{"title":"Implementation of Fuzzy Logic on Microcontroller for Quails Coop Temperature Control","authors":"Nisa Rizqiya Fadhliana, Sayekti Harits Suryawan, Ariyadi","doi":"10.1109/ISRITI54043.2021.9702820","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702820","url":null,"abstract":"Quail (cortunix cortunix japonica) is a type of poultry that is quite popular for its eggs and meat as an alternative protein source. However, for tropical climates such as Indonesia, there are challenges faced by quail farmers, namely heat stress. One way that can be a solution to deal with these challenges is to regulate the room temperature in the quail cage. This study aims to design an automatic temperature control system for quail cages using a microcontroller embedded with a fuzzy algorithm to determine the action to be taken to adjust the temperature and humidity of the air in the quail cage. The prototype developed in this research is tested by comparing the output simulation of the microcontroller with the simulation performed using Matlab software.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Bontang City COVID-19 Data Time Series Using the Facebook Prophet Method","authors":"Kurnia Kasturi, M. I. A. Putera, S. R. Natasia","doi":"10.1109/ISRITI54043.2021.9702874","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702874","url":null,"abstract":"The increasing trend of COVID-19 cases in Bontang makes it the first order of the highest incident rate in East Kalimantan, with a value of 1161.78 cases per 100 thousand inhabitants. The purpose of this study was to predict the increase in COVID-19 cases in Bontang City with a data set of positive confirmed cases, recovered and died of COVID-19 in Bontang city. The data set used starts from March 24, 2020 - March 1, 2021, using the Facebook Prophet method, the Jupyter Notebook application, and the Python programming language. The research process consists of the data collection stage, prediction implementation stage (data preprocessing, processing, performance evaluation, dashboard creation), and analysis of the result. The prediction was performed for up to 92 days until May 5, 2021. The result shows a trend of increasing cases of covid reaching the highest positive value, the highest recovery, and highest death, respectively, of 8695, 6099, and 156 people. According to the model, the average positive predictive error (MAE) and the average positive predictive accuracy value (MAPE) are 0.17 and 17.4%, indicating the positive prediction of contracting covid has good accuracy criteria. The next evaluation for the death prediction is accounted as reasonable accuracy criteria in which MAE and MAPE are 0.27 and 27%, respectively. Lastly, the recovery prediction has MAE of 0.17 and MAPE of 17.4%, implying good accuracy criteria. The study also provides recommendations to the COVID-19 Task Force to prepare the minimum number of PCR Tests by 870 tests and increase the hospitalization occupancy by 294 to control the spreading of the Coronavirus.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133296879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Algorithm for Chest X-Ray Image Classification","authors":"B. A. Nugroho","doi":"10.1109/ISRITI54043.2021.9702770","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702770","url":null,"abstract":"The application of a Deep Neural Network for medical image classification has been known widely to help the tasks of an accurate doctor assessment. One of the applications is the classification of diseases from Chest X-Ray images. The NIH Chest X-Ray dataset is the most popular and the most prominent medical images database in the field. Several approaches have been made to improve the classification of the 14 classes from the dataset, including modifying network layers, handcrafting the dataset, and conducting smart-augmentation. We propose a weight modification algorithm to overcome the class imbalance problem. Hence, our objective is to improve the classification. The work's novelty is the proposed framework to improve the classification performance, which includes: (i) a novel weight calculation formula, (ii) the real-dataset augmentation into the training data. Experimental results are provided to show the improved classification performance. Our experiments are based on the standardized split-sets, which are also used by previous researches. The steady-state experiment settings are required to achieve acceptable results for the dataset. This study contributes to (i) the further cost-sensitive algorithm to train an imbalance Chest X-Ray dataset, also (ii) we provide results under identical settings compared to the previous study.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rizky Ajie Aprilianto, E. Firmansyah, F. D. Wijaya
{"title":"Review on Control Strategy for Improving The Interleaved Converter Performances","authors":"Rizky Ajie Aprilianto, E. Firmansyah, F. D. Wijaya","doi":"10.1109/ISRITI54043.2021.9702804","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702804","url":null,"abstract":"An interleaved converter provides several advantages over non-interleaved converters. Therefore, many researchers have proposed control methods to improve its performance. Control strategy generating variable-frequency (VF) switching identically with Pulse Frequency Modulation (PFM) technique is viewed as more beneficial than constant-frequency (CF) switching. Unfortunately, no specific review study observes various control strategies to obtain VF switching on the interleaved converter. This article presents a review of VF switching controls for low-power interleaved converter applications. Also, several issues are discussed related to the interleaved converter control strategy, such as technical challenges and suggested research perspectives. This review is able used as a guide for mapping control strategy based on VF switching research trends.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polynomial Tope (PT) Key Group Generation Based Received Signal Strength (RSS)","authors":"Suwadi, Mike Yuliana, Wirawan","doi":"10.1109/ISRITI54043.2021.9702835","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702835","url":null,"abstract":"In the process of sending data wirelessly, a high data security system is needed to avoid data leakage. The key generation between wireless devices using Physical Layer Security has become an attractive alternative for wireless device communication security. In this paper, we propose a Polynomial Tope (PT) key group generation which is a group key generation system from several wireless devices using a star topology. The test is carried out in indoor and semi-outdoor environments by utilizing the randomness characteristics of the wireless channel. From the measurement results, RSS is generated which is converted into Difference of Signal Strength (DS) which will be used to generate the key. Based on the test, the average Key Generation Rate (KGR) is 4.2065 bps and the Key Disagreement Rate (KDR) is 0.172 for all scenarios. In addition, the key obtained has been able to meet all the randomness requirements of the National Institute of Standards and Technology (NIST) test with a value above 0.01.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. F. Rochim, Fahmi Maghrizal Mochtar, Adnan Fauzi
{"title":"Design and Implementation of Post-Detection of Denial of Service (DoS) as a Mitigation System (PDDMS) Based on Dynamic Access Control List Algorithm","authors":"A. F. Rochim, Fahmi Maghrizal Mochtar, Adnan Fauzi","doi":"10.1109/ISRITI54043.2021.9702881","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702881","url":null,"abstract":"Computer networking maintenance and monitoring have been essential things. A human administrator could not monitor the whole resources for 24 hours and take action directly in inactive hours when an incident occurs. Automating the network appliance with the integration of an attack detection system could help solve the problem. This study mainly focuses on mitigating network attacks using the Dynamic Thresholding algorithm as a detection and mitigation system based on network automation using the Dynamic Access Control List algorithm. The data used for this research is self-generated in a virtual environment and a mitigation system written in Python to automate the router configuration through REST API. Prototype of the mitigation system, namely post-detection of DoS as a Mitigation System (PDDMS). The system testing phase results show that the mitigation system has an average of 1.57 seconds response time to configure ACL for one router. The implementation evaluated using Confusion Matrix shows 0% results of True-Positive Rate in the generated dataset, with 23.01% of accuracy and no positive results detected, which resulted in no response taken by mitigation system.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Sensing Using Adaptive Threshold Based Energy Detection in Cognitive Radio System","authors":"Budi Bayu Murti, Risanuri Hidayat, S. Wibowo","doi":"10.1109/ISRITI54043.2021.9702818","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702818","url":null,"abstract":"Wireless communication has experienced rapid development and has been widely used to meet the needs of society. However, in some real situations it shows that most of the allocated radio frequency spectrum is underutilized. Cognitive radio (CR) system is a smart technology that goals to improve the utilization of licensed spectrum frequencies by providing effective access to Secondary Users (SU). Dynamic spectrum access techniques can be used without intervention to the Primary User (PU). The main problem in CR is the sensing of the spectrum which must be able to accurately ensured the presence of a primary user signal in the licensed frequency band. In this research, a framework was conducted and developed based on the modeling of spectrum energy detection. Modeling is done on the PU signal source, AWGN communication channel, as well as the SU receiver side. Evaluation is carried out to obtain adaptive threshold value settings that can be adjusted to obtain optimum detection. Results analysis was performed statistically based on ROC graphs to determine the performance of the detection system. The results of the simulation showed that at the Pfa value that has been set, then the value of Pd will increase along with the increase in the value of SNR. The value of Pd also increase with the number of samples used. At the level of Pfa=0.1, from 500 to 1500 samples the probability of detection increases to 48 %.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116733937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agus Sulistyono, S. Mulyani, E. H. Yossy, Rakhmi Khalida
{"title":"Sentiment Analysis on Social Media (Twitter) about Vaccine-19 Using Support Vector Machine Algorithm","authors":"Agus Sulistyono, S. Mulyani, E. H. Yossy, Rakhmi Khalida","doi":"10.1109/ISRITI54043.2021.9702775","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702775","url":null,"abstract":"Currently the world is experiencing a Corona Virus Disease (Covid-19) pandemic which attacks the respiratory tract and spreads very quickly to various countries including Indonesia, so the World Health Organization (WHO) has declared Covid-19 as a pandemic. To overcome this pandemic, experts in the medical field also intervened by making vaccinations to strengthen human immunity against the Covid virus. This sentiment analysis was carried out to see opinions on the object, namely the existence of a Covid-19 vaccine. Data collection by crawling data with the keyword ‘Covid Vaccine’. The method that will be used is the Support Vector Machine (SVM). The analysis was carried out by comparing the classification accuracy values of the two SVM kernel functions, namely linear and Radial Basic Function (RBF). The results of the study obtained positive sentiment of 43.5%, negative of 19.1%, and neutral of 37.4%. Then the evaluation of the system using the confusion matrix obtained an accuracy value for the linear kernel of 79.15%, a precision value of 77.31%, and a recall value of 78.09%. While the RBF kernel has an accuracy of 84.25%, a precision value of 83.67%, and a recall value of 81.99%. While the cross validation obtained the optimum value at $mathrm{k}=1$ with an accuracy value of 80.18% for the linear kernel and 85.88% for the RBF kernel. So the RBF kernel has a higher accuracy than the linear kernel.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rushendra, K. Ramli, Nur Hayati, E. Ihsanto, T. S. Gunawan, A. Halbouni
{"title":"Development of Intrusion Detection System using Residual Feedforward Neural Network Algorithm","authors":"Rushendra, K. Ramli, Nur Hayati, E. Ihsanto, T. S. Gunawan, A. Halbouni","doi":"10.1109/ISRITI54043.2021.9702773","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702773","url":null,"abstract":"An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. This detection system must differentiate between normal data and abnormal or hacker-generated data. Additionally, the intrusion detection system (IDS) must be precise and quick to analyze real-time traffic data. Despite extensive research, there is still a need to improve detection accuracy and speed due to the tremendous increase in internet traffic volume and variety. This paper introduces a novel, efficient, and accurate approach for real-time intrusion detection and classification based on the Residual Feedforward Neural Network (RFNN) algorithm. The RFNN algorithm is developed to avoid overfitting, improve detection accuracy, and accelerate training and inference. Additionally, the suggested algorithm is highly adaptable and straightforward to accommodate different types of intrusion. The prominent NSL-KDD dataset was utilized for training and testing in this study. The accuracy obtained for two and five classes was 84.7 percent and 90.5 percent, respectively. Additionally, the identification speed was $15 mumathrm{s}$ and $14 mumathrm{s}$, respectively, indicating that real-time detection is feasible.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Digital Library Model for Validated Content-based Preservation of Traditional Javanese Songs","authors":"K. Hastuti, M. Muslih, A. M. Syarif, A. Mulyana","doi":"10.1109/ISRITI54043.2021.9702850","DOIUrl":"https://doi.org/10.1109/ISRITI54043.2021.9702850","url":null,"abstract":"The development of a digital library for the preservation of traditional Javanese songs requires the validity of the content that is part of the collection. Meanwhile, collecting traditional Javanese song data is a challenge since there is still a lot of song data stored in hard copy and data spreads everywhere. Internet-based digital libraries can be a solution for easy user access both for uploading content or accessing song data. Easy access for users to upload related content can increase the number of collections. In order to maintain the validity of the collection, user leveling based on role-based access control is implemented by dividing users into Guest, Member, Contributor and Reviewer levels with Administrator level acting as librarians. Thus, the validated content-based preservation approach proposed in the development of a digital library of traditional Javanese songs is expected to be a solution to these problems. Song data uploaded by users can be displayed in a digital library as a candidate collection, but any content that is determined to be part of the library collection must pass the validation process. It is similar to the process in the Wikipedia or similar archive sites but the proposed validation stage adopts the process in peer review journals. Furthermore, the digital library technology instruments, digital library organization and digital library environment are selected as instruments to evaluate the proposed model.","PeriodicalId":156265,"journal":{"name":"2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"65 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}