{"title":"Parallel processing for simulating 2D radial dambreak using FVM HLLE flux on OpenMP","authors":"M. Pahlevi, P. H. Gunawan","doi":"10.1109/ICOICT.2017.8074665","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074665","url":null,"abstract":"This paper presents the simulation of 2D dry-wet radial dambreak cases using shallow water equations on multicore processing. Here, OpenMP for parallel computing is used. The CPU time for parallel programming with N = 800 points is shown almost similar to the the CPU time for serial programming with N = 400. The speedup and efficiency using parallel with 16 processors are obtained 7.8 times for dry simulation, 8.6 times for wet simulation and 50% from the serial respectively. This means the computational cost using parallel reduces 50% from the average of computational cost by a single processor.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesizing a soft system methodology use in information systems research field: A systematic review","authors":"Fitroh, D. N. Utama","doi":"10.1109/ICOICT.2017.8074722","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074722","url":null,"abstract":"A systematic review is practically necessitated to understand a whole view of the research. It is a type of research that is previously able to be done before conducting a main research activity. The purpose of this paper is to investigate soft system methodology (SSM) use in the research field of information systems (IS). The method systematic review was operated in this study, particularly to systematically review numerous papers. Four simple main stages were performed here; review identifying, previous article screening, further articles screening, and articles evaluation. The results of the study show the precise position of SSM use in research related to IS field.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129094761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments on coreference resolution for Indonesian language with lexical and shallow syntactic features","authors":"Gilang Julian Suherik, A. Purwarianti","doi":"10.1109/ICOICT.2017.8074648","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074648","url":null,"abstract":"We built Indonesian coreference resolution that solves not only pronoun referenced to proper noun, but also proper noun to proper noun and pronoun to pronoun. The differences with the available Indonesian coreference resolution lay on the problem scope and features. We conducted experiments using various features (lexical and shallow syntactic features) such as appositive feature, nearest candidate feature, direct sentence feature, previous and next word feature, and a lexical feature of first person. We also modified the method to build the training set by selecting the negative examples by cross pairing every single markable that appear between antecedent and anaphor. Compared with two available methods to build the training set, we conducted experiments using C45 algorithm. Using 200 news sentences, the best experiment achieved 71.6% F-Measure score.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123405357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring afterlife interpreted through dance and multimedia","authors":"Ang Kok Yew, Y. M. Chan, T. Cheng","doi":"10.1109/ICOICT.2017.8074713","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074713","url":null,"abstract":"This paper presents the design and development of the project “Afterlife” (Death) as interpreted through the integration of the Butoh dance genre and interactive digital media art presentation. According to Chinese's Taoism teaching, the soul of a dead person would be sent to the Heaven if the person has collected enough good karma during their lifetime on earth whereas the soul would be punished to the Eighteen Levels of Hell for their bad deeds. This project was exhibited at the International Multidisciplinary Media Arts Festival (IMMA'16) at Quill City Mall, Kuala Lumpur. The project gave the audience a new perspective about the afterlife. This paper concludes with the audience's reactions to the project and also recommendation for the future research.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites","authors":"Sadaf Hina, D. D. Dominic","doi":"10.1109/ICOICT.2017.8074720","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074720","url":null,"abstract":"The hi-tech instigation of social media, powered and enhanced by the unique participation/collaboration pattern has initiated an epoch of in-depth research practices in education, government and the corporate sector. Social Networking Sites (SNS) are an example of Web 2.0 software that adheres to the participation/collaboration pattern with the capacity to connect people with similar demographics, interests, ideas, as well as similar educational, professional or social backgrounds. This study examines the perceived security and privacy on SNS along with the cyber safety education (acceptable usage policies) among stakeholders in schools (parents, teachers, students and school admin). A research framework has been established by incorporating a construct of intention to use SNS from the Technology Acceptance Model along with a unique combination of perceived security, perceived privacy, cyber safety education and trust constructs. Using reliable metrics from the literature, the research study validates that an enhanced sense of security and privacy positively affects users' trust in SNS. This paper highlights that the existence of a cyber-safety education among stakeholders also positively influences user trust in friends and eventually in positive intention for educational association. Moreover, secure and trusted intention to use SNS leads towards participation/collaboration between all stakeholders in the school environment.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ahmed, A. Alsadoon, P. Prasad, N. Costadopoulos, L. S. Hoe, Amr Elchoemi
{"title":"Next generation cyber security solution for an eHealth organization","authors":"H. Ahmed, A. Alsadoon, P. Prasad, N. Costadopoulos, L. S. Hoe, Amr Elchoemi","doi":"10.1109/ICOICT.2017.8074723","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074723","url":null,"abstract":"eHealth organizations are a major target for hackers as they hold wealth of information. Current cyber security solutions for eHealth organizations are not comprehensive and only protect certain security layer. Therefore; the need for a next generation cyber security solution is increasing, a solution that is smart, scalable and adoptable to challenges. The wide spread of security tools and advancing technology have provided the needed infrastructure to create a comprehensive eHealth security solution. Connecting the right security tools together to ensure the overall security without affecting the network performance and user productivity is hard and requires special setup. The network layer is a major target for any eHealth organization, this research has indicated several network security metrics that need to be considered when designing and managing network security for an eHealth organization. The ultimate goal of this research is to identify the limitations in the current eHealth organization cyber security solutions specially the network layer and propose a next generation cyber security solution for eHealth organizations.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Awalludin, Adiwijaya, M. Bijaksana, A. Huda, L. K. Muslim
{"title":"Churn prediction on fixed broadband internet using combined feed-forward neural network and SMOTEBoost algorithm","authors":"Awalludin, Adiwijaya, M. Bijaksana, A. Huda, L. K. Muslim","doi":"10.1109/ICOICT.2017.8074672","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074672","url":null,"abstract":"The case of churn becomes a critical problem that often happens in many telecom companies. In many real cases of churn, imbalance and outlier data usually occurs in the dataset. These problems in some cases, make the conventional data mining approach is less successful to create a churn prediction model. Therefore, it is a concern of telecommunication service providers to investigate and developed various methods to overcome the problems. This paper combines feed-forward neural network and SMOTEBoost Algorithm for churn prediction. While the former is used to overcome the problem of noise, the latter is used to overcome the problem of imbalanced class. The first technique performs data reduction of noise, and the second one performs the task of prediction. In addition, SMOTEBoost, which is a method that combines SMOTE and Boosting algorithm, well performs in classifying imbalanced class dataset without sacrificing the overall accuracy.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Praditya Anggara Widya Kristantya, D. S. Kusumo, N. Selviandro, Fachriannoor
{"title":"The implementation of adaptive requirements engineering process based on case-based reasoning","authors":"Praditya Anggara Widya Kristantya, D. S. Kusumo, N. Selviandro, Fachriannoor","doi":"10.1109/ICOICT.2017.8074718","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074718","url":null,"abstract":"One major reason of failure in IT projects is a problem in requirements given by stakeholders, such as incomplete, inconsistent, and incorrect requirements. Requirements Engineering (RE) is a phase in software development life cycle that plays a critical role in determining software requirements from user requirements. Therefore RE could be very influential in determining software quality. Factors that influence the process of RE are organization culture, application domain, and the characteristics of the project. Characteristics and attributes of the IT project should determine the choice of RE processes and techniques. In this paper we present the adaptive process of RE which is based on IT projects characteristics and attributes. We believe conducting RE process based on the right IT projects characteristics and attributes will give more benefits in terms of effectiveness and efficiency. Case-based reasoning approach was adopted for the adaptive process of RE in this study. The IT project parameters that used are project size, complexity, requirements volatility, project category, degree of safety criticality, time and cost constraints. Output of adaptive process of RE is a RE process model recommendation. To evaluate the RE adaptive process, prototype software were developed and used three IT projects as case studies. Results from the experiment showed that the RE process model recommendation helps developer in conducting RE process and the output recommendation satisfied its users.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenMP architecture to simulate 2D water oscillation on paraboloid","authors":"S. Juliati, P. H. Gunawan","doi":"10.1109/ICOICT.2017.8074662","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074662","url":null,"abstract":"This paper discusses about implementation of shared parallel architecture OpenMP platform on two-dimensional shallow water equations. Finite volume method that is used to approximate these equations is called staggered grid scheme. The performance of numerical implementation is shown for number of grids (Nx, Ny) more than (16, 16). The results using parallel processing OpenMP for two numbers of threads (4 and 8) are shown better than serial processing. Moreover, maximum speedup by using 4 threads achieved around 3.38 times of serial processing, and around 6.05 times by using 8 threads. Then, the maximum efficiency in this simulation achieved around 84.4% by using 4 threads at number of grids (Nx, Ny) = (256, 256). However by using 8 threads, maximum efficiency achieved around 75.6% at number of grids (Nx, Ny) = (256, 256).","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of privacy, security and trust in user acceptance of smartphone user in Indonesia","authors":"A. Kusyanti, Nungki Dwi Prastanti","doi":"10.1109/ICOICT.2017.8074674","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074674","url":null,"abstract":"Smartphone is one of the technological evolutions that become one of the important things for Indonesian nowadays. By using the Smartphone, variety of work can be done easily, faster and certainly more practical. There are many benefits to be gained from the use of Smartphone, such as e-banking, online shopping, etc. On the contrary, Smartphone usage will lead to negative impact for its users, such as data theft and data misuse. This study aims to identify factors that affect the use of Smartphone by using eight variables constructs, which are Perceive Usefulness, Perceive Ease of Use, Functionality, Perceive Trust, Perceive Privacy, Perceive Security, Social Network and Behavioral Intention. Data were collected by distributing web-based questionnaires to 248 respondents. Structural Equation Modeling (SEM) is used as data analysis method. The result of this study indicates that the factors which have positive affect toward behavioral intention to use Smartphone that will affect the variable actual use of Smartphone are Perceive Usefulness, Perceive Ease of Use, Perceive Trust.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}