2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)最新文献

筛选
英文 中文
Theoretical Model of Determinants Factors of Health Information Technology (HIT) Acceptance 卫生信息技术(HIT)接受度决定因素的理论模型
N. Sevani, B. Marpaung
{"title":"Theoretical Model of Determinants Factors of Health Information Technology (HIT) Acceptance","authors":"N. Sevani, B. Marpaung","doi":"10.1109/ISRITI.2018.8864471","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864471","url":null,"abstract":"Knowledge of determinants factors of Health Information Technology (HIT) acceptance is important for successful implementation of the technology. So far, the Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) are commonly adopted to measure user acceptance of the technology in the medical field. However, to be implemented in developing countries, those models should be extended. One of the determinant factors that affect user acceptance of the HIT in developing countries is cost-effectiveness. Therefore, in this study, we develop a theoretical model by elaborating variables from TAM and UTAUT with cost-effectiveness. The proposed model is expected to give benefit to the healthcare provider in developing countries, to implement a proper strategy of the HIT.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Super Encryption using Transposition-Hill Cipher for Digital Color Image 数字彩色图像的换位希尔密码超级加密
Vike Maylana Putrie, C. A. Sari, D. Setiadi, E. H. Rachmawanto
{"title":"Super Encryption using Transposition-Hill Cipher for Digital Color Image","authors":"Vike Maylana Putrie, C. A. Sari, D. Setiadi, E. H. Rachmawanto","doi":"10.1109/ISRITI.2018.8864361","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864361","url":null,"abstract":"Research on cryptography in digital image continues to grow today. One of the most widely used cryptographic algorithms is Hill cipher. This method is widely applied in various cryptographic studies to decrypt data. Along with the development of technology cryptographic techniques must be developed to improve security. This study aims to improve the security of image delivery by combining the Hill cipher algorithm with column transposition method. The column transposition is applied first to randomize the image, then the Hill algorithm is applied to substitute the image value. The combination of randomization and substitution techniques produces super encryption techniques that are more resistant to various attacks. This is evidenced by the experiments conducted in this study based on the measurement of PSNR, MSE, SSIM, entropy and the encrypted image histogram. The proposed method is superior to the transposition method only, Hill cipher only and Hill cipher-transposition.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131779177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling flexibility on internal quality assurance system business process 对内部质量保证系统业务流程的灵活性进行建模
Yulherniwati, J. Jama, Ganefri, Aidil Ikhsan
{"title":"Modeling flexibility on internal quality assurance system business process","authors":"Yulherniwati, J. Jama, Ganefri, Aidil Ikhsan","doi":"10.1109/ISRITI.2018.8864325","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864325","url":null,"abstract":"The new policies and regulations of quality assurance system for higher education institutions (HEIs) in Indonesia requires many significant changes to the supporting information systems including internal quality assurance system - information system (IQAS-IS). Internal factors such as changes in organisational structures, needs of exchanging data within HEI in different formats and technology platforms also contribute to this issue. When IS didn’t provide the certain level of flexibility needed, the efforts to cope with the changes and variety are usually big and time consuming. Therefore, many times it ends up with decision to rebuild the IS. This resulted in low sustainable of IQAS-IS. This article discusses about identifying the business processes which require specific level of flexibility followed by modeling flexibility for the future IQAS-IS and then, measuring wether the proposed model of business process enabling flexibility. The identification process is done by means of literatures review, observation and focus group discussion followed by modeling using Business Process Management Notations (BPMN) and then, measuring flexibility through case analysis. By enabling flexibility to IQAS business process, the future IQAS-IS will get better operational implementation and better law implementation. Thus, IQAS-IS will be sustain and be able to support continous improvement.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128901543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Extraction and Sentiment Analysis to Indicate Hotel Service Quality in Yogyakarta based on User Opinion 基于用户意见的日惹酒店服务品质提取与情感分析
Yuliana Setiowati, Fitri Setyorini
{"title":"Service Extraction and Sentiment Analysis to Indicate Hotel Service Quality in Yogyakarta based on User Opinion","authors":"Yuliana Setiowati, Fitri Setyorini","doi":"10.1109/ISRITI.2018.8864269","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864269","url":null,"abstract":"Yogyakarta is one of the most popular tourist destinations in Indonesia. In Jogja, Malioboro is one of the most visited place for its nature, culinary, shopping, culture, and arts. Every year, in Malioboro, room occupancy rate has increased significantly. The promising tourism business had allured many online booking service provider, including Traveloka. Using Traveloka, users can reserve, give ratings and opinions on hotel services. The rating and opinion are employed to indicate hotel services quality. Later on, from the indicator, user satisfaction level can be obtained. In this study, a new approach, the rule-based method is utilized to sort out opinions containing services. Moreover, it is also employed to extract service words and opinion words. Afterward, it is utilized to identify sentiments from opinions. Because the result is still impractical, then, it is segmented according to the department and function of the hotel. From the summary, indicators of the hotel service quality can be obtained. Later, the indicators will be utilized to determine the user satisfaction level. From the experiment, it is shown that the rule-based method can be employed to sort service-based opinions and to calculate service quality indicators. The rule-based method can classify opinions based on services with precision of 0.97, recall of 1, and f-measure of 0.98. The rule-based method can classify opinions based on sentimen with precision of 0.99, recall of 1, and f-measure of 0.99. As comparison, the experiments are also performed with other methods, namely KNN, SVM, J48 and Naïve Bayes. The result shows that the rule based method achieves the best performance, compare to the other methods.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual Assistant Using Lstm Networks In Indonesian 在印度尼西亚使用Lstm网络的虚拟助手
Mirwan, Aryo Nugroho, Ferial Hendarta, Rumaisah Hidayatillah, Firdaus Hassan, Kristovel Printo Nana
{"title":"Virtual Assistant Using Lstm Networks In Indonesian","authors":"Mirwan, Aryo Nugroho, Ferial Hendarta, Rumaisah Hidayatillah, Firdaus Hassan, Kristovel Printo Nana","doi":"10.1109/ISRITI.2018.8864448","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864448","url":null,"abstract":"Researches into the development of virtual assistants that are human-like today were an active research that has been developed over the past few decades. Currently the generative model virtual assistant is a few steps towards artificial general intelligence, the smart computer with complex feelings and characteristics. One method for building the generative model virtual assistant is by using the LSTM Networks. This method has been popular for building English virtual assistant. Our aim is to test whether this method could be applied in Indonesian or not. We used the dataset from many movie subtitles in Indonesian languages. The LSTM variant that we used was the sequence-to-sequence model embedded with word2vec. The results show that the model could answer appropriately to the simple questions such as greetings. Although the models were failed to answer some complex questions, the results still give potential works on the future.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Implementation of Data Mining for Association Patterns Determination Using Temporal Association Methods in Medicine Data 基于时间关联方法的医学数据关联模式挖掘实现
L. Zahrotun, Dewi Soyusiawaty, Rahma Sara Pattihua
{"title":"The Implementation of Data Mining for Association Patterns Determination Using Temporal Association Methods in Medicine Data","authors":"L. Zahrotun, Dewi Soyusiawaty, Rahma Sara Pattihua","doi":"10.1109/ISRITI.2018.8864322","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864322","url":null,"abstract":"Clinic is one of the businesses that perform health services for people in the surrounding environment. The clinic also provides medicines that will be given to patients who conduct health checks. The problem that occurs in these clinics is that the medicine data recap is only using excel data, the purchase of medicine stocks that are conducted only based on medicine that out of stock. Based on an interview with one of the nurse at a clinic on Yogyakarta site, occassionally, there are a case that a surge of patient that running out medicine supplies, while on the other hand there are lots of medicine accumulation occurred because these medicines was not needed by the patient. This is because the clinic has not been able to predict the medicine that are often issued by the clinic. Therefore, this research aims to build a data mining program with the Temporal Association Rules method for determining the relationship between medicines which is accompanied by the date of release of the medicine.The method used in this research is Temporal Association Rules with the Apriori Algorithm to find association rules that meet the support and confidence limits, and in the testing process lift ratio is used.The results of this research are applications that able to provide information on patterns of medicine data associations and the date of medicine’s release. The test results with 8186 amount of data and support value 50% and confident value 70% with lift values above 0, the patterns of association rules obtained is 6.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Round-robin Algorithm in HAProxy and Nginx Load Balancing Performance Evaluation: a Review 轮循算法在HAProxy和Nginx负载均衡性能评估中的应用综述
Luthfan Hadi Pramono, R. C. Buwono, Yanuar Galih Waskito
{"title":"Round-robin Algorithm in HAProxy and Nginx Load Balancing Performance Evaluation: a Review","authors":"Luthfan Hadi Pramono, R. C. Buwono, Yanuar Galih Waskito","doi":"10.1109/ISRITI.2018.8864455","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864455","url":null,"abstract":"The web application is expected to be continuously available, to meet these objectives the web application must be supported by a reliable, dynamic and flexible web server. This is possible if the system utilizes more than one web server to serve requests from users. Load Balancing makes web application performance better when more than one server is used. This can improve the efficiency of the results created by the server, and reduce the traffic load from a single server and distribute the traffic load to all servers connected to load balancer. In this study a load balancing performance review will be carried out on HAProxy and Nginx by implementing the Round-robin algorithm on both load balancing servers. The results of the final conclusions of this study are which load balancing server has better performance which can later be used as a descriptive and measurable reference for future studies.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123681338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Exploiting Malay Corpus On Islamic Issue using Sketch Engine 利用Sketch Engine挖掘马来语料库中的伊斯兰问题
Roziyani bt Setik, Raja Mohd Tariqi Bin Raja Ahmad, Suziyanti bt Marjudi, Azhar bin Hamid, Wan Hassan Basri bin Wan Ismail, Zuraidy bin Adnan, Wan Azlan bin Wan Hassan
{"title":"Exploiting Malay Corpus On Islamic Issue using Sketch Engine","authors":"Roziyani bt Setik, Raja Mohd Tariqi Bin Raja Ahmad, Suziyanti bt Marjudi, Azhar bin Hamid, Wan Hassan Basri bin Wan Ismail, Zuraidy bin Adnan, Wan Azlan bin Wan Hassan","doi":"10.1109/isriti.2018.8864337","DOIUrl":"https://doi.org/10.1109/isriti.2018.8864337","url":null,"abstract":"","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive DOCR Coordination in Loop Electrical Distribution System With DG Using Artificial Neural Network LMBP 基于人工神经网络LMBP的DG环路配电系统自适应DOCR协调
D. Rahmatullah, Belly Yan Dewantara, D.P. Iradiratu K
{"title":"Adaptive DOCR Coordination in Loop Electrical Distribution System With DG Using Artificial Neural Network LMBP","authors":"D. Rahmatullah, Belly Yan Dewantara, D.P. Iradiratu K","doi":"10.1109/ISRITI.2018.8864433","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864433","url":null,"abstract":"To design the coordination protection for passive distribution system is not the tough work, while active or mesh distribution system which consists many distributed generators is quite more challenge for protection engineers. Additionally, the short circuit current will also vary if any DG in the system is offline, which causes to re-coordinate the relay protection in the system. To reset the relay protection, the engineers need more time. However In order to reduce the time of relay setting calculation, the adaptive protection coordination is proposed in this study by using artificial neural network. The study bases on the combinations of DGs’ state and the current short circuit levels as the input data and low setting of the directional overcurrent relays (DOCR) as the output data training. This research is conducted on modified IEEE 9-bus system equipped with distributed generators. After reaching convergence of Levenberg-Marquardt Back Propagation (LMBP) learning process, the results of weights and biases are compiled into the master controller to control all of the relays in the whole system. It will generate the relay setting automatically base on the results of ANN training. The results of this research have been testified in Etap simulation successfully and it is obvious that LMBP neural network is a robust method to model adaptive relay coordination system.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124599735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Method of Undersampling and Oversampling for Handling Imbalanced Data 欠采样和过采样混合方法处理不平衡数据
Shabrina Choirunnisa, Joko Lianto
{"title":"Hybrid Method of Undersampling and Oversampling for Handling Imbalanced Data","authors":"Shabrina Choirunnisa, Joko Lianto","doi":"10.1109/ISRITI.2018.8864335","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864335","url":null,"abstract":"Imbalance of data occurs in various kinds of data including natural imbalanced data. If the computation process of the imbalanced data is carried out (for example clustering), the data imbalance has the potential to cause misclassification because the majority data is more dominant on minority data which results in a decrease in accuracy. The combination method of oversampling and undersampling can be one solution in solving imbalance cases. This study aims to address the problem of imbalanced data by combining the oversampling method with the undersampling method to obtain more representative synthetic data. In this study, the undersampling methods used is Neighborhood Cleaning Rules (NCL. While Adaptive Semiunsupervised Weighted Oversampling (A-SUWO) will be used as the oversampling method. After the undersampling and oversampling process is carried out, the data will be classified using the Decision Tree C4.5 and Random Forest algorithm. Performance evaluation will be processed using the calculation of precision, recall, F-measure and accuracy.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信