{"title":"Saboteur game modelling using means-ends analysis","authors":"D. Krisnadi, Samuel Lukas","doi":"10.1109/IAC.2016.7905737","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905737","url":null,"abstract":"Saboteur game is a board game that uses cards. The game is done by a number of players divided into two groups, gold-miner group and saboteur group who prevents gold-miners to seek gold. Each player knows his role, but they do not know exactly which ones are their friends. Gold searching process is started from a single point of reference followed by making a path of seven cards horizontally from the reference to the gold card's position. This paper is done to propose a model of this game and applying the role of artificial intelligence so that it can be implemented as a computer program.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117196598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Election fraud and privacy related issues: Addressing electoral integrity","authors":"M. Lubis, M. Kartiwi, Sonny Zulhuda","doi":"10.1109/IAC.2016.7905720","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905720","url":null,"abstract":"Nowadays, in a highly computerized system, people have tendency to have not expect privacy to be maintained and continue in its current form if individual control is required and monitored. Especially, in contemporary campaigns for higher office, the candidates often use mass media to deliver political message or having certain campaign developed by expert in the efficient use of providing personal information for the purpose of influencing the voters while some of them may be hidden or exploited by certain parties. Practically, it is impossible to have total control over personal information, once it has been collected and dispersed but it is possible to have privacy without control and vice versa. In election, huge amount of data is stored and transfer from multiple location to other numerous or single location to facilitate tabulation and calculation analysis. Thus, it is critical to conduct monitoring process to prevent crime such as theft, fraud and illegal use, to prevent unauthorized disclosure of confidential information, to comply with the obligation, law and regulation in avoiding discrimination, to maintain productivity and quality of service and to ensure integrity of the systems. This paper explores the election fraud and privacy related issues occurred during the election period in various countries to address the electoral integrity in Indonesia.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125743301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Ayu, Siti Aisyah Ismail, T. Mantoro, A. F. A. Matin
{"title":"Real-time activity recognition in mobile phones based on its accelerometer data","authors":"M. A. Ayu, Siti Aisyah Ismail, T. Mantoro, A. F. A. Matin","doi":"10.1109/IAC.2016.7905732","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905732","url":null,"abstract":"Context awareness is one of the important keys in a pervasive and ubiquitous environment. Activity recognition by utilizing accelerometer sensor is one of the context aware studies that has attracted many researchers, even up until today. Inspired by these researches, we came out with this presented study, which is a continuation of our previous workswhere we explore the possibility of using accelerometer embedded in smartphones in recognizing basic user activity through client/server architecture. In this paper, we present our work in exploring the influence of training data size on recognition accuracy in building classifier model by studying two algorithms, Naïve Bayes and Instance Based classifier (IBk, k=3). The result shows that 13 out of 18 possible combinations for both algorithms gave 90% training data size as the best accuracy, thus proving the assumption that bigger size of training data gives better classification accuracy compared to small sized training data, in most cases. Based on the outcome from the study, it is then implemented in Actiware, which is an activity aware application prototype that uses built in accelerometer sensor in smartphones to perform real-time/online activity recognition. The recognition process is done by utilizing available phone resources locally, without the involvement of any external server connection. ActiWare manages to exhibit encouraging result by recognizing basic user activities with relatively small confusion when tested.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARmatika: 3D game for arithmetic learning with Augmented Reality technology","authors":"Julio Cristian Young, M. B. Kristanda, S. Hansun","doi":"10.1109/IAC.2016.7905744","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905744","url":null,"abstract":"Learning mathematics is one of the most important aspects that determine the future of learners. However, mathematics as one of the subjects is often perceived as being complicated and not liked by the learners. Therefore, we need an application with the use of appropriate technology to create visualization effects which can attract more attention from learners. The application of Augmented Reality technology in digital game is a series of efforts made to create a better visualization effect. In addition, the system is also connected to a leaderboard web service in order to improve the learning motivation through competitive process. Implementation of Augmented Reality is proven to improve student's learning motivation moreover implementation of Augmented Reality in this game is highly preferred by students.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Direction Cosine Matrix in rocket payload dynamics attitude monitoring","authors":"Purnawarman Musa, Dennis Christie, E. P. Wibowo","doi":"10.1109/IAC.2016.7905728","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905728","url":null,"abstract":"Rocket, one of the aerospace vehicle capable to being used for implement various interests in many fields, can maintain the sovereignty of the State. Rocket generally do not stand alone, but embedded with payload that contains sensors, processor, and transceiver. The payload will be equipped with Inertial Measurement Units (IMUs) which generally consists of a gyroscope and an accelerometer. This is intended to determine the rocket dynamics attitude that play an important role in the rocket control system. Problems arise considering the accelerometer and gyroscope each has its deficiencies. Accelerometer is sensitive to small external force and gyroscope has a tendency to drift. Both are not able to determine rockets heading orientation relative to Earth, thus they will require a magnetometer to solve the problem. The whole series of these deficiencies can be eliminated by combining measurement data from the three. IMU with 9 DOF and Direction Cosine Matrix algorithm are expected to produce rockets dynamics attitude data trustworthy.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Residual Energy Effects on Wireless Sensor Networks (REE-WSN)","authors":"A. Alkalbani, T. Mantoro","doi":"10.1109/IAC.2016.7905731","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905731","url":null,"abstract":"This study presents the effect of residual energy of nodes in Wireless Sensor Networks (WSNs). There are many issues and challenges that still need to be solved in this area especially for energy contrain. This factor considered during clustering and routing approached to maximize network lifetime. To prolong network lifetime, there is a need for efficient power control mechanisms to reduce power consumption in sensor nodes. At the same time, energy efficient techniques should be employed at all layers of the network. This paper proposed an approach for WSNs energy conservation in order to maximize network lifetime by investigating Residual Energy Effects on Wireless Sensor Networks (REE-WSN). The performance and efficiency of REE-WSA are measured through simulation results and analysis.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WMEVF: An outlier detection methods for categorical data","authors":"N. Rokhman, Subanar, E. Winarko","doi":"10.1109/IAC.2016.7905686","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905686","url":null,"abstract":"Outliers are uncommon events in real life. For a database processing, an outlier means unusual record comparing to the others. An outlier can be caused by a damage to a system, an intruder in a system, or a new fact in a system. Outlier detection is an important task to find an exceptional data.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wulan Indriani, N. Budi, F. Azzahro, A. Hidayanto, Solikin
{"title":"Selection of cloud deployment model for Ministry of Foreign Affairs using Benefit, Cost, Opportunity, and Risk (BCOR) Analysis and Analytic Hierarchy Process (AHP)","authors":"Wulan Indriani, N. Budi, F. Azzahro, A. Hidayanto, Solikin","doi":"10.1109/IAC.2016.7905761","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905761","url":null,"abstract":"The use of information technology becomes important tool to achieve business goals of an organization. One of the technologies that can be used for that purpose is cloud computing, which enable some cloud service could be comfortably accessed anywhere. Additional benefit offered by cloud technology is by providing an access to the shared network in some computing resource that has been configured. The purpose of this research are to select the most suitable cloud deployment type by using AHP (Analytic Hierarchy Process) and the specified criteria by using BCOR (Benefit, Cost, Opportunity, Risk) Analysis. We conducted interviews, questionnaires, and also literature studies to collect the data. The result of this research indicates the most suitable cloud deployment model for Ministry of Foreign Affairs is private cloud model.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing the security of NFC based payment systems","authors":"N. Tabet, M. A. Ayu","doi":"10.1109/IAC.2016.7905710","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905710","url":null,"abstract":"Electronic payment (e-payment) has been around for decades and has been used all around the world. This type of payment has been evolved following the enhancement in the technology involved. One of the key issues in e-payment is the security of the system. Whether the sensitive data sent over the payment network is safe and secure. The process of this data transferring as well has evolved over the last decades. Currently, in the ubiquitous world, data is more and more transferred through the wireless mode. In the wireless mode itself, the technology has developed to provide faster, cheaper, and more secured data transaction. Near Field communication (NFC) is one of the emerging technologies that used in data transferring and has been applied in several sector, including the e-payment. NFC technology is still considered to be quite new and some of the vulnerabilities are not yet explored. This paper analyses the security side of NFC based payment systems. It discusses the threats that could occur, and the measures taken in order to ensure system security and performance efficiency.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124617074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of malaria identification techniques for microscope blood images","authors":"A. Ningsih, S. Hartati, Rika Rosnelly","doi":"10.1109/IAC.2016.7905716","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905716","url":null,"abstract":"Malaria is a deathly disease caused by parasites that are transmitted to human through the bite of infected Anopheles mosquitoes. One of these parasites, P. Falciparum can progress to severe illness and often lead to death if not treated within 24 hours. Thus, early diagnosis of parasites in the red blood cell is crucial to decrease the number of malaria victim. Manual diagnosing require a well trained medical staff and several tools. This can be optimized using digital image processing to reliably detect or classify the presence of the parasites in red blood digital image. By doing microscopic digital image processing, the expected image of microscopic blood clots can be analyzed more effective, efficient and accurate. This paper provide an overview of the previous study of malaria identification techniques. We categorize different technique of microscopic digital image processing from pre-processing step to identification step and provide a clear comparison between them in term of pros and cons and identification accuracy.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}