{"title":"A Malay named entity recognition using conditional random fields","authors":"M. S. Salleh, S. A. Asmai, H. Basiron, S. Ahmad","doi":"10.1109/ICOICT.2017.8074647","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074647","url":null,"abstract":"Currently, unstructured textual data analysis has attracted researchers' interest because it offers valuable information into many fields such as business, education, political, healthcare, crime prevention and other. Various sources are accessible that contain unstructured textual data such as online documents, Facebook, Twitter or Instagram. However, the implementation process for these types of unstructured data is limited, especially for Malay language. The lack of textual analysis process brings difficulties in obtaining important information for decision-making. This paper presented an Automated Malay Named Entity Recognition (AMNER) conceptual model using conditional random fields method for Malay language to recognize entities from unstructured textual data. The analysis focused on the developmental model based on Malay language features which guided the recognition process of entities from unstructured text documents.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Nazir, M. Ghazanfar, Naif R. Aljohani, M. A. Azam, Jalal S. Alowibdi
{"title":"Data analysis to uncover intruder attacks using data mining techniques","authors":"S. Nazir, M. Ghazanfar, Naif R. Aljohani, M. A. Azam, Jalal S. Alowibdi","doi":"10.1109/ICOICT.2017.8074683","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074683","url":null,"abstract":"Radicalism is becoming an increasingly potential concern. Intruder groups are using handful tactics and radicalism has disparaging effects, particularly in Gulf and Pakistan region. Forecasting the pattern of attacks is a complex task. This research paper presents new insights on intruder groups and targets using data mining algorithms. We propose a framework, which uses historical data to train machine-learning classifiers and can predict intruder groups and attack types based on selected features. We analyzed that the major victims of intruder groups would be citizen and property, government, police, and military sectors. We figured out that J48 and IBK learning algorithms perform consistently well under various experimental settings.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The performance of OpenMP architecture for simulating fire spreading in forest area by cellular automata","authors":"Mulyani, N. D. Putri, P. H. Gunawan","doi":"10.1109/ICOICT.2017.8074661","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074661","url":null,"abstract":"The analysis of parallel performances in simulation of forest fires using Cellular Automata (CA) is considered in this paper. Two simulations are given, simulation of forest fire with topography and wind effects. Here, the Von Nuemann rule of CA is used. From the numerical simulations, the CPU time for several grids 100×100, 200×200, 400×400, 800×800, and 1600×1600. Using number of grids 1600×1600, the CPU time for serial and parallel codes with topography effect are obtained 6076.31 and 2670.43 seconds respectively. Meanwhile, the CPU time serial and parallel of simulation, with wind effect are obtained 186.325 and 128.793 with grid numbers 1600 × 1600. The speedup and efficiency for simulation with topography effect reach 2.27 and 56% respectively. Moreover, 1.44 and 36% are the speedup and efficiency for simulation with wind effect.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adiwijaya, Masyithah Nur Aulia, M. S. Mubarok, W. U. Novia, F. Nhita
{"title":"A comparative study of MFCC-KNN and LPC-KNN for hijaiyyah letters pronounciation classification system","authors":"Adiwijaya, Masyithah Nur Aulia, M. S. Mubarok, W. U. Novia, F. Nhita","doi":"10.1109/ICOICT.2017.8074689","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074689","url":null,"abstract":"Reciting Al-Qur'an sometimes becomes hard to do for Indonesian because Al-Qur'an was written in Arabic which is not the native language of Indonesian. The common mistake for Indonesian is pronouncing the Hijaiyah letters. In this paper, we propose to utilize the ability of Speech Recognition to help people learn reciting Al-Qur'an in the right way. This system is built using K-Nearest Neighbor (KNN) Algorithm as the classifier. For the extraction feature, we use Linear Predictive Coding (LPC) and Mel-Frequency Cepstrum Coefficients (MFCC) and compare both. We also compare the result for system with Principal Component Analysis (PCA) and without PCA. The best result when we use LPC is 78,92% and when we use MFCC is 59,87%.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adoption factors of online-web railway ticket reservation service (A case from Indonesia)","authors":"Indrawati, Sofiar Yusliansyah","doi":"10.1109/ICOICT.2017.8074709","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074709","url":null,"abstract":"PT. Kereta Api Indonesia (KAI) is the only company that has been given an authority by government to provide, manage and organize railway transportation in Indonesia. The railway industry in Indonesia started during the colonial in 1864 and in 2015 KAI had served 326 million passengers with an average growth in the number of 330.000 passengers annually. One of the biggest challenge faced by KAI is the improvement of pre-trip service quality. One of the improvement of this service is the development of Rail Ticketing System by using a web-based information technology platform. The online-web ticket reservation service (OTRS) had been launched since 2012 with 42 partner channels available on the internet. However — since its first launched in 2012 — the usage of OTRS had only 27% reservation compared to 67% ticket reservations from ticket counter at railway station. In order to increase the use of OTRS, finding factors that affect the behavior of OTRS user is needed. Based on Unified Theory of Acceptance and Use of Technology (UTAUT) 2 Model and modified UTAUT 2, this study proposed a new modified model toward the service. The data to test the model were collected from 682 valid respondents. The data were analyzed by using SmartPLS2.0 software and the result showed that the independent variables Performance Expectancy, Social Influence, Facilitating Condition, Hedonic Motivation and Perceived Risk had significant influence on Behavioral Intention and Facilitating Condition, Habit and Behavioral Intention had significant influence on the Use Behavior.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. N. Utama, Luqman Isyraqi Lazuardi, Hersy Ayu Qadrya, B. M. Caroline, Tris Renanda, Atthiya Prima Sari
{"title":"Worth eat: An intelligent application for restaurant recommendation based on customer preference (Case study: Five types of restaurant in Tangerang Selatan region, Indonesia)","authors":"D. N. Utama, Luqman Isyraqi Lazuardi, Hersy Ayu Qadrya, B. M. Caroline, Tris Renanda, Atthiya Prima Sari","doi":"10.1109/ICOICT.2017.8074654","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074654","url":null,"abstract":"In a metropolitan, to find a restaurant in rush hour is a challenging activity to do. It is going to be easy, when someone accesses an application and it recommend the best restaurant then he / she can visit to. Through using combination between methods fuzzy-logic and bubble-sort that were realized in customer preference case, an intelligent application for restaurant recommendation was technologically constructed. The method fuzzy logic used to parameterize three selected parameters; interest, location, and rating. And, the bubble-sort is a method to optimize the recommendation based on full-factorial concept. Tangerang Selatan (Indonesia) area and twelve restaurants indicating five types of restaurant were practically chosen as a case study of this research, and seventy seven respondents were realistically involved to justify the selected parameters.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amanda Putri Septiani, D. D. J. Suwawi, A. Herdiani
{"title":"Interactive and collaborative platform implementation on learning management system","authors":"Amanda Putri Septiani, D. D. J. Suwawi, A. Herdiani","doi":"10.1109/ICOICT.2017.8074714","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074714","url":null,"abstract":"In common traditional learning, there are some weaknesses, one of which is students' limitation of receiving additional learning material. The use of e-learning in schools is expected to be a solution to these problems, because generally e-learning contains known traditional learning components such as group discussions, ideas submission and knowledge accumulation. Social Network allows users to do problem solving, creates connection and collaborates with other users. In this paper, the authors build e-learning system with interactive and collaborative platforms concept. Interactive and collaborative platform makes learning as a combination of cognitive and constructive process with social process, so it encourages more active learning and supports better group interaction. The concept of e-learning with interactive and collaborative platform and its features, such as news feeds, chat box, like and comment feature along with open course system, are able to increase the level of E-learner Satisfaction which includes Learner Interface, Learning Community, also Content and Personalization.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks","authors":"Song Wang, K. G. Chavez, S. Kandeepan","doi":"10.1109/ICOICT.2017.8074692","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074692","url":null,"abstract":"Software Defined Network (SDN) brings additional flexibility to the traditional network allowing the implementation of intelligent information processing. SDN introduces a new architecture, where the controller acts as the brain of the network controlling several tasks such as routing, load balancing and providing the required quality of service (QoS). However, having a centralized controller makes the network vulnerable in terms of security. This paper introduces SDN sEcure COntroller (SECO) a novel and simple detect and defense algorithm, running in the controller, for improving SDN security features under Denial of Service (DoS) attacks. The network performance during attack is tested with and without the SECO algorithm. In this paper we show by means of simulations that the DoS attacks can degrade the controller's performance and the proposed algorithm could significantly reduce the impact of such DoS attacks.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128051349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Yogarayan, A. Azman, S. F. A. Razak, K. J. Raman, M. F. A. Abdullah, S. Z. Ibrahim, A. Amin, K. S. Muthu
{"title":"A study of cloud based connected car services","authors":"S. Yogarayan, A. Azman, S. F. A. Razak, K. J. Raman, M. F. A. Abdullah, S. Z. Ibrahim, A. Amin, K. S. Muthu","doi":"10.1109/ICOICT.2017.8074645","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074645","url":null,"abstract":"The automotive industry has been moving fast towards advanced integrated system. Connected car has been a very popular research field in both academic and automotive industries. Generally, vehicles can have communication efficiency with other wireless access points and Internet gateways which provide useful information and practical Internet access. A good amount of research has been done to exploit the different services that provides vehicle communication in several countries like USA, Europe and Japan. This paper provides a study of how a vehicle communication takes place with mobile phone experience application into embedded systems and the wireless communication technologies that is suitable to be used in vehicular environment in Malaysia.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Giri, B. Santoso, A. Mustikasari, Made Kevin Bratawisnu
{"title":"Consumer perceptual mapping towards e-banking channel: (A study of bank BRI customer in Indonesia)","authors":"R. Giri, B. Santoso, A. Mustikasari, Made Kevin Bratawisnu","doi":"10.1109/ICOICT.2017.8074686","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074686","url":null,"abstract":"Implementation of e-banking services system provides various advantages for the company are cost and time efficiencies, and be able to create differentiation and able to target market segments with low cost. To determine the underlying motives customers to select and prefer one channel and the other required a systematic exploration of the customer perception. This study aims to understand the customers' perception of various e-banking channels and how their motives in choosing the channel usage. By understanding customer perceptions about various banking channels, it is expected to be more helpful in assisting banks in Indonesia to introduce e-banking. A convinience sampling technique used to select 234 customers who surveyed in this study. Findings suggest that Automatic Teller Machine was percieved to be low cost, low complexity and most usefulness. EFT is also almost similar to the ATM, get the low cost and low complexity but low on security. Perception on Internet banking was secure and usefulness and high on privacy. Meanwhile perception on SMS banking was easy to access and also high on privacy. And phone banking was perceived to be the most expensive and inaccurate. Future studies are expected in addition to using other multivariate techniques would also be able to add other attributes are more influential.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}