{"title":"Wave Forecast using Bidirectional GRU and GRU Method Case Study in Pangandaran, Indonesia","authors":"Azka Jauhary Thanthawy Sukanda, D. Adytia","doi":"10.1109/ICoDSA55874.2022.9862832","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862832","url":null,"abstract":"Wave forecasting is needed to support marine activities, especially planning for ship navigation, maintenance, and offshore engineering construction. Especially in an open sea, forecasting waves can be challenging due to the stochastic nature of the waves. In this research, we use deep learning models to forecast significant wave height, i.e., the Gated Recurrent Unit (GRU) both unidirectional and bidirectional variants. As a case study, we use six-year time series wave data in Pangandaran, West Java, Indonesia. We use the historical wave data to forecast the next one, three, and seven days’ wave conditions. Results of prediction show that the GRU gives better results than the experiment’s Bidirectional GRU (BiGRU). To predict one day ahead, the GRU gives an RMSE value of 0.2184 and R2 value of 0.9863, whereas the BiGRU gives a prediction with an RMSE value of 0.2206 and R2 value of 0.9869.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116075982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Influencers and Community of Lazada Using Social Network Analysis","authors":"Nabila Ammara Diliana, Indrawati","doi":"10.1109/ICoDSA55874.2022.9862849","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862849","url":null,"abstract":"Indonesia reaches more than 200 million internet users in 2022. Considering a large number of internet users in Indonesia, there are many digital-based businesses and one of them is e-commerce platforms. Understanding user in social media plays an important role in determining a suitable digital marketing strategy, one of which is by knowing the user interaction or User Generated Content in social media. The research related to User Generated Content is commonly used as one the data to analyze marketing strategy in social media. One of the previous research about User Generated Content as data to analyze marketing strategy for an educational platform and tourism platform. Both the previous study used User Generated Content and Social Network Analysis to analyze the data. Therefore, this study aims to form a network using data sources based on tweets on social media that models Lazada network interaction in Indonesia. We use User Generated Content as a source to find the influencer's and communities' representations of these are the two most important in deciding on a digital marketing strategy, especially for their social media. The results of this study identify the influencers and communities of the social network. The research will be worthwhile for business opportunities, policymakers, and Lazada.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"abs/1402.4986 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128089975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lulus Wahyu Prasetya Adi, Satria Mandala, Y. Nugraha
{"title":"DDoS Attack Detection System using Neural Network on Internet of Things","authors":"Lulus Wahyu Prasetya Adi, Satria Mandala, Y. Nugraha","doi":"10.1109/ICoDSA55874.2022.9862848","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862848","url":null,"abstract":"Distributed Denial-of-Service (DDoS) is an attack launched over a computer network to make the server unable to provide services to users. DDoS is also effectively used to stop services on Internet of Things systems based on the message Queuing Telemetry Transport (MQTT) protocol. In the system, attackers usually attack brokers who are used to manage data traffic between the issuer and the customer. Several research projects have been undertaken to detect DDoS in the Internet of Things (IoT) using machine learning. However, existing research projects still generally have low detection accuracy in predicting DDoS. This study provides a solution to the above problems by proposing the development of a machine learning model based on Neural Network (NN) to detect DDoS. Furthermore, this study also compared the results of NN predictions with K-Nearest Neighbor (KNN). The methods used in this study are as follows: 1. Conducting literature studies. 2. Develop both machine learning models. 3. Conduct analysis. Rigorous experiments have been carried out using dataset derived from other research and dataset generated through DDOS simulations in IoT environments. By using the dataset generated through simulation, the results obtained showed that the accuracy of NN is better than KNN, which is 99.99% and 99.82%, respectively.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127862285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Classification in Indonesian-language Tweets using Fast-Text Feature Expansion with Support Vector Machine (SVM)","authors":"Imaduddin Muhammad Fadhil, Y. Sibaroni","doi":"10.1109/ICoDSA55874.2022.9862899","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862899","url":null,"abstract":"Twitter is a popular social media platform that gives users the ability to send text messages with a maximum length of 280 characters which causes a lot of use of word variations that cause vocabulary writing errors and nowadays more and more tweets are spread and because of the very rapid spread it causes information overload. From the problems raised, it is necessary to be able to recognize words that have errors in writing and categorize tweets into certain categories. Therefore, this study aims to build a topic classification system on tweets that can study writing errors in a word and feature expansion using pretrained from FastText can be used to recognize writing errors in a word because the process of building word vectors from FastText can learn the internal structure of a word that will be used in the Support Vector Machine. The best results from this study get an accuracy of 76.88% with the application of feature expansion on top-1 but the application of feature expansion using pretrained classification Support Vector Machine.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131663076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extractive Text Summarization for Snippet Generation on Indonesian Search Engine using Sentence Transformers","authors":"Komang Uning Sari Devi, Lya Hulliyyatus Suadaa","doi":"10.1109/ICoDSA55874.2022.9862886","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862886","url":null,"abstract":"Search engine results usually show a list of retrieved document titles with document summaries to give a better preview of the retrieved documents, called snippet. This research proposes extractive text summarization models to generate a snippet. A new dataset is constructed for extractive text summarization tasks using Indonesian thesis documents, in which the targeted summaries were created manually by selecting important sentences. In generating snippets, we use Lead-3 and Textrank as baselines and propose fine-tuning Sentence Transformers (SBERT). Based on the evaluation results, SBERT generated a better summary than other baselines with 0.545 Rouge-1, 0.433 Rouge-2, and 0.474 Rouge-L.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124860561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICoDSA 2022 Author Index","authors":"","doi":"10.1109/icodsa55874.2022.9862893","DOIUrl":"https://doi.org/10.1109/icodsa55874.2022.9862893","url":null,"abstract":"","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nuha, Tafta Zani, Muhammad Fadhly Ridha, Adiwijaya
{"title":"Binary Data Correction Simulation Using Convolutional Code on Additive White Gaussian Noise Channel","authors":"H. Nuha, Tafta Zani, Muhammad Fadhly Ridha, Adiwijaya","doi":"10.1109/ICoDSA55874.2022.9862932","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862932","url":null,"abstract":"Access to digital communications in remote areas requires a mechanism to increase the robustness of the transmitted data. Many areas in Indonesia still have difficulty accessing the Internet. This is because the location of the settlement is remote from the signal transmitter Convolutional codes are a technique to improve the reliability of data transmission. This article contains a simulation process of Convolutional Code from an application that we developed using Java. The basic difference between block codes and convolution codes in designing and evaluating is that Block codes are based on algebraic techniques or a combination whereas ConvCode based on construction techniques. Some of the excellent features of this application are demo encoding, modulation, noise generation on white Gaussian noise channels, and decoding using the Viterbi algorithm. The error correcting code process begins by checking the bit similarity (hamming distance) in the code word with the trellis diagram which will produce a path with weights depending on the hamming distance. With the Viterbi Algorithm, we will decode the codeword into the initial code by finding the highest probability (Maximum Likelihood) based on the Hamming distance from each state. Experiments show that the application successfully demonstrates the system's reliability to recover information signals damaged by noise.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Control on Interpolation-based Reversible Audio Data Hiding using Bit Threshold","authors":"Yoga Samudra, T. Ahmad","doi":"10.1109/ICoDSA55874.2022.9862889","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862889","url":null,"abstract":"To solve daily problems, sometimes information needs to be accessible digitally or online by authorized parties. However, accessing some information may need secure data transmission. This reliable process can be achieved by using data security techniques to protect the transmitted information, such as cryptography or steganography. As part of data hiding methods, steganography works by hiding private information inside other public data, mainly multimedia data, in plain sight. Nevertheless, there are some main concerns regarding previous research, such as the similarity level and hiding capacity of the respective audio file. In this research, private information is embedded into an audio file as cover data so it can be retrieved later by the receiver without any suspicion of other parties. Therefore, this research focuses on providing flexibility in the embedding capacity of cover data by using an interpolation-based approach as the core sampling technique and then enhancing the similarity level by adding bit threshold values to evenly distribute hiding capacity on each sample as even as possible. Experimental results show that this proposed method can achieve an average similarity level of 103.56 dB on 100 Kb private data to an average of 93.95 dB on 300 Kb private data. It is better than some existing studies.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanfi, Arief Ramadhan, A. Trisetyarso, M. Zarlis, E. Abdurachman
{"title":"Measuring Student’s Satisfaction and Loyalty on Microsoft Power BI Using System Usability Scale and Net Promoter Score for the Case of Students at Bina Nusantara University","authors":"Yanfi, Arief Ramadhan, A. Trisetyarso, M. Zarlis, E. Abdurachman","doi":"10.1109/ICoDSA55874.2022.9862839","DOIUrl":"https://doi.org/10.1109/ICoDSA55874.2022.9862839","url":null,"abstract":"Microsoft Power BI is one of the visual analytics platforms that help people to see and understand the data. This research aimed to evaluate students’ satisfaction and loyalty to the Microsoft Power BI application. The method used in this research utilized the DECIDE framework to determine the evaluation goals, explore the questions, choose the evaluation and data collection methods, and identify the practical issues. The evaluation was conducted using the System Usability Scale (SUS) and Net Promoter Score (NPS). The application's score using SUS was 51 and the NPS score was below 6. The result showed that students are not quite satisfied and loyal to the application. This finding is part of the product lifecycle where users gave feedback for the improvement of the product to satisfy users’ needs, even though this finding is only in small scope at Bina Nusantara University. Therefore, the corporation should review the application in terms of features, performance, and tutorials and invest more resources in marketing activities to acquire new customers, including academic fields, reducing its competitiveness in the market. In addition, we proved that without asking Net Promoter Score (NPS) questions, the Net Promoter Score (NPS) values could be taken from SUS to determine participant loyalty.","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130397345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICoDSA 2022 Homepage","authors":"","doi":"10.1109/icodsa55874.2022.9862860","DOIUrl":"https://doi.org/10.1109/icodsa55874.2022.9862860","url":null,"abstract":"","PeriodicalId":339135,"journal":{"name":"2022 International Conference on Data Science and Its Applications (ICoDSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128514653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}