Agus Winarno, Novi Angraini, Muhammad Salmon Hardani, R. Harwahyu, R. F. Sari
{"title":"Evaluation of Decision Matrix, Hash Rate and Attacker Regions Effects in Bitcoin Network Securities","authors":"Agus Winarno, Novi Angraini, Muhammad Salmon Hardani, R. Harwahyu, R. F. Sari","doi":"10.1109/CyberneticsCom55287.2022.9865472","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865472","url":null,"abstract":"Bitcoin is a famously decentralized cryptocurrency. Bitcoin is excellent because it is a digital currency that provides convenience and security in transactions. Transaction security in Bitcoin uses a consensus involving a distributed system, the security of this system generates a hash sequence with a Proof of Work (PoW) mechanism. However, in its implementation, various attacks appear that are used to generate profits from the existing system. Attackers can use various types of methods to get an unfair portion of the mining income. Such attacks are commonly referred to as Mining attacks. Among which the famous is the Selfish Mining attack. In this study, we simulate the effect of changing decision matrix, attacker region, attacker hash rate on selfish miner attacks by using the opensource NS3 platform. The experiment aims to see the effect of using 1%, 10%, and 20% decision matrices with different attacker regions and different attacker hash rates on Bitcoin selfish mining income. The result of this study shows that regional North America and Europe have the advantage in doing selfish mining attacks. This advantage is also supported by increasing the decision matrix from 1%, 10%, 20%. The highest attacker income, when using decision matrix 20% in North America using 16 nodes on 0.3 hash rate with income 129 BTC. For the hash rate, the best result for a selfish mining attack is between 27% to 30% hash rate.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Istiadi, Emma Budi Sulistiarini, Rudy Joegijantoro, Affi Nizar Suksmawati, Kuncahyo Setyo Nugroho, Ismail Akbar
{"title":"Expert System Integrated with Medical Record for Infectious Diseases using Certainty Factor","authors":"Istiadi, Emma Budi Sulistiarini, Rudy Joegijantoro, Affi Nizar Suksmawati, Kuncahyo Setyo Nugroho, Ismail Akbar","doi":"10.1109/CyberneticsCom55287.2022.9865639","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865639","url":null,"abstract":"Humans with weak immune systems are very susceptible to infectious diseases. Infectious diseases can cause the risk of premature death if not handled properly. This research integrates an expert system with a health care system to diagnose and treat infectious diseases. The integration system aims to optimize the database of medical records of patients. The result of the integration system is that physicians can use the medical record data in the health care system as initial instructions for examinations, and expert systems can use the medical record data to acquire new knowledge. Tests on the expert system were carried out using the Certainty Factor (CF) method on 35 medical record data. The test results obtained an accuracy value of 80%, which indicates that the expert system can diagnose the disease quite well.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Poisson MAP Algorithm for Better Image Deconvolution","authors":"Z. Al-Ameen, Zainab Younis","doi":"10.1109/CyberneticsCom55287.2022.9865641","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865641","url":null,"abstract":"Captured images are usually obtained unclear and blurry. Image deconvolution algorithms are normally applied to get clearer images from their unclear versions. Research related to this field has tremendously grown in the past years due to the increased demand for top-quality images. The maximum a posteriori (MAP) concept has been used previously for image deconvolution. Accordingly, the Poisson MAP is a simple structure iterative algorithm that was proposed for image deconvolution. Iterative means that it needs many repetitions to deliver the output image. The repetitive procedure consumes time and involves more computational costs that can be avoided. Therefore, this algorithm is modified by utilizing two non-complex acceleration factors so that the output is obtained by using fewer iterations, making the algorithm runs faster. The improved algorithm is tested intensively with various unclear images, as well as it is compared with its original version, and the outcomes are evaluated using two evaluation methods (i.e., gradient information with features (GI-F) and run-time). From performing various tryouts, the original algorithm required an average of 36 iterations and an average runtime of 0.49 seconds, while the proposed algorithm required an average of 15 iterations and an average runtime of 0.28 seconds to produce better quality results. Hence, the proposed algorithm has shown better performances than its original version by providing better-acutance results rapidly.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. G. Agung Premananda, A. Tjahyanto, Ahmad Mukhlason
{"title":"Design Science Research Methodology and Its Application to Developing a New Timetabling Algorithm","authors":"I. G. Agung Premananda, A. Tjahyanto, Ahmad Mukhlason","doi":"10.1109/CyberneticsCom55287.2022.9865661","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865661","url":null,"abstract":"Natural science research is the most common and widely used research methodology. Various fields such as physics, biology, social and behavioral apply this research methodology. However, not all research is suitable for using the natural science research methodology in computer fields such as information technology, computer science, and information systems. Research that aims to solve problems by developing an artefact is more suitable for using the design science research methodology. Unfortunately, there are still many researchers who do not understand or even do not know this methodology. In this paper, we discuss the design science research methodology framework to reintroduce this methodology. The discussion starts with the theory of design science research, which explains five stages, from the explicated problem to the evaluation stage. Furthermore, an example of the application of this methodology is presented for the timetabling problem. This application example shows how the design process was and what the results were. This paper is expected to provide knowledge to researchers, especially for researchers who should use this methodology.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Azis Satria, K. Indriawati, B. L. Widjiantoro, Akhmad Ibnu Hija, H. Nurhadi
{"title":"Lane Keeping Control Using Nonlinear Model Predictive Control on Constant Speed Autonomous Car","authors":"Muhammad Azis Satria, K. Indriawati, B. L. Widjiantoro, Akhmad Ibnu Hija, H. Nurhadi","doi":"10.1109/CyberneticsCom55287.2022.9865546","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865546","url":null,"abstract":"Lane keeping controller drives vehicle's steering to keep the vehicle driving on the track. This paper discusses lane control on a prototype autonomous car that moves at constant speed, using a nonlinear predictive control (MPC) model which is used to calculate the optimal steering angle based on lateral deviation information. The predictive lateral deviations are obtained from the linear parameter varying (LPV) model while the current lateral deviation value is obtained from the lane detection algorithm which produces a reference trajectory for the car. The lane detection uses image processing towards images captured by the camera. The real time experiment result shows that the proposed controller could keep the prototype to stay on track until the curvature of 0.27 m-1 with the maximum lateral deviation of 8.86 cm.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125120195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer Clustering Based on RFM Features Using K-Means Algorithm","authors":"Wafa Essayem, F. A. Bachtiar, Diah Priharsari","doi":"10.1109/CyberneticsCom55287.2022.9865572","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865572","url":null,"abstract":"Offering targeted products and services to customers is the key driver to a successful business. In recent years and with the simplified access and gathering of data, companies are adjusting their marketing strategies to retain and attract new customers. One of the methods organizations adopt, is customer clustering. Customer clustering, as part of Customer Relationship Management, is useful when companies wish to offer services, discounts and targeted advertising campaigns to specific customers based on their preferences. One of the techniques widely used in this task is RFM based clustering using K-Means clustering algorithm. The clusters obtained by the algorithm are then further analyzed to set marketing strategies. In this research we cluster customers of a retail store based on RFM features using K-Means clustering algorithm. For the task, we use the available POS data of the store. Clusters obtained are analyzed using Silhouette analysis technique and compared to the observations in the retail store. We found that one of the clusters indicates possible customer churn while another showed potential loyal customers. These clusters can be used to set special marketing strategies to retain and win back customers.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alim Misbullah, Laina Farsiah, Nazaruddin, Furqan Hermawan
{"title":"Voice-Zikr: A Speech Recognition System Implementation for Hands-Free Zikr Based on Deep Learning","authors":"Alim Misbullah, Laina Farsiah, Nazaruddin, Furqan Hermawan","doi":"10.1109/CyberneticsCom55287.2022.9865318","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865318","url":null,"abstract":"Speech recognition is a branch of pattern recog-nition that has been widely implemented in products. Some well-known products that used speech recognition systems include Google Assistant, Apple Siri, and Alexa which have high accuracy to produce output with user expectations. Recently, deep learning is one of the techniques that is often used to build models in speech recognition systems. The technique works to keep information in its hidden layers from audio frames as input features and phones as output labels respectively. Zikr is one of the Muslim worship activities that can be done at any time. Several tools and applications have been created to count the zikr words while repeatedly speaking them. In this research, the speech recognition system is implemented to create an application called voice-zikr that is used to count the zikr words spoken by Muslim people. The speech recognition model is trained using time delay neural networks with 5 hidden layers. The dataset was collected from different ages of speakers who read “Subhanallah”,” Alhamdulillah”, “Lailahaillallah”, and”Allahuakbar”. The model performance can reach 1.04 %WER on recorded audio testing and work perfectly on microphone testing,","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. T. Anwar, Mailia Putri Utami, Laksmi Ambarwati, Abdul Wahid Arohman
{"title":"Identifying Social Media Conversation Topics Regarding Electric Vehicles in Indonesia Using Latent Dirichlet Allocation","authors":"M. T. Anwar, Mailia Putri Utami, Laksmi Ambarwati, Abdul Wahid Arohman","doi":"10.1109/CyberneticsCom55287.2022.9865493","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865493","url":null,"abstract":"Understanding public perceptions regarding EVs is important so that strategic decisions could be made in developing the EV ecosystem in a country. However, given the large and various aspects of EV adoption, it is very hard to decide which aspects are more important and need to be addressed first. The identification of topics can be facilitated by using topic modeling applied to social media data. This research aims to identify social media conversation topics regarding electric vehicles in Indonesia using Latent Dirichlet Allocation. Tweet search resulted in 11565 tweets which 1746 of them are unique tweets were collected between February 13 to March 9, 2022, using the tweepy library in Python. The LDA modeling resulted in 5 major topics regarding EVs in Indonesia i.e: the ecosystem development (42.9%), the positive impact on the environment (24.1%), the development of the domestic electric vehicle industry (17.5%), the convenience / supporting facilities for electric vehicles (9.7%), and the investment in battery-based electric vehicle production (5.7%). The anecdotal findings and the limitation of this study are discussed.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sifa Novwidia Agni, G. Wibisono, I. K. A. Enriko, Kalam Adhiansyah Lutfie
{"title":"Correlation of Relationship Business Model and Business Strategy: Case Study PT Telkom IoT","authors":"Sifa Novwidia Agni, G. Wibisono, I. K. A. Enriko, Kalam Adhiansyah Lutfie","doi":"10.1109/CyberneticsCom55287.2022.9865380","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865380","url":null,"abstract":"PT TELKOM is part of the IoT ecosystem that provides IoT services as well as network operation and connection. The success of PT TELKOM's business strategy can be seen in the business model it has. However, the relationship between the business model and business strategy is not yet clearly known. The results of the questionnaire are then processed by methods of analyzing factors and canonical correlations to see the dominating factors of the business model and business strategy and see the relationship between the two variables. Then using the SWOT method to provide strategic recommendations to the company. item X13 at value proportion X23 on the value network and X41 in value architecture is the dominant item reflected in the business dimension of this model. items Y12 on Unfold, Y21 and Y22 on Coordinate, Y33 on Communicate, Y42 on Control, and Y52 on Recognize and Develop are the dominant items reflected in the business strategy dimension and also show there is a relationship between business model and business strategy with a canonical correlation of 87.886%. The results of matrix analysis I-E, then developed using SWOT analysis, where the results obtained that the company in Quadrant I. namely the strengths owned by the company are better than existing weaknesses, and the company still has wider opportunities or opportunities than the threat to be faced.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130188242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEM for Predicting in Determining Factor of Social Customer Relationship Management Adoption in SMEs","authors":"Hani Purwanti, A. F. Rochim, B. Warsito","doi":"10.1109/CyberneticsCom55287.2022.9865618","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865618","url":null,"abstract":"The increasing use of social media is challenging the old concept of customer relationship management (CRM). Social CRM strategy is a new model of CRM that applies social technology by presenting a new way to manage customer relationships. Compared to traditional CRM, social media is an affordable tool for SMEs to compete in the global market. Although the application of social CRM can increase business in SMEs, the implementation of social CRM still requires various conditions, especially for SMEs with limited resources. So for the adoption of social CRM, it is necessary to determine the factors that influence the adoption of social CRM in SMEs. This study aims to predict the adoption of social CRM by proposing a TOEP application model and developing several hypotheses that test the function of technology factors, Organizational factors, Environment factors, and Information Process factors. The proposed hypothesis model was tested using the SEM method on data taken from SMEs in the Banyumas area with a sample of 115 SMEs. This study finds that Relative Advantage, Complexity, Compatibility CRMS, Employee IT/SI Knowledge, Government Support, Information Use, Information Retrieval are the most important factors influencing the adoption of social CRM. This study differs from previous studies because it proposes a new model, namely the TOE adoption model and the information process factor as an additional factor to determine the factors that affect social CRM in SMEs.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}