Mujito, Basuki Hari Prasetyo, Subandi, Dian Anubhakti, Ady Widjaja
{"title":"Selection of Prospective Employees Using Analytical Hierarchy Process (AHP) and ISO 9126","authors":"Mujito, Basuki Hari Prasetyo, Subandi, Dian Anubhakti, Ady Widjaja","doi":"10.1109/ICAITI.2018.8686733","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686733","url":null,"abstract":"Resources Management is one of the important aspects to determine the success of work at company. To get qualified human resources, the company applies a tight selection of employee acceptance to job applicants to fit the company's needs for checking and selection process is done manually by looking at one by one file submitted by applicants. This is of course in addition to very inconvenient also inefficient and takes a long time, not to mention the possibility of human error and subjective assessment so that the candidate is not the best candidate. By utilizing a Decision Support System that uses Analytical Hierarchy Process (AHP) Algorithm to help employee acceptance selection problem, Analytical Hierarchy Process (AHP) is a decision-making process using Pairwise Comparisons to explain the evaluation factor and weight factor under conditions multi factor. ISO 9126 is an international standard issued by ISO for software quality evaluation and Capability Testing of Employee Selection Model Using Analytical Hierarchy Process (AHP) adopted on ISO 9126 test model with Functionality, Reliability, Usability and Efficiency criteria. So, the result of this research is an application or decision support system that generates the output of a ranking of each prospective employee, so that the management decision makers can see the ability of each prospective employee based on the ranking","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regulatory Framework Analysis of Infrastructure Sharing for Mobile Operators in Indonesia by Using Regulatory Impact Analysis Approach","authors":"B. Burhanudin, M. Asvial","doi":"10.1109/ICAITI.2018.8686753","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686753","url":null,"abstract":"Concernment about the operators capability to conduct for development of telecommunication infrastructure fairly and equitably throughout Indonesia has become a question. This is due to the financial condition of current operators, especially non-dominant operators, in not good conditions. A way that can be done by the operator, especially non-dominat operators, is to do efficiency on the expenditure through infrastructure sharing. However, the infrastructure sharing can also affect competition among mobile operators, including changes in the landscape of the operator's business model. This research aims to propose a regulatory framework of infrastructure sharing for mobile operators that appropriate to be implemented in Indonesia. The results of the analysis using Regulatory Impact Analysis show that the existing regulation is time to change, so that the new regulation is expected to encourage commercially sustainable and healthy business environment for all mobile operators. A regulatory framework allowing mobile operators to perform MORAN scheme can be accepted by all stakeholders, except by dominant operator with relatively little resistance level. The result of analysis using Cost and Benefit Analysis is net benefit Rp. 52.18 trillion for 5 years, and Competitive Impact Analysis is positive value, 60.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Steganography Based on Multimedia Cover to Improve Security and Capacity","authors":"Ilham Firman Ashari, R. Munir","doi":"10.1109/ICAITI.2018.8686741","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686741","url":null,"abstract":"Information is important asset, so it takes effort to maintain the confidentiality, integrity, and availability of information. Cryptography and steganography methods can be combined to improve information security. Steganography is divided into two types, Noisy Steganography and Noiseless Steganography. Noisy steganography has some disadvantages that can cause noise and the process of concealment that requires a container, while Noiseless Steganography (Nostega) will not produce noise and not require a container. One of the nostega paradigms is Graph Steganography (Graphstega). Graphstega is a technique that inserts messages as plotted data on a graph. This paper proposes a method that produces a graphstega encoding method that reduce the plot ratio gap, enhances data security by encrypting data, improve reality data with combination of excel cover, increasing message capacity without overlapping plots using (data splitting techniques, setting graphstega image resolution, setting font size on the graph plot), and implementing graphstega on text cover, digital image, and image hardcopy. The result of proposed graphstega method shows that it can improve data security, the value of the plot looks more realistic, reduce the plot ratio gap, increase message capacity, and can be implemented in text cover, image cover, and image hardcopy so the message distribution increases.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firdaus, Yulindon, Meza Silvana, Asrial, R. Efendi, N. Samsudin
{"title":"Optimization of Compact UWB Monopole Antenna with Tapered Connection and Linier Tapered Transformer","authors":"Firdaus, Yulindon, Meza Silvana, Asrial, R. Efendi, N. Samsudin","doi":"10.1109/ICAITI.2018.8686732","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686732","url":null,"abstract":"A very compact UWB monopole antenna with stable radiation pattern is presented. The antenna is constructed on FR4 with dielectric constant of 4.4 and 1.6 thickness. The antenna has a bandwidth of 4.2 - 11.2 GHz. The antenna impedance adjustment process in the UWB frequency range can be adjusted by optimizing the tapered side and linear tapered transformers. The antenna structure have the same radiator and ground plane width. A partial ground plane produces an antenna with a stable omnidirectional radiation pattern for all UWB frequency bands. The antenna gain also shows very stable with a maximum gain of 3.5 dBi.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization of Data Mining Classification Technique for Civil Servant Mutation Pattern: A Case Study of Pangkajene and Kepulauan District Government","authors":"M. M., I. Budi, Y. Ruldeviyani","doi":"10.1109/ICAITI.2018.8686757","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686757","url":null,"abstract":"Pangkajene and Kepulauan (Pangkep) District is an area located in South Sulawesi Province, Indonesia. Regional Civil Servants, Education, and Training (BKPPD) responsible for managing the civil servants (PNS) of Pangkep District. BKPPD provides mutation services to civil servants ranging from recruitment, placement, transfer, education and training, discipline, dismissal, and retirement. Currently, BKPPD has difficulty in conducting mutations, determining which civil servants should be transferred because the absence of a reference mutation pattern. This study aims to obtain mutation patterns using data mining based on historical data on the employment service application system (SAPK). We use three classification algorithms, which are Decision Tree, Naïve Bayes, and Support Vector Machine (SVM) for revealing the mutation pattern in the mutation history data. We find that the decision tree yields the highest accuracy compared to Naive Bayes and SVM with a value of 72.76%. This research also recommends that the mutation pattern may be implemented by BKPPD to design the civil servants redistribution planning of Pangkep District Government.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome remark","authors":"","doi":"10.1109/icaiti.2018.8686756","DOIUrl":"https://doi.org/10.1109/icaiti.2018.8686756","url":null,"abstract":"","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commitee","authors":"","doi":"10.1109/caipt.2017.8320649","DOIUrl":"https://doi.org/10.1109/caipt.2017.8320649","url":null,"abstract":"","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siswanto, Yuda Pratama Wibawa, W. Gata, Grace Gata, Nia Kusumawardhani
{"title":"Classification Analysis of MotoGP Comments on Media Social Twitter Using Algorithm Support Vector Machine and Naive Bayes","authors":"Siswanto, Yuda Pratama Wibawa, W. Gata, Grace Gata, Nia Kusumawardhani","doi":"10.1109/ICAITI.2018.8686751","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686751","url":null,"abstract":"The high comment about the event of a motor racing motoGP race in a print media and electronic media, making the event makes the conversation of many people in the real world and in cyberspace. Especially in the digital era today is very easy for people to get the information they want, either through the website or through existing media social and sometimes the info is loaded in real time at the same time comment on the show about trending topics that exist in cyberspace. The curiosity of the public about info-info or comments circulating about the motoGP racing makes the conversation in the existing media social so that the topic becomes a popular topic in media social that post about the race of the motoGP race. This paper will do research how accurate the comments about the existing motoGP in existing media social such as twitter which became a forum for society to talk about the race of the motoGP race. In this paper will apply two classification algorithms to test how accurate the information or comments that become a lot of people talk through media social twitter. This paper will apply the Support Vector Machine and Navie Bayes algorithms in text mining processing. The result of SVM algorithm accuracy value is 95.50% while the value of NB accuracy is 93.00%.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Purwanto, T. Sugiarto, H. Maksum, D. S. Putra, Erzeddin Alwi
{"title":"Comparison of Three Topologies Rotor to Improve Efficiency and Torque for High-Speed Spindle Motor Applications","authors":"W. Purwanto, T. Sugiarto, H. Maksum, D. S. Putra, Erzeddin Alwi","doi":"10.1109/ICAITI.2018.8686718","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686718","url":null,"abstract":"This paper presents the design of three closed slot rotor topologies as circular, round, and oval. The design generated using the Taguchi, equivalent circuit, and finite element method (FEM) for high-speed, high-torque, and high-efficiency. For a fair comparison, the topologies are tested using FEM under the same conditions and specifications and an equivalent circuit is used for verifying and analyzing their output powers, torques, and efficiencies. The results help simplify rotor selection for various spindle motor applications requiring high efficiency and torque.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing Multiple Nested Schema to Reduce Data Redundancy in CONoSQLDB Schema","authors":"Sutedi, T. B. Adji, N. A. Setiawan","doi":"10.1109/ICAITI.2018.8686736","DOIUrl":"https://doi.org/10.1109/ICAITI.2018.8686736","url":null,"abstract":"The Corporate's interest of cloud computing based system continues accelerating due to its efficiency, promising performance and better scalability. Most of these systems use the Not Only SQL (NoSQL) database. The database has different characteristics from the relational database. Data migration from a relational database to a column-oriented NoSQL database (CONoSQLDB) can use the concept of Multiple Nested Schema. The concept has proved to be effectual to boost query performance but at the cost of high data redundancy. This study proposes a new conversion method called Enhanced Multiple Nested Schema, developed of Multiple Nested Schema by adding rules to identify and eliminate inter-table transitive dependency—one of the major causes of data redundancy. We aim to reduce data redundancy in CONoSQLDB Schema. The objective is to generate CONoSQLDB schema much better. Previous research did not pay attention to transitive dependency problems when doing schema conversion. The proposed conversion mechanism produces an efficient CONoSQLDB database schema. However, the schema guarantees complete data and allows queries quickly. This means that the additional rules proposed in this study can improve the CONoSQLDB schema generated using the previous method.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}