{"title":"Automatic detection of learning style in adaptive online module system","authors":"A. Hidayat, V. Utomo","doi":"10.1109/IAC.2016.7905696","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905696","url":null,"abstract":"Detecting student needs in learning is a challenge, while it is also a necessity in order to provide an adaptive learning. Since students have different learning styles, an adaptive learning is required in their learning styles. This paper explains the development of learning module which adapt to students' learning style according to FSLSM that consists of the following dimensions, perception (sensing or intuitive), input (visual or verbal), processing (active or reflective) and understanding (sequential or global). Students' learning styles is determined using ILS questionnaire and later used as consideration to show appropriate learning module content according to the learning style.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The web security and vulnerability analysis model on Indonesia Higher Education institution","authors":"I. Mantra, M. Alaydrus, HM Misni","doi":"10.1109/IAC.2016.7905707","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905707","url":null,"abstract":"The Information technology has become an important part of life to perform various daily activities. The web site is one of the important technologies both within the enterprise, government, and education. The web site is currently a media both as a source of information, communication, data search, create, process and publication of information, in addition to the web site be a source of great information and important addition to the book and widely used in the media of learning in Higher Education and School by users Internet. This paper will review the analysis vulnerability (VA) and web site security, especially in Indonesia Higher Education to find out more about how web site in filter response attacks. The heart of the web of organizations and universities that do research depends on the individual SQL database, there is a high risk and there is a medium risk, but it is not easy to secure SQL database. Hackers often will damage the SQL database to perform copy, edit and delete the database. This time the hackers smarter to simply copy the SQL database only those with the hope to sell the database to the other party. This study tried to find out the weaknesses and protection against SQL databases in several universities tested. The Sample Attacks that will be tested in form of SQL injection to find vulnerabilities and provide prevention and countermeasures for the owner of the web site.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Hulliyah, A. Wahab, N. Kamaruddin, S. Erdogan, Yusuf Durachman
{"title":"Analysis of Indonesian sentiment text based on affective space model (ASM) using electroencephalogram (EEG) signals","authors":"K. Hulliyah, A. Wahab, N. Kamaruddin, S. Erdogan, Yusuf Durachman","doi":"10.1109/IAC.2016.7905738","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905738","url":null,"abstract":"The affective space model (ASM) based on the valence and arousal (VA) has been used by many researchers in determining the emotional state of an individual. Psychologist uses the self assessment maniquin (SAM) while other researchers uses the facial patterns, voice emotions and also electroencephalogram (EEG) signals to obtain the category of Sentiment analysis (SA) based on VA as the two dimensional approach represents affective state. However, getting affective words with VA scores are still infrequently used, even though these VA lexicon are advantageous resource in creating application of sentiment, especially in the Indonesian language and can be used as a corpus for SA. Thus this paper proposes to design and analyze Indonesian affective lexicons based on affective norm english word (ANEW) for automatic determination of VA rating of words. In this research, we proposed to develop an extensive number of sentiment states in Indonesian language that have been placed in terms of VA using SAM and would be correlated with EEG as a comprehensive tool of Neuro Physiological Signal for the emotion sentiment corpus rating.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote QR code recognition based on HOG and SVM classifiers","authors":"Hicham Tribak, Salah Moughyt, Y. Zaz, G. Schaefer","doi":"10.1109/IAC.2016.7905704","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905704","url":null,"abstract":"QR codes have become useful and efficient data storage tools which are exploited in many commercial applications including product tracking, website redirection, etc. A QR code is a 2-dimensional barcode localised through three finder patterns (three squares characterised by a series of alternative black and white modules at ratios 1∶1∶3∶1∶1) placed in its three corners. QR codes are generally placed in different environments with complex backgrounds (overlapping text, pictures, etc.), and are often captured under unfavourable conditions such as poor lighting. These factors can significantly affect the recognition ability and thus may hinder correct QR code localisation and identification. In order to appropriately address these issues, in this paper, we present a QR code recognition algorithm based on histogram of oriented gradients (HOG) features combined with support vector machine (SVM) classifiers. Using HOG, we extract gradient features of each extracted pattern. Subsequently, the obtained features are passed to two linear SVM classifiers, one trained with finder patterns and one trained with alignment patterns, to remove irrelevant patterns. QR codes are then conveniently localised according to a pattern closeness constraint. In the last stage, the captured code is enhanced by applying a perspective correction followed by image binarisation and morphological processing. Finally, the patterns are decoded using an accurate 2-d barcode decoder. Our proposed approach is designed for an embedded systems using a Raspberry Pi equipped with a HD camera and a small robot carrying the equipment.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service","authors":"Muhamad Haekal, Eliyani","doi":"10.1109/IAC.2016.7905711","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905711","url":null,"abstract":"The role of SMEs in the economy of Indonesia is significant. However, the problems faced by the SMEs as less professional management often become an obstacle to the progress of the business. To solve these problems, we need an application that can help small business owners to help manage their business and can also be accessed by a variety of platforms. All these problems can be solved with the application SIKASIR. In order SIKASIR application can be accessed by multiple platforms, it takes a web service that resides on a server. Each application SIKASIR of various platforms to be connected to the service RESTful Web Service so interconnected and synchronized. However, there are some problems when making a multi-platform service, one of them is an authentication problem. In REST architecture, we need authentication methods that are stateless, one of which is a token-based authentication methods. On this occasion, this study will use JSON Web Token. JSON Web Token is the new industry standard based (RFC 7519). JSON Web Token is stateless, so it is suitable to be implemented on a RESTful Web Service application. In this research will be discussed how to implement authentication technique using token-based authentication method with a JSON Web Token, which will produce a secure authentication and make web service SIKASIR be multi-platform.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of Haar Wavelet Transformation for androgenic hair pattern recognition","authors":"Regina Lionnie, M. Alaydrus","doi":"10.1109/IAC.2016.7905683","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905683","url":null,"abstract":"To identify criminal or pedophile in online child pornography images and video is a challenging task when the faces and other distinguish features are not shown. To address these kind of problems, the system of recognition using androgenic hair pattern is being developed. The system of recognition presented in this paper used three main parts of methods, pre-processing methods, feature extraction with Haar Wavelet Transform level 1 decomposition and classification using Nearest Neighbor. Using 400 images of lower right legs with controlled condition, the system was analyzed. The Haar Wavelet Transformation for level 1 decomposition gave 83.48 % of average recognition precision when using 10-fold cross validation with nearest neighbor classification.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the performance of translation process in a statistical machine translator using sequence IRSTLM translation parameters and pruning","authors":"T. Mantoro, J. Asian, M. A. Ayu","doi":"10.1109/IAC.2016.7905736","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905736","url":null,"abstract":"A translation process, as a critical part of a machine translation, can be put simply as a process of decoding the meaning of the source text and re-encoding the meaning into the target language. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This statistical machine translation uses parallel corpus and statistical machine learning for English and Bahasa Indonesia. This study also evaluated 28 different parameters in IRSTLM language modeling and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence value parameter in translation process, it also has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of AODV and DSDV using SUMO, MOVE and NS2","authors":"T. Mantoro, M. Reza","doi":"10.1109/IAC.2016.7905747","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905747","url":null,"abstract":"VANET is a part of MANET which is specific on communication between vehicle to vehicle or between vehicles to its surrounding environment infrastructure. One of the most widely used routing protocol at VANET implementation are AODV (Ad-hoc On-Demand Distance Vector) and DSDV (Destination Sequence Distance Vector Routing), which are topology based routing protocol. VANET dynamic network architecture and character of the node that always move, require a reliable routing protocol, since it related to safety. This study analyzes the performance of those routing protocol. The main objective of this study is analyzing the performance of AODV compare to DSDV using simulator SUMO, MOVE and NS2.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":" 29","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rahmat, Athmanathan, M. F. Syahputra, M. S. Lydia
{"title":"Real time monitoring system for water pollution in Lake Toba","authors":"R. Rahmat, Athmanathan, M. F. Syahputra, M. S. Lydia","doi":"10.1109/IAC.2016.7905749","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905749","url":null,"abstract":"Lake Toba serves as an important tourism attraction in Indonesia, especially in the region of North Sumatera province. As tourism in Lake Toba develops, the possibility of environmental issues in Lake Toba, mainly water quality, is also increased. This condition increases necessity for a system that can monitor environment condition, especially water quality in Lake Toba. In this paper, we propose a design and development to gather and process data about water pollution in Lake Toba in a real-time process. Our proposed design consists of several sensors which record several parameters, such as Dissolved Oxygen Level, pH level, Water Temperature, Air Humidity and Air Temperature. These sensor buoys will be placed on several locations on Lake Toba's surface to increase the effectiveness of measurement, thus improving the measurement result. Finally, the real-time measured values from the sensors will be gathered and processed in one main controller; the experiment result shows that certain area can be monitored effectively.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Agent Hyper-Heuristics based framework for production scheduling problem","authors":"C. Nugraheni, L. Abednego","doi":"10.1109/IAC.2016.7905735","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905735","url":null,"abstract":"This paper investigates the potential use of hyper-heuristics and multi agent approach for solution of the real single machine production scheduling problem. A framework consisting of six agents is proposed. The agents are Problem Agent, Trainer Agent, Training Dataset Agent, Heuristic Pool Agent, Algorithm Agent, Advisor Agent, and Solver Agent. Three Algorithm Agents are proposed to solve the problem, i.e. Genetic Programming Hyper-Heuristics (GPHH) agent, Genetic Algorithm Hyper-Heuristic (GAHH) agent, and Simulated Annealing Hyper-Heuristics (SAHH) agent. Experimental results show that the performance of GAHH is comparable with SAHH. While GPHH agent outperforms GAHH algorithm agent and SAHH algorithm agent, and also six other benchmark heuristics including MRT, SPT, LPT, EDD, LDD, and MON rules with respect to minimum tardiness and minimum flow time objectives.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}