{"title":"Fraud detection on event logs of goods and services procurement business process using Heuristics Miner algorithm","authors":"Dewi Rahmawati, Muhammad Ainul Yaqin, R. Sarno","doi":"10.1109/ICTS.2016.7910307","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910307","url":null,"abstract":"Event logs are history records that contain sequence data for the activity of a case that has been executed by an information system. Event logs can be valuable information with a technique called mining process. With this technique, cheating on the business processes of an enterprise can be detected early on. Thus, the company can commit further examination of business processes, especially the business process of procurement of goods and services to achieve business process is expected.[8] In this study, management data of event log obtained from log data at each event transaction procurement and services. The event log data is then analyzed using a heuristic miner algorithm. Heuristics miner algorithm chosen because it has advantages that are not owned by Alpha++ algorithm that this algorithm can calculate the frequency relation between activities in the log to determine the causal dependency. Heuristic Miner can be used to determine the predominant process of thousands of logs and detect behaviors that are not common in a process.[11] This study aims to detect anomalies on business processes that occur during the process of procurement of goods and services by calculating the fitness value of the event log into the system. Heuristic miner algorithm using the results obtained identification accuracy of 0.88%.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130612901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Google Trend data in forecasting number of dengue fever cases with ARIMAX method case study: Surabaya, Indonesia","authors":"Wiwik Anggraeni, Laras Aristiani","doi":"10.1109/ICTS.2016.7910283","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910283","url":null,"abstract":"Indonesia has the highest number of dengue fever cases in Southeast Asia. Early detection of the disease is required in order to be able to prepare preventive measures against dengue fever. Previous research has shown that certain query search related to communicable disease on Google Trends are highly correlated with number of communicable disease cases in South Korea. Based on previous research, Google Trends search index shows potential to be included as external variable in a multivariate quantitative forecasting model. Using time series model, the role of Google Trends on epidemiology of dengue fever transmissions in Surabaya will be analyzed. This research uses several data (1) Number of dengue fever cases obtained from general local hospital of Dr. Soetomo (2) Google Trends search index of certain queries related to dengue fever. All of the data spans from December 2010 – August 2015. Interpolation and extrapolation techniques are used to handle the missing data. ARIMA and ARIMAX model with Google Trends data are implemented in order to forecast the number of dengue fever cases. The research shows that the addition of Google Trends into ARIMAX model improves forecasting performance. The best ARIMAX with Google Trends model improves MAPE value by 3%.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130625094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Ardiyanto, H. A. Nugroho, Ratna Lestari Budiani Buana
{"title":"Maximum entropy principle for exudates segmentation in retinal fundus images","authors":"I. Ardiyanto, H. A. Nugroho, Ratna Lestari Budiani Buana","doi":"10.1109/ICTS.2016.7910284","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910284","url":null,"abstract":"This paper addresses a novel segmentation algorithm for detecting one of the diabetic retinopathy pathologies, called “exudates”. Exudates segmentation is ordinarily examined from retinal fundus images by various image processing techniques. Instead of carefully picking up the specific exudates features on the retinal images as has been done by the other works, our scheme is to observe global information of the retinal images. The global information, as well as spatial information, is extracted by maximum entropy-based thresholding. The proposed algorithm determines a reasonable threshold value for separating exudates areas, which are usually sparse and brighter, from the rest of images. This approach also ensures and minimizes the illumination variance effects of different images since it takes into account the global information. In addition to the proposed algorithm, luminance channel of the retinal images is exploited for pre-processing stage. After the optical disc which has similar characteristic to the exudates is separated, the pathological areas are subsequently acquired. Evaluations on the E-OPHTHA-EX retinal fundus images database show the advantages of the proposed approach, with the accuracy 99.4 percent, specificity 99.6 percent, and sensitivity 16.9 percent.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering of SSH brute-force attack logs using k-clique percolation","authors":"H. Studiawan, B. Pratomo, R. Anggoro","doi":"10.1109/ICTS.2016.7910269","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910269","url":null,"abstract":"The brute-force attacks to SSH service still persist in the server environments. The existing methods have not applied graph theory to analyze authentication log that records this attack. Therefore, we model the log as a graph and propose k-clique percolation to cluster auth.log file to assist the system administrators to inspect this incident. The k-clique percolation has proven in clustering of biological networks and we will deploy it to this problem. We then provide the mechanism for edge removal to separate the generated clusters and make clear the clustering outputs. The experimental results show that this approach is appropriate to cluster raw logs of SSH brute-force attacks.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics simulation of air passenger forecasting and passenger terminal capacity expansion scenario in Yogyakarta Airport","authors":"B. Amaliah, Azizha Zeinita, E. Suryani","doi":"10.1109/ICTS.2016.7910296","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910296","url":null,"abstract":"Adisutjipto International Airport Yogyakarta has reached four times more than capacity allowed in 2015. The building capacity only accommodate 1,5 million passengers per year, but in 2015 there were 6 million passengers. For this reason, in 2016 the airport developing new airport, Kulon Progo Airport. Actually, since 2003, passenger terminal capacity already exceeded two times capacity allowed. To solve this problem, this research proposed new modeling-simulation-dynamic-system, that combine between GDP, population, terminal capacity and regulation from minister of transport to forecast passenger demand and time to expansion the airport. Simulation model utilized historical data in 2005–2015 to generate forecasting for 2016–2050. There were three scenarios used as consideration in determining policy, such as pessimistic, most likely, and optimistic scenario. In the pessimistic scenario models, the ideal for development is before 2031. In the most likely scenario models, the ideal time for development is before 2025. While the model of the optimistic scenario, the ideal time for development is before 2024.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"NS24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a gamification for monitoring Surabaya City development","authors":"Nur Aini Rakhmawati, Bagus Fibrianto","doi":"10.1109/ICTS.2016.7910309","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910309","url":null,"abstract":"The City hall of Surabaya has a website that allows Surabaya citizen to write a proposal of Surabaya development. This websites also give information to the citizen about response of government toward the proposals which are uploaded by citizen. However, the status of the proposals cannot be monitored by citizen using the website. Therefore, a web application Monitoring dan Visualisasi Musrenbang or called Monvis-Musrenbang is developed to facilitate a citizen in terms of monitoring and tracking their proposals. The more citizen participate in giving feedback, the more accurate the information are. The web application should increase and maintain the citizen activity in giving the feedback. Thus, a gamification is implemented over the web application. The gamification system is designed based on User-centered approach. A user earn points after doing an activity or completing an event. The activity and event are formulated clearly in this paper. A group of people are asked to do set of activities before and after the gamification implementation. The evaluation results reveal that the gamification design can stimulate a citizen to do an activity without changing his motivation.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Novia Andriani, Muhammad Doni Maulida, Yunafi'atul Aniroh, Miftahul Falahi Alfafa
{"title":"Pressure control of a wheeled wall climbing robot using proporsional controller","authors":"Novia Andriani, Muhammad Doni Maulida, Yunafi'atul Aniroh, Miftahul Falahi Alfafa","doi":"10.1109/ICTS.2016.7910285","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910285","url":null,"abstract":"The increased interest in the development of wall climbing robot has been shown in the past decade. Wall climbing robot with the ability to maneuver on vertical surfaces capable of performing dangerous operations such as multi-storey building inspection, surveillance, reconnaissance, assist in firefighting and rescue. By using this wall climbing robot costs become cheaper and less risky. Design wall climbing robots are wheeled robot. This robot is configured with two motors for the wheels, a suction motors, batteries, control movement, and sensors. To create a robot attached to the wall, the robot is equipped with suction. The main sensors used are pressure sensors, to monitor the level of pressure in the vacuum space. Sensors connected to arduino mega generate control inputs for suction motors. The controller used is proportional controller. Proportional controller is used to keep the pressure on the robot to remain constant at surface conditions that vary according to a certain set point.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HTTP communication latency via cellular network for Intelligent Transportation System applications","authors":"Michael Ardita, Suwadi, A. Affandi, Endroyono","doi":"10.1109/ICTS.2016.7910268","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910268","url":null,"abstract":"Intelligent Transportation System (ITS) relies on the performance of wireless network. The cellular networks performance should be explored before building an application to obtain optimal system. In this paper, the wireless network performance is evaluated from latency of information delivery by using hypertext transfer protocol (HTTP). The tests of 3G and LTE networks are performed in static and mobile conditions. Based on measurement result of cellular network in mobile conditions, the best application using HTTP platform for ITS in mobile environment is text based communication between mobile units and traffic management center.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarwosri, Muhammad Jabir Al Haiyan, Mujahid Husein, Aditya Putra Ferza
{"title":"The development of method of the enhancement of Technical Factor (TF) and Environmental Factor (EF) to the Use Case Point (UCP) to calculate the estimation of software's effort","authors":"Sarwosri, Muhammad Jabir Al Haiyan, Mujahid Husein, Aditya Putra Ferza","doi":"10.1109/ICTS.2016.7910299","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910299","url":null,"abstract":"Use Case Point (UCP) is one of many approaches used for software project estimation. This approach is implemented by calculating effort estimation based on prediction a total number of workers and software development time. UCP was fist introduced by Karner on 1993. This approach is widely used. It was because some research on UCP showed that UCP approach is better than those approaches developed by experts. The calculation of effort estimation that was mentioned in the paper (Chetan Nagar, 2011), it has been proven that calculation estimation using UCP sometimes doesn't fit the real effort. This leads to the difference in cost calculation and a total number of workers on software development project.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}