{"title":"Rating Of Indonesian sinetron based on public opinion in Twitter using Cosine similarity","authors":"Vincentius Riandaru Prasetyo, E. Winarko","doi":"10.1109/ICSTC.2016.7877374","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877374","url":null,"abstract":"Sinetron is a frequently watched television program in Indonesia. However, there are many sinetron featuring scenes that are not suitable for a certain age group viewers. Viewers who feel disappointed with some sinetron often express their opinion on social media, especially twitter. This research aimed to categorize sinetron into the age groups: A (Children), R (Teen), or D (Adults) based on the results of similarity calculation between tweets and chapters of Indonesian Broadcasting Commision regulations, or called P3&SPS KPI 2012. The calculation of similarity is done by combining Cosine similarity method with Term Frequency (TF) and Term Frequency-Inverse Document Frequency (TF-IDF). The results of experiments showed that the combination of Cosine similarity and TF-IDF gives better accuracy than the combination of Cosine similarity and Term Frequency. In addition, the results of sinetron categorization based on people opinions posted in Twitter in many cases are not match with the result of categorization established by Indonesian Broadcasting Commision (KPI).","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indonesian traditional dance motion capture documentation","authors":"Ega Hegarini, Dharmayanti, A. Syakur","doi":"10.1109/ICSTC.2016.7877357","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877357","url":null,"abstract":"Indonesia is an archipelago country with various kind of arts and cultures that must be maintained and preserved. Traditional dance is one kind of arts and cultures owned by each territory in Indonesia. Optical motion capture computer technology had been successfully implemented as traditional dance motion captured. Using this technology, traditional dancer movement could be documented and stored into digital movement data that could subsequently be used for traditional dance animation making purpose. The result of this research was traditional dance movement data compilation in raw data (.bvh stand for Biovision Hierarchy) form and its animation into the databased the originality of the traditional dance's move can be maintained.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. W. Santoso, Dwi Pebrianti, T. Lim, L. Bayuaji, H. Lateh, J. M. Zain
{"title":"Comparison of fuzzy filters on Synthetic Aperture Radar image","authors":"A. W. Santoso, Dwi Pebrianti, T. Lim, L. Bayuaji, H. Lateh, J. M. Zain","doi":"10.1109/ICSTC.2016.7877342","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877342","url":null,"abstract":"The Synthetic Aperture Radar (SAR) image with its advantages is becoming more popular than the optical image in earth observation in using the remote-sensing techniques. However, the speckle noise that occurs in the SAR image causes difficulties in image interpretation. Thus, speckle noise reduction needs prepossessing procedure prior to the use of the SAR images. This study is done by proposed fuzzy filters that utilize SAR data. From the comparison, the combination of Frost-Triangular Moving Average (TMAV) has the best performance in the ability to reduce speckle noise than other filters. This filter improved the Frost filter performance for speckle noise reduction parameter's measurement, shows that 13.41% for Equivalent Number of Looks (ENL) and 6.07% for Speckle Index (SI). While Frost-Asymmetric Triangular Moving Average (ATMAV) has a relatively good performance for preserved texture. This filter improved the texture parameters such as Standard Deviation improved 4.33% and improved Variance for 8.46%. However, for the Mean parameters, Frost-Triangular Median Center (TMED) combination has the best performance compared to other filters, which improved the mean value for 7.10%. The comparative study it has been verified that the fuzzy approach has the robustness in the reduction of speckle noise and preserving the texture when applied in SAR image.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring mobile wallet adoption in Indonesia using UTAUT2: An approach from consumer perspective","authors":"Simon Megadewandanu, Suyoto, Pranowo","doi":"10.1109/ICSTC.2016.7877340","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877340","url":null,"abstract":"In past few years, mobile wallet took spotlight as alternative of existing payment solution in many countries such as USA, South Korea, Germany and China. Although considered as one of the most convenient payment, mobile wallet only claimed 1% from total electronic payment transaction in Indonesia. The aim of this study is to identify the behavior and user acceptance factors of mobile wallet technology. Online survey was conducted among 372 respondents to test hypothesis based on UTAUT2 model. Respondents consisted of 61.29% of male and 38.71% of female with age proportion was dominated by age group of 20's of 78.76%. In addition, 50.81% of respondents never used mobile wallet before and 49.19% of respondents have ever used mobile wallet. Data obtained were confirmed using confirmatory factor analysis and analyzed using structural equation model. The study found that habit was the factor that most strongly affected individual behavioral intention to use mobile wallet in Indonesia, followed by social influence, effort expectancy and hedonic motivation. The findings of this research for management can be used as consideration for making product decision related to mobile wallet. Further study is needed, as mobile wallet is still in early stage and another factor beside UTAUT2 should be considered in the study.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal input for Role-Playing Game's combat pace using an Active Time Battle system algorithm","authors":"Agrivian Anditya, Agus Sihabuddin","doi":"10.1109/ICSTC.2016.7877348","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877348","url":null,"abstract":"This paper discusses the use of the Active Time Battle (ATB) system to improve the default combat/battle system of RPG Maker MV. The default RPG Maker MV battle system is a simple single-phase one in which all battlers take their turns and commence action immediately. The objective of this paper is to find the optimal tick rate time input and gauge speed requirement calculation, which affect time consumption in battle, the speed at which the ATB gauge charges, and whether the ATB system changes the battle flow or not. Implementation of the ATB system was done using a plugin. The results indicate that the optimal time calculation gives a tick rate of 0.1 – 0.15 and gauge speed requirement of 5000–6000 for full gauges and 2000–3000 for charge gauges, while m works best at 100 and 20 for full gauge and charge gauge speed requirements, respectively. With the ATB system implemented, agility statistics have a better role, battle flow is more organized, and an ATB/time bar is displayed as a turn indicator and charges based on the agility of the battler.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination schemes Reversible Data Hiding for medical images","authors":"Aulia Arham, H. A. Nugroho, T. B. Adji","doi":"10.1109/ICSTC.2016.7877345","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877345","url":null,"abstract":"The conventional schemes of data hiding such as Least Significant Bit (LSB) or frequency domain using the Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) or Discrete Wavelet Transform (DWT) on digital images can cause a permanent distortion after the extraction process. In medical images, distortion in the image can cause misdiagnosis. To overcome this problem, a special scheme is required for the embedding data in the medical image such as reversible data hiding. One of the schemes in reversible data hiding is Difference Expansion (DE), which is able to restore the image without any distortion after the extraction process. In this paper, a new scheme based on DE has been proposed to enhance capacity and visual quality. One of the characteristics of medical images is the large smooth block areas, while the original DE scheme is applied to the non-smooth areas image. Eight different medical images were used to evaluate the proposed scheme. The result showed that the proposed scheme has a high capacity and very good visual quality compared to the original scheme and similar schemes that have ever been previously proposed.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khurniawan Eko Saputro, S. Kusumawardani, S. Fauziati
{"title":"Development of semi-supervised named entity recognition to discover new tourism places","authors":"Khurniawan Eko Saputro, S. Kusumawardani, S. Fauziati","doi":"10.1109/ICSTC.2016.7877360","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877360","url":null,"abstract":"Tourism information needs are increasing in line with tourism that has been a primary need for some people. This has an impact on the growth of the tourism information provider. The amount of available information sometimes makes tourist confuse to the information that they needed. Currently, the search systems only rely on indexing web pages so that the information obtained by the tourist is still unfavorable because it only shows a web page with keywords that exist on the article. A support system to recognize tourism places on the web pages is required to produce better information presentation. In this study, the recognition system based on Yet Another Two Stage Idea (YATSI) Semi-Supervised Learning with the Naïve Bayes classifier is used to address the problem. Results obtained by classifying candidate entities on a hundred web pages demonstrate 74% precision with 70% recall.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint authentication system using Back-Propagation with downsampling technique","authors":"P. Ochieng, Kani, H. Harsa, Firmansyah","doi":"10.1109/ICSTC.2016.7877371","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877371","url":null,"abstract":"Fingerprint authentication process plays a crucial role for human identifications. Fingerprint stored in the database are often used to confirm individual identity in cases like security checks, disaster, and medical jurisprudence. However, when dealing with the database consisting of a huge number of the fingerprint, recognizing the correct fingerprint matches using some of the existing methods present a great challenge. Therefore, it is critical to develop automatic fingerprint authentication process with fast execution time and high precision. Here we introduce a novel downsampling pixel preprocessing technique to compress original fingerprint pixel matrix to a unit input vector for Artificial Neural Network for fingerprint authentication system. Furthermore, the proposed downsampling technique compress the original pixel matrix by computing the arithmetic mean of the sum of the pixel values on each input row matrix to generate a unit input vector for ANN. Using back-propagation technique the algorithm trains the system to matches fingerprints samples and relates them to the number provided for each authorized user. The interest of the proposed method is illustrated by its application to 102 fingerprint samples with standard 500 pixels both row and column with 8bits grayscale resolution. The results indicate the proposed Back-Propagation with downsampled pixel precisely recognize 100 fingerprints from 102 tested samples. Moreover, the comparative evaluation shows the proposed method outperform Back-Propagation normal pixel, Perceptron with Downsampled pixel and Perceptron with normal pixel achieving 98.03 % precision with minimum convergence time of 30 seconds and mean square error (MSE) of 0.05%.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paris Ali Topan, M. N. Ramadan, Ghufron Fathoni, A. Cahyadi, O. Wahyunggoro
{"title":"State of Charge (SOC) and State of Health (SOH) estimation on lithium polymer battery via Kalman filter","authors":"Paris Ali Topan, M. N. Ramadan, Ghufron Fathoni, A. Cahyadi, O. Wahyunggoro","doi":"10.1109/ICSTC.2016.7877354","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877354","url":null,"abstract":"To avoid battery failure and keep the battery lifetime, a system needs control its use by considering two of several parameters of Battery Management System (BMS) such as State of Charge (SOH) and State of Health (SOH). The State of Charge in Battery Management System provides the percentage of battery capacity, while the State Of Health measures the battery health. The Thevenin battery model is used to describe polarization characteristic and dynamic behavior of the battery and estimared using KalmanFilter(KF). Parameters in the model were estimated using Recursive Least Square. As the results, KF is better then RLS to estimate SOH with a mean relative error as much as 5.26% while RLS has 7.08%.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the new-message notification of information systems","authors":"B. Prastowo, O. A. Dhewa, N. Putro","doi":"10.1109/ICSTC.2016.7877352","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877352","url":null,"abstract":"People get messages from several information channels provided by available communication technologies. Notification systems are installed to make sure that there is no missed important message. The problem is how to set the systems such that we do not get annoyed by them. Over 40 social communication systems found on the Internet are examined to list new message notification system. This paper classifies those systems and uses the classification as the basis of conducting a survey to confirm which ones are the most utilized by the users.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}