2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)最新文献

筛选
英文 中文
Augmented Reality for Office and Basic Programming Laboratory Peripheral 增强现实办公室和基础编程实验室外围设备
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878527
M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka
{"title":"Augmented Reality for Office and Basic Programming Laboratory Peripheral","authors":"M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka","doi":"10.1109/EIConCIT.2018.8878527","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878527","url":null,"abstract":"Submission of information can use 3-dimensional (3D) images that will make information clearer and more interesting. Faculty of Computer Science and Information Technology (FKTI) one of the faculties located at Mulawarman University. Base rooms and laboratories are often used and if someone wants to do peripherals then he will look for additional peripherals. However, they do not have a device that can be used to know the pattern of each room function and the learning environment must have additional devices to facilitate the use of Augmented Reality 3D media. Therefore, it is necessary to have augmented reality media to provide an understanding of visual information for the faculty room and the basic laboratory of the FKTI program. Each scheme of determining markers is adjusted to the point where the camera will scan. Tests are carried out to show the results are done on plain paper that already has their own floor plan and in each room partition can display basic information about the room. Light testing is also done with the result that if the light is $gt300$ lux then it can be ascertained that AR visibility will appear quickly.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127042411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of e-Business Furniture SMEs From Commodity and Waste Utilization Perspective 商品与废弃物利用视角下的中小家具企业电子商务设计
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878520
I. Patulak, M. Firdaus, N. Dengen
{"title":"Design of e-Business Furniture SMEs From Commodity and Waste Utilization Perspective","authors":"I. Patulak, M. Firdaus, N. Dengen","doi":"10.1109/EIConCIT.2018.8878520","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878520","url":null,"abstract":"Current economic era is not only based on capital and human resources, but on information held by the company and no exception to small medium enterprise (SMEs). Correct information at the right time can determine positive business development, while lack of information can lead to failure. Commodity-Processed Furniture SMEs and Waste Utilization in Samarinda are research targets because they feel SMEs furniture is increasingly farther away with consumers in the current information age. Data collection is carried out by direct survey to the place of business and the community by recording, documenting photos, archives, and recording interviews. This research aims to show that existing modern media is suitable for use in e-business in Furniture SMEs in terms of increasing the coverage and sales of various products and services. The authors try to present business model solutions from SMEs furniture services in particular. Wood raw material for wood production waste is closer to being obtained from sawn timber companies along the lower reaches of the Mahakam River. The resulting waste is in the form of powder and specks. Commodities of finished and traded goods are pretty much like cosmetics, windows, doors, cabinets, tables, chairs, even gravestones. Social media such as Facebook, Instagram, WhatsApp, and Lne are the cornerstones of the e-business media in this design because it is the social media that is closest to the community.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Transmission using Metadata Logger Manipulation Approach 使用元数据记录器操作方法的安全数据传输
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878601
Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo
{"title":"Secured Data Transmission using Metadata Logger Manipulation Approach","authors":"Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo","doi":"10.1109/EIConCIT.2018.8878601","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878601","url":null,"abstract":"The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Image Edge Detection Operators for Lontara Sanskrit Scripts Lontara梵文图像边缘检测算子的性能比较
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878673
Yolanda Gabyriela Ferandji, Diaraya, A. Lawi
{"title":"Performance Comparison of Image Edge Detection Operators for Lontara Sanskrit Scripts","authors":"Yolanda Gabyriela Ferandji, Diaraya, A. Lawi","doi":"10.1109/EIConCIT.2018.8878673","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878673","url":null,"abstract":"Processing of image digital is a technology that can be used to enhance images and information about objects in images. Edge detection in digital image enhancement is a process that produces parts of image objects for segmentation and creativity of objects in the image. This research aims to get the best operators to detect the character of the word Lontara in Sanskrit manuscripts. This research also uses morphological operations in binary images to identify the many forms of the character of the word Lontara. Edge detection operators used are Sobel, Canny, Prewitt, and Roberts. There are 2 types of images used in this study are good quality images and poor-quality images. The parameter used to measure operator performance is Mean Square Error (MSE). The results we obtained from Roberts operator are the best operators to detect the location of the script with an MSE value of 0.8370 in images of good quality, MSE value of 0.8688 in images of poor quality.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Case Based Reasoning with Nearest Neighbor and Decision Tree for Early Warning System of Student Achievement 基于案例的最近邻推理与决策树相结合的学生成绩预警系统
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878512
Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin
{"title":"Combination of Case Based Reasoning with Nearest Neighbor and Decision Tree for Early Warning System of Student Achievement","authors":"Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin","doi":"10.1109/EIConCIT.2018.8878512","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878512","url":null,"abstract":"Student achievement is one of the main focuses to increase university credibility. An early warning system is needed to prevent more risks. The early warning systems (EWS) of student achievement has been possible with a combination of case based reasoning (CBR), k-nearest neighbor (K-NN), and decision tree. CBR is used to obtain a solution that stores knowledge so that it can predict student achievement. This research is combining the Case Based Reasoning, K-Nearest Neighbor (K-NN), and Decision Tree (DT) methods for the prediction of student achievement that applied in the early warning system. The attributes of an early warning system of student achievement are genders, distances of residence, ages, high schools, majors, and grade point average (GPA) for six semesters. The results show that accuracy rate is 60.5% of 55 data in the early warning system of student achievement and a model CBR for Early Warning System of Student Achievement.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality of Service Voice over Internet Protocol in Mobile Instant Messaging 移动即时通讯中基于互联网协议的语音服务质量
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878574
M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi
{"title":"Quality of Service Voice over Internet Protocol in Mobile Instant Messaging","authors":"M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi","doi":"10.1109/EIConCIT.2018.8878574","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878574","url":null,"abstract":"Voice over Internet Protocol (VoIP) technology is easy to find even almost all instant messaging mobile applications already have features such as voice calls. The VoIP feature can only be used after the user is connected to the internet network, for the average smartphone user to use the internet network provided by the internet service provider (ISP). The VoIP is very dependent on the network used. Quality of Service (QoS) parameters such as delay, jitter, throughput and packet loss be used to measure the quality of the network. This study aims to analyze the performance of VoIP technology in one of the instant messaging mobile applications like WhatsApp uses Telkomsel ISP network and be adapted to International Telecommunication Union (ITU-T G.114) standards. Results of the research, the highest of delay generated by voice calls during indoor conditions is 56,6 ms, jitter is the most resulted voice call when the indoor condition is 0,5 ms, packet loss is the most generated voice call when the indoor condition is 7%. The resulting throughput in the voice call testing process is between 25.2 Mbps until 28.1 Mbps.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Economic Dispatch using Novel Bat Algorithm Constrained by Voltage Stability 电压稳定约束下新型Bat算法的经济调度
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878604
Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin
{"title":"Economic Dispatch using Novel Bat Algorithm Constrained by Voltage Stability","authors":"Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin","doi":"10.1109/EIConCIT.2018.8878604","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878604","url":null,"abstract":"Economic Dispatch (ED) of thermal power plant has a role in maintaining economic power system. The main purpose of ED is to set the control variables of power system so that the generators can generate maximum power according to load demand based on each generator characteristic with lower production cost. In this paper, the economic dispatch will be done in thermal power system using Novel Bat Algorithm (NBA) constrained by voltage stability. NBA is a recent optimization method that is developed build upon bat behavior. The result showed that the NBA can optimize the thermal power system by showing lower price of production cost. The NBA can reduce 9.23% of the production cost. Not only is the production cost smaller but also the power loss obtained by NBA. Voltage stability is also maintained in this research by showing better improvement of critical point with average 0.920 per unit. The proposed method is applied in real system of SULSELBAR 150 kV power system.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
[EIConCIT 2018 Back Cover] [EIConCIT 2018封底]
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/eiconcit.2018.8878541
{"title":"[EIConCIT 2018 Back Cover]","authors":"","doi":"10.1109/eiconcit.2018.8878541","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878541","url":null,"abstract":"","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Student Academic Evaluation using Naïve Bayes Classifier Algorithm 使用Naïve贝叶斯分类器算法的学生学业评价
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878626
Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah
{"title":"Student Academic Evaluation using Naïve Bayes Classifier Algorithm","authors":"Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah","doi":"10.1109/EIConCIT.2018.8878626","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878626","url":null,"abstract":"One of the department tasks is to predict study duration-time of each student in order to anticipate dropout (DO), which causes the department performance to be poorly. Consequently, study duration-time of each student is indispensable. Furthermore, the evaluation showing whether the student will pass or fail would benefit the student/instructor and act as a guide for future recommendations/evaluations on performance. An in-depth study on the student academic evaluation techniques by using Naïve Bayes Classifier (NBC) has been implemented. The dataset with specific parameters among others age, place of birth, gender, high school status (public or private), department in high school, organization activeness, age at the start of high school level, and progress GPA (pGPA) and Total GPA (tGPA) of undergraduate program from semester 1–4 with three times graduation criteria (i.e., fast, on, and delay times) have been described and analyzed. The experimental results indicated that accuracy algorithm (AC) of 76.79% with true positive rate (TP) of 44.62% by using quality training data of 80% and 90% have a good performance accuracy value.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Comparison of Artificial Neural Network and Gaussian Naïve Bayes in Recognition of Hand-Writing Number 人工神经网络与高斯Naïve贝叶斯在手写体数字识别中的比较
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878651
Herman, Lukman Syafie, Dolly Indra, As’ad Djamalilleil, Nirsal, Heliawaty Hamrul, Siska Anraeni, Lutfi Budi Ilmawan
{"title":"Comparison of Artificial Neural Network and Gaussian Naïve Bayes in Recognition of Hand-Writing Number","authors":"Herman, Lukman Syafie, Dolly Indra, As’ad Djamalilleil, Nirsal, Heliawaty Hamrul, Siska Anraeni, Lutfi Budi Ilmawan","doi":"10.1109/EIConCIT.2018.8878651","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878651","url":null,"abstract":"Current technological developments spur the application of pattern recognition in various fields, such as the introduction of signature patterns, fingerprints, faces, and handwriting. Human handwriting has differences between one another and often is difficult to read or difficult to recognize and this can hamper daily activities, such as transaction activities that require handwriting. Even though one of the human biometric features is handwriting. The purpose of this paper is to compare the algorithm of Artificial Neural Network (ANN) and Gaussian Naïve Bayes (GNB) in handwriting number recognition. Both of these algorithms are quite reliable in performing the classification process. ANN can do pattern recognition and provide good results. If the size of the training data is small, the accuracy of GNB provides good results. To recognize the handwriting pattern, the characteristics of the handwriting object are extracted using an invariant moment. The test results show that GNB produces a higher level of accuracy of 28.33% compared to the ANN of 11.67%. The resulting accuracy level is still very low. This is because the result extraction data has a small distance for each class or any number character.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信