2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)最新文献

筛选
英文 中文
Social Media Warfare in Indonesia Political Campaign: A Survey 印尼政治竞选中的社交媒体战:一项调查
F. E. Nastiti, R. A. Prastyanti*, Restiadi Bayu Taruno, Dedy Hariyadi
{"title":"Social Media Warfare in Indonesia Political Campaign: A Survey","authors":"F. E. Nastiti, R. A. Prastyanti*, Restiadi Bayu Taruno, Dedy Hariyadi","doi":"10.1109/ICITISEE.2018.8720959","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720959","url":null,"abstract":"Social Media has a strategic role in political competition. By using social media, information delivery to the public becomes faster. As a medium of mass information dissemination with broader penetration in society, social media has adverse effects in its use, such as unhealthy competition, hate-speech spreader means, hoax propagation facilities, to the means of spreading of radical, ethnic, and religious issues. In the world of Politics, Social media is used as a weapon (Cyber warfare) as a material to attack opponents with spreading of radical, ethnic, and religious issues issues. The Government of Indonesia has made various efforts in combating cyber warfare, through the Electronic Information and Transaction Act, purchasing ICT devices to detect and action against the spread of negative issues on social media in Indonesia. However, some Indonesians still consider the Government’s lack of role in tackling social media war in Indonesia. This is due to the lack of literacy gained by the people of Indonesia. This paper we explain the efforts of the Government of Indonesia in the prevention of social media warfare, focusing on information technology aspects used by the Indonesian government in tackling hoax and propaganda content spreader on social media. We offer a discussion on the adoption of social media propaganda countermeasures that have been done by developed countries in filtering social media into a means of trusted information","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial Neural Network Utilization for Analyzing Sentiment Polarity in Electronics Product Reviews 利用人工神经网络分析电子产品评论中的情感极性
Bambang Pilu Hartato, Tri Astuti, Irnawati Pratika, R. Wahyudi, Irfan Santiko, Andi Riyanto
{"title":"Artificial Neural Network Utilization for Analyzing Sentiment Polarity in Electronics Product Reviews","authors":"Bambang Pilu Hartato, Tri Astuti, Irnawati Pratika, R. Wahyudi, Irfan Santiko, Andi Riyanto","doi":"10.1109/ICITISEE.2018.8720987","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720987","url":null,"abstract":"Intelligent systems currently have been proven to provide more benefits on various aspects of human life. One of them is sentiment analysis (SA) approach. SA is a mathematical approach that allows machines to analyze the opinion polarity of the statements or documents. Generally, SA is utilized to observe the tendency of public opinion on an issue. SA can also be used on e-commerce to analyze the trend of customer statements toward a product based on the reviews given by them. Thus, SA will help e-commerce business owners to know the level of acceptance toward offered products. In this paper, we try to evaluate the artificial neural network (ANN) algorithm in conducting a SA of electronic products reviews. In this study, the ANN was designed using 1 input layer, 1 hidden layer consisting of 10 neurons, and 1 output layer consisting of 2 neurons. Our experimental results showed that the ANN had a fairly high accuracy and precision while conducting SA toward electronic products reviews that have been carried out, i.e. 70.80% and 71.07% respectively. Hence, ANN is very possible to be applied to intelligent systems that are tasked to assist e-commerce business owners in conducting SA toward feedback provided by the customers.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the Bioinformatics Resource Portal 生物信息学资源门户的评估
E. Budiman, N. Puspitasari, Haerullah, Muh Jamil, M. Wati, Abbas Saudek
{"title":"Evaluation of the Bioinformatics Resource Portal","authors":"E. Budiman, N. Puspitasari, Haerullah, Muh Jamil, M. Wati, Abbas Saudek","doi":"10.1109/ICITISEE.2018.8720973","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720973","url":null,"abstract":"Motivated by the idea that “every species must be saved by all means”. A balance between the goals of conserving biodiversity and other needs in various decisions and interests. Conservation of biodiversity is the responsibility of everyone, contributing to their respective roles according to their resources. The purpose study was to apply the plant ontology and taxonomy model for the development and exploration of Borneo biodiversity data. Building a local biodiversity database, collecting data plants for to purpose of sharing data and information at the global, national and local levels. The Borneo Biodiversity Resource Portal is the basis for the preparation of the Regional Biodiversity Strategy and Action Plan. Software development method uses Model View Controller with the LARAVEL Framework. Evaluation of the portal focused on the performance of QOS resource portals using Web Performance Optimization (WPO) techniques. To date, data collection results in the portal store 233 records of medicinal plants, 1482 records of tree species and endemic, 86 wood records and characteristics, and 80 records of bamboo species.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Heart Failure Decision Support System Using Semantic Web Approach 基于语义Web的心力衰竭决策支持系统
M. Furqon, Nur Aini Rakhmawati, Faizal Mahananto
{"title":"Heart Failure Decision Support System Using Semantic Web Approach","authors":"M. Furqon, Nur Aini Rakhmawati, Faizal Mahananto","doi":"10.1109/ICITISEE.2018.8720984","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720984","url":null,"abstract":"Heart failure is a health problem that continues to grow in the world with the number of heart failure patients more than 20 million people. The mortality rate caused by heart failure, especially in Indonesia is quite high due to indifference to symptoms of heart failure. An expert system is needed that is used to predict heart failure and provide a decision support for doctors to take action on patients with heart failure. This paper is a systematic literature review that provides insights related to the semantic method used to heart failure decision support. The methodology used in this study includes (1) defining the research questions; (2) defining the literature search strategy; (3) defining the study selection criteria; (4) study quality assessment; and (5) data extraction and synthesis. Based on the results of a systematic literature review, several semantic methods such as Ontology, SWRL, and Bayesian networks are used in making a support system for heart failure. There are some features that are used in predicting heart failure such as patient information, symptoms, blood test, ECG, etc.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure E-Payment Method Based on Visual Cryptography 基于视觉密码的安全电子支付方法
Trihastuti Yuniati, R. Munir
{"title":"Secure E-Payment Method Based on Visual Cryptography","authors":"Trihastuti Yuniati, R. Munir","doi":"10.1109/ICITISEE.2018.8720999","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720999","url":null,"abstract":"In recent time there is a rapid growth in the online shopping market. With ever increasing popularity of the online shopping, debit or credit card fraud and personal information security are major concerns. Phishing and identity theft are common threats to online shopping. Phishing is a method of stealing personal confidential information, such as username, password, credit card details, from legitimate user. In this paper, we have proposed a credit card payment method using visual cryptography. Visual cryptography is applied to captcha generated by the merchant during the registration phase, to a text file containing credit card details sent by the Merchant Plug-In to the Card Provider Directory Server, and to Quick Response Code containing One Time Password that is used to authorize payment transaction. The purpose of this method is to improve e-payment security, especially in terms of authentication, authorization, and confidentiality. This method provides limited credit card details to the merchant and prevents phishing and identity theft so that the customer’s confidence will increase.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICITISEE 2018 Conference Organizer 2018年会议组织者
{"title":"ICITISEE 2018 Conference Organizer","authors":"","doi":"10.1109/icitisee.2018.8720950","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8720950","url":null,"abstract":"","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131751858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness analysis of PID controller Bidirectional SEPIC/Zeta for Energy Management in DC Nanogrid Isolated System 直流纳米栅隔离系统能量管理PID控制器双向SEPIC/Zeta鲁棒性分析
F. Murdianto, M. Z. Efendi, K. Widarsono, Miftahul Azizi
{"title":"Robustness analysis of PID controller Bidirectional SEPIC/Zeta for Energy Management in DC Nanogrid Isolated System","authors":"F. Murdianto, M. Z. Efendi, K. Widarsono, Miftahul Azizi","doi":"10.1109/ICITISEE.2018.8721036","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8721036","url":null,"abstract":"Renewable energy is needed to reduce sources of electrical energy utilization derived from coal and fossil fuel. Photovoltaic is a component of renewable energy that used sunlight to produce electrical energy. The problem that occurs in photovoltaic is the output power that changes depending of light intensity. That problem causes the output power in the Photovoltaic to supply the load to be unstable due to changes in sunlight The solution of the problem is using the bidirectional converters. The bidirectional converter are currently widely used to store excess power in energy storage system and keep output voltage of the system on stable condition. Therefore this problem requires a good control to be applied to the bidirectional converter. The PID controller can be applied to the bidirectional converter to keep the voltage on the DC bus steady at the set point. Therefore, this paper proposed the performance of bidirectional SEPIC/Zeta converters using PID controller to solve that problem. The experiment result shows the PID controller can keep the DC bus voltage in stable condition. Average time speed to reach set point when charging mode is 1,024 ms with average error is 0,08%. On the other side average time speed to reach set point when discharging is 1,288 ms with average error is 0,6012%.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sentiment Analysis of Law Enforcement Performance Using Support Vector Machine and K-Nearest Neighbor 基于支持向量机和k近邻的执法绩效情感分析
Sean Semuel Istia, H. Purnomo
{"title":"Sentiment Analysis of Law Enforcement Performance Using Support Vector Machine and K-Nearest Neighbor","authors":"Sean Semuel Istia, H. Purnomo","doi":"10.1109/ICITISEE.2018.8720969","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720969","url":null,"abstract":"Sentiment analysis or opinion mining is a method to group opinions or reviews into positive or negative. It is important sources for decision making and can be extracted, identified as well as evaluated from online sentiments reviews. This research discussed sentiment analysis in law enforcement on a law case in Indonesia. The analysis uses Support Vector Machine and K-Nearest Neighbor (KNN) for data classification integrated with Particle Swam Optimization (PSO) to increase their performance. The experiment results show that PSO increase the performance of both algorithmof the paper is PSO method make value SVM with PSO where value C = 1.0 and Epsilon = 1.0 accuracy 100% while for algorithm KNN with PSO 93.08%. This result show SVM algorithm more accurate than KNN algorithm by using PSO optimization. The performance of law enforcers in the trial case get more positive responses from the people of Indonesia in accordance with their comments or tweets in social media.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Huffman Coding Medical Image Watermarking with Compressive Sensing L1 Norm 压缩感知L1范数的Huffman编码医学图像水印
Rana Krisnanda, Irma Safitri, Achmad Rizal
{"title":"Huffman Coding Medical Image Watermarking with Compressive Sensing L1 Norm","authors":"Rana Krisnanda, Irma Safitri, Achmad Rizal","doi":"10.1109/ICITISEE.2018.8721012","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8721012","url":null,"abstract":"In this study, we propose compressive sensing (CS) and 2D-DCT Huffman coding for medical image watermarking. The methods used are CS, L1 Norm, 2D-DCT, Huffman coding and discrete wavelet transform (DWT). Experiment results show that images have SSIM = 1 for the system without attacks which indicates that the decompressed image will be exactly the same as the original image before being compressed. Our system is added by several attacks, namely JPEG compression, rotate, scaling, filter, AWGN, and salt & pepper. System added with attacks have the best SSIM = 1, BER = 0.0146 and PSNR = 57.1702 dB.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Speed Gablind App in Detecting Obstacle-Experiment Results 速度gablindapp在障碍物检测中的应用分析-实验结果
A. C. Frobenius, Ema Utami, Asro Nasiri
{"title":"Analysis of Speed Gablind App in Detecting Obstacle-Experiment Results","authors":"A. C. Frobenius, Ema Utami, Asro Nasiri","doi":"10.1109/ICITISEE.2018.8720964","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720964","url":null,"abstract":"Disability is the limited ability of an individual to perform a certain activity. One of them is a blind person, who has limitations in vision. This limitation of conditions makes blind people have the low mobility to carry out daily activities. Blind people need to be able to interact with the surrounding environment and have better security. Although, there are traditional tools used by blind people in daily activities such as sticks or dogs, the more advanced era makes technology more advanced development. This device has been made, one of which is a tool called Gablind. Gablind is a glasses tool that is equipped with electronic components and connected to a smartphone application called Gablind app. This tool can detect obstacles in their environment and provide navigation and instructions through the smartphone application. This research focuses on the Gablind app speed to the max sonar sensor to detect obstacles. Max sonar sensors on glasses is used to detect the environment in front of the blind. Gablind App on the android smartphone provides sound output and provides navigation for the visually impaired. This research used the standard deviation approach. The distance captured on the Max sonar sensor was 1 to 6 meters. The captured angle was from 450 to 1450. Gablind App speed on the smartphone worked effectively at speeds 21 to 66.8 cm / s to detect obstacles with distance 123 cm to 63 cm. The standard deviation value was less than one meaning that the data collected was homogeneous.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信