Zhi-Hao Wang, Yu-Fan Kung, Hendrick, Po-Jen Cheng, Chih-Min Wang, G. Jong
{"title":"Enhance Wireless Security System Using Butterfly Network Coding Algorithm","authors":"Zhi-Hao Wang, Yu-Fan Kung, Hendrick, Po-Jen Cheng, Chih-Min Wang, G. Jong","doi":"10.1109/ICAITI.2018.8686731","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686731","url":null,"abstract":"The traditional security system requires a lot of manpower, and the wireless security system has been developed to reduce costs. However, for wireless systems, stability and reliability are important system indicators. In order to effectively improve these two indicators, we have imported butterfly network coding algorithm into the wireless sensing network. Because this algorithm enables each node to play multiple roles, such as routing, encoding, decoding, sending and receiving, it can also improve the throughput of network transmission, and effectively improve the stability and reliability of the wireless security system. This paper used the Wi-Fi module to implement the butterfly network coding algorithm, and is actually installed in the building. The basis for transmission and reception of all nodes in the network is received signal strength indication (RSSI). On the other hand, this is an IoT system for security monitoring.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Devianto, Maiyastri, Randy, Masyhuri Hamidi, S. Maryati, Afridian Wirahadi Ahmad
{"title":"Efficiency Analysis of Optimal Portfolio Selection for Stocks in LQ45 Index","authors":"D. Devianto, Maiyastri, Randy, Masyhuri Hamidi, S. Maryati, Afridian Wirahadi Ahmad","doi":"10.1109/ICAITI.2018.8686713","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686713","url":null,"abstract":"The purpose of the study is to determine the model of the most efficient optimal portfolio from Markowitz and single index methods. This Study was performed using daily prices of stocks LQ45 index in the period 2016. The results showed that the most efficient portfolio formation is determined by using single index model with the ratio between expected return and risk 0.63; this is greater than the Markowitz model with ratio only 0.21. The greater this ratio the more optimal portfolio selection. This efficient portfolio produces 10 stocks that the fund proportion of stock BUMI 10%, PPRO 21%, ANTM 21%, ADRO 17%, PTBA 13%, MYRX 5%, LSIP 4%, ELSA 3%, INCO 3%, WSKT 4%. This efficient portfolio is resulting from expected return 0.58% and risk 0.91% for each day.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NRF: Normalized Rating Frequency for Collaborative Filtering Paper","authors":"Sri Lestari, T. B. Adji, A. Permanasari","doi":"10.1109/ICAITI.2018.8686743","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686743","url":null,"abstract":"The online system is rapidly developing and widely used for companies to market their products. The products can always be more diverse and abundant. However, it creates difficulties for the company to provide recommendations to users about products which are suitable with users' interest. This condition encourages a recommendation system. One of the popular methods of this recommendation system is Collaborative Filtering (CF) by using rating-based and ranking-based approaches. Some of the ranking-based methods are Copeland method and Borda method. Both methods use a user-rating approach limited to the user preference profiling processes. Therefore, this research proposes the use of the user-rating to get the normalized rating frequency (NRF). Normalization process was done through the calculation of the frequency of a user-rating, which eventually generated a product ranking for recommendations to users. Experimental results of the NRF method can improve the performance of the recommendation system. This can be seen from the recommendations produced by the NRF method was more relevant in accordance with the wishes of the user, which is indicated by the average value of Normalized Discounted Cumulative Gain (NDCG) higher than Copeland and Borda methods. In addition, the NRF method has a faster computation time with a simpler algorithm than the Copeland and Borda methods.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nabella Permatasari, M. Fauzi, Rini Wisnu Wardhani
{"title":"Comparison of Trivium and Random Number Generator Arduino for Challenge Value in Color Combo Authentication Scheme on Arduino","authors":"Nabella Permatasari, M. Fauzi, Rini Wisnu Wardhani","doi":"10.1109/ICAITI.2018.8686735","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686735","url":null,"abstract":"The paper presents the comparison of random number generator function provided by Arduino and Trivium algorithm. The Trivium algorithm will be evaluated regarding its capability to produce challenge response in color combo authentication scheme. In fact, the scheme has been implemented on Arduino which then used as access control. This scheme is used since it is resistant to shoulder-surfing attack, which means attacker cannot get password from legitimate user directly. However, the algorithm being used on Arduino to make random number generator function cannot ensure the randomness of the challenge value, thus this paper will propose another algorithm to be used as challenge value that can cover the weakness mentioned. The proposed algorithm is actually one of stream cipher standards, which is Trivium algorithm.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. P. Dody Lesmana, W. Dewanto, B. Widiawan, Muhammad Fuad Al Haris, D. R. Hartadi, Eka Mistiko Rini
{"title":"Design of Mirror Therapy Technique to Rehabilitate Upper Limb After Stroke Using Non-Immersive Virtual Reality","authors":"I. P. Dody Lesmana, W. Dewanto, B. Widiawan, Muhammad Fuad Al Haris, D. R. Hartadi, Eka Mistiko Rini","doi":"10.1109/ICAITI.2018.8686763","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686763","url":null,"abstract":"Mirror therapy (MT) is a method to train upper limb after Stroke incident. The combination of MT with virtual reality (VR) has given more immersion experience into the illusion, while MT needs participant concentration to truly sensate the illusion as real. The purpose of this research is to design and develop first prototype of VR-MT as physical therapy equipment for enhancing motor performance in upper limb after Stroke. Upper limb motion in VR-MT is captured by Microsoft Kinect. We involve five healthy participants as VR-MT tester to execute a therapy task by controlling virtual limb to hit apples or avoid bombs in virtual environment (VE) for 10 minutes. After the treatment of therapy task, participants do simple assessment by answering a questionnaire. The result of statistical analysis of the questionnaire can be concluded that four elements including controllability, natural operation, sense of delay.and spatial difference are important key to control the movement of virtual limb correctly in VR-MT.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Secure Hash Algorithm – 3 for Biometric Fingerprint Access Control Based on Arduino Mega 2560","authors":"Indrian Alfiansyah, Rini Wisnu Wardhani","doi":"10.1109/ICAITI.2018.8686734","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686734","url":null,"abstract":"Biometric recognition refers to the use of distinctive anatomical (e.g., fingerprints, face, iris) and behavioral (e.g., speech) characteristics, called biometric identifiers or traits or characteristics for automatically recognizing individuals. Fingerprint has advantages that we don't need to bring a card or remember a password and the most important thing is fingerprint could not be shared or transferred. Biometric fingerprint authentication has many advantages, but biometric fingerprint authentication has a weakness in fingerprint template that can be stolen and the attacker can reconstructs fingerprint template to fingerprint image. In this paper, we introduce an implementation of SHA-3 hash function for fingerprint template on biometric fingerprint authentication based Arduino Mega 2560. This paper describes about how to secures fingerprint template with SHA-3 from attacker that want to reconstructs fingerprint template to fingerprint image.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Multi-Criteria Decision Making for Student Degree Completion Time based on Entropy Weighted","authors":"M. Wati, H. S. Pakpahan, N. Novirasari","doi":"10.1109/ICAITI.2018.8686746","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686746","url":null,"abstract":"Undergraduate student's criteria such as grade point average, high school major, age when they registered, etc., which exist in academic data can be utilized to predict the student degree-completion time. This paper tries to get the weight of ten criteria objectively using entropy and used those criteria weighting in comparative analysis for prediction of accuracy and precision of three multi-criteria decision-making methods, i.e., Simple Additive Weighting (SAW), Weighted Product (WP), and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The result showed that the fourth grade point average has the biggest impact on degree-completion time with 0.1589 of weight and weighted product is the best method to use with percentage of accuracy 61.3 percent and precision 52.85 percent. The result of this research can be used to help academic staff in making decision for student admission and administering mentoring process.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness Of Android-Based Mobile Robots For Children Asperger Syndrome","authors":"Anip Febtriko, T. Rahayuningsih, Dinda Septiani, Liza Trisnawati, Diki Arisandi, Sukri","doi":"10.1109/ICAITI.2018.8686759","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686759","url":null,"abstract":"Autistic disorder is a disorder or developmental disorder in social interaction and communication and is characterized by limited activity and interest. One type of autism is Asperger Syndrome is a personal qualitative weakness in communicating and social interaction. Just like any other autistic child with Asperger's Syndrome, it is very difficult to understand emotions. Limitations in expressing and understanding emotions cause children with Asperger's Syndrome to retreat socially like aloof, indifferent, less interested in others, lack empathy, think in one direction, and think hard. Therefore it is necessary to apply play therapy for children with Asperger Syndrome disorder by using Android Mobile-based robot as a robot control tool. Wheel-shaped robot or wheeled robot with work area in the form of obstacles and obstacles with the aim that there is a challenge to run the robot. Research using Pre experimental design. The population in sampling is 15 children. Children with Asperger's Syndrome take the 6 -12 year age example at special school for Pekanbaru children. Data collection to assess the outcome of play therapy using Mobile robot, the data collected were analyzed by descriptive analysis and Rank Wilcoxon test. The main purpose of this study is the influence or effectiveness of the use of android-based mobile robots as a control tool against Asperger's Syndrome disorder in children in independent schools Pekanbaru to communicate and interact socially.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125740506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdul Aziz, Khoirun Nissa Isti Khomah, Samgadi Palgunadi Yohanes
{"title":"Prediction The Price of National Groceries Using Average Based Fuzzy Time Series With Song - Chissom and Markov Chain Approach","authors":"Abdul Aziz, Khoirun Nissa Isti Khomah, Samgadi Palgunadi Yohanes","doi":"10.1109/ICAITI.2018.8686737","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686737","url":null,"abstract":"Groceries are strategic commodities that have an important role in economic, social, and even political aspects in various countries including Indonesia. The groceries affect the livelihood of the people with the scale of the fulfilment of high needs as well as factors supporting the welfare of the community. The classical problem in the fulfilment of grocery is the fluctuation of the prices of groceries. The increase in the prices of groceries commodities becomes a major factor in inflation. To overcome these problems, one of the efforts made by the government is to stabilize the price policy of grocery so that farmers as producers get profitable results and the community as consumers can afford to buy groceries at affordable prices. To accommodate the afford it is needed a forecasting step to predict the prices of groceries. This study aims to predict the prices of national groceries using the Average Based Fuzzy Time Series method with Song - Chissom and Markov Chain approach. The data used are prices of groceries weekly period from 2015 - 2017. Data is divided into two phases: training and testing dataset with the ratio of 90: 10. Based on MAPE value and feasibility test, it can be concluded that Average Based Fuzzy Time Series with Markov Chain approach shew better than Song - Chissom approach for prediction the prices of national groceries.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning-Based Implementation of Hate Speech Identification on Texts in Indonesian: Preliminary Study","authors":"Erryan Sazany, I. Budi","doi":"10.1109/ICAITI.2018.8686725","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686725","url":null,"abstract":"This paper presents an implementation of hate speech identification task for text data written in Indonesian language. There are some studies purposed for similar problem, but all of them use classical machine learning approach, whose heavily depends on the feature engineering. Switching the domain of data set means that the feature engineering should be redone. To address this issue, this preliminary research proposes another method based on deep learning approach which needs no feature engineering and is also adaptive to the varying context. Using data sets sourced from Twitter posts, the proposed method gives better result of 94.5% F1-score at a minimum.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126017918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}