{"title":"Using cloud computing for building DAS Tondano mitigation disaster information system prototype","authors":"S. Karouw, H. Wowor","doi":"10.1109/IAC.2016.7905725","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905725","url":null,"abstract":"The paper describe a cloud computing based information system prototype development process. The information systems prototype provide data collecting, storing and managing Tondano river water-level. Agile requirement management technique have been used for conducting requirement process and producing Software Requirement Document. Model-driven approach have been used for analyzing and designing process, and producing Testing Document. Google Application Engine have been used for building running information system prototype. Using short messages service gateway technology, usage for the information systems prototype is to sharing data in real-time manner for government stakeholders and city leaders. We also used Google Maps API for mapping interface while MySQL is used for data management. This information system prototype also runs well through web browser and android-mobile platform device.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121693855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traceability between business process and software component using Probabilistic Latent Semantic Analysis","authors":"Fony Revindasari, R. Sarno, Adhatus Solichah","doi":"10.1109/IAC.2016.7905723","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905723","url":null,"abstract":"Business process and software component has relationship on business process execution in the organization or company. Changes in business process affecting the software component. A Method is needed to determine traceability of artifacts between process on business process and software component. The purpose of traceability is to trace the difference between business process of accompany and its software component through the artifacts. The artifacts in business process are identified by sequence of process, while the artifacts in software component are in the form of modules. In the proposed method, there are two main stage, namely modelling of process on business process and software component and document clustering using Probabilistic Latent Semantic Analysis (PLSA). In the modelling phase, process on business process and software component are grouped into documents. Then, the documents are processed by separating document into words. In the document clustering, documents are calculated using PLSA. It can be concluded that the document clustering can be done with recall 100% and precision 59%.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122057894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Server Consolidation Method on a Data Center by using Virtualization Technique: A Case Study","authors":"H. Sukmana, Yuditha Ichsani, S. Putra","doi":"10.1109/IAC.2016.7905729","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905729","url":null,"abstract":"Data center is a place where data and applications placed and run. Those data and applications saved various server based on function of application run such as server of database, proxy, portal, website, application, mikrotic and so on. The more vary application run, the more server types needed. There are several implications when data center encounter “server flood”, including more electrical energy must be provided. In addition to the relationship between energy and the utilization rate is still low, there is still one problem faced by system administrators with the number of servers in the data center, the more the server to be maintained. The maintenance requirement is usually done as a result of periodic maintenance, hardware upgrades, system upgrades and hardware damage. The maintenance process requires a fairly long time, starts from new server preparation, application and system preparation, and also on the network side. The solution that can be done to solve this situation is by using virtualization (VM) of the servers. After several processes, such as categorization process, consolidation, design and implementation, the results made are by using VM terms of energy consumption, it can provide a savings of more than 50%. We conduct the virtualization concept on Syarif Hidayatullah State Islamic University of Jakarta (UIN Jakarta) as our case study. Before VM applied, the consumption of energy used is equal to 7855 watts, whereas after VM applied energy consumption will be 3890 watts. Efficient data center management can be applied and can save time for maintenance. Before the use of the VM, the time required to process improvement at least 3 hours, but after the use of VM takes just less than 1 hour.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yusuf Durachman, M. Suhaimi, Selpiana, Nida Hasanati
{"title":"Acceptance and use of technology evaluation on insurance data processing system (Care Tech): A case study on insurance company in Indonesia","authors":"Yusuf Durachman, M. Suhaimi, Selpiana, Nida Hasanati","doi":"10.1109/IAC.2016.7905718","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905718","url":null,"abstract":"Insurance data processing system used by PT. Asuransi Takaful Umum is a system Care Tech. Care Tech System is a system designed for general data processing such as vehicle insurance, fire, property, and others with a web-based base that can be accessed online. During implemented since October 2013, Care Tech system has not been evaluated in terms of user acceptance. The purpose of this study was to determine the factors that influence user acceptance Care Tech system and also provide recommendations to the company PT. Asuransi Takaful Umum which can be used as a decision-making for the development of the next system. This study uses a model to evaluate the Unified Theory of Acceptance and Use of Technology (UTAUT). Variables used in this research that performance expectancy, effort expectancy, social influence, facilitating conditions and behavioral intention. Tests conducted variables include validity, reliability, normality test, multicollinearity, heteroscedasticity test and multiple linear regression tests using the tools of IBM SPSS version 22 and Ms. Excel 2007. The results of this study showed that the variables of performance expectancy, effort expectancy, social influence significant effect on the dependent variable is behavioral intention. While variable conditions facilitating no significant effect on the dependent variable behavioral intention.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sundanese ancient manuscript retrieval system comparison of two probability approaches","authors":"M. Suryani, S. Hadi, Ayi Muhammad Iqbal Nasuha","doi":"10.1109/IAC.2016.7905698","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905698","url":null,"abstract":"Nowadays, the development of information technology both in terms of hardware and software has been growing rapidly. Many people used technology to search many types of information. On the other hand, there are information on Sundanese ancient manuscript as cultural heritage with many valuable information still accessed manually, such as the manuscript which located in Situs Kabuyutan Ciburuy, Garut, Jawa Barat. Many people with many purposes (i.e. Research, education, etc.) came to access directly. Its becoming a problem because due to lack of maintainability, the manuscripts became fragile. Furthermore, the information will be lost. So, the emergency solution should be proposed to preserve this valuable heritage. We proposed a retrieval system using the probability approach that can be effective for search the information in ancient Sundanese language. The two probability approaches: Bayesian Networks and Divergence form Randomness have been compared. The 50 queries for three different types of structured query have been run and evaluated by Mean Average Precision (MAP). The results give that the effective methods come from Bayesian Network. There is another finding during the building process of retrieval system. The interactive visualization can be delivered by the retrieval system according to the given query.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. S. Wijaya, Ario Yudo Husodo, I Wayan Agus Arimbawa
{"title":"Real time face recognition using DCT coefficients based face descriptor","authors":"I. S. Wijaya, Ario Yudo Husodo, I Wayan Agus Arimbawa","doi":"10.1109/IAC.2016.7905705","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905705","url":null,"abstract":"This paper presents an alternative real time face recognition using DCT coefficients based face descriptor. The face descriptor consists of dominant frequency content extracted by discrete cosine transforms (DCT), local features extracted by zone DCT, and shape information extracted by hu-moment. The aim of DCT coefficients based face descriptor is to obtain rich information of face descriptor which can provide good performance on real-time face recognition. In this research, dimensional size of face descriptor is decreased by using predictive linear discriminant analysis (PDLDA) and the kNN is implemented for verification. From accuracy, false negative and positive data, the proposed real time face recognition seems to provide good performances. In addition, it also needs short computational time.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using GPS and Google maps for mapping digital land certificates","authors":"Vikky Aprelia Windarni, E. Sediyono, A. Setiawan","doi":"10.1109/IAC.2016.7905756","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905756","url":null,"abstract":"Google maps API provides many features for manipulating maps and adding content to the map through a variety of services that allows to create a mapping application. This paper discusses the use of the Google maps API to connect the land site listed in the certificate of land with Google maps so that the location of the land can be determined accurately. The method used in this research is the research and development (R&D) method with dynamic system approach. The applications were made aiming to help the Land Officer and the public to know the location of the land digitally. The utilization of GPS technology is used to determine the coordinate points of the boundary in the form of latitude and longitude accordance with the existing situation in the field. The advantage of mapping digital land certificates is not only to know the land site, but also get the information contained in the map and make map-making is much cheaper because they do not need to use a lot of tools, maintenance, in addition to the storage media practically do not need more space. The digital land certificate mapping application resulted in this research can be used supplemental to the current official application, but the precision of this application is still the problem for this research, and still continuously determined.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126325622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The implementation of Genetic Algorithm and Routing Lee for PCB design optimization","authors":"T. Badriyah, Fitri Setyorini, Niyoko Yuliawan","doi":"10.1109/IAC.2016.7905706","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905706","url":null,"abstract":"The placing components and routing are very important in designing PCB, although they require a lot of time and precision. Auto placer and auto router application that are available so far are proprietary and thus cannot be developed freely. This research proposes optimization design of PCB alongside with genetic algorithm and routing lee algorithm. The genetic algorithm allocates components automatically and Routing Lee algorithm does routes between components.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning for facilitating learning","authors":"Heni Jusuf, A. Azimah, Rangga Firdaus","doi":"10.1109/IAC.2016.7905695","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905695","url":null,"abstract":"E-learning usefulness as a supporting system in learning is famous, and even though the research about e-learning has been done, the research about motivation effect in the context of e-learning usefulness in learning is still an interesting topic to be discussed. Because of that, some of major purposes about e-learning usefulness in learning are to facilitate learning process, improving performance of students, and to observe literature in e-learning usefulness. The literature shows that the researchers and practitioners consider some of important aspects in order to make sure that e-learning is a part of blended learning system that can optimize the students learning experience. This research was done using 2 parallel classes of algorithm programming course in Bina Insani campus. The result of the experimental research that has been done in one semester for algorithm programming class by comparing X1 learning method with blended learning and X2 learning method a conventional method without blended learning showed that X1 is better than X2, which means that learning to blended learning method is better than conventional teaching methods −0.29941 Number t is smaller than the number of t table is −1.6611, then H0 rejected. ARCS model for motivating students in the context of algorithm programming class using blended learning are with category fun is result 27 percent.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Okamoto-Uchiyama homomorphic encryption algorithm implementation in e-voting system","authors":"Rifki Suwandi, S. M. Nasution, Fairuz Azmi","doi":"10.1109/IAC.2016.7905739","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905739","url":null,"abstract":"Nowadays, the use of electronic voting in an election has been widely adopted as a replacement for conventional voting system. Apart from the benefits of using this system, in fact, there are still many problems that can occur, such as system errors, network security, data confidentiality, and others. One of the main problems is it does not guarantee the confidentiality and accuracy of the data that to be stored and used. Cryptography is the science of mathematical techniques to secure the message offer solutions for the related problems. This research implements Okamoto-Uchiyama algorithm as the offered solutions that utilize cryptography on the security of e-voting system to ensure the security and confidentiality of the voting data, as well as utilizing the homomorphic properties of this algorithm to do the counting. This algorithm will hide the data by encrypting the votes that chosen by the voters and the system can perform calculations using the data that still encrypted without having to be decrypted first.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}