Dina Ikramina Setiani, Sfenrianto Sfenrianto, Gunawan Wang
{"title":"Analysis of the Effect of Trust on Purchase Intention in E-Commerce Integration for Vendors & Event Organizer","authors":"Dina Ikramina Setiani, Sfenrianto Sfenrianto, Gunawan Wang","doi":"10.1109/ICITISEE48480.2019.9003965","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003965","url":null,"abstract":"Event Organizer is a professional service provider of organizing events in order to organize the entire series of events to suit the expected goals. This research aims to determine the Event Organizer integrated with e-commerce such as Tokopedia, Bukalapak, Blibli, Lazada and Shopee, so that it can be accessed by customers and vendors providing event needs easily. Some factors that influence customer behavior so that they are interested in using Event Organizer services are by using Perceived Value, Service Quality, User Satisfaction, Trust, and Purchase Intention variables. This research produces several hypotheses that will illustrate the interrelationship between variables and the effect on variables. The hypothesis will be validated using an online survey involving 100 respondents. The results of the questionaire will be tested using SmartPLS software so that it is accurate. This research shows that many factors influence customers in deciding to use Event Organizer services. The results showed that the influence of trust has a positive effect on purchase intention.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114719637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Cacao Pod Detection Under Outdoor Condition Using Computer Vision","authors":"Yulia Ekawaty, Indrabayu, I. Areni","doi":"10.1109/ICITISEE48480.2019.9003733","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003733","url":null,"abstract":"This study aims to detect and count cacao pods on trees using a 4K resolution drone. The image was taken with the difference in distances and illumination in the plantation area which affect the color variation of the object’s surface. The data variation is a challenge in this study. There are 85 images of cacao fruit on trees were taken with three variations of distance, which are 50 cm, 100 cm, and 150 cm. For each distance, all images processed through several stages, i.e. image quality improvement using image enhancement at the preprocessing stage, image segmentation using the K-means method, and BLOB analysis method to detect and count the number of cacao pods on the tree. The result shows that the best distance between the camera and the object is 50 cm with an average accuracy of 93.3%.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116094156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dina Evita Sari, Happy Niti Noor Muchsin, D. Setiadi, C. A. Sari, E. H. Rachmawanto
{"title":"Hybrid Encryption Technique using Cyclic Bit Shift and RC4","authors":"Dina Evita Sari, Happy Niti Noor Muchsin, D. Setiadi, C. A. Sari, E. H. Rachmawanto","doi":"10.1109/ICITISEE48480.2019.9003848","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003848","url":null,"abstract":"Data security is an important aspect when data is sent over public networks such as the internet. Securing data can use cryptographic techniques. In symmetric cryptographic techniques, there are permutation and stream techniques, where each technique has its own weaknesses and strengths. This research combines two techniques into a hybrid technique to get stronger encryption. The proposed permutation technique is cyclic bit shift, while the proposed stream technique is RC4. The results of the combination of two methods are then performed performance tests using the avalanche effect (AE), bit error ratio (BER), the time required for decryption encryption and character error rate (CER). Based on the results of testing the proposed method is superior compared to the method that has been previously proposed.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Device orientation for Visible Light Communication in Closed Room","authors":"Amirullah Wijayanto, K. Sujatmoko, Brian Pamukti","doi":"10.1109/ICITISEE48480.2019.9003931","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003931","url":null,"abstract":"This paper evaluates the impact of device orientation in Visible Light Communication (VLC) with the Bit Error Rate (BER) as the main parameter of measurement. Most studies on optical wireless communications have neglected the effect of random orientation in their performance analysis. In this paper, we analyze the device orientation and assess its importance on system performance. The device orientation are we use equal to 0°, 15°, and 35°. To support the simulation, we use the OOKNRZ modulation techniques with the threshold Bit Error Rate (BER) around 10-5. Each of the device orientation has the value of a wide range of communication coverage. The smaller of device orientation, the coverage will be wider. With using the biggest device orientation, the communication coverage is decreased of 11,04% while the smallest device orientation is 98.08% coverage area.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Istikmal, A. Subekti, D. Perdana, N. Ridha Muldina, I. ArifIndra, Sussi
{"title":"Dynamic Source Routing and optimized Link State Routing Performance in Multipath Fading Environment with Dynamic Network Topology","authors":"Istikmal, A. Subekti, D. Perdana, N. Ridha Muldina, I. ArifIndra, Sussi","doi":"10.1109/ICITISEE48480.2019.9003887","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003887","url":null,"abstract":"In wireless adhoc network, routing protocol plays an important role establish and to maintain end-to-end communication path. Effects of propagation environment and mobility of the nodes have to be considered in the routing protocol. In this research, we investigated proactive and reactive routing protocol performance in a more realistic environment with dynamic network topology scenarios. We proposed a more realistic model scenario which includes Rician and Rayleigh multipath fading. Performance evaluation using the proposed model has been performed for two routing protocols, Dynamic Source Routing (DSR) as reactive routing protocol and a proactive routing protocol optimized Link State Routing (OLSR). Considering the dynamic nature of the wireless adhoc network architecture, we focus on network topology change scenarios by increasing number of nodes and behavior of the node. The results show that OLSR give more advantages of higher throughput and smaller end-to-end delay compare to DSR in Rician and Rayleigh environments due to multipoint replying (MPR) strategy. However, DSR have more efficient in packet routing control with smaller normalized routing load. For dynamic topology change in Rician and Rayleigh fading, OLSR performs more stable and can gain higher performance than DSR.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122840807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Scaling Factor for Multiple Watermarking Scheme","authors":"Dhani Ariatmanto, F. Ernawan","doi":"10.1109/ICITISEE48480.2019.9003948","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003948","url":null,"abstract":"This paper presents an adaptive scaling factor for multiple watermarking scheme. Watermarks are inserted into the red and green channels with lowest variance of the cover image. DCT is applied on each selected block for transforming image pixels to DCT coefficients. This experiment examines DCT coefficients in the middle frequency to obtain adaptive scaling factor for embedding a watermark. The proposed algorithm used the impact of selected DCT coefficients to imperceptibility and robustness for generating adaptive scaling factor. Arnold transform is used to provide additional security and secrecy of the embedded watermark image. The experimental results reported that our scheme achieves higher invisibility performance for multiple watermarks compared to existing schemes.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Pornographic Image Classification based on Texture, Color, and Shape Features","authors":"I. W. P. Swardiana, A. Setyanto, Sudarmawan","doi":"10.1109/ICITISEE48480.2019.9003842","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003842","url":null,"abstract":"Content filtering application on the internet is very important to protect children from various negative content such as pornography and violence. It is necessary to find a detection tool for pornographic images with high accuracy and fairly low computational time. The classification algorithm is responsible for distinguishing pornographic images and non-pornographic images. This research aims to find the optimum classifier among available algorithms. To achieve these objectives, we compare the existing classification algorithm namely: K Nearest Neighbors (KNN), Logistic Regression (LR), Linear Discriminant Analysis (LDA), Decision Tree (DT), Random Forest (RF), Multi Layers Perceptron (MLP), and Support Vector Machine (SVM). Classification algorithm needs features as the input. Therefore we need a feature extraction algorithm to do so. In this study, we evaluate some features which are Haralick texture (texture features), Color Histogram (color features), and Hu Moment (shape features). The test results show that the most suitable method for classification of pornographic images is the Random Forest (RF) with an accuracy of 91.04% and the computational time per image is 0.80 ms.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Disaster Application on Big Data and Machine Learning: A Review","authors":"Rania Rizki Arinta, Emanuel Andi W.R.","doi":"10.1109/ICITISEE48480.2019.9003984","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003984","url":null,"abstract":"Natural disasters are events that are difficult to avoid. There are several ways of reducing the risks of natural disasters. One of them is implementing disaster reduction programs. There are already several developed countries that apply the concept of disaster reduction. In addition to disaster reduction programs, there are several ways to predict or reducing the risks using artificial intelligence technology. One of them is big data, machine learning, and deep learning. By utilizing this method at the moment, it facilitates tasks in visualizing, analyzing, and predicting natural disaster. This research will focus on conducting a review process and understanding the purpose of machine learning and big data in the area of disaster management and natural disaster. The result of this paper is providing insight and the use of big data, machine learning, and deep learning in 6 disaster management area. This 6-disaster management area includes early warning damage, damage assessment, monitoring and detection, forecasting and predicting, and post-disaster coordination, and response, and long-term risk assessment and reduction.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Essential Blockchain Technology Adoption factors in Pharmaceutical Industry","authors":"Surjandy, Erick Fernando, Meyliana","doi":"10.1109/ICITISEE48480.2019.9003997","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003997","url":null,"abstract":"Blockchain the new technology that rapidly develop contemporary beyond the cryptocurrency. Several researches reported the adoption of Blockchain Technology for health, pharmacy, logistic, and education sector. However, the report research in education sector that adopt Blockchain Technology for pharmacy very rare, therefore this research tries to explore on how the Blockchain technology influence the four critical success factors of pharmacy industry which are people, process, technology and organization factors or commonly known as Leavitt diamond model. The systematic literature review used in this research and found a thousand and two hundred ten (1210) papers from eight (8) reputable publishers and an index such as Taylor and Francis, IEEExplore Online Library, MDPI, ACM, Science Direct, Wiley Online, Emerald Inside and Scopus as Index paper publication. Eighteen (18) papers were selected, 23 critical factors found that will influence to people, process, technology, and organization.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Overclock Ram Galax Hall Of Fame For Daily Needs","authors":"Rizqi Sukma Kharisma, Miko Kastomo Putro","doi":"10.1109/ICITISEE48480.2019.9003923","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003923","url":null,"abstract":"Nowadays, everyone needs a computer or PC to help them run daily errands or work. Any device on a PC has its own performance level, and can be maximized through a method called overclocking. Memory or commonly known as RAM is the easiest device to overclock. By using Memory Try-It feature in BIOS, user can obtain a better performance compared to its default condition. The authors used RAM Galax Hall Of Fame 16 GB. HWBOT Realbench benchmark was performed to observe the increased performance of RAM during overclock condition. Benchmark test results a system score which can be utilized as a reference for the user to understand the increased performance of a device (in percentage) after being overclocked.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}