{"title":"Classification of Indonesian Batik Using Deep Learning Techniques and Data Augmentation","authors":"I. M. D. Agastya, A. Setyanto","doi":"10.1109/ICITISEE.2018.8720990","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720990","url":null,"abstract":"Although batik is one of the most prestige heritage in Indonesia, many Indonesian people cannot recognize the pattern name of batik that they wear or see. Moreover, the batik varieties increase each year so batik pattern becomes harder to be identified. Based on that fact, automatic batik classification become of more importance to assist people in recognizing the batik pattern. In addition, Batik patterns are critical to being understood because there is the history behind the pattern. In order to recognize the batik pattern automatically, we implement batik classification methods using Convolutional Neural Network (CNN) that is called VGG-16 and VGG-19 and they are able to predict almost 90% correctly in classifying batik patterns. But the variation of batik images such as rotated and scaled images make the classifier cannot effectively detect the type of batik pattern. To illustrate, the batik classification accuracy becomes less than 56% when it has classified a batik pattern that is scaled 2.0. Then we train the CNN with augmented data to improve the accuracy. After all, the augmented data technique can improve the accuracy as well as 10% for rotated images or scaled images.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126821985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Location Based Service on Monito ring System of Visually Impaired Position with A-GPS Method","authors":"E. Saputra, Ema Utami, Asro Nasiri","doi":"10.1109/ICITISEE.2018.8721017","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8721017","url":null,"abstract":"Disability is a deficiency in physical, cognitive, intellectual, mental, sensory, developmental, or combination of it results in limitations on individual abilities. One of them is visually impaired. The visual impairment must face many limitations in everyday life such as visibility and often get lost when going through an environment that is not familiar to them. This study discusses the implementation of location-based services in the monitoring system of visually impaired position using the A-GPS method by sending a coordinate data of the position of the visually impaired through internet connection, which will be stored in the database, so that the position of visually impaired people can be identified and displayed on an Android-based monitoring application. From testing, the results obtained that all the functional requirements of the system were successfully met and from the results of the test accuracy obtained from the questionnaire given to users who have used this prototype, obtained a value of 83.33%, which means the accuracy and functionality of the prototype in the study this is in fair category.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icitisee.2018.8720991","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8720991","url":null,"abstract":"","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Intelligence According to Aspect-Based Sentiment Analysis using Double Propagation","authors":"Sena Wijayanto, M. L. Khodra","doi":"10.1109/ICITISEE.2018.8720961","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720961","url":null,"abstract":"Market research is necessary to plan a game. Given game reviews, response from gamers in terms of aspect and sentiment expressions, can be extracted automatically by aspect-based sentiment analysis (ABSA). This paper develops business intelligence according to the result of double propagation, an ABSA method, to provide insight for game planning. Double propagation extracts pairs of aspect and sentiment expressions, and aggregates them into aspect category. For our corpus, DP gained F-Measure of 0.6239 for extracting aspect expression, F-Measure of 0.6239 for extracting sentiment expression, and F-Measure of 0.5136 for aspect aggregation. We also applied ETL (Extract Transform Load) to transform extraction result into data mart, and employ Tableau for data visualization. The aspect expression results displayed on data visualization giving the ratio information of positive and negative sentiment, which types of aspect categories game player interested in, and which types of targets needed to be concerned in designing game.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of Soft Systems Methodology to Resolve Hoax News Problems in Indonesia","authors":"N. A. Miftahul Huda, I. Sembiring","doi":"10.1109/ICITISEE.2018.8720966","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720966","url":null,"abstract":"Hoax news often appears in social media used by people. Hoax is made with various purposes. Although the cause of the making is not clear, but the rise of hoax news in society is a threat to the Indonesian nation. The purpose of this research was to obtain data and information about the influence of news hoax against society in Indonesia and looking for solutions to problems posed by the news of the hoax. The methods used for research is the Soft Systems Methodology (SSM) which is a learning system using multi-purpose system idea to formulate the fundamental mental actions. Raw SSM cycle comprises seven stages are carried out sequentially. To test the success of the research used a table of conformity between the stages in the process of with SSM destination on the stage. The results of this research in the form of a conceptual model that contains fifteen action actions that can be performed as the basis for consideration of a decision action that can be performed as a whole or in part. Various actions are a result of this research is to conduct a clarification, creating tools, performing socializing, making arrests, create documentation, conducting seminars, and conduct research. The place was found to spread news of the hoax in this research is through online social media","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121662783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Battery Monitoring System with LoRa Technology","authors":"Devi Nur Tsyani, Asih Kurniasari, C. Hudaya","doi":"10.1109/ICITISEE.2018.8720952","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720952","url":null,"abstract":"A Prototype has been developed for monitoring lead acid battery in far distance area using LoRa SX1278 as module wireless communication. The aim of this paper is to find the reliability of LoRa as data sender. In order to reach low capital we focused on basic spring antenna which is cheap and easy to install. With cost only ten dollars per node and 25 milliwatt power, we were able to send data from battery to central point. The movement of voltage can be monitor per six seconds that will allowed us to analyzed the condition of battery such as: additional load, discharge battery, and fault. The percentage error of data sending is 0,013% and the precentage error of analog voltage reading is 0,023%. This research proved that LoRa could be the solution for rural development in Indonesia.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keylogger Is A Hacking Technique That Allows Threatening Information On Mobile Banking User","authors":"Adam Prayogo Kuncoro, B. Kusuma","doi":"10.1109/icitisee.2018.8721028","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8721028","url":null,"abstract":"Modern society is use of mobile phones for business interests, especially financial activities related to banking. The growth of mobile financial services is not only dependent on technological progress, but also on consumer confidence in the services provided. An example of banking services discussed in this study is the mobile banking application. Communities increasingly comfortable to use the application because it is easy to use and very helpful financial process. But still few people are aware of the threat of crimes that threaten financial accounts using mobile banking applications. In this study discusses the possibility of attacks that can threaten users of mobile banking services using keylogger. The forensic data is analyzed with the static method expected to obtain important information or data that can be used as digital evidence. Suppose the access log, transaction records, customer profiles, and so on. Because the important information that can be misused as a security loophole to carry out illegal access. The results showed that there is no important information that can be used for unauthorized access and the security level had been applied is good enough to secure from unauthorized access action.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133563885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Pratama, Sfenrianto Sfenrianto, A. Fajar, Arinda Amyus, Rayan Nurbadi
{"title":"A Smart Agriculture Systems Based on Service Oriented Architecture","authors":"B. Pratama, Sfenrianto Sfenrianto, A. Fajar, Arinda Amyus, Rayan Nurbadi","doi":"10.1109/ICITISEE.2018.8720989","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720989","url":null,"abstract":"Recently, technology has been advancing very fast because of the use of information technology and the ability to obtain needs that exist in various places. Furthermore, the development of Service Oriented Architecture technology is now adopted in various fields. The use of Smart Agriculture System can help people who work in an agricultural sector. Components in Smart Agriculture Systems integrated an entity such as hotel, hospital, logistic, restaurant, supermarket and traditional market who can get a message, information, and data throughout Enterprise Service Bus (ESB). Service Oriented Architecture help to share information and data very quickly because using SOA connects various actors in the material sales industry. The usage of SOA in the field of agriculture is expected to help the economy in Indonesia and also can suppress prices so it will not soar. This high price is caused by various factors such as lack of technological knowledge among farmers. There are still many brokers who become third parties from the distribution of agricultural food ingredients in Indonesia. With the implementation of SOA, it is expected to help farmers for a better living.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Budiman, Yonatan Parassa, Haerullah Haerullah, Dikwan Moeis, R. Soekarta, Muh Jamil
{"title":"The Effect of Mobile Learning Media on Student Learning Motivation in Data Structure Courses","authors":"E. Budiman, Yonatan Parassa, Haerullah Haerullah, Dikwan Moeis, R. Soekarta, Muh Jamil","doi":"10.1109/ICITISEE.2018.8720963","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720963","url":null,"abstract":"The study aims to determine the utilization of learning media data structure courses, the level of student motivation and the influence of learning media on student learning motivation. To achieve this purpose the author uses data collection techniques through observation, questionnaires, and documentation with a population of 175 students and a sample of 35 students. The data is processed using quantitative analysis to determine the effect of learning media on student learning motivation. The results showed that the level of use of learning media was in a good category, which was seen from the indicators of visual media, content media, and animated visual media. The level of student motivation is very high in terms of indicators that stimulate students, provide realistic expectations, provide incentives, and direct student behavior. The results of the analysis and testing of hypotheses show that there is a significant influence on the learning media on students’ learning motivation with a low level of influence.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Hidayat, A. R. Rafsanzani, O. Wahyunggoro, A. Cahyadi
{"title":"Local Arrival Time Field based Path Planning using Guided Waypoints for Unknown Environment","authors":"R. Hidayat, A. R. Rafsanzani, O. Wahyunggoro, A. Cahyadi","doi":"10.1109/ICITISEE.2018.8720974","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720974","url":null,"abstract":"Path planning and mapping are two key components in autonomous mobile robot. In this paper, a path planning and mapping algorithm for unknown environment is proposed. The proposed algorithm uses arrival time field combined with Lidar to handle local information and mapping. Lidar enables robot to understand the local environment by calculating Euclidean distance to guided waypoints of generated arrival time field which leads to the goal point. Arrival time generates a safe and minimum path from starting point to guided waypoints which will be renewed every time the robot is moving until it reaches the goal. The simulation demonstrates that the local arrival time field successfully leads robot to goal point safely with 0.5434 m shorter path than global arrival time field for the given environment.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127963233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}