{"title":"Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means","authors":"Teny Handhayani, Ito Wasito","doi":"10.1109/ICACSIS.2014.7065891","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065891","url":null,"abstract":"Intelligent Kernel K-Means is a fully unsupervised clustering technique. This technique is developed by combining Intelligent K-Means and Kernel K-Means. Intelligent Kernel K-Means used to cluster kernel matrix without any information about the number of clusters. The goal of this research is to evaluate the performance of Intelligent Kernel K-Means for clustering nonlinearly separable data. Various artificial nonlinearly separable data are used in this experiment. The best result is the clustering often ring datasets. It produces Adjusted Rand Index (ARI) = 1.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia","authors":"A. Fadhilah, Y. G. Sucahyo, Denny","doi":"10.1109/ICACSIS.2014.7065862","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065862","url":null,"abstract":"In the international community. Indonesia is one of the country that quite active involved in international cooperation forums. One of the forums is South-South and Triangular Cooperation (SSTC), a new cooperation framework in political, economic, social, cultural and technical area between at least two developing countries and one developed country. In order to support SSTC, the Government of Indonesia formed the National Coordination Team on SSTC. In its implementation, the National Coordination Team (NCT) on SSTC has not shown satisfactory results due to the lack of coordination among the Ministry involved. As a result, the programs that exist today are mostly not linked to each other, not sustainable, and not providing the maximum impact for Indonesia. To make coordination in NCT easier, we proposed to create an integrated information system that supports all of cooperation process. This research tries to design an integrated information system software that can support SSTC program in Indonesia, using RUP (Rational Unified Process) method. The results of this research will be presented as a draft of system specification, and ready to use as an initial design of the software. With the implementation of integrated information system software, we expect that all cooperation programs conducted by Indonesia can linked to each other, sustainable, and bring maximum impact for the Indonesian progress.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani
{"title":"Element extraction and evaluation of packaging design using computational Kansei Engineering approach","authors":"Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani","doi":"10.1109/ICACSIS.2014.7065861","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065861","url":null,"abstract":"Currently packaging design needs more a computational processing roles and became the fundamental selling art of products. Design of packaging is very subjective and company needs to understand customer's behavior, perception and attractiveness. Challenges arise when marketing in fast moving consumer goods is getting very dynamic and competitive. Computational needs to identify customer's perception and attractiveness is unavoidable. In this paper we proposed new methodology to extract and evaluate information elements of packaging design from customer preferences using computational Kansei Engineering (KE) approach. The elements of packaging design were extracted from group discussion and evaluate centrality and novelty metrics using Key Element Extraction (KEE) algorithm. Correlation of packaging design elements and Kansei words was obtained with association rule mining (ARM). This formulation enabled us to define which packaging design elements are strongly correlated with each Kansei/affective words and gives recommendation to designer what kind of packaging to design. In short this proposed methods become a quantification of the art of packaging design that ease a reliable design.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin
{"title":"Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection","authors":"Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin","doi":"10.1109/ICACSIS.2014.7065869","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065869","url":null,"abstract":"Currently there are dozens of internet based applications. Each of these applications can be accessed by their user on the same application layer protocols but different pattern of payloads. For example social network applications like Facebook, Twitter and Google Plus. Each of them can be accessed using HTTPS protocol, but with different payload for each applications. It also possible to access a service in internet by using tunneled protocol, for example Bit Torrent protocol can be tunneled on top HTTP access. These kind of access modes make standard firewalls obsolete to regulate our university internet access control. In this research, we are aiming to prove whether an application layer access control can be developed using Deep Packet Inspection Method. With the deep packet inspection method, it is possible to identify applications based on their application signature. If the application signature can be identified, we can construct more robust rules to regulate university internet access control. We are developing a prototype of application layer access control using several number of free/open source software components. One of these components is Deep Packet Inspection Library - nDPI - which will become our main focus. This research also will explain the way to assemble those software components in order to perform access control functions. We are also performing a test against nDPI payload detection mechanism and the results are reported in this paper.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"78 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system analysis and design for sorghum based nano-composite film production","authors":"Belladini Lovely, Taufik Djatna","doi":"10.1109/ICACSIS.2014.7065870","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065870","url":null,"abstract":"The existence of process complexity and higher inter-dependency within production system of biodegradable sorghum-based nanocomposite film are obviously required for system analysis and design. In this paper, nanocomposite film production was simulated in Business Process Modeling Notation (BPMN) model to assist researchers in decision making. The system was designed by using 2 processing variables as the model input, namely hydrolysis time and plasticizer ratio. Then by modifying and controlling value of these variables, researcher would determine their influences on 3 nanocomposite film crucial physical and thermal properties, such as Water Vapor Permeability (WVP), X-Ray Diffraction (XRD) and Derivative Thermo-gravimetric (DTG). Numerical examples were implemented in order to illustrate the related issues. Model verification result showed that the model succeeded conducting an improvement for all film properties compared to other various composites. Therefore this system is potentially possible to simulate sorghum-based nanocomposite film production in a simpler and fully controllable model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"37 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citation sentence identification and classification for related work summarization","authors":"D. H. Widyantoro, Imaduddin Amin","doi":"10.1109/ICACSIS.2014.7065871","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065871","url":null,"abstract":"Scientific article summarization is an important problem because it can be of helpful for researchers, particularly for those who start a new research topic. In this paper, we address the problem of related work summarization from scientific papers. The process of summarization comprises of extracting citation sentence followed by classifying the rhetorical category of citation sentence. Citation sentence extraction is performed by combining regular expression-based patterns, co-reference system, evidence-based approach and additional extraction rule. Citation sentence is represented as feature vectors containing term frequency, sentence length, thematic word and cue phrase feature groups. The learning of classification model is explored using Naïve Bayes, Complement Naïve Bayes and Decision Tree. Experiment results reveal that the approaches adopted for citation sentence extraction and rhetorical category classification is promising to provide the ground work for related work summarization.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tourism recommendation based on vector space model using composite social media extraction","authors":"H. Khotimah, Taufik Djatna, Yani Nurhadryani","doi":"10.1109/ICACSIS.2014.7065894","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065894","url":null,"abstract":"Intentionally or not, social media users likely to share others recommendation about things, included tourism activities. In this paper we proposed a technique which was able to structure the joint recommendation of composite social media and extract them into knowledge about the tourist sites by deploying the vector space model. We included advice seeking technique to not only calculate recommendations obtained from the profile itself but also recommendations by social network users. This is a potential solution to handle sparsity problem that usually appears in conventional recommender systems. We further formulated an approach to normalize the unstructured text data of social media to obtain appropriate recommendation. We experimented the real world data from various source of social media in R language. We evaluated our result with Spearman's rank correlation and showed that our formulation has diversity recommendation with positive correlation to user's profile.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model prediction for accreditation of public junior high school in Bogor using spatial decision tree","authors":"Endang Purnama Giri, A. M. Arymurthy","doi":"10.1109/ICACSIS.2014.7065831","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065831","url":null,"abstract":"Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios (training set as testing set, leave one out, and 3-fold cross validation) using conventional decision tree (ID3) the accuracy level reach 97.14%, 40%, and 51.51% respectively. On the other hand, using spatial decision tree (SDT) the accuracy reach level 97.14%, 54.29%, and 54.28%. Based on the accuracy level and the structure of tree that was constructed, SDT produce better result. These facts will imply that quality level of public junior high schools on Bogor have correlation with characteristics of geographic area. However, SDT need much more computation time to construct decision tree rather than ID3, so for big number of data and big number of attributes, SDT will not appropriate.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image","authors":"Setiawan Afandi, Y. Herdiyeni, L. Prasetyo","doi":"10.1109/ICACSIS.2014.7065848","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065848","url":null,"abstract":"This research report about Fuzzy C-Means for Deforestation Identification Based On Remote Sensing Image. Deforestation means that changes forest area into another functions. Clustering is a method of classify objects into related groups (clusters). While, Fuzzy C-Means clustering is a technique that each data is determined by the degree of membership. In this research, the data used are MODIS EVI 250 m in 2000 and 2012 to identify deforestation rate in Java island. MODIS EVI is one of kind MODIS image which is able to detect vegetation based on photosynthesis rate and vegetation density. The number of clusters used were 13 clusters. This research had succeeded to classify areas based on the value of EVI like areas who had a high EVI values (forests, plantations, grass land), moderate values (agricultural area), and low values (build up area, mining area, pond, and other land cover). But, EVI value is only influenced by photosynthesis rate and vegetation density. Thus, EVI value is not well to identify forest areas, this is because the value of EVI in forest areas are almost same with plantations, savanna, etc.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending V-model practices to support SRE to build secure web application","authors":"Ala A. Abdulrazeg, N. Norwawi, N. Basir","doi":"10.1109/ICACSIS.2014.7065838","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065838","url":null,"abstract":"Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}