normal conditions, but this model gives a lot of false positiv messages. Several previous studies have shown that the IDS approach with machine learning techniques can provide high accuracy results. The first step that must be done in the application of mechine learning technique is preprocessing the selection of features / attributes to optimize the performance of learning algorithms. In this study, intrusion detection system with mechine learning classification technique is proposed by using naivebayes algorithm with NSL-KDD dataset. The processes in this reseach start from normalization of data, discretization features continuous variables with k-means method and the selection of features using Information Gain algorithm. The result of this reseach shows that the application of k-means clustering method for continuous variabe discretization and feature selection can optimize the performance of naivebayes algorithm in classifying intrusion types.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni
{"title":"Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster","authors":"Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni","doi":"10.1109/ICITISEE.2017.8285542","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285542","url":null,"abstract":"Next-Generation Sequencing in bioinformatics produce a massive amount of data volume. Big data technologies are needed to reduce computation time in data processing. In this paper, we implement Hadoop Map-Reduce framework for processing Next-Generation Sequencing using Hadoop-BAM library. Our implementation process a Binary Alignment Map (BAM) file which contains a reference sequence and many aligned/not-aligned reads by spitting the BAM file into Hadoop data blocks. To process the BAM file in a computer cluster, we implement a mapper and a reducer of Hadoop Map-Reduce framework. The mapper processes the BAM file to produce key value pairs. While, the reducer summary the key value pairs into a meaningful output. Here the mapper and reducer are created to summarize the number of bases in a BAM file. We conduct the experiment in a LIPI Hadoop cluster. The cluster consists of 96 CPU cores. The result of our experiments show that our map-reduce implementations are gaining speed-up compare to serial Next-Generation Sequencing with Picard tools.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto
{"title":"Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm","authors":"Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto","doi":"10.1109/ICITISEE.2017.8285505","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285505","url":null,"abstract":"Public networks such as the Internet are becoming more sophisticated, faster, and cheaper, so that more and more used for information exchange. This may increase the likelihood of confidential information from being stolen and exploited by unauthorized persons. This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons. Messages are encrypted using the 3-DES method. On the other side of the cover image is decomposed into four subbands by using DWT. LH, HL, and HH subbands are chosen to embed encrypted message using LSB method. The last step, done Inverse DWT (IDWT) to get the stego image reconstruction. From the proposed method is then measured its quality with PSNR and MSE. As for message encryption results are measured using entropy. From the experiment results obtained PSNR results with a value of 55.30 dB for image messages size 64 ∗ 64 and 49.23 dB for messages size 128 ∗ 128. The extraction process can also be done perfectly with NC 1 and the average of Entropy of encrypted messages are 7.95754 for 64∗64 and 7.98904 for 128∗128.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto
{"title":"MPPT-current fed push pull converter for DC bus source on solar home application","authors":"Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto","doi":"10.1109/ICITISEE.2017.8285532","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285532","url":null,"abstract":"This paper presents the design of MPPT-current fed push-pull converter. Because of the high step-up transformer ratio and the transformer works at high frequencies, the converter is suitable for low voltage photovoltaic applications. Photovoltaic is a renewable energy that has several advantages, i.e., no pollution (no emissions), no noise, little maintenance and an abundant resource. The photovoltaic used in this study was 300Wp with a DC Bus of 400V. To optimize the working of photovoltaic used MPPT technique. The MPPT technique chosen is Perturbation and Observe. In the proposed converter, an inductor installed on the input side serves as a voltage boost so that the transformer ratio is not too high.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic speech recognition using MFCC feature extraction and ANN classification","authors":"E. S. Wahyuni","doi":"10.1109/ICITISEE.2017.8285499","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285499","url":null,"abstract":"This research addresses a challenging issue that is to recognize spoken Arabic letters, that are three letters of hijaiyah that have indentical pronounciation when pronounced by Indonesian speakers but actually has different makhraj in Arabic, the letters are sa, sya and tsa. The research uses Mel-Frequency Cepstral Coefficients (MFCC) based feature extraction and Artificial Neural Network (ANN) classification method. The result shows the proposed method obtain a good accuracy with an average acuracy is 92.42%, with recognition accuracy each letters (sa, sya, and tsa) prespectivly 92.38%, 93.26% and 91.63%.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving organizational agility of micro, small, and medium enterprises through digital marketing strategy","authors":"Sandy Kosasi, Vedyanto, I. Yuliani","doi":"10.1109/ICITISEE.2017.8285561","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285561","url":null,"abstract":"The business success of Micro, Small, and Medium Enterprises (MSMEs) is determined by capital assets and capabilities to adopt innovation of social media technology to formulate digital marketing strategy improving organizational agility. The vastly developing content of social media becomes an opportunity ensuring more agile organizations in the accessibility of target markets. Problems of this research proposal are formulated (a) to propose a new research model on influences of innovation adoption of social media technology on digital marketing strategy in improving organizational agility of MSMEs and (b) to design hypothetical tests to cognize the influence of each latent variable. The research aims to identify and analyze to what extent digital marketing strategy can improve organizational agility of MSMEs in Pontianak, Indonesia. The combination of a convergent triangulation model and a follow-up, explanatory design is used. The sample including 55 MSMEs is determined by using Slovin Formula and a simple random sampling technique. 5 informants are selected at a sampling site by using a purposive sampling technique. The novelty of this research is on influences of antecedent variables aiming to improve organizational agility of businesses of MSMEs digitally.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heuristic evaluation of online satisfaction survey system for public healthcare service: Applying analytical hierarchical process","authors":"S. Yusoh, Sureena Matayong","doi":"10.1109/ICITISEE.2017.8285551","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285551","url":null,"abstract":"This paper aims to evaluate usability factors of online satisfaction survey system for public healthcare service. The evaluation was performed to analyze issues of usability factors, which is relevant to user interface design by applying Analysis Hierarchy Process (AHP) to prioritize their level of challenges. The study focuses on 10 Jakob Nielsen's heuristics principles as main usability factors. Based on main factors, 43 sub-factors are determined. Relevant data was collected through questionnaires by surveying 24 persons, including programmers, system analyst, students, lecturers, and general users. Next, researchers calculated values of data by using Expert Choice. The result shows the first 5 levels of usability factors that are challenges in a form of percentage rate respectively. The factors of recognition rather than recall (81%); help users recognize, diagnose, and recover from errors (78%); match between system and real world (77%); user control and freedom (76%) and consistency and standards (74%). The challenge rate of all usability factors reveal 72% while non-challenge rate is only 28%. From the result of this study we can conclude that existing online applications of satisfaction survey system for public healthcare service need to be improved. The improvement can be taken by prioritizing the usability factors based on level of challenges that found in this study.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}