2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)最新文献

筛选
英文 中文
Next Generation Firewall for Improving Security in Company and IoT Network 下一代防火墙,提高企业和物联网网络的安全性
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937145
B. Soewito, Charlie Erwin Andhika
{"title":"Next Generation Firewall for Improving Security in Company and IoT Network","authors":"B. Soewito, Charlie Erwin Andhika","doi":"10.1109/ISITIA.2019.8937145","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937145","url":null,"abstract":"The goal of this research is to analyze of effectiveness the Next Generation Firewall that implemented to secure IoT in smart house and company network. The method used in this research is the method of comparison with a test of DDoS attacks, phishing and SQL Injection on both network, smart house network and company network. From the results of experiment, it can be concluded that the Next Generation Firewall has significantly better performance for protecting smart house and company network, it can increase security of data communication networks against threats from the Internet.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Combining SentiStrength and Multilayer Perceptron in Twitter Sentiment Classification 结合SentiStrength和多层感知机在Twitter情感分类中的应用
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937134
Eko Yudhi Prastowo, Endroyono, E. M. Yuniarno
{"title":"Combining SentiStrength and Multilayer Perceptron in Twitter Sentiment Classification","authors":"Eko Yudhi Prastowo, Endroyono, E. M. Yuniarno","doi":"10.1109/ISITIA.2019.8937134","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937134","url":null,"abstract":"The advancement of internet technology has caused the use of social media to become the people lifestyle. The company and the government use social media as instant feedback to get user sentiments regarding their comments or reviews. The sentiment is an opinion or view that based on excessive feelings towards something. The method for knowing positive or negative sentiments from someone’s comments can be done manually by humans to analyze comments one by one or automatically by machine learning to do classifications. Machine learning requires training data and test data that have positive and negative labels. Generally, data labeling is done manually by humans. In this study, we used machine learning to classify sentiments with data collected from Twitter. Machine learning method used is Multilayer Perceptron and Naive Bayes as a comparison. Labeling dataset using manual method. For addition training data, labeled data was generated using an English lexicon dictionary called SentiStrength. Feature extraction uses vectorization and TF-IDF. This study aims to measure effect of adding training data generated using SentiStrength from unlabeled data during learning process to accuracy of machine learning model. Classification model testing uses data of 627 tweets. The result is addition of training data to increase average accuracy by 5% of initial accuracy. Multilayer Perceptron is more accurate than Naive Bayes with the highest accuracy ratio of 77.71% and 76.07%.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Cryptography Module Security Certification Based on SNI ISO/IEC 19790:2012 - Security Requirements For Cryptography Module 基于SNI的加密模块安全认证的实现ISO/IEC 19790:2012 -加密模块的安全要求
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937280
R.M Ival Tirta Kusumah, Yasril Andriawan
{"title":"Implementation of Cryptography Module Security Certification Based on SNI ISO/IEC 19790:2012 - Security Requirements For Cryptography Module","authors":"R.M Ival Tirta Kusumah, Yasril Andriawan","doi":"10.1109/ISITIA.2019.8937280","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937280","url":null,"abstract":"Utilization of cryptography in information and communication technology devices in the form of cryptographic modules can guarantee confidentiality, integrity, and anti-denial of the information. In 2015 the National Standardization Agency (BSN) has issued SNI ISO/IEC 19790 : 2015 – Persyaratan Keamanan untuk Modul Kriptografi which is identical adoption of ISO/IEC 19790:2012 - Security Requirements for Cryptographic Module.SNI ISO/IEC 19790:2015 is a national standard that can support national security and digital economic development by providing security guarantees of the cryptographic modules. Unfortunatelly until now there are still no certification schemes, certification bodies, and testing laboratories that built for this standard, so the certification of the cryptographic module security based on SNI ISO/IEC 19790:2015 is cannot be held yet.This paper proposes that the cryptographic module security certification scheme that can be implemented in Indonesia is type 2 scheme with some adjustments, the Certification Body that runs the recommended cryptographic module security certification scheme is BSSN, and the Testing Laboratory that runs the recommended cryptographic module security testing is BSSN internal testing laboratory.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"1982 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ISITIA 2019 Organizing Committee ISITIA 2019组委会
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/isitia.2019.8937234
{"title":"ISITIA 2019 Organizing Committee","authors":"","doi":"10.1109/isitia.2019.8937234","DOIUrl":"https://doi.org/10.1109/isitia.2019.8937234","url":null,"abstract":"","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ladder Diagram Design Based On Change Signal Method For Crude Palm Oil Process 基于变化信号法的粗棕榈油工艺阶梯图设计
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937144
E. Iskandar, M. Rameli, F. A. Palito
{"title":"Ladder Diagram Design Based On Change Signal Method For Crude Palm Oil Process","authors":"E. Iskandar, M. Rameli, F. A. Palito","doi":"10.1109/ISITIA.2019.8937144","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937144","url":null,"abstract":"In the process of processing palm fruit into crude palm oil there are five general processes. The first process is the sterilization process, which is the process of boiling the palm fruit, the second process is the process of separating the fruit from the bunch, the third process is the process of separating the fruit from the seeds, the fourth process is pressing the process of separating the oil from the fruit, the fifth process is the process of clarification, namely the process of separating oil, water and dirt. On this basis, the right action is needed for each stage of the process so that the final results can be maximized. Another factor that determines the quality of results and efficiency of the plant is equipment that must be in standard conditions, both the quality and quantity of each tool. The capacity of a process with the others must be synchronous and the operation of each process is also a factor that determines the performance of a palm oil mill. The processes that occur in palm oil processing can be controlled by the PLC as the controller. PLC programming can use the change signal method in the form of a ladder diagram design. With the ladder diagram, the process carried out will run sequentially. Because in the process there are parts which are backward processes and onward processes, this method is right used here. By using the change signal method, the results of the ladder diagram construction are 96 units, 916 relay contacts, and the resulting program capacity is 18 KB.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clinical decision support system for typhoid fever disease using classification techniques 基于分类技术的伤寒临床决策支持系统
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937286
Boby Andrianto, Y. Suprapto, I. Pratomo, Ika Irawati
{"title":"Clinical decision support system for typhoid fever disease using classification techniques","authors":"Boby Andrianto, Y. Suprapto, I. Pratomo, Ika Irawati","doi":"10.1109/ISITIA.2019.8937286","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937286","url":null,"abstract":"Antibiotic resistance is one of the biggest threats to global health. According to WHO antibiotic resistance is already at high levels of danger. Causes of antibiotic resistance are errors in diagnosis and treatment. Essential facts of disease diagnosis in primary health care units in Indonesia are conventional methods often used because of a shortage of skilled medical personnel, Conventional diagnosis systems depend on the experience of medical personnel without using complex clinical data. This paper use a clinical decision support system (CDSS) based on medical record data and classification techniques to reduce misdiagnosis. This paper focuses on the diagnosis of typhoid fever disease (TFD) because the amount of antibiotic resistance is very high and is an endemic disease in Indonesia that is difficult to diagnose. This system uses three methods of supervision classification, Naïve Bayes (NB), k-nearest neighbor (kNN), Support Vector Machine (SVM). Then the system was compared and evaluated. The results of the three methods showed that kNN provided 88.7% accuracy, better than other classifications for typhoid fever disease.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124745341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal Placement and Sizing Distributed Generation (DG) Considering Energy Storage Using ABC-QP Algorithm 基于ABC-QP算法的储能分布式发电最优布局与规划
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937204
Luthfia Fajariyanti, R. S. Wibowo, O. Penangsang, D. F. U. Putra, N. K. Aryani
{"title":"Optimal Placement and Sizing Distributed Generation (DG) Considering Energy Storage Using ABC-QP Algorithm","authors":"Luthfia Fajariyanti, R. S. Wibowo, O. Penangsang, D. F. U. Putra, N. K. Aryani","doi":"10.1109/ISITIA.2019.8937204","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937204","url":null,"abstract":"The optimal location and capacity of distributed generation (DG) is essential for electric power systems especially to satisfy the load demand. This paper proposed the hybrid optimization method to obtain optimal location and capacity of DG considering energy storage in dynamic systems. Artificial bee colony (ABC) algorithm and quadratic programming (QP) is applied. The objective functions of the proposed method minimize the cost of distribution line losses and load shedding. ABC algorithm is used to find the optimal location and capacity of DG. Then, objective functions are calculated using QP with dynamic condition of the load profile for 24 hours. Load shedding is generated based on power generation which can’t satisfy the load demand. The proposed method has been implemented in a modified IEEE 30 bus.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Secure Bit Rate for Quantum Key Distribution based on EDU-QCRY1 基于EDU-QCRY1的量子密钥分发安全比特率分析
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937140
Damayani Suyitno, Haykal Octa Asmar, Rini Wisnu Wardhani, Mohamad Syahral, Dion Ogi, D. Putranto
{"title":"Analysis of Secure Bit Rate for Quantum Key Distribution based on EDU-QCRY1","authors":"Damayani Suyitno, Haykal Octa Asmar, Rini Wisnu Wardhani, Mohamad Syahral, Dion Ogi, D. Putranto","doi":"10.1109/ISITIA.2019.8937140","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937140","url":null,"abstract":"Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Quantum Key Distribution (QKD) or Quantum Cryptography is attracting much attention as a solution of the problem of key distribution; QKD offers unconditionally secure communication based on quantum mechanics. In this article we analyze of secure bit rate with the most popular QKD protocols. Also, we give a short state of the art of Quantum Cryptography.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Estimation of Nigrescens Palm Oil Ripeness using Contrast and Skewness from 680 nm Image 利用对比度和偏度对680 nm图像中黑油棕榈油成熟度的估计
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937225
A. W. Setiawan, D. Danudirdjo, A. R. Ananda
{"title":"Estimation of Nigrescens Palm Oil Ripeness using Contrast and Skewness from 680 nm Image","authors":"A. W. Setiawan, D. Danudirdjo, A. R. Ananda","doi":"10.1109/ISITIA.2019.8937225","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937225","url":null,"abstract":"This paper aim of this study is to assess the oil palm ripeness using a specific wavelength as a light source, 680 nm, and simple image processing technique. This paper proposes a simple and low computation technique to estimate the oil palm FFB maturity using 680 nm LED as the light source and digital camera to capture the image. There are some parameters that can be used to detect oil palm FFB maturities, such as chlorophyll concentration and fruitlet detachment. In this research, the 680 nm image contrast is used to detect the chlorophyll due to it correlated with the chlorophyll absorbance. The accuracy of this approach technique is 64.94 %. The second approach is using texture analysis, skewness, to differentiate the detached and undetached fruitlets in oil palm FFB. The accuracy of this technique is 68.83 %. The last technique is combining image contrast and skewness. The result of this approach gives accuracy by 68.83 %. From the results, skewness and combination of contrast and skewness give the same accuracy, 68.83 %. It can be concluded that the estimation of oil palm FFB maturity can be done by using an only skewness value of the 680 nm image. The result is in-between another research results in oil palm FFB maturity grading. The proposed technique can be implemented using microcomputer. It will reduce the implementation cost and can be used to build portable systems.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Critical Clearing Time Based on Critical Trajectory Method using Unbalance Fault 基于临界轨迹法的不平衡故障临界清除时间确定
2019 International Seminar on Intelligent Technology and Its Applications (ISITIA) Pub Date : 2019-08-01 DOI: 10.1109/ISITIA.2019.8937214
A. Priyadi, T. P. Sari, Wahyu Dwi S, N. Yorino, M. Purnomo
{"title":"Determining Critical Clearing Time Based on Critical Trajectory Method using Unbalance Fault","authors":"A. Priyadi, T. P. Sari, Wahyu Dwi S, N. Yorino, M. Purnomo","doi":"10.1109/ISITIA.2019.8937214","DOIUrl":"https://doi.org/10.1109/ISITIA.2019.8937214","url":null,"abstract":"Transient stability has an essential role in the electric power system. When a disturbance occurs, the minimum protection relay will operate in about 0.22 seconds. However, this condition does not guarantee the system will return to steady state condition because of its Critical Clearing Time (CCT). If the fault is isolated before the value of CCT, the generator will return to stable. Otherwise, the generator becomes unstable if the fault is isolated after the value of CCT. This paper proposed the calculation of CCT on generators using an energy function method to determine the control of Unstable Equilibrium Point (CUEP) by considering unbalance fault. The result of this method has an allowable error in 0.0108% for the calculation in critical clearing time. Moreover, this method has faster calculation time than time domain simulation method with the difference in calculation time is 116.243 seconds.","PeriodicalId":153870,"journal":{"name":"2019 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130734206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信