{"title":"ICOMITEE 2019 List Of Comittee And Reviewers","authors":"","doi":"10.1109/icomitee.2019.8921058","DOIUrl":"https://doi.org/10.1109/icomitee.2019.8921058","url":null,"abstract":"","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of The Alignment Maturity Level of Business and Information Technology at CV Jaya Technology","authors":"Damayanti, Dyah Ayu Megawaty, Dwi Santia","doi":"10.1109/ICOMITEE.2019.8921103","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921103","url":null,"abstract":"This research discusses the assessment of alignment maturity level between business and information technology on organizations. Empirical study made on CV Jaya Technology to assess the alignment by using different area as: communications area, competency/value measurement area, governance area, partnership, scope and architecture, skills. An assessment of the level of IT maturity and business strategy is carried out at CV Jaya Technology Indonesia. The technique of collecting data using a questionnaire to the management appointed according to their authority, amounting to 5 respondents. The results of the study show that the alignment maturity level of business and IT strategy alignment at CV Jaya Technology is at level 3 with an average value of 3.32, called Established Focused Process.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131796676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drip Irrigation System using BLDC Motor-driven Direct Pumping and Soil Moisture Sensor","authors":"M. Rivai, Suwito, M. Ashari, M. Mustaghfirin","doi":"10.1109/ICOMITEE.2019.8921024","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921024","url":null,"abstract":"Drip irrigation system is very efficient in irrigating vegetables and crops. Conventional drip irrigation systems provide water to crops based on predetermined doses and schedules regardless of farmland conditions. Drip irrigation control that ignores soil conditions causes too little or too much water to be supplied which makes conventional drip irrigation still not optimal. This condition can be optimized by adjusting water supply according to soil conditions. In this study, drip irrigation is controlled by a Proportional-Integral (PI) control system using information from soil moisture sensor as a feedback signal. This system uses pressurized water generator from direct water pumping driven by brushless DC (BLDC) motor. Combination of PI control, soil moisture sensor and BLDC motor driven pump makes this system more efficient in using water and electricity than conventional drip irrigation systems. In the future, this drip irrigation system will be combined with solar panels to make it more efficient.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124315171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis of Positive and Negative of YouTube Comments Using Naïve Bayes – Support Vector Machine (NBSVM) Classifier","authors":"Abbi Nizar Muhammad, S. Bukhori, P. Pandunata","doi":"10.1109/ICOMITEE.2019.8920923","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8920923","url":null,"abstract":"Sentiment analysis on the YouTube video comments is a process of understanding, extracting, and processing textual data automatically to obtain sentiment information contained in one sentence of YouTube video comment. Text mining approach becomes the best alternative to interpret the meaning of each comment. The classification of positive and negative content becomes very important for the YouTube user to assess how meaningful the content that has been published is based on user opinion. Naïve Bayes and Support Vector Machine is extensively used as a basic line in tasks related to texts but the performance varies significantly in all variants, features, and numbers of data collection. Naïve Bayes is very good in classifying texts with the small number of data and document snippets while Support Vector is very good in classifying texts with relatively many numbers of data or full-length document. The combination of Naïve Bayes and Support Vector Machine produces better accuracy level and stronger performance with the use of a 7:3 scale of data that is 70% training data and 30% testing data. By producing the highest performance test values, namely precision of 91%, recall of 83% and flscore of 87%.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoyok Sukrismon, Aripriharta, N. Hidayatullah, N. Mufti, A. N. Handayani, G. Horng
{"title":"Smart Fish Pond for Economic Growing in Catfish Farming","authors":"Yoyok Sukrismon, Aripriharta, N. Hidayatullah, N. Mufti, A. N. Handayani, G. Horng","doi":"10.1109/ICOMITEE.2019.8921233","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921233","url":null,"abstract":"Catfish is one of people’s favorite food in Indonesia. Catfish’ taste is strongly influenced by water quality. The farmers need a system to manage water quality and support the stability of catfish stocks in the market. In this paper, a smart fish pond system for modern catfish farming is proposed. The system applies the internet of things (IoT) concept to monitor and control water quality in catfish ecosystem. The system equipped with temperature, pH, turbidity, and water level sensors to monitor pond parameters. Environmental parameters are uploaded to the cloud and monitored via a smartphone application. The smartphone application equipped with features that support catfish farmers to collaborate in meeting market needs. The cost of making the system is designed to be as minimal as possible so can be applied by a middle-low scale catfish farmer. The implementation of the proposed system provides ease in monitoring pond conditions, improving fish quality, and farmer’s income.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128706040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryan Randy Suryono, Ekawati Marlina, Mardiana Purwaningsih, D. I. Sensuse, Mochammad Arief Hcrmawan Sutoyo
{"title":"Challenges in P2P Lending Development: Collaboration with Tourism Commerce","authors":"Ryan Randy Suryono, Ekawati Marlina, Mardiana Purwaningsih, D. I. Sensuse, Mochammad Arief Hcrmawan Sutoyo","doi":"10.1109/ICOMITEE.2019.8921349","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921349","url":null,"abstract":"P2P Lending for Tourism was built to support government programs in increasing the number of domestic tourists and increasing the number of startups in Indonesia. At present there is no platform that can be used as a reference to build a specific P2P Lending for tourism. This study will try to propose a P2P Lending for Tourism platform in the Indonesian context. The proposed P2P Lending for Tourism consist of business process and application. The business process in the P2P Lending platform are adopted from the p2p lending and combine with e-commerce. The design of application shown with use case diagram, class diagram, and the prototype interfaces. The prototype tested with usability test, with the aim of whether the application is functioning properly and what needs to be fixed. From the usability test, the average value is 4.05 from 5 scale, so that the binding of the application can be used properly.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kautsar, B. Widiawan, B. Etikasari, Saiful Anwar, Rosiana Dwi Yunita, M. Syai’in
{"title":"A Simple Algorithm for Person-Following Robot Control with Differential Wheeled based on Depth Camera","authors":"S. Kautsar, B. Widiawan, B. Etikasari, Saiful Anwar, Rosiana Dwi Yunita, M. Syai’in","doi":"10.1109/ICOMITEE.2019.8921165","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921165","url":null,"abstract":"Industrial Revolution 4.0 is the center of automatic technology development and adoption. This applies to the development of industrial automation and information technology. In the manufacturing industry, machines have been able to work autonomously to carry out the production process quickly and precisely. Even in the development of information technology, expert systems have been embedded in various smart phones. There are many things that can be controlled through smart phones that are connected to the internet network. Not only in manufacturing industries or offices, the development of industrial technology 4.0 has also begun to be implemented in homes. Automatic robotic cleaning technology, or smart home applications can be used commercially. In fact, using people tracking technology, automatic trolleys have been applied to help consumers in supermarkets. In this paper, person-following robot was developed. We use depth cameras to recognize human movement. 3D data is used as a reference value in a human follower system. Minimizing computing time, the dynamic decision tree method is used. This offers lighter and faster computational processing than using the fuzzy or NN method. Based on the testing result, a good robot performance is obtained. Robots can follow human movements in real-time on various testing paths.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICOMITEE 2019 Copyright Page","authors":"","doi":"10.1109/icomitee.2019.8921154","DOIUrl":"https://doi.org/10.1109/icomitee.2019.8921154","url":null,"abstract":"","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Louis Cianciullo, H. Ghodosi, Kovel Thuremilla, A. C. Prihandoko
{"title":"Flaws in Strong t-Consistency","authors":"Louis Cianciullo, H. Ghodosi, Kovel Thuremilla, A. C. Prihandoko","doi":"10.1109/ICOMITEE.2019.8921313","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921313","url":null,"abstract":"Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce uncertainty regarding S.Harn and Lin proposed a strong (n, t, n) secret sharing scheme which they claim is information theoretic secure. In this paper we show that this is not the case and that the notion of strong t-consistency used by Harn and Lin as well as Liu et al. actually results in an imperfect scheme that is not secure in the information theoretic setting.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"95 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of The Most Influential Factors on Indonesian Maritime Security Using Fuzzy Analytical Hierarchy Process","authors":"Hozairi, H. Lumaksono, M. Tukan, Buhari","doi":"10.1109/ICOMITEE.2019.8921237","DOIUrl":"https://doi.org/10.1109/ICOMITEE.2019.8921237","url":null,"abstract":"The issue of maritime security is a major factor in safeguarding the sovereignty of the Republic of Indonesia because 70% of its territory is maritime. Indonesia has several institutions to maintain defense and security, maritime security is not only determined by the number of authorized agencies but by many factors. The purpose of this study aims to assess the factors and sub-factors that influence the conditions of Indonesian maritime security. This research method uses Fuzzy Analytic Hierarchy Process (FAHP) with six main factors and twenty nine sub-factors assessed. The findings of this study provide recommendations for the Government to consider the most influential aspects of maritime security, first is the aspect of defense and security 0.34, second is the political and legal aspects 0.20, third is the economic aspect 0.14 fourth is the technological aspect 0.12, fifth is social and cultural aspects 0.10 and sixth are environmental aspects 0.09. The contribution of this research is a consideration for the Government to determine policies towards improving Indonesia’s maritime security.","PeriodicalId":137739,"journal":{"name":"2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126289170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}