2020 Fifth International Conference on Informatics and Computing (ICIC)最新文献

筛选
英文 中文
Developing Name Entity Recognition for Structured and Unstructured Text Formatting Dataset 结构化和非结构化文本格式数据集的名称实体识别开发
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288566
N. Azzahra, Muhammad Okky Ibrohim, Junaedi Fahmi, Bagus Fajar Apriyanto, Oskar Riandi
{"title":"Developing Name Entity Recognition for Structured and Unstructured Text Formatting Dataset","authors":"N. Azzahra, Muhammad Okky Ibrohim, Junaedi Fahmi, Bagus Fajar Apriyanto, Oskar Riandi","doi":"10.1109/ICIC50835.2020.9288566","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288566","url":null,"abstract":"Named-Entity Recognition (NER) is a task that extracts the entity information from dataset into several different entity classes. Most of current NER research train the NER model from structured data such as news and Wikipedia article. Whereas, there are several tasks that generate an unstructured dataset such as speech-to-text task. In this paper, we did NER research for unstructured text formatting dataset in Indonesian language using deep learning approaches including LSTM, Bidirectional LSTM (Bi-LSTM), GRU, Bidirectional GRU (Bi-GRU), and Convolutional Neural Network (CNN). We used NERGRIT CORPUS as our dataset and modified the dataset into four types of structured and unstructured datasets. Afterward, we run several experiments scenario by combining all types of data modification and the deep learning algorithms that we used and we obtain that the highest $F$ - Score was obtained when using Bi-GRU for standard dataset, lowercase with punctuation dataset, lowercase without punctuation dataset, and lowercase and clean dataset equal to 71.04%, 70.61%, 68.12%, and 67.45%, respectively.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indonesia's News Topic Discussion about Covid-19 Outbreak using Latent Dirichlet Allocation 印度尼西亚关于Covid-19爆发的新闻主题讨论使用潜在狄利克雷分配
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288596
Razief Perucha Fauzie Afidh, Z. Hasibuan
{"title":"Indonesia's News Topic Discussion about Covid-19 Outbreak using Latent Dirichlet Allocation","authors":"Razief Perucha Fauzie Afidh, Z. Hasibuan","doi":"10.1109/ICIC50835.2020.9288596","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288596","url":null,"abstract":"News related to Covid-19 or Corona dominates the news in several media. From various perspectives, a number of news have been produced regarding the corona outbreak. The purpose of this research is to look at various news topics related to corona, both in national online media and in local online media. This study uses the Latent Dirichlet Allocation (LDA) algorithm to find out news topics related to corona. Preprocessing was carried out on existing articles such as removing punctuation marks, numbers, and removing stopwords. This process is preceded by lowering the text to get unique words. The number of articles collected was 12.883 news titles from the national online media RMOL and the Aceh Tribunnews regional online media in the period January to May 2020. The news items came from various news categories such as politics, law, health, economy, sports and others. Based on this research, by using the LDA algorithm, evaluate using coherence value and visualize the topics, will have the best perspective of how many topics can be created. RMOL news articles have 12 topics discussion with the coherence value is 0.538795. Aceh Tribunnews has 8 topics with the coherence value of 0.522946.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of Work Training Certificate Verification Based On Public Blockchain Platform 基于公有区块链平台的在职培训证书验证设计与实现
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288610
I. Afrianto, Y. Heryanto
{"title":"Design and Implementation of Work Training Certificate Verification Based On Public Blockchain Platform","authors":"I. Afrianto, Y. Heryanto","doi":"10.1109/ICIC50835.2020.9288610","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288610","url":null,"abstract":"The purpose of this research is to develop a job training document storage system based on the public blockchain platform. The use of public platforms is used to secure certificate data making it difficult to falsify. The use of smart contracts is used to form data that will be used in blocks to be sent to the Ethereum blockchain network. The InterPlanetary File System (IPFS) is used to store certificate files in a distributed environment so that access is easy and safe to do. The results showed that certificate data can be stored in public blockchain Ethereum infrastructure and its supporting files stored in the IPFS environment. This means that certificate data is more secure from counterfeiting because it is stored in a distributed and transparent blockchain environment.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Importance of Bounding Box in Motion Detection 边界盒在运动检测中的重要性
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288604
Ahmad Fauzi, S. Madenda, Ernastuti, E. P. Wibowo, Anis Fitri Nur Masruriyah
{"title":"The Importance of Bounding Box in Motion Detection","authors":"Ahmad Fauzi, S. Madenda, Ernastuti, E. P. Wibowo, Anis Fitri Nur Masruriyah","doi":"10.1109/ICIC50835.2020.9288604","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288604","url":null,"abstract":"In today's digital era, we are used to living with various technologies that help ensure safety and comfort in our daily activities. One of the technologies commonly used to help safety and comfort is the use of Closed-Circuit Television (CCTV). Many people or groups are helped by the presence of CCTV in their environment. Some CCTVs have been shown to help identify criminals, but this is done manually. In this research, CCTV is supported by computational techniques that can identify object activities. The computational technique used is a bounding box for moving objects. Thus, it is easier for stakeholders to find out suspicious things in a particular area or incident. The technique to determine the bounding box by calculating the body aspect ratio and object speed.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125377993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evaluation of Internet Addiction Test (IAT) 网络成瘾测试(IAT)评价
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288561
Heru Nugroho, Maria Irmina, Rini Wijayanti
{"title":"An Evaluation of Internet Addiction Test (IAT)","authors":"Heru Nugroho, Maria Irmina, Rini Wijayanti","doi":"10.1109/ICIC50835.2020.9288561","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288561","url":null,"abstract":"Internet has changed society's lifestyle in the direction that completely modern and digital. But the excessive use of the internet may cause dependency or addiction effects. Internet Addiction Test (IAT) is the most frequent instrument used to measure someone's internet addiction level. This paper will conduct a review of the IAT questionnaire through reliability and validity tests based on the online survey result in 385 Indonesian netizens. The reliability test result shows the Cronbach's Alpha value at 0.905, which means the measurement is reliable. The results of the validity test show that the items in the IAT instrument are valid. In addition, this paper also reviews some related scientific literature which showed that it was necessary to evaluate the IAT instrument.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Health Information Adoption Influencing Factors in Social Online Community 社交网络社区健康信息采纳的影响因素
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288519
Ave Adriana Pinem, Achmad Nizar Hidayanto, Awalia Mitha Syaninda, Ernest Anderson, Hera Mentari Putri, Yudistira Ramadhan, Rahmat Mustafa Samik Ibrahim
{"title":"Health Information Adoption Influencing Factors in Social Online Community","authors":"Ave Adriana Pinem, Achmad Nizar Hidayanto, Awalia Mitha Syaninda, Ernest Anderson, Hera Mentari Putri, Yudistira Ramadhan, Rahmat Mustafa Samik Ibrahim","doi":"10.1109/ICIC50835.2020.9288519","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288519","url":null,"abstract":"Health is very essential and considered an asset to complete all our daily activities smoothly. As the development of technology is advancing, the search for health information is now developing even further on the internet media in the online community. Previous studies have been conducted to evaluate the motivation of sharing, seeking, and exchanging health information. Whereas the final purpose for people to seek information has not been studied intensely which is to adopt and apply the information. There is still limited literature to study the factor of the adoption of health information. Thus, this study aims to analyze the factor that influences the adoption of health information. The data was collected with an online survey and 170 valid data were collected. The analysis was conducted with PLS-SEM using SmartPLS. The results show that the recommendation credibility and recommendation usefulness have an influence on recommendation adoption. Credibility can be achieved through online community interactivity and social support. The recommendation usefulness can be influenced by the recommendation credibility.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Purchasing New Smartphones among University Students: The Role of Domain-Specific Innovativeness (DSI) and Technology Product Characteristics 大学生购买新智能手机:特定领域创新性(DSI)与技术产品特性的作用
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288608
Karina Lia Meirita Ulo, Aldi Firmansyah, Astari Dwi Rahmanisa, Athifa Michel, Deana Almira Putri, Hauri Silmi Zafirah, A. Hidayanto, Ferdian Aditya Pratama
{"title":"Purchasing New Smartphones among University Students: The Role of Domain-Specific Innovativeness (DSI) and Technology Product Characteristics","authors":"Karina Lia Meirita Ulo, Aldi Firmansyah, Astari Dwi Rahmanisa, Athifa Michel, Deana Almira Putri, Hauri Silmi Zafirah, A. Hidayanto, Ferdian Aditya Pratama","doi":"10.1109/ICIC50835.2020.9288608","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288608","url":null,"abstract":"This study examined the influence of University students' innovativeness and the technology product characteristics toward their intention of purchasing new smartphones by utilizing the theory of Domain-Specific Innovativeness (DSI). Data collection was done by distributing an online questionnaire. There were 156 responses collected from University students in Indonesia. The data were analyzed by using Smart-PLS version 3. The finding discovered that relative advantage had the strongest influence on purchase intention. Meanwhile, Product-Possessing Innovativeness (PPI) had a great influence on the social image. This also revealed a strong relationship between students' Information-Possessing Innovativeness (IPI) and their attraction of aesthetic products. Later, discussion of the results and its practical implications presented.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Risk Management Planning of Digital Certificate Management Case Study: Balai Sertifikasi Elektronik 数字证书管理的信息安全风险管理规划案例研究:Balai Sertifikasi Elektronik
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288593
D. I. Sensuse, Andy Syahrizal, Faizan Aditya, M. Nazri
{"title":"Information Security Risk Management Planning of Digital Certificate Management Case Study: Balai Sertifikasi Elektronik","authors":"D. I. Sensuse, Andy Syahrizal, Faizan Aditya, M. Nazri","doi":"10.1109/ICIC50835.2020.9288593","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288593","url":null,"abstract":"Otoritas Sertifikat Digital (OSD) is a certificate authority held by Balai Sertifikasi Elektronik (BSrE) of the Badan Siber dan Sandi Negara (BSSN). Digital certificate management is the primary business process of Otoritas Sertifikat Digital Layanan Universal (OSD LU), which, if it is interrupted, the OSD business process cannot run smoothly and has an impact on the digital certification process. With the problem of maintaining the reliability and security of the system it there is a need to classify, analyzed, and carried these risks correctly to diminish the negative repercussions that may arise at an agreeable level. The main goal is to address the issues about risk management planning, particularly in the absence of an information security risk management plans within BSrE. We carried the process of risk assessment utilizing the ISO 27005 framework combined with NIST SP 800–30 revision 1 in assessing the security risks. The results of the risk assessment of the 27 assets identified and 26 risk scenarios that must be mitigated and 38 risk scenarios acceptable to the organization. We hope with this study it can help the BSrE in analyzing and to maintaining the security management plan within the OSD LU system and to provides control recommendations as an effort to minimize information security risks in data communication application within the business processes and produce a strategic plan for handling and accepting risk accompanied by a person in charge of the risk scenario","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factors Influencing of Online Forums Effectiveness as Knowledge Sharing Media in Increasing Knowledge and Cooking Performance 网络论坛作为知识分享媒介对提高知识和烹饪绩效的影响因素
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288602
Rafif I. Shaputra, A. Hidayanto, Purwo Aji Fahmi Akmal, Ismail Al Ghani, Muhammad Arief Wibowo, Annisa Monicha Sari
{"title":"Factors Influencing of Online Forums Effectiveness as Knowledge Sharing Media in Increasing Knowledge and Cooking Performance","authors":"Rafif I. Shaputra, A. Hidayanto, Purwo Aji Fahmi Akmal, Ismail Al Ghani, Muhammad Arief Wibowo, Annisa Monicha Sari","doi":"10.1109/ICIC50835.2020.9288602","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288602","url":null,"abstract":"Online forum as media for exchange information that can be accessed online by the public (citizen), especially cooking information. Despite the citizen can obtain various information through online forums, very little is known about factors affecting the effectiveness of online forums in cooking information. This study, therefore, seeks to analyze what factors can influence online forum's effectiveness as knowledge sharing media in increasing people's knowledge and cooking performance. There are four indicators used in this study, knowledge sharing, knowledge application, knowledge creation, and transactive memory system (which refers to three-point: specialization, credibility, and coordination). The survey was taken place and obtain 174 respondents as samples. Structural Equation Modelling (SEM) was conducted with SmartPLS tools to test this research. The result of this study concludes that knowledge application, knowledge sharing, and knowledge creation significantly influence knowledge and cooking performance by using transactive memory systems (TMS) theory.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis and Topic Detection of Mobile Banking Application Review 手机银行应用审核的情感分析与话题检测
2020 Fifth International Conference on Informatics and Computing (ICIC) Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288616
Majesty Eksa Permana, Handoko Ramadhan, I. Budi, Aris Budi Santoso, Prabu Kresna Putra
{"title":"Sentiment Analysis and Topic Detection of Mobile Banking Application Review","authors":"Majesty Eksa Permana, Handoko Ramadhan, I. Budi, Aris Budi Santoso, Prabu Kresna Putra","doi":"10.1109/ICIC50835.2020.9288616","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288616","url":null,"abstract":"Understanding user needs and application quality are difficult things in developing an application. Sentiment analysis and topic modeling based on application review can be used to understand the user needs and application quality. This research aimed to determine customer sentiment towards mobile banking applications and what aspects need to be improved or maintained from the application. The data come from application user reviews on Google Play Store, which amounted to 6194 data. Labeling is done manually, generates two main classes namely positive and negative classes. The sentiment analysis process is done using Naive Bayes models. While the topic modeling process is carried out using the LDA algorithm. The results of the experiment were Naive Bayes method has a good level of accuracy, recall, and precision. The highest accuracy, recall, and precision are at the value of k=5, which is 86.762% accuracy, 93.474% for recall, and 92.482% for precision. Based on the LDA algorithm, the most frequent topics in negative classes are related to OTP code delivery constraints, application login problems, and network connection. On the other hand, the most frequent topics in positives classes included ease, simplicity, and helpfulness.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"4291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信