Ratnasari Nur Rohmah, H. Supriyono, Agus Supardi, Hasyim Asyari, Riant Rahmadi, Yana Oktafianto
{"title":"IoT Application on Agricultural Area Surveillance and Remote-controlled Irrigation Systems","authors":"Ratnasari Nur Rohmah, H. Supriyono, Agus Supardi, Hasyim Asyari, Riant Rahmadi, Yana Oktafianto","doi":"10.1109/ICoICT52021.2021.9527438","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527438","url":null,"abstract":"This research applies IoT technology to help farmers overcome two problems by proposing an agricultural land surveillance system and a remote-controlled irrigation system. The agricultural land surveillance system in this research was designed to detect object’s motion, take pictures of objects, and send image data to the user’s smartphone. The surveillance system also provided a live streaming video mode by request. The irrigation system was designed to monitor temperature, send data to the user, and allowing the control of water pump operation remotely by the user via a smartphone. Tests on systems performance show that both systems performed properly. In the surveillance system, the optimal distance for motion detection by the sensor was 6 meters. On sunny days, the time needed from taking the image when motion was detected and notification received by the user was 4.9 seconds while the interval from notification to the image sent was 3.9 seconds. In live streaming video mode, the user must wait 2.3 seconds on average to receive live streaming video on a smartphone. In the irrigation system performance, the average temperature measurement error of the sensor was 1.49%. Sensor data transmission to the user’s smartphone works well and the user can remotely control the pump operation.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberbullying Detection on Indonesian Twitter using Doc2Vec and Convolutional Neural Network","authors":"Shindy Trimaria Laxmi, Rita Rismala, Hani Nurrahmi","doi":"10.1109/ICoICT52021.2021.9527420","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527420","url":null,"abstract":"Cyberbullying is the act of threatening or endangering others by posting text or images that humiliate or harass people through the internet or other communication devices. According to a survey from Polling Indonesia and Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) about cyberbullying, 49% of 5900 participants claimed they have been bullied. Therefore, this research was conducted with the intention to prevent cyberbullying acts, especially in Indonesia. We collected data from Twitter based on Twitter’s Trending keywords which correlated to cyberbully events. Then we combined it with the data from previous research. We obtained a total of 1425 tweets, consists of 393 data labeled as cyberbully and 1032 data labeled as non-cyberbully. Thereupon, we build a Doc2Vec model for features extraction, and a classifier model using the baseline classification method (SVM and RF) and CNN to detect cyberbully texts. The results show that the classifier using CNN and Doc2vec has the highest F1-score, 65.08%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elvaretta Dian Detiana Yucky, Aji Gautama Putrada, M. Abdurohman
{"title":"IoT Drone Camera for a Paddy Crop Health Detector with RGB Comparison","authors":"Elvaretta Dian Detiana Yucky, Aji Gautama Putrada, M. Abdurohman","doi":"10.1109/ICoICT52021.2021.9527421","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527421","url":null,"abstract":"This paper proposes the system of paddy crop health detector using drone camera. Indonesia is an agricultural country that has very large agricultural land, where every plant health monitoring activity is done manually. However, applying technological developments in land monitoring activities will shorten time and increase work efficiency. In this paper a drone with a raspberry pi camera has been used to capture several images of rice fields from several areas. The image data is processed into a digital leaf color chart (LCC) through the process of image acquisition, RGB color extraction, and k-Nearest Neighbor (k-NN) classification. The data has been compared with the real LCC, which is a reference to the health color of rice plants. The paddy fields that are used as the research material are 25 days after planting. The result shows that the precision of the method is 88.89%, the recall is 93.02%, the accuracy is 98.22%, and the specificity is 98.77%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1991 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spam Detection on Indonesian Beauty Product Review","authors":"Muhammad Ahsan Athallah, A. Romadhony","doi":"10.1109/ICoICT52021.2021.9527409","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527409","url":null,"abstract":"A product review is one of the most important sources of information that can help consumers to find the most suitable products for their needs. However, there is a chance a reviewer has other intentions than providing an honest review, including advertising the brand or other brands. A review that does not contain any information related to the product’s aspects/features could be considered spam. This paper presents our work on spam review detection, specifically in the domain of beauty products. We used SVM and Logistic Regression classifier and the following features: the review sentiments, product-related features, and review-centric features extracted from the reviews. We classified the beauty product review texts as spam and non-spam reviews. The experimental result showed that the best accuracy percentage was 81%, obtained when we used the sentiments and review-centric features with the SVM algorithm.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122416638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ransomware Detection on Bitcoin Transactions Using Artificial Neural Network Methods","authors":"Hairil, N. Cahyani, H. Nuha","doi":"10.1109/ICoICT52021.2021.9527414","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527414","url":null,"abstract":"The use of digital currency or cryptocurrency in various virtual transactions is common due to its easiness. Cryptocurrency is a digital currency that is used for virtual transactions on the internet network. The most common types of cryptocurrencies include Litecoin, Ethereum, Monero, Ripple, and Bitcoin. Even though cryptocurrencies have secret codes that are quite complicated and complex that serve to protect and maintain the security of digital currencies, it is possible to be hacked by skilled hackers. Cryptocurrency-related hacking is a type of digital crime that is very harmful or dangerous acts. For example, in recent years, cases of hacking on bitcoin transactions using ransomware have been on the rise. Ransomware is malicious software that secretly infects a victim’s device, and suddenly asks for a ransom to decrypt encrypted data. This type of malware aims to blackmail a victim whose computer is infected with ransomware by asking for a certain amount of money as a ransom. Therefore, a design was built in the form of a ransomware detection system based on available bitcoin heist data so as to minimize hacking attacks against cryptocurrency in the future. The ransomware detection system was built using the backpropagation artificial neural network method using Weka software. The best results in data testing are using the parameter number of hidden layer with 9 neurons; learning rate 0.1; and the number of iterations of 5000 yields an accuracy rate of 97%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125510240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Stationary Order of Vector Autoregression in Significant Ocean Wave Forecasting","authors":"Fikka Raudiya, A. A. Rohmawati, D. Adytia","doi":"10.1109/ICoICT52021.2021.9527502","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527502","url":null,"abstract":"This paper studies the implementation of non-stationary multivariate time series model to fit the ocean wave data. A model comprises from a regression term and associate with exogenous variables in a particular time horizon. Because of the trend fluctuation in the data leading to unstable process, differentiated data are used in fitting the model. The approach suggested is applied to the finite order of Vector Autoregression for an improvement in prediction simultaneously of ocean wave by carrying out wind-related information to waves. The proposed model is compared with linear simple autoregressive model. The performance of both forecasting procedures is assessed by RMSE of well-known error measures. The forecast based on the proposed methodology indicated that it can be regarded as a promising method for wave ocean prediction, it outperforms using 4-order Vector Autoregression.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satrio Adi Rukmono, Fais Zharfan Azif, Muhammad Zuhri Catur Candra
{"title":"Designing an Educational Game Evaluation Framework Based on Game Mechanics","authors":"Satrio Adi Rukmono, Fais Zharfan Azif, Muhammad Zuhri Catur Candra","doi":"10.1109/ICoICT52021.2021.9527418","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527418","url":null,"abstract":"Children in everyday life are increasingly using educational games. However, the quality of each of the many educational games available varies. Some evaluation frameworks exist, but most are prone to the evaluator’s subjectivity, which cannot be compared objectively. This study aims to formulate a framework that evaluates the quality of educational games objectively based on the game mechanics used. The framework is built upon Bloom’s taxonomy as the basis to ascertain the academic side and MDA (Mechanics-Dynamics-Aesthetics) Framework to distinguish the game side. Then, it assesses each educational mechanic based on a standard in the evaluation framework to obtain an accurate, quantifiable score as a measure. Validation of the framework involves using the framework to evaluate existing educational games and comparing the results with expert reviews. With this framework, an educational game quality can be measured objectively and quantitatively based on the technical and fundamental elements that exist in each game.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132644566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abu Fuad Ahmad, Md. Shohel Sayeed, Choo Peng Tan, K. Tan, Md Ahsanul Bari, Ferdous Hossain
{"title":"A Review on IoT with Big Data Analytics","authors":"Abu Fuad Ahmad, Md. Shohel Sayeed, Choo Peng Tan, K. Tan, Md Ahsanul Bari, Ferdous Hossain","doi":"10.1109/ICoICT52021.2021.9527503","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527503","url":null,"abstract":"The Internet of Things (IoT) is a powerful and transformative force for the convergence of the physical and digital world of technology. The IoT is connecting things, businesses, and people in real-time and on a massive scale. The IoT is the network of interconnected devices that contains actuators, sensors, electronics, software and connectivity which lets these things connect, interact and transfer data. Connected devices and software work in ways that produce massive amounts of data where Big Data comes into the picture. The terminology of Big Data represents diverse sets of information that are both very large and complex in nature. Big data offers a better way of managing and using a large amount of data with the opportunity to conduct deeper and richer analysis. Although the extensive number of big data analytics and IoT studies has been performed, the overlapping of the two fields of study creates various possibilities for thriving data analysis in the IoT environment. This paper presents a thorough review of the recent advancement of IoT with big data and analytics. We also make a review of the relationship between these fields. We present a discussion on the application area of IoT and big data analytics as well as the opportunities created by enabling analytics in an IoT system.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hoax Identification on Tweets in Indonesia Using Doc2Vec","authors":"Titi Widaretna, Jimmy Tirtawangsa, A. Romadhony","doi":"10.1109/ICoICT52021.2021.9527515","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527515","url":null,"abstract":"In this paper, we present our work on hoax detection on a collection of Tweets. We tackle the hoax detection as a text classification problem, with Doc2Vec as the text representation method and SVM as the classifier. We collected and annotated 5000 Tweets that consist of 2500 hoax Tweets and 2500 truth Tweets. The experimental results show that the accuracy of our proposed hoax detection on Tweets is 93.4%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tenia Wahyuningrum, Gita Fadila Fitriana, Ariq Cahya Wardhana, Muhammad Amien Sidiq, Dyah Wahyuningsih
{"title":"Developing Suicide Risk Idea Identification for Teenager (SERIINA) Mobile Apps Prototype using Extended Rapid Application Development","authors":"Tenia Wahyuningrum, Gita Fadila Fitriana, Ariq Cahya Wardhana, Muhammad Amien Sidiq, Dyah Wahyuningsih","doi":"10.1109/ICoICT52021.2021.9527508","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527508","url":null,"abstract":"Suicide death is the number 15 cause of death in the world. Suicide cases go undetected because the perpetrator shows no signs beforehand. Therefore, it is necessary to identify the risk of suicide in adolescents early, accessed quickly, maintains user privacy, and understand user needs. Using the Risk Factors of Suicidal Ideation (RFSI) questionnaire, it hoped to detect early suicide incidents in adolescents. This research proposed a Suicide Risk Idea Identification for Teenager (SERIINA), a mobile application developed using the Extended Rapid Application Development (ERAD) method. The ERAD method combines the concept of design sprint and RAD in the system development cycle. Based on the research results, SERIINA mobile apps development is completed in 19 days. The functional testing using Black-Box testing shows that the application works well and compatible with the five main scenarios. The results of interface design testing using heuristic evaluation indicate that the application has been well designed, with a usability value of 2.34 or about 72-85% according to design rules.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}