2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

筛选
英文 中文
Implementation of Algorithm Rabin-Karp for Thematic Determination of Thesis 论文主题确定Rabin-Karp算法的实现
Ainul Yaqin, Akhmad Dahlan, Reno Diandika Hermawan
{"title":"Implementation of Algorithm Rabin-Karp for Thematic Determination of Thesis","authors":"Ainul Yaqin, Akhmad Dahlan, Reno Diandika Hermawan","doi":"10.1109/ICITISEE48480.2019.9003867","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003867","url":null,"abstract":"Thesis / scientific work is a science composition that presents facts and is written according to a good and correct writing methodology. But to find out what the theme discussed should read the abstract of the essay. Along with the development of information technology that offers convenience for human labor in simplification of his work. Difficulty in determining the theme in the thesis can be aided with applications that are able to set themes based on abstract. To make the application of thesis thematic determination can use string matching algorithm, one of string matching algorithm is Rabin-Karp algorithm by doing string matching based on the hash value on text and hash value in a pattern. The Rabin-Karp algorithm is often used to detect plagiarism text document, comparing the overall hash value of k-gram contained in all text documents, then deciding the degree of similarity. Then it can be concluded that Rabin-Karp is able to string a text as a whole, from this the researcher is interested in proving what if the Rabin-Karp algorithm is implemented in the classification field wherein in this study it is used to string matching each word or keyword refers to the theme of an Indonesian essay or thesis abstract. The application is built using web programming language PHP and MySQL database. The confusion matrix is used to determine accuracy, obtained 88% and 12% for misclassification rates.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluate Number of LED on Reflector Room for Optical Wireless Communication 光无线通信反射室LED数量评估
Dyndra Anindita Ramadhanti, K. Sujatmoko, Brian Pamukti
{"title":"Evaluate Number of LED on Reflector Room for Optical Wireless Communication","authors":"Dyndra Anindita Ramadhanti, K. Sujatmoko, Brian Pamukti","doi":"10.1109/ICITISEE48480.2019.9003994","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003994","url":null,"abstract":"Optical fiber communication system is the most implemented technology for backbone and access network telecommunication. However, the mobility of users has forced technology wired to wireless technology and one of the newest research is Optical Wireless Communication (OWC). The OWC has no longer using fiber optic as propagation media and using air for its transmission. In this paper, we evaluate number of Light Emitting Diode (LED) with comparison for one and two transmitters towards light communication distribution in a 5 m × 5 m × 4 m on closed room with reflector. We also use reflector mirror in the wall and using On Off Keying-Non Return to Zero (OOK-NRZ) as a modulation system. In addition, we evaluate wall reflector for impact of communication coverage area. From computer simulation, the results show that two LEDs used with reflector has 29.9 % larger coverage area than one LED.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimization of a Lexicon Based Sentiment Analysis Method on Indonesian App Review 基于词汇库的印尼语应用评论情感分析方法优化
B. T. Pratama, Ema Utami, A. Sunyoto
{"title":"An optimization of a Lexicon Based Sentiment Analysis Method on Indonesian App Review","authors":"B. T. Pratama, Ema Utami, A. Sunyoto","doi":"10.1109/ICITISEE48480.2019.9003900","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003900","url":null,"abstract":"Over the past years, the popularity of mobile applications (or known as mobile apps) is continuously growing from year to year in the last decade. The development of mobile apps now becomes a part of business activity. It is essential for each developers to understand the users’ need to keep their users on using their app. Sentiment analysis or opinion mining is an approach that can be used to analyze and conclude the opinion of the users of mobile apps. Recent method using lexicon based approach which is proposed by the previous study still has poor performance and still can be improved. There are two optimization chances that can be explored: lexicon resource usage evaluation and the application of domain specific features. This study tries to explore these two optimization chances in order to improve and optimize the method proposed by the previous study. The result shows that SentiWordNet can outperform other lexicon resources and the additional of domain specific features has a good impact on the performance of the classifier both on overall accuracy and f-measure average evaluation parameters compared to not only the results of this study but also compared to the result of the previous study.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Welcome Message from ICITISEE 2019 General Chair 2019年icitissee大会主席致欢迎辞
{"title":"Welcome Message from ICITISEE 2019 General Chair","authors":"","doi":"10.1109/icitisee48480.2019.9003888","DOIUrl":"https://doi.org/10.1109/icitisee48480.2019.9003888","url":null,"abstract":"","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint Presence Fraud Detection Using Tight Clustering on Employee’s Presence and Activity Data 基于员工在场和活动数据的指纹在场欺诈检测
I. Kamil, B. Pharmasetiawan
{"title":"Fingerprint Presence Fraud Detection Using Tight Clustering on Employee’s Presence and Activity Data","authors":"I. Kamil, B. Pharmasetiawan","doi":"10.1109/ICITISEE48480.2019.9003914","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003914","url":null,"abstract":"Detecting fraud in fingerprint presence poses a unique challenge as we cannot rely on an existing employee’s attribute. Furthermore, analyzing using a supervised algorithm cannot handle unlabeled data [1] that generated uniquely for this case. We study the patterns of employee’s presence and activity report data and found that fraud action tends to be closely similar to other fraud action. Therefore, we propose a tight clustering method to detect fraud in fingerprint data using DBSCAN (Density-based spatial clustering of applications with noise) algorithm, as tight distance calculation removes non-fraud data because non-fraud data is generated to be unique naturally.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QIM-based Audio Watermarking using Polar-based Singular Value in DCT Domain 基于qim的DCT域极奇异值音频水印
Allwinnaldo, Gelar Budiman, L. Novamizanti, Revin Naufal Alief, Muhammad Rasyid Redha Ansori
{"title":"QIM-based Audio Watermarking using Polar-based Singular Value in DCT Domain","authors":"Allwinnaldo, Gelar Budiman, L. Novamizanti, Revin Naufal Alief, Muhammad Rasyid Redha Ansori","doi":"10.1109/ICITISEE48480.2019.9003921","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003921","url":null,"abstract":"This paper presents an audio watermarking scheme that ensures the efficient of robustness-distortion ratio and a pleasing amount of capacity. Quantization Index Modulation (QIM) method synergism along with Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), and Cartesian to Polar Transformation (CPT) to emphasize copyright protection for harmonical work of art. DWT synergism along with DCT, SVD, and CPT to emphasize copyright protection for harmonical work of art. The system establishes with DWT that divides the signal within a specific range of frequency, alter it to the frequency domain by DCT, partite with mathematical processing SVD, and transform the peculiar value of matrix-S to polar value using CPT, furthermore, QIM embed the watermark into the angular value from the CPT. The system performance is astonishing, tested using 4 different audio host signal and evaluated considers to desirable Bit Error Rate (BER) <0.025, Signal-to-Noise Ratio (SNR)>21dB, a great amount of data payload that is 525 bit per second, and the noise caused by watermark is inaudible. All of the experiments, trials, and results show that the designed audio watermarking system is robust and imperceptible.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Decision Support System for Boarding house Search Using Topsis Algorithm 基于Topsis算法的公寓搜索决策支持系统
Ainul Yaqin, Akhmad Dahlan, Tonny Hidayat, Reza Mardiansyah Putra
{"title":"Decision Support System for Boarding house Search Using Topsis Algorithm","authors":"Ainul Yaqin, Akhmad Dahlan, Tonny Hidayat, Reza Mardiansyah Putra","doi":"10.1109/ICITISEE48480.2019.9003977","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003977","url":null,"abstract":"Boarding house are temporary homes that are most in demand by students or upper level students. However, to get the appropriate boarding house is not easy because of the difficulty of obtaining boarding house information and also many boarding house criteria that must be considered such as rental rates, room area and boarding house facilities etc. Multi criteria decision support system using the Topsis method can facilitate students in finding boarding house. Users can input the boarding house criteria to be searched such as rental rates, room area and boarding house facilities, then after that a mathematical calculation will be performed on each boarding house using the Topsis method. Resulting in board recommendations that match what the user is looking for. The system is made using Java for Android-based programming. The test is performed using the confusion matrix method to measure the accuracy of the costing recommendations produced by the system, resulting in 83% accuracy and 17% of recommendation errors.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Effect of Security and Trust on Buying Decision On the Tokopedia Mobile Apps 安全与信任对Tokopedia移动应用购买决策的影响分析
E. Chandra, Stefanie Liu, Sfenrianto Sfenrianto, Gunawan Wang
{"title":"Analysis of the Effect of Security and Trust on Buying Decision On the Tokopedia Mobile Apps","authors":"E. Chandra, Stefanie Liu, Sfenrianto Sfenrianto, Gunawan Wang","doi":"10.1109/ICITISEE48480.2019.9003846","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003846","url":null,"abstract":"In 2018, e-commerce activities contributed USD 12 billion to Indonesia’s digital economy activities. On the other hand, some internet users stated having problems with transactions and mistrust with e-commerce. Tokopedia is one of the largest e-commerce in Indonesia that has the largest monthly web visitors and dominates the ranking in Google PlayStore and Apple App Store. This research aims to analyze the effect of security and trust on buying decision on the Tokopedia mobile apps in Jakarta. The research was conducted using quantitative method. Research data was collected by distributing online questionnaires through Google Form in August 2019. The research model was analyzed using PLS-SEM of 129 respondents. Results show Trust and Ease of Use have significant influence on Intention to Buy, and Intention to Buy has significant influence on Buying Decision.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICITISEE 2019 Technical Program Committee 2019年icitissee技术项目委员会
{"title":"ICITISEE 2019 Technical Program Committee","authors":"","doi":"10.1109/icitisee48480.2019.9003767","DOIUrl":"https://doi.org/10.1109/icitisee48480.2019.9003767","url":null,"abstract":"","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Weight Backpropagation with Particle Swarm Optimization for Student Dropout Prediction 基于粒子群算法的权值反向传播算法在学生退学预测中的应用
Eka Yulia Sari, Kusrini, A. Sunyoto
{"title":"Optimization of Weight Backpropagation with Particle Swarm Optimization for Student Dropout Prediction","authors":"Eka Yulia Sari, Kusrini, A. Sunyoto","doi":"10.1109/ICITISEE48480.2019.9004032","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9004032","url":null,"abstract":"Students who drop out of school are the cases that should be of concern in college. An uncontrollable decline affects the quality of the university. Dropout could happen for a variety of reasons, one of which has carried out a maximum study period. The Undergraduate program has a maximum finished within less than eight years. In this study, student dropouts prediction was conducted for students who had the possibility of exceeding the maximum study period. The predictions are made by digging the data patterns in the student’s academic database by utilizing the Academic Achievement index data of each semester and class attendance. This research aims to accelerate training and improve the accuracy of predictions with backpropagation (BP) optimized with particle swam optimization (PSO). Evaluation of the classification model is done with 10 fold cross-validation, where the data are divided into 10 fold, and the test is done 10 x until the highest accuracy is obtained. Further accuracy results was compared with a simple backpropagation algorithm without optimization. The algorithm of backpropagation, which is optimized with particle swarm optimization, produces the best accuracy of 100% with 6 epoch. Meanwhile, the backpropagation algorithm generates an accuracy rate of 77.78% with 17 epoch. The highest accuracy gained using the best architecture is 8-8-1 and the number of particles 10. Optimization of a network weight backpropagation with particle swarm optimization can improve the accuracy and number of decreased iterations","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信