SIET 2017
Submission Management System
 Main Site Submission Guide Register Login Participant List Abstract List
:: Abstract List ::

 1 Sentiment Analysis of Customer Engagement on Social Media in Transport OnlineMelva Hermayanty Saragih, Abba Suganda Girsang Currently, social media in all of business organizations and community are commonly used to get many advantages such as feedback, customer engagement, and as tools of marketing and promotion. This research proposes investigating the customer engagement by analysis the comments on social media (facebook and twitter) in transport online. This study investigates by mining the comments of fan page facebook and tweet of twitter in three transport online in Indonesia, Gojek, Grab and Uber using the API service which is provided of both media social. The data comments are classified into some categories and positive and negative sentiment as well. These results show that the category ?Feedback system by driver? and ?Feedback system by user? have most comments for three transport online, while category ?Service quality for driver? has the smallest comments. This study also reveals the most comments are the complaining. This feedback of social media can be used to evaluate the performance of these business transport online. Topic: Business process management 2 Mapping the Needs of maturity model of ICT implementation in universityWasilah (1,2), Lukito Edi Nugroho (1), P.Insap Santosa (1) Support Information Communication Technology (ICT) is needed in running an organizations business process. Implementation of ICT in organizations, including university has proven to improve the quality of business processes. Monitoring process is necessary in order to achieve that goal. Maturity model can be utilized to monitor the actual condition of the continuity of an organizations business processes. Currently ICT maturity model for the university is still very rare.The existence of technological developments adopted by the university led to the need for the development of new maturity models. This paper aims to map of existing the ICT maturity model for the university with the needs of ICT in university in the future. This mapping aims to identify new approaches to the development of ICT maturity model in university. The method used is a literature review. A review was performed on a paper relating to the ICT maturity model in education. Review is done on paper in the last 10 years. Based on the review, was found some factors needed in building new ICT maturity model for university. These factors can be considered in developing of ICT maturity model in university. Topic: Business process management 3 Designing The Business Process Model for Higher Education (Case Study: Institut Teknologi Kalimantan)Wiratama Putra Pratikta; Lovinta Happy Atrinawati Business process within the scope of university has an important role to ensure the university meets its goals. Institut Teknologi Kalimantan (ITK) as a developing university has run the business processes, but they haven?t documented the business processes yet. There are no standardization and this leads to deviations in the process implementation. Therefore, ITK needs business processes that are documented and in accordance with the applicable standards, which is Standar Nasional Pendidikan Tinggi (SNPT) and Badan Akreditasi Nasional Perguruan Tinggi (BAN-PT) to improve the operational performance in ITK. The method used in this study is business process management. The stages include process identification, process discovery, process analysis, and process redesign. This method is done by identifying all of the academic business process that ITK has. After that, the current business process (as-is) is modeled with Business Process Model and Notation (BPMN). Each of process models then analyzed to find out its weakness and its conformity with the standards. The analysis results used for recommendation by modeling the proposed business process (to-be) that has been in accordance with the standards. The results of this study are expected to be used as a reference for implementing academic business process in ITK. Topic: Business process management 4 Positive Impact of Customer Relationship Management (CRM) Implementation to Improving The Services of Animal Polyclinics CustomersEdy Prayitno, Novita Amylia Astuti Customer loyalty within the service organization is critical, so transactional data and interactions between customers and organizations must be well managed in Customer Relationship Management (CRM) to create an ideal relationship value. Animal clinics need to use CRM to establish good relationships with their customers, animal owners. The purpose of this study is to know the positive impact of CRM applications on animal polyclinics. CRM was built by involving five actors: the general public, animal owners, veterinarians, polyclinic leaders, and officers. Business process reengineering was done for several new services as a companys appreciation of customers. While other processes still follow the existing business process. CRM was implemented by using a website that has various facilities that can be used by customers and polyclinics to more easily interact, and SMS (sort message service) service from polyclinics as a media attention of customers. The applied CRM application can reduce service waiting time by 82% and add services by 50%. Topic: Business process management 5 Data Gathering in Rural Area using Publish/Subscribe over Wireless Mesh NetworkEko Sakti Pramukantoro, Kasyful Amron, Hanif Kuncahyo Adi Observation data as a material in the decision making process becomes important. The difficulty of accessing data in remote areas poses a challenge to the development of the area itself. Wireless Mesh network infrastructure has proven to be applicable in rural areas. Publish/Subscribe mechanism also proves to be a communication pattern that can survive in unreliable situations. This research combines Wireless Mesh Network infrastructure and Publish/Subscribe mechanism to support the process of collecting sensor data in the rural area. Observed data will be collected on the local webserver. This data can later be transmitted with other technologies such as Delay Tolerant Network. To observe the data, the sensor takes more than 1 second with the percentage of success above 90%. In the data transmission process, not all data can be transmitted. There is a failure rate but no more than 20%. The number of nodes affects the delay in the data transmission process. Larger delays will occur in larger systems. Considering the ease of its application process in remote areas, its ability to survive in unstable network situations and relatively stable performance, this mechanism can be selected as an alternative data collection solution in the rural area. Topic: Climate and ecosystem monitoring 6 Climate Monitoring with Rapsberry pi for Web Based GIS ApplicationTrinovita Zuhara Jingga (a*), Arnayulis (b) Lareh Sago Halaban is one of sub-districts in the Lima Puluh Kota regency. It has several areas consist of rain-fed paddy fields followed by high drought potential due to topography condition. In previous research, it is known that slope and rocky land affect the agricultural system in the region. Climate changes also provides massive influences toward the agricultural process conducted by the society. Therefore, cropping pattern in cultivating the agricultural lands are not well-organized and it makes farmer could not be able to cultivate their land well. This paper describes the implementation of climate sensor to real time monitoring in Lareh Sago Halaban. The data collected will be sent through internet connection to database server GIS web-based. GIS web-based application is an integrated application functioned to analyze land suitability, agricultural potential, and climate changes. Topic: Climate and ecosystem monitoring 7 Drought Forecasting Using ANFIS on Tuban Regency, IndonesiaAndreas Nugroho Sihananto(a*), M. Shochibul Burhan (a), Arief Andy Soebroto (a), Wayan Firdaus Mahmudy(a), Fatwa Ramdani (a), Ahmad Luthfi (b), Hartanto (b) Tuban is a regency on East Java Province, Indonesia, that always suffer from drought every year. A forecasting model is being needed to predict when the drought periods will happen next years. This paper studied the forecasting implementation by using two algorithms : Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) with implementation of additional weather parameters such as meridional wind and zonal wind that, as long as authors know, seldom to be used in weather forecasting model. Based on the RMSE test, ANN resulted RMSE 0.09145; 0.1288 ; and 0.1194 on three different regions while ANFIS resulted RMSE 0.01733; 0.01645; and 0.01714 on the exactly same three regions with ANN. Topic: Climate and ecosystem monitoring 8 Effect of Rotational Speed Spin Coating on pH Sensor Performance Based Titanium Dioxide (TiO2)Eka Maulana, Onny Setyawati, Novvy Nurdiana Dewi The thick layer deposition of TiO2:AgCl on the alumina substrate by using spin coating method for pH sensor application has been done. Part of pH sensor in this investigation is electrode and sensing area, the electrode material is AgCl and the material were made to sensing area is TiO2. AgCl paste and TiO2 paste was made by mixing binder solution (PVA) with AgCl powder and TiO2 powder which stirrer with magnetic stirrer that the mixture became homogenous paste. The AgCl material were deposed to alumina substrate at various rotational speed spin coating 300 rpm, 500 rpm, 700 rpm, 1000 rpm, 1500 rpm, and the TiO2 material were deposed to alumina substrate at rotational speed spin coating 300 rpm. The result of sensor voltage showed that rotational speed spin coating effect on sensor output voltage. The sensor repeatibility result showed that was used of sensors repeatedly resulted in decreased sensor performance. This proves that the materials used make the sensor ineffective for reusable sensors. The sensitivity result of 1000 rpm and 1500 rpm sensors, showed that the optimum sensitivity is 1000 rpm sensor with -41,07 mV/pH. In the calculation of error analysis showed that the pH sensor has the best uncertainly (smallest) is 1500 rpm sensor that is 0,5484%. Topic: Climate and ecosystem monitoring 9 Performance Testing Analysis on Web Application: Study Case Student Admission Web SystemMayang Anglingsari Putri, Hilman Nuril Hadi, Fatwa Ramdani Websites used for universities selection entrance (admission) are most visited websites in daily activity, thus its performance is critical. The ability of web applications either to control or process users? requests determines its reliability. Furthermore, those websites which process students admission in Universitas Brawijaya and Politeknik Negeri Malang certainly engage huge volume of data and information that requires the highest level of reliability. Therefore, there is absolutely needed appropriate testing performances to measure the level of the certain application based on reliability rate. This measurement is used to determine responses, throughput, capability, and system scalability upon workload given. This research has a contribution to present testing performance concepts, goals, targets, types, and tools of Apache JMeter which is engaged for web assessment including detects mistake and error that relates to application performance and helps to improve the level of application performance as expected. Topic: Computer Engineering 10 Post-processing and Band Selection for Hyperspectral Image Data Classification with AdaBoost.MHDesta Sandya Prasvita This research proposed a method to improve classification performance on hyperspectral image data. The method consists of three phases: 1) band selection, 2) hyperspectral image data classification, and 3) post-processing. AdaBoost.MH classifier is used for classification of hyperspectral image data. Accuracy of AdaBoost.MH classification without post-processing is 96.3%. After post-processing, accuracy increased by 3.698%. In addition to improving the accuracy of classification, post-processing also can remove the small misclassified pixel (speckle noise). To reduce the number of hyperspectral bands, band selection was used in this research. Band selection method used was contribution ratio value of AdaBoost.MH classifier. The maximum accuracy in this research is 99.9982%, only 1 pixel is misclassified. Topic: Computer Engineering 11 The Recognition of Mango Varieties Based on The Leaves Shape and Texture Using Backpropagation Neural Network MethodFathorazi Nur Fajri, Nur Hamid, Ricardus Anggi Pramunendar At this time, the demand of Indonesian mango is in great demand by the society especially for the superior quality mango like Manalagi and Gadung. However, many people are still wrong in distinguishing mango varieties. At this moment, the identification or introduction of mango varieties is done by eye. Some people may be expert in identifying mango varieties based on leaves by eye, but not all mango varieties they can identify. Until now, there are several methods to identify mango varieties, but the accuracy got is less than 80%. In research before, the extraction feature used is either shape or texture feature of the leaf images. In this research, we use Backpropagation Neural Network (BPNN) by using mango leaf shape and texture feature. A Dataset used are 300 images of mango leaves consisting of 150 images of mango leaves of Manalagi varieties and 150 images of leaves Gadung. By using this method, we obtain that the most optimal BPNN model got by using hidden layer = 19, learning rate = 0.9, momentum = 0.9, and epoch = 100 with root mean square error (RMSE) = 0.0018. The accuracy rate that we obtain is 96% Topic: Computer Engineering 12 A Dual Dynamic Migration Policy for Island Model Genetic AlgorithmAlfian Akbar Gozali, Shigeru Fujimura The common problem in island model is the way to migrate individual from one to another island or usually called as migration policy. Previous researches in this movement protocol could be categorized into two different approaches, diversity preservation based such as migration protocol in LIMGA and better island pursuing based such as new dynamic migration policy. The main purpose of this works is to introduce a brand-new migration mechanism called as Dual Dynamic Migration Policy (DDMP) for island model GA. DDMP will take the advantage from result pursuer of dynamic migration policy and convergence avoider of LIMGAs migration protocol. The experiment result shows that DDMP could give great result while carrying out the general optimization cases. It could produce the best score result for all cases among previous island model migration methods. This work also compares DDMP with the best-known-so-far solution for the problem set. Topic: Computer Engineering 13 Design and Implementation 8 bit CPU Architecture on Logisims For Undergraduate Learning SupportMochammad Hannats Hanafi Ichsan (a), Wijaya Kurniawan (b) Computer Architecture consist of some basic design based on Computer Organization and Architecture (COA) such as logic design. Leading students to improve knowledge about COA needs a comprehensive learning with a working simulation of a simple 8 bit Central Processing Unit (CPU). The Design based on Von Neumann Architecture that?s generally include Registers, Bus Interface, ALU, Memory and their structures. The CPU Architecture simulation used Logisims which capable to performs digital logic simulation. Logisims has an ability to perform digital logic to build subcircuits become a larger circuit in a single environment from low level combinational and sequential circuits to build a complete CPU. Undergraduate student has suffered to study COA with the theory that explained in several lesson, the lesson explained a structur and an architecture computer only. There are not providing a simulation that explained step by step computer architecture. This research to propose design and implementation 8 bit CPU architecture that designed and implemented step by step that created in Logisims. So the simulation easy to visualize then the Undergraduate Student can learn about the next competency which is to design and make a specific purpose computer. Topic: Computer Engineering 14 THE USE OF CURVE WIZARD METHOD FOR GENERATING ROUGH SURFACE IN CAD MODEL AND DATA TRANSFERING ANALYSIS IN CAE MODEL1,2Kartini*, 2G.A. Sipayung, 2R.R.S. Wicaksono, 2E. Saputra, 2R. Ismail, 2J. Jamari, 2A.P. Bayuseno The contacting surfaces in the biomedical implants, e.g. artificial hip and knee impants, have a rough surface in the micro scale. The computational modelling of the contacting surface between implants with respect to the rough surfaces require are conducted using finite element modelling in CAE software. The rough surface of the contacting components can be modelled as a homogeneous rough surface which derived from equation in Matlab. Then the rough surface is exported to CAD and CAE model. A geometrical deviation can be appear during data transfer in the CAD and CAE model. This paper aims to study the geometrical analysis of the data transfer from mathematical models in Matlab to CAD models in SolidWorks and CAE models in ABAQUS software. In the CAD model, especially in SolidWorks, the rough surface generation process, which is imported from other file format, can be performed in 3 modes: automatic creation method, guided creation method and curve wizard method. The geometrical analysis is conducted on a sinusoidal rough surface model, especially at the peak of height, the valley depth, and the rough surface wavelength with respects to the three types of surface generation method. The result show that homogeneous rough surface successfully transferred to CAD model and CAE model using curve wizard method with the highest geometrical accuracy. The deviation in this method is less than 1 percent on average on 4 locations on the sinusoidal rough surface model. In the automatic creation method, and the guided creation method, the resulted rough surface is less acurate which is indicated by the higher geomterical deviation. Topic: Computer Engineering 15 Designing Core Layer using Triangle Topology and OSPF Protocol for High-Availability Campus NetworkIwan Setiawan and Azis Wisnu Widhi Nugraha One of the considerations in designing a campus network is the availability of interconnection service. Hierarchical network design, that comprises of core, distribution, and access layers, is used in campus network providing foundation to support the characteristic. The core layer is commonly utilized as the connecting layer between internal campus network to other campus networks via another core layer, or to the Internet. This layer needs to have the property of high-availability, since it will be one of the points of failure in the big picture of a campus network. Thus, making this layer high available and automatically repair the interconnection service when link failure occured is essential. We design a triangle topology at the core layer that consists of three routers and two switches to tackle the issue in a campus network using GNS3. The network in the layer implements OSPF protocol so that the link failure can be recovered by managing link states between routers. We evaluate the design by running link testing using tools such as ping and traceroute. Moreover, we measure convergence time of the network after topological change when one of the link failures occured according to the scenarios. We also analyze the link-state database of each routers before and after link failure. Topic: Computer Engineering 16 A Knowledge Base Repository Model for Multiple Domain Problem of Distributed Expert System SevicesIstiadi (a*); Emma Budi Sulistiarini (a); Dedy Usman Effendi (a); Rudy Joegijantoro (b) An expert system that accommodates multiple domain problems is potentially accessed by a large number of users. This can degrade service performance if done at a single service center. The distributed service centers is an alternative to the problem, but the knowledge base between dispersed server needs synchronization mechanism. This study proposes a knowledge base repository model in the form of a database for multi-case and scattered expert systems. The repository model was developed to mark the knowledge base elements to be exchanged between servers. A data exchange mechanism is illustrated to accommodate the data exchange between expert system servers. Topic: Conceptual modeling, languages and design 17 Agile Data Architecture in Mining Industry for Continuously Business-IT Alignment: EA PerspectiveRika Yuliana; Budi Rahardjo Data plays a vital role particularly in mining enterprises to foster innovation and business performance through precise decision-making. Scientists have created many kinds of database technology to support them, such as big data, data cloud, etc. Meanwhile business is always facing a fluctuant situation in using those various database technologies. Unfortunately, there is still hard to use database technology in a proper way because there are no model rules in making a perfect planning so that they can choose suitable tools for its own case. Therefore, this paper aims to design an agile enterprise data architecture model rules (blueprint) in mining company based on various frameworks, tools and methods/techniques so that managers can govern their data asset for sustainably business-IT alignment. This data architecture reference models can be easily adopted by CIO in order to move toward an integrated mining enterprises as well as guide user in producing a precise decision-making. Topic: Conceptual modeling, languages and design 18 Business Intelligence for Physical Examination Platform Service Reporting SystemAbba Suganda Girsang, Sani Muhamad Isa, Aditya, Arie Purnama, Christopher Aryaguna, Evans Andita Sukmana, and Ferico Samuel As a human resource partner company which currently serves South East Asia area, this company is providing more than sixteen professional services to dozens of companies in South East Asia area. This Company is starting to provide physical examination platform service to its client since 2016 which effectiveness in choosing examination package and collaboration options are critical. Every decision made by the company could be disastrous due to the other competitors has been settled in the market for a long time. Therefore, capability to present reports or data in accurate and insightful ways is highly required in order for the company to make data-driven decision. The method chosen to develop the data warehouse along with its analytics and reports is Kimball methodology which has been introduced since mid-1980s and has been used by a lot of prior researchers. As the data can be displayed in various form as it needed, the stakeholder is able to make data-driven decision which benefit this company to perform better in the market Topic: Conceptual modeling, languages and design 19 Integrated Social Media Knowledge Capture Model in Medical Domain of IndonesiaFarrell Yodihartomo (a), Dicky Prima Satya (a) The Social Media Platforms, as the one of largest part of today data traffic on the Internet, disseminate a vast volume of information, including medical information in it. Knowledge management system (KMS) approach is applied with a purpose to capture, maintain, and manage tacit or explicit knowledge available and collected within the social media platforms, organizations database, knowledge base, or document repository. Using Indonesian Natural Language Processing (InaNLP) and Data Mining approach, the proposed model is designed to improve the previous research related to social media knowledge capture model and offer a better accuracy, availability, and reliability of knowledge retrieved. Thus, the processed knowledge can be applied in medical sector of Indonesia, mainly aimed for medical practitioner to give a quick suggestion of the diseases regarding to the early diagnose which has been taken in the first place. Topic: Conceptual modeling, languages and design 20 MANAGEMENT COUNSELING SYSTEM FOR JUNIOR HIGH SCHOOL STUDENTS WITH KNOWLEDGE MANAGEMENT SYSTEM APPROACHNovita, Agnes I.S., Faried, Isnin Non-academic problems are often experienced by junior high school students that lead to, among others, disruption of academic achievements. Careful handling shall be necessary as the students at this level are still in their self-development stages and have yet found a good level of maturity. Thus far, school counseling system has been implemented but in reality the system has not been well documented by using an aid tool in information technology-based system. A knowledge management system (KMS) is necessary in providing assistance to school counselors (?BK teachers?) in managing counseling processes, and by using this approach as the aid tool, thus non-academic problems experienced by the students can be dealt with. This system is built by conducting a proper database design for manage the knowledge. The development process uses an SECI model approach and implements a tacit knowledge to explicit knowledge method in a knowledge management system that has been developed for purposes of counseling systems. The knowledge management system that is developed has met with expected requirements in documenting the problems dealt with by the students as well as making BK teachers easier on making the best use of their own knowledge from experience in dealing with various problems that have been faced in their school. Topic: Conceptual modeling, languages and design 21 Optimization of Fulfillment Nutritional Needs of Toddlers using PSO Algorithm with Flexible BudgetingLeni Istikomah, Imam Cholissodin, Marji In the fulfillment of nutrients, one type of food alone is not enough so it requires a variety food ingredients that contain all the elements of nutrients. In this research give recommendation variation foodstuff automatically by using optimization process of Particle Swarm Optimization algorithm so that it can facilitate Posyandu and parents in providing daily food according to the nutritional needs of a toddler with economic conditions each parent. Based on the resulting in system accuracy up to 84.2% The expenditure of parents of children under five is 37.8%. Topic: Data mining 22 Production Data Warehouse In The Oil and Gas CompanySofyan (a*), Abba Suganda Girsang (b) The focus of this research is to design a pilot project of production data warehouse in an oil and gas company which operates matured field to obtain information about production performance achievement and the dominant factor causing low and off. The data warehouse is one of the solutions that can be used by oil and gas company to analyze data and get valuable information about production achievement performance and dominant cause of low and off in shorter time and more accurate. The data source used in this research come from the company operational database. The method used in this research is a nine step methodology [1] that is a model of systematic data warehouse in building data warehouse recommended by Kimball with through the stages of choosing the process, choosing the grain, identifying and confirming the dimensions, choosing the facts, storing pre-calculation in the fact table, rounding out the dimension table, choosing the duration of the database, tracking slowly changing dimensions, deciding the physical design. The conclusions obtained from this research is a model data warehouse and portal reporting as an analytical tool that can help executives and senior managers in obtaining the multidimensional report that provides strategic information in the decision-making process related to production planning to achieve production targets and reduce the occurrence of low and off on production wells. Topic: Data mining 23 A ALGORITHM HYBRID MODEL OF BAYESIAN FOR DETECTION PERFORMANCE IN UNHEALTHY LIFESTYLEIlham This study was conducted to see the trend of diseases caused by unhealthy lifestyles in underserved communities and coastal villages around Gresik and Tuban by using a hybrid algorithm through the Bayesian Network structure construction.The purpose of this study is to produce a software model that is able to detect early disease risk propensity lagging rural and coastal communities who have unhealthy lifestyle in the form of construction of structures and produces a probability value with cendrungan disease.The validity of that people have a tendency to smoke will experience disease Tuberculosis, Bronchitis or Lung Cancer through the test system is 75% to 95%. Topic: Data mining 24 Implementation Of Naive Bayes Classifier Algorithm On Social Media (Twitter) To The Teaching Of Indonesian Hate SpeechNaufal Riza Fatahillah (a), Pulut Suryati (a*), Cosmas Haryawan (a) Twiiter is a social media that is widely used as a medium of sharing on the internet. There are tweets containing sentences shared by the user, so they can be read by other users. A lot of information can be obtained from social media Twitter. Twitter users can connect with other Twitter users in international scale. Technology that is growing as today can be used for various things, especially in the information distributed in social media especially Twitter. One of the problems derived from social media is Twitter tweets containing speech are positive and negative utterances. From the above problems raised to be a research to classify tweets that contain positive speech and negative utterances using naive bayes classifier method. The results of this study are implemented into a system that can classify tweets on Twitter. The system is built using js Node technology and Naive Bayes classifier as the calculation method of classification. Based on the tests performed, the best accuracy is generated by systems using the Naive Bayes Classifier, which is 93%. Topic: Data mining 25 Mobile App for Stock Prediction Using Improved Multiple Linear RegressionAbidatul Izzah (a), Ratna Widyastuti (b) Stock Prediction is developed in both of two studies, economics and data mining. Stock predictions got special attention because it is important for create a more effective and efficient planning. So that, in this study, we built a mobile application based android platform to predict stock prices using Improved Multiple Linear Regression (IMLR). IMLR is a hybrid Multiple Linear Regression with Moving Average technique. The app is built in several steps, they are requirements analysis, system design, implementation, and testing. Data is collected from the finance.yahoo.com page with category "Jakarta Composite Index (^ JKSE)" which is automatic taken by using Yahoo Finance API. In this app, users can see daily stock history also stock price predictions in real time. Topic: Data mining 26 Modeling Backpropagation Neural Network for Rainfall Prediction in Tengger East JavaIda Wahyuni (a*), Nakhel Rifki Adam (b), Wayan Firdaus Mahmudy (a), Atiek Iriany (c) Climate Change in the world gives many impacts on changing rainfall patterns. As a result, potato farming areas such as Tengger, East Java are having problems to determining potato growing times. It needs a method that can predict rainfall based on rainfall patterns that occur after climate change. Backpropagation Neural Network (BPNN) is one method that can learn from the data of the past and make it a benchmark to predict future data. In this research, BPNN method uses to predict rainfall in Tengger, East Java using rainfall data from 2005 to 2014 which is the period of climate change. Data from 2005-2009 use as training data and data from 2010-2014 use as data testing. In addition, this research also looking for the most optimal parameter modeling of BPNN includes the value of learning rate, hidden layer, and maximum epoch. Based on the test results, the most optimal parameter of BPNN is learning rate 0.2, hidden layer 3, maximum epoch 4000, and average error RMSE for 4 location in Tengger is 8.41. The result of RMSE error with BPNN is smaller compared to previous research using GSTAR SUR and Tsukamoto FIS. Topic: Data mining 27 Finding similar clustering pattern between students academic performance and non-curricular activities dataNur Ayuni Ramadhani, Utomo Pujianto Students attend a number of non-curricular activities in order to develop critical thinking skills and organizational skills. The negative side of this is that some students tend to be more active in the organizations activities than trying to improve their academic performance. This study focuses on cluster analysis on variables related to non-curricular organizational activities and student academic performance. The K-Means algorithm has been used to divide student academic performance into two clusters, high and low GPA. The results are then compared to the clustering of students - also with K-Means - based on the variable activity of each students organization. Experiments that have been conducted show that more than 50 percent of samples show an equivalent clustering pattern between each cluster of academic performance and their correlated non-curricular activity cluster. Topic: Data mining 28 Comparison of illiteracy cluster pattern and population data using Fuzzy C-Means.Nimatul Rochmaniyah, Utomo Pujianto Illiteracy is one of the problems for the Indonesian government that needs serious attention. A number of factors contributing to the high rate of illiteracy include unequal population spread and uneven distribution of teachers between urban and rural areas. One of the efforts made by the government to overcome the problem is by using a block system. However, the weakness of this system is that it takes a long time and also a huge cost. The solution provided to minimize the weakness of the system is to group regions with high and low illiteracy levels so as to form a group of data with the same characteristics. In this research, clustering process is done by using Fuzzy C-Means algorithm. The attributes used are the number of illiterate population, the total population, the number of poor people, the number of schools that have libraries, the number of community learning centers and the number of people who can not speak Indonesian. The experimental results have shown that these attributes have patterns that are identical to the pattern of cluster formation of illiterate population in an area. Topic: Data mining 29 Non-Linear Modelling of Variables Relationship in Multiple Time-Series Data with Extended Dynamic Interaction NetworkHarya Widiputra, Elliana Gautama, Marsudi Kisworo The topic of time-series modeling has been widely researched in studies of dynamic systems. Nevertheless, most studies have focused more on the task of modeling movement of a single time-series in order to forecast their future values and rarely gave further interest to learn about the governing behavior of the observed system. Therefore, we have previously introduced an adaptive machine learning method, named the Dynamic Interaction Network (DIN), to discover and model dynamic pattern of interactions from multiple time-series data to not only predict their future values but also to extract knowledge about their joint movement. However, the interactions were modeled only in a linear form which is a simplified representation of more complex relationships between variables related to real world phenomena. Accordingly, this research extends the previously developed method to allow the modeling of non-linear relationships between contributing variables in multiple time-series data. The objective is realized by incorporating the Extended Kalman Filter method into the DIN to enable the identification of non-linear interactions between variables in a set of multiple time-series data. Comparative study and results of conducted experiments reveals that the ability to model the dynamic interactions between variables in non-linear forms leads to better understanding of the nature of observed system and in addition helps to increase the prediction accuracy. Topic: Data mining 30 Optimization Fuzzy Neural Network with Simulated Annealing on Jatropha Curcas Plant Disease IdentificationDiny Melsye Nurul Fajri, Triando Hamonangan Saragih, Andi Hamdianah Jatropha curcas are multifunctional plants, especially on the seeds. It can be extracted into oil as cosmetic additives, detergents, waxes and biofuels. The Jatropha curcas farmer must be aware of the disease that attacks by pest or virus for the existence and benefits of this plant. The main obstacle is the lack of farmers?s knowledge about diseases that attack the plant, a system is needed that can utilize expert knowledge so that it can give the decision like an expert. This paper used optimized of using simulated annealing from Fuzzy Neural Network (FNN) method to identify Jatropha Curcas Disease and achieved the best solution of 32.5%, better than just using FNN only. Topic: Data mining 31 Jatropha Curcas Disease Identification Using Fuzzy Neural NetworkTriando Hamonangan Saragih, Diny Melsye Nurul Fajri, Andi Hamdianah Jatropha Curcas is a plant that has many functions and uses, but not apart from that this plant can be attacked by disease. Expert systems can be applied in identification so as to help both farmers and extension workers to identify disease. In this paper the method used in the identification of Fuzzy Neural Network (FNN) with an accuracy of 30% with an average accuracy of 11.2%. Topic: Data mining 32 Gold Price Movement Forecasting using Hybrid FIS-ESAndreas Nugroho Sihananto(a*), Fitra A. Bachtiar(a) Gold is the most popular commodities that has been used for exchange of goods for centuries. For a trader, the most important thing to gain profit on gold-exchange trading world is to know the behavior gold price, when it will be moving down or moving up in the stock market. Gold prices affected by some economic factors such as foreign exchange but most methods that studied gold forecasting only focused on technical analysis ? using time series and historical price. This paper is trying to formulate fundamental analysis to forecast gold price by using hybrid between Evolution Strategies and Fuzzy Inference System. It resulted lower error based on MAE compared on regular FIS, with the value is 9.460308 for regular FIS Mamdani and 2.73414 for ES-FIS. Topic: Data mining 33 The Performance of Genetic Algorithm Learning Vector Quantization 2 Neural Network on Identication of The Types of Attention Deficit Hyperactivity DisorderBrillian Aristyo Rahadian (a*), Candra Dewi (b), Bayu Rahayudi (c) Attention Deficit Hyperactivity Disorder (ADHD) is a psychomotor disorder on children with characteristics like difficult to concentrating, difficult to keep quiet, feeling restless, unable to sit quietly and do something excessively. Detection types of ADHD is necessary to handle the patient appropriately. This research implements Genetic Algorithm Learning Vector Quantization 2 Neural Network (GA-LVQ2 NN). The advantages of LVQ2 are able to set the weight vectors on the process of supervised learning to estimate the classification results. But if the initialize weight vectors is not precise then the classification results will not be optimal. Genetic Algorithm (GA) is used to optimizing the weight vectors on LVQ2 training process. To find out the performance of GA for optimizing the weight vectors of LVQ2, then performed comparison between GA-LVQ2 and LVQ2. The testing is done by calculating the accuracy using 80 training data and 20 testing data. Based on the testing by 10 experiments, showed that the GA-LVQ2 method gives higher accuracy that is 89.5% compared to LVQ2 method which is 80%. Topic: Data mining 34 Classification of Provinces Based on Schools Dropout Rate using C4.5 AlgorithmAnnas Gading Pertiwi(a*), Triyanna Widyaningtyas (b), Utomo Pujianto (b) The education in a certain region reflects the region. In Indonesia, the rate of schools dropout rate in each province is considered high. This urges the effort to reduce the schools dropout rate. One of the ways to reduce it is by knowing the characteristic of province whose schools dropout rate is low. From those characteristics, we can classify to know which characteristic is similar to others, and it can be indicated as one of causative factors of the schools dropout rate itself. Data mining has been used to analyze data and can be used to solve this kind of problem. One of data minings method, C4.5 algorithm is chosen to be the method because its proved that the result is good and C4.5 is good for data which has many attributes. The result showed accuracy rate of 71.2%. Based on the result, it can be concluded that the development of the classification of provinces based on schools dropout rate using C4.5 algorithm was accurate to use. Topic: Data mining 35 Predicted Drought Rate in KabupatenTuban With Web Scrapping Techniques and Fuzzy Inference Sugeno AlgorithmsM.Shochibul Burhan, Fitra A. Bahtiar Drought disaster in Tuban District is a frequent disaster. This is due to soil conditions in the form of limestone sediment and rainfall is very rare in the dry season so that the ground water run dry and run out. Disaster mitigation is urgently needed for the early mitigation of drought impacts, for which a drought-level prediction is required that accurately predicts the occurrence of drought. By using data analysis and forecasting using fuzzy logic then supported by scrapping data from various source website. This problem can be solved quickly and forecasting results obtained more accurate results. Topic: Disaster management 36 Application of Open Garden Sensor on Hydroponic Maintenance Management by Using Shortest Job First AlgorithmBaihaqi Siregar (a*), Sawaluddin (a), Muhammad Kurniawan (a), Ulfi Andayani (a), Fahmi (b*) Hydroponic farming system is an agricultural system that uses direct water as a nutrient without using soil as a planting medium. This system allows smallholder farmers to have the opportunity to develop their crop production with less capital. In addition, hydroponic planting has also been widely adapted by individuals as a personal hobby. Application of technology has penetrated various fields including agricultural fields. One of the technologies that can be applied in a hydroponic farming system is the sensor. Sensors are devices that used to convert a physical quantity into a quantity of electricity so that it can be analyzed with a certain electrical circuit. In this study, the technology to be applied is wireless sensor technology applied in human life to help get information quickly and accurately. Sensors to be used in this study are pH sensors, conductivity sensors, temperature sensors and humidity. In addition to sensors, the study also involved Arduino technology. Arduino is a microcontroller board that is used to interact with the environment based on programs that have been made. The author also tries to apply Shortest Job - First algorithm to help scheduling sensor data. The Shortest Job - First algorithm is the optimal scheduling algorithm with a minimum average waiting time. The final results of the application testing show that the success rate of the diagram displays the data in real-time in an environment with a radius of 20 meters is 88.5%. While the success rate diagram displays data in real-time in an environment with a radius of 11 Km is 65.7%. Topic: e-Government and public sector 37 Nearby Search Indekos Based Android Using A Star AlgorithmBaihaqi Siregar (a*), Erna Budhiarti Nababan (a), Jun Arthur Rumahorbo (a), Ulfi Andayani (a), Fahmi (b*) Indekos or rented a temporary residence is monthly or annual. Academic civitas who come from outside the city desperately need a temporary residence such as boarding or rented in undergoing the period of education, teaching or duties. In search of the boarding is often difficult because of lack of information from the boarding house. Especially for the new academic civitas who generally do not know the location around the campus and prefer the closest distance from the board to the campus. This problem can be solved by applying the A Star (A*) algorithm. The algorithm is one of the shortest path algorithms of a nearest college lookup application from the campus, where the campus faculty are the starting point of the search. The determination of the starting point of the search used in this study aims to enable students to determine the starting point of the search for boarding. This application is built with a mobile-based to facilitate the search, so it can be used anytime and anywhere. Based on the experimental results, A* Algorithm able to find the closest route with search accuracy reach 86.67%. Topic: e-Government and public sector 38 Environmental electronic governance (EEG) in Indonesia: its current conditions, challenges, and obstaclesTeguh Kurniawan Advances in information and communication technology have provided significant benefits in human life including in the field of environmental management. One form of ICT utilization in environmental management is through Environmental Electronic Governance (EEG). EEG according to Martin et.al (2012) is the rules, behavior and dynamic process by actors, including government, industries, market and civil society, using ICT to protect the environment and achieving sustainable development involved in environmental protection. As an instrument, EEG provides abundant tools for direct public participation, focuses on networking and interactions among stakeholders, and spurs citizens? interest in environmental problems and protection as well as facilitates their engagement. This paper tries to see how the current status of EEG in Indonesia and the challenges and obstacles it faces. Related to government actors, in this article the discussion focused on the Ministry of Environment and Forestry as the central actor and the Provincial Government of DKI Jakarta and the Municipal Government of Depok as regional actors. Topic: e-Government and public sector 39 Enhancing public complaint management via an IT-enabled conceptual frameworkPrassanna Pathmanathan, Ryan Poulier Across the world, many nations have successfully implemented complaint management solutions for diverse complaint types, so as to promote open government initiatives and other policies. The issues reported include potholes, broken sidewalks, flooding, garbage, etc. In Sri Lanka, there are many issues with the current public complaint management process which have led to citizens being dissatisfied. Based on this background, the project aims to analyse why citizens in key cities in Sri Lanka are dissatisfied with the process; and design, develop and evaluate an IT solution to reduce this dissatisfaction, while creating a conceptual framework for effectively incorporating the solution into the complaint management process. In creating an effective conceptual framework and IT solution for complaint management, attitudinal factors, social factors, technological factors and knowledge and communication factors affecting citizen participation in complaint management initiatives were analysed based on existing literature. These factors were validated via interviews with government officials and questionnaire distribution amongst citizens. Building on this, the conceptual framework was formulated, incorporating a complaint management IT solution for citizens. Topic: e-Government and public sector 40 Definition of Critical Success Factors in E-Government of IndonesiaRuci Meiyanti (a*), Muhammad Mishbah (b), Darmawan Napitupulu (c), Dana Indra Sensuse (d), Yudho Giri Sucahyo (e) Critical Success Factors (CSFs) of e-government are useful to get success implementation of e-government services to the citizen. The last data about CSFs of e-government in Indonesia amounts 52 factors. The problem is unclearly meaning or too short word that revealed in the CSFs. The purpose of this study is to describe the Critical Success Factors (CSFs) of e-government in Indonesia. Describing CSFs is very important to avoid misinterpretation of the meaning. The exact explanation of CSFs of e-government will make the easy clarification of developing e-government in Indonesia. The approach of a method that used in this study is a depth of literature review of CSFs. The result of this study is the definition of CSFs of e-government in Indonesia and influence for stakeholders of e-government. Topic: e-Government and public sector 41 Influential Variables of Behavioral Intention to Use E-Government Services in Indonesia Using The Unified Theory of Acceptance and Use of Technology 2 ModelRuci Meiyanti (a*), Deki Satria (b), Dana Indra Sensuse (c) Many studies about good services in e-government are done by improving services for the citizen. The behavioral intention to use e-government services can influence in improving services. There are variables used to measure behavioral intention to use e-government services. The research model used the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model. UTAUT2 model is complete than UTAUT with added variables such as hedonic motivation, price value, and habit. In this study, we modified some variables in UTAUT2 such as price value variable was substituted by public value variable. Meanwhile, the hedonic motivation variable was eliminated because the activity of service was used to public service that was not to the business. Finally, we completed the model with antecedent trust variables because the intention to use in some research usually needs to trust. We had 203 respondents from the citizen that spread in Jakarta and surroundings to answer the online questionnaires about some e-government services in Indonesia. The findings of this research were three variables to give the positive impact on behavioral intention to use e-government services, they were public value, habit, and effort expectancy. Topic: e-Government and public sector 42 Design of Interactive Digital Book Quiz TemplateDidik Dwi Prasetya The EPUB digital book is a future book format that is beginning to be considered in academics and industry. Compared to the PDF format, EPUB has a richer, interactive, and reflowable content, so it accessible through a variety of desktop and mobile devices (tablet PCs and smartphones). However, until now the writing of EPUB documents is still not as easy as a PDF. This paper tries to propose the design of interactive quiz templates as one form of content in EPUB documents. This multiple-choice quiz is able to present random questions based on the available questions database but still arranged sequentially by keeping the difficulty level of the questions (easy, medium, difficult). The existence of this template quiz will greatly help anyone who will develop evaluation content on electronic learning (e-learning) based on digital book without requiring any special knowledge. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 43 DETERMINANTS OF E-COMMERCE SERVICE QUALITY, RECOVERY SERVICE QUALITY, AND SATISFACTION IN INDONESIAHendra, Ginting, Rini, Sembiring Managing recovery service quality, service quality and satisfaction of e-commerce services is highly significant businesses long-term growth. Previous research has shown that e-retailers experience difficulty maintaining customer satisfaction despite the recent rapid growth of Customer to Customer (C2C) e-commerce applications. Numerous studies have empirically examined mostly Business to Customer (B2C) e-commerce recovery service quality, service quality and satisfaction in various countires. Nevertheless, empirical research on these key contructs of C2C e-commerce in developing country like Indonesia is generally limited. Thus, the main objective of this paper is to identify whether recovery service quality and service quality have influence towards satisfaction in C2C e-commerce. This study draws on previous research to build a conceptual framework which hypothesizes relationships between these three e-commerce constructs and their antecedents. A survey was conducted among C2C e-commerce customers in the eastern province of Indonesia using a structured self-administered questionnaires. The results of this study show C2C e-commerce customer satisfaction in Indonesia is significantly influenced by service quality but is not influenced by recovery service quality, though when combined, it has has significant influence. The study limitations, implications, along with directions for further research are discussed. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 44 The Mediation Effect of Intrinsic and Extrinsic Motivations on Generation Y: An Analysis of Mobile Advertising Attitudes.Arie Kusumawati Y generation has been at the forefront of adopting technology and interacting more with mobile devices. Mobile advertising is considered the application of this technology. Many firms have embraced this, although studies reveal that consumer have a negative attitude towards it. This is why this study was conducted, as to obtain new information if generation Y has the similar attitude. This study examines the factors that influence consumers? attitudes toward mobile advertising. The authors analyze timeliness, localization, and personalization of the advertisement message as antecedents of extrinsic motivation, as well as consumer innovativeness and perceived enjoyment as antecedents of intrinsic motivation. Using partial least square, this study analyzes the conceptual model with a sample of 160 mobile phone users that categorized as Y generation. The result of this study showed that both intrinsic and extrinsic motivations mediate the effects of the advertising message?s characteristics on mobile phone users? attitudes toward mobile advertising. This study may provide a new perspective of a generation?s attitude on perceiving mobile advertising, especially in Indonesia. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 45 The Analysis Of Consumer?s Intention Model For Using E-Payment System In IndonesiaSfenrianto, Junadi, Melva Hermayanty Saragih The objective of this research is to identify the factors that encourage consumers intention to use the electronic payment system for e-commerce transaction in Indonesia. This study was developed based on a model of factors influencing consumer?s intention to use e-payment, namely culture, perceived security, performance expectancy, effort expectancy and social influence. In conducting this study, the data is obtained from 110 respondents who used electronic transactions using e-payment. Meanwhile, the data collected was analyzed using Structural Equation Modeling (SEM). From the analysis, it is known that all of these factors significantly influence the value of the use of e-payment. The sequence is based on a significant level of the greatest to the smallest are effort expectancy, culture, social influence, performance expectancy and perceived security. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 46 Blended learning as a solution to increase the competence of employees in the Ministry of financeHasan Ashari The Ministry of Finance employee amounted to 70,383. This certainly brings a huge impact in the management of human resources. One of them is the development of employee competency. Article 70 of the ASN Law states that each Employee has the right and opportunity to develop competence. Competence development can be obtained through education and training, courses, and upgrading. The Financial Education and Training Agency (BPPK) is an organizational unit within the Ministry of Finance responsible for the employee competency development program at the Ministry of Finance. This employee competency development program is organized through the program "Ministry of Finance Corporate University". In this program, BPPK is required to organize competence development program especially in the form of education and training (training). With the limited resources owned by BPPK, the implementation of training and training can not rely on the classical methods that have been held. BPPK needs to adopt a learning method in accordance with the development of information technology. The development of information technology, allowing BPPK to organize a training program where learners can undertake the learning process without being limited by time and place. This method matches the demographic conditions and the large number of financial ministry employees spread throughout the country. This method is often referred to as e-learning. Type of Training is to meet the competency standards of technical expertise. For training that requires cognitive aspects of C3 level (applying) and above, conventional training methods can not be completely replaced by e-learning methods. To achieve the expected standard of competence, it is necessary to combine conventional methods in which the training participants can interact directly with the teacher, and the e-learning method to deliver materials of basic concepts. This method is hereinafter referred to as blended learning method. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 47 An implementation of Delay-Disruption Tolerant Networking Approach in E-learning, Case Study: belajardisini.comEko Sakti Pramukantoro, Rakhmadhany Primananda Web-based applications can be accessed from anywhere at any time as long as the user is connected to the internet and works on a different platform. Besides for media information, website in educations is used for teaching and learning activities or known as e-learning. The benefits of using e-learning are student can learn anytime and anywhere, but when internet connection has a problem the benefits is not reached. In the implementation, e-learning highly depends on a stable internet connection. If there is a disruption in internet access, e-learning system is not working properly. Delay and disruption tolerant networking can overcome that problem. In this paper an e-learning system with DTN approach is proposed. We evaluate our system using several network condition and the result is a proposed e-learning system adaptive to disruption network and does not cause disadvantage when users working on the online quiz. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 48 IMPLEMENTATION B2C MODEL BASED ON ISO 9241-151: CASE STUDY TENUN ENDEK IN KLUNGKUNG, BALIEvi Triandini, M Rusli, IB Suradarma Small and Medium Enterprises (SMEs) have a role to support economic in Indonesia. They have some problems such as market ability penetration, limited market access and limited access of information. E-commerce will provide different opportunities to SMEs. E-commerce is an effective media online to support SMEs to solve their problems. B2B model was used in this study from the previous research using ISO 9241-151. The objective of this study is to implement B2B model using System Development Life Cycle (SDLC). Database, e-commerce process business, and user interface were designed based on characteristics Tenun Endek SMEs in Klungkung, Bali Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 49 Factors Influencing Acceptance of Accounting Software with Technology Acceptance Model (TAM)Muhammad Agiet Putra This study have examined the factors that influence the acceptance and use of an information system, in this case Accurate Accounting software using the Technology Acceptance Model (TAM) approach to ESQ Groups business units. In this research, the form of data presentation and the method used is descriptive qualitative. Factors in TAM that are used are perception of ease of use, attitude toward usage, and interest of usage behavior.Informants in this study were selected by using purposive sampling method that is determination of informants based on certain considerations or criteria. The criteria used as the basis for determining informants are employees in the ESQ Group business units who use the Accurate system directly to support their daily work. The results of this study indicate that employees in the ESQ Group business units accept the use of the Accurate system due to ease of use, attitude in use, interest in use, and social factors or organizational support for system usage. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 50 Design of E-Commerce Chat Robot for Automatically Answering Customer QuestionAdhitya Bhawiyuga, Moch. Ali Fauzi, Eko Sakti P In order to provide an excellent service, the seller in e-commerce world is required to actively involves in communication with its customer. Nevertheless, in several condition e.g. in vacation or during a rest, the seller might be unable to communicate with his/her customer. While employing a customer service can be a partial solution, it may involves additional costs for paying customer service persons. In this paper, we propose the design and implementation of e-commerce chatbot system which provides an automatic response to the incoming customer-to-seller question. In general, the proposed system consists of two main agents : communication and intelligent part. In order to get the question message sent by the customer, the communication agent periodically performs a request to Telegram server using a standard HTTP protocol. Upon reception, it forwards that question to intelligent agent which then find the closest instance in predefined question-answer corpora. Notice that, we utilize the Levenstein distance to measure the difference between a submitted question with that of in predefined question-answer corpora. Once an closest instance is selected, the intelligent agent forward the answer to communication agent which then send the answer back to the sender through Telegram chat service. From usability and performance testing result, the proposed system can deliver the automatic answer in less than 5 seconds with relatively good matching accuracy. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 51 RELIABILITY TESTING USING HYBRID EXPLORATORY BASIS OF TOUR AND FUZZY INFERENCE SYSTEM TSUKAMOTOTitis Sari Putri (a), Fatwa Ramdani (b) Reliability is a software quality attribute. Reliability can be used to indicate the software?s reliability. Reliability testing is an important matter in software development. It assesses the quality and reliability of a software system, especially a large-scale system that has plenty of users and handles many business operations and transactions. In this research, the reliability test was performed towards the two biggest Indonesian online marketplaces on the android platform, Bukalapak.com and Tokopedia.com. The testing applied scenario-based exploratory method which combines testing based on scenario and exploration. The test was known as hybrid exploratory testing. Scenario-based exploratory test was assessed to identify the result test that cannot be revealed by scenario testing, in which the performed testing is more accurate in resembling the actual end-user behavior that often differs greatly with the script in scenario testing. The testing results of Bukalapak and Tokopedia were compared and analyzed. The results showed that there were some weaknesses in the tested features: impurities, discomfort of using application, and potential occurrences of bugs or errors. From the scenario-based exploratory testing result, it can be concluded that there was no significant error that can damage the system. After optimization was conducted using Fuzzy Inference System Tsukamoto, it showed that both Bukalapak and Tokopedia have an equal end value output of the reliability system, though there were some different values of testing. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 52 Learning Machine Approach for Measuring Flow Experience in Adaptive E-learningDadang Syarif Sihabudin Sahid, Lukito Edi Nugroho, Paulus Insap Santosa Flow experience as a psychological theory has been implemented in various fields, especially in games and marketing. Flow is an optimal condition that someone feels immersed, focused and enjoy an activity. Based on this theory the psychological experience is represented as anxiety, boredom, and flow. The flow is built by complexity elements. But, balance skill and challenge often used for describing the flow. Implementation of flow theory in learning mostly was conducted in a face-to-face situation. Considering the psychological conditions in learning activities can improve the performance of learners. Involving the flow experience on e-learning becomes very interesting and still limited. Nevertheless, the main challenge in this study is how the measurement of flow experience in e-learning. In the previous study, flow was measured by conducting a series of questionnaires after a learning process. This is very inefficient, especially if applied in an adaptive e-learning application, such as context aware e-learning. Therefore in this study presented flow experience measurements when students interact with e-learning. In this study, flow was measured by using machine-learning approach. The measurement was done using learning behavior parameters of learner when interacting with e-learning. The parameters included duration of access, frequency of access, assessment score, and duration time to complete the assessment. The Na?ve Bayes and Decision tree methods have been implemented that provide an accuracy value 78.26% and 92.4%. The results of the experiment showed that the flow experience could be measured inference with high accuracy level. In the context aware e-learning model, the identified flow state can be used as a context to get the appropriate adaptation. Adaptation is expected can keep the psychological condition of the learner in optimal condition. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 53 The Acceptance of E-Payment among Indonesian MillennialsBayu Kelana, Anggar Riskinanto, Deliar Rifda Hilmawan The objective of this study is to explain how e-Payment system is being adopted by the millennial generation in Indonesia. This study applies the Technology Acceptance Model approach and a quantitative method, by analysing 424 PayTren e-Payment users, born between 1977 and 1998 using Smart PLS 3.0. The results show all independent variables have significant relationship to dependent variables. Among them, perceived ease of use has the strongest relationship with perceived of usefulness of e-Payment adoption. Meanwhile, the attitude towards using score shows the best predictive power in this model. The gender was proposed as a moderator variable but the findings did not support this role. Compared to e-Payment adoption in Jordan and Greece,?this study may provide a new perspective on how e-Payment being adopted by the millennial generation in Indonesia. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 54 E-Learning Readiness Measurement on Indonesian Student from Individual PerspectiveAnnisa Syatitah Muharina, Bayu Kelana In 2010-2015, the e-Learning growth rates in Indonesia was above 30 percent, the top eight countries with the highest rates in the world. Therefore, the instrument of assessing e-Learning Readiness (ELR) in education institution in Indonesia is needed. By adapting Aydin & Tasci, Darab and Rohayati framework, this study develops the ELR instrument to see from individual perspective, in order to understand the readiness of Indonesian high school students with the e-Learning. The finding show that the student respondents are ready for e-Learning, but need some improvement particularly in two ELR areas, including innovation and self development. Although this instrument has been tested to measure high school students readiness, it can be adapted to be applied in different school settings in Indonesia. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 55 Tahani Model of Fuzzy Database for an Adaptive Metacognitive Scaffolding in Hypermedia Learning Environment (Case: Algorithm and Structure Data Course)Akhsin Nurlayli (a*), Teguh Bharata Adji (a), Adhistya Erna Permanasari (a), Indriana Hidayah (a) Studies show that an adaptive learning environment is needed by learners. Adaptive e-learning systems have been developed with instructions based on student[s] knowledge level, pedagogical recommender, and scaffolding using student[s] test scores. Since each student not only has different cognitive level but also has a different metacognitive level refers to student[s] knowledge and regulation, we currently develop an adaptive Hypermedia Learning Environment (HLE) for Algorithm and Data Structure Course based on metacognitive awareness level. HLE provides scaffolding as instructional interventions including pedagogical agents, guides, and strategies in learning to facilitate students[] aptitude in programming. Student[s] scaffolding can be determined by knowing his/her own metacognitive awareness level. In this paper, we propose the use of Tahani Model of Fuzzy Database in web-based HLE to support the adaptive decision making. Tahani is one of the feasible models in fuzzy database that can categorize the students[] metacognitive awareness level using Metacognitive Awareness Inventory (MAI). The produced fuzzy rules have been validated by metacognitive experts of educational psychology. A hundred students were categorized into three groups according to three metacognitive awareness level (low, medium, high) and getting their own scaffolding. The results verified the suitability of the proposed model and the student[s] scaffolding. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 56 Data Warehouse Development for Hotel Reservation systemAbba Suganda Girsang, Sani Muhamad Isa, Bambang Susilo, MaxLian, Danang Satya, Salman Al Fariz, Dudi Ramdani XYZ company is a major travel company that has many branches in Indonesia. As the company always provide adequate services for their customers, the company grows larger and need the fast report for business development in order to compete with it?s fellow rivals. By creating a data warehouse for XYZ company, this paper aims to exploit business possibilities stored in XYZ company to get better information about customer behavior from the data received from each branches to get information for the company to take the decision. The Data Warehouse development is done through the nine step methodology designed by Kimball and Ross. Furthermore, the data is able to be presented in dashboard or report corresponding to the user to simplify the data presentation, The data warehouse is used to integrate the data sources needed to provide quick and accurate information. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 57 SPOC Adoption in Accounting Course among Indonesian Undergraduate StudentsAnggar Riskinanto, Bayu Kelana, Indah Navidah Hayati This research aims to determine the factors that affect behavioral intention of Indonesian university students to use Small Private Online Course (SPOC) for accounting learning. This research applies the Unified Theory of Acceptance and Use of Technology 2 (UTAUT 2) approach and a quantitative method, by analysing 42 undergraduate students in accounting course in an Indonesian university (STIMIK ESQ), using Smart PLS 3.0. The finding show that hedonic motivation has a significant effect to behavioral intention of SPOC adoption in accounting learning. The gender and experience were proposed as a moderator variables but the findings did not support this role. This may provide a new perspective on how SPOC being adopted in accounting course by undergraduate students in Indonesia. Topic: e-Healthcare, e-Learning, e-Manufacturing, e-Commerce 58 NEW AND RENEWABLE ENERGY : A REVIEW AND PERSPECTIVESDeria Pravitasari, Sapto Nisworo The issue of global warming and climate change caused by the greenhouse effect becomes one of the interesting things to be studied. This is done to encourage the use of environmentally friendly energy to reduce greenhouse gas emissions resulting from the use of fossil fuels. Government with various policies to be a leading player in the development and application of environmentally friendly energy technology. Reviews and perspectives on renewable energy will be presented in this paper. Based on the review, more research, education and support is needed to further promote and apply technology engineering to process existing resources and seek new renewable energy opportunities to meet policy-defined objectives and standards. Topic: Energy independent 59 Potential of Irrigation Channels as New Renewable Energy SourcesSapto Nisworo, Deria Pravitasari The energy potential of the Progo Manggis Channel is designed and functioned as an irrigation channel, so that the flow discharge is relatively stable throughout the period, even in the dry season. The geographical location of the city of Magelang is relatively ups and downs, to avoid the erosion of the design of Progo Manggis Channel is designed to occur in many dams, it is possible to investigate the energy potential that is found throughout the dams. The potential energy produced is very possible to be used as a cheap alternative energy and environmentally friendly. Measurement of discharge is done by measuring the flow velocity and cross-sectional area of the channel. Measurement of discharge with the aid of current flow meter through velocity-area method approach with total calculation of 510,4303 kW, Kedungsari 61,63076 kW, Menowo 2 55,20043 kW, Menowo 1 114,647 kW, Polosari 80, 67755 kW, Kebonpolo 110,40009 kW, Rindam 21,35771 kW, Jl. Iklas I 25,81356 kW and Jl. Iklas II 40.70273 kW. If at two points of the dump with the highest energy value will be built small-scale generator, then in accordance with the Ministerial Decree No ESDM. 1122 / MEM / 2002 on the Small Scale Power Generation Manual, which states that PT PLN must purchase at 60% of the Cost of Generation in the area to be connected to a low voltage network and 80% connected to a MV network Topic: Energy independent 60 Internet-Based Monitoring and Protection on PV Smart Grid SystemSholeh Hadi Pramono, Eka Maulana, Sapriesty Nainy Sari Smart Grid system based on PV development is an effort to increase the efficiency of energy use. Hence the need for tools that can perform protection and monitoring of the use of electric power should be manage optimally. This tool is able to monitor the current and voltage on the load by using current and voltage sensors, then the data is converted into power (P). This system is also capable of performing power protection to the load so that if the power supplied by the power supply exceeds the power specifications on the burden of this protection system will disconnect the load from the power supply. In this study the method used in monitoring and protection mechanism using wireless communication via internet with ESP 8266 Wifi module which can be accessed through website. This tool is capable of reading up to 5 A current changes with an error readings on ammeters by 2.4% and the change in voltage up to 30 V with an error in the voltmeter readings of 0.073%. The data read on the microcontroller will be stored on the memory card such as data loggers and some are sent to the web service is available to do the monitoring. The protection system in the tool uses the relay, the relay has a switching response at speeds of 54 ns. This system can be used for the control and protection mechanisms of future smart grid networks based on IoT (Internet of Things). Topic: Energy independent 61 Rute Pengangkutan Sampah Berdasarkan Kapasitas Kendaraan dan Kondisi Container di Surabaya PusatRicky Setiawan Hartanto, Edwin Hendrawan The garbage collection constitutes the main contributor in terms of the garbage cost management. Garbage collection scheduling model is a variable that determine cost center. Cities in developing countries still operate a traditional waste transport and handling where rubbish were collected at regular intervals by specialized trucks from curb-side collection or transfer point prior to transport them to a final dump site. The waste generated by Central Surabaya is about 190 tons / day spread over 18 TPS. Garbage transport from TPS to Benowo TPA uses 2 types of trucks. The first truck is an ordinary truck located in Tanjung Sari Sanitation and Plantation Service and has a carrying capacity of 10,939 Kg. The second truck is a compactor truck located in the Menur Sanitation and Plantation and has a carrying capacity of 10,300 Kg. Effective working time of DKP Surabaya is 8 hours / day. The optimization of transport is done by making the transportation route. Optimization is done by considering the technical aspects of the mass of waste in each TPS and truck capacity. Routes using the shortest distance, not the fastest time. Ritivity is adjusted according to the garbage mass of each TPS. The optimal route for regular TPS is 12 routes with a total distance of 580 Km, while the optimal route for TPS compactor is 9 routes with a total distance of 505 Km. The garbage mass of each TPS and vehicle capacity has a significant influence on the waste transport route. Topic: ERP and supply chain management 62 Strengthening of Supply Chain Strategy Case Study KUD DAU MalangNovianti Adi Rohmanna & Imam Santoso Industrialization is one of the issues that are growing in Indonesia. Developments of these industry impact on economical improvement and competition on this country. One of strategy that can be applied to enhance the performance of companies with an evaluation system supply chain involved directly or indirectly in acquirement demand or consumer needs. In a supply chain system there are three value streams, such as product flow, information flow and financial flows. These streams must be optimized in order to create a strong supply chain network. Some of the strategies that can be used in strengthening the supply chain are the selection of good suppliers, improvement of institutional relation, as well as the capital gains. Some methods were used to determine the best strategy are AHP, ANP, TOPSIS fuzzy, ISM and AHP. The result of this study, shown that capital gains were the top priority for the improvement of supply chain strategy, then followed by of institutional and supplier strengthening. An alternative strategy to improve capital gains is self capital cultivation. The relations of institutional in KUD Malang are relatively good. As for the best suppliers are the dairy farmers from Princi for the efficiency of shipping. Topic: ERP and supply chain management 63 Production Data Warehouse In The Oil and Gas CompanySofyan, Abba Suganda Girsang The focus of this research is to design a pilot project of production data warehouse in an oil and gas company which operates matured field to obtain information about production performance achievement and the dominant factor causing low and off. Data warehouse is one of the solutions that can be used by oil and gas company to analize data and get valuable information about production achievement performance and dominant cause of low and off in shorter time and more accurate. The data source used in this research come from the company operational database. The method used in this research is a nine step methodology that is a model of systematic data warehouse in building data warehouse with through the stages of choosing the process, choosing the grain, identifying and confirming the dimension, choosing the facts, storing pre-calculation in the fact table, rounding out the dimension table, choosing the duration of the database, tracking slowly changing, deciding the physical design. The conclusions obtained from this research is a production data warehouse and portal reporting as an analytical tool that can help executives (stakeholders) in obtaining the multidimensional report, where the report can be directly obtained by performing customized according to the wishes of stakeholders as a decision maker. Topic: ERP and supply chain management 64 A Mathematical Proof Concerning The Geometrical Aspect of Very Low Index of Difficulty in Multidirectional Tapping Task of The ISO9241-Part 411Reyna Marsya Quita; Romy Budhi Widodo Through mathematics, this paper works to analyze the Index of Difficulty in ISO9241-Part 411: Evaluation methods for the design of physical input devices. It was proven that all the target circles always intersect for very low Index of Difficulty; which conjectured to disturb the experiment or affect the focus of the subject. Some examples are provided, in addition, to support the proof. We hope this proof will contribute to the improvement of ISO9241, where the result might become a special attention to the designer of the experiment in human-computer interaction field; especially in checking the influence of overlap area in the human factor. Topic: Human computer interaction 65 An Architecture Design of Convolutional Neural Network to Distinguish between Human and Seismic Activities Approach of P- and S-Wave as Fractal DataBudiarianto Suryo Kusumo; Ana Heryana;Ekasari Nugraheni; Bambang Setiadi;Andri Fahrur Rojie Abstract--Nowadays many sensors embedded in smartphone opening a lot of research possibility. In the beginning, accelerometer sensors are used to measure gravitational pull to determine the angle of the smartphone screen. But this capability can be extended to also classify human activity, and even further, seismic activity. In this research, we propose a new architecture design concept using Convolutional Neural Network to distinguish between human and seismic activity is one of the multilayer neural network models. P- and S-waves are called elastic waves are deform the earth elastically (Peter M. Shearer (2009)). This type of wave fundamentally changes the medium through which it propagates and often used as an earthquake modeling benchmark In this paper, we approach to P- and S wave seismic data chunk record as class pattern data input to be trained. We observed 18 different types of daily human activities which cause simultaneous vibration, the recorded vibrations are divided into fractals. We describe design architecture in fully-connected convolution neural network model in this our preliminary work. Topic: Human computer interaction 66 Speech Modeling using Deep Belief Network ModularizationMurman Dwi Prasetio (a*), Tomohiro Hayashida (b), Ichiro Nishizaki (c), Shinya Sekizaki (d) Speech is mode of communication among human being and also the most natural and efficient of exchanging information among human in speech. The natural language processing is based on speech that allows us to interact between human into machine, that?fs technological development to be natural language speech recognition for human computer interaction (HCI). The purpose of this study is to examine the deep belief network combined with evolutionary computational optimization can reach the accuracy of speech with the acoustic model. Deep belief network (DBN) was similar to neural network (NN). The state of the art techniques in DBN have proven to be effective for machine learning especially in speech. The experimental result that we build stated the DBN achieves a single spoken dataset without error significanly. Topic: Human computer interaction 67 Virtual dressing room using 3D-rigid transformation for efficient shopping madura batik dressAri Kusumaningsih, Arik Kurniawati, Cucun Very Angkoso, Eko Mulyanto Yuniarno, Mochammad Hariadi The exoticism of Madura batik has become one of the tourist charm of the Indonesian Madura island. Maduras batik created by skilled hands with a high level of artistic imagination to produce diverse and unique batik. Our virtual dressing room used augmented reality technology to create solution of an efficient shopping experience by superimposing the 3D model of a Madura Batik dress within the live Kinect sensors. The superimposed 3D model of Madura?s Batik will then transformed using 3D rigid transformation and bond to the movements of customer so it appears as if the customer is wearing the virtual dress in the live video view. We built the system using SimpleOpenNi library, and Microsoft Kinect SDK. User Experience (UX) measurement on the adaptation key performance indicators which include Attention, Importance, and Arousal showed 96% of respondents said that they were satisfied while the Quality key performance indicators which include Impression, Competence, and Enjoy showed 97% respondents were satisfied . Topic: Human computer interaction 68 USABILITY ANALYSIS IN THE APPLICATION OF SUGARCRM SALES CONNECT USING USER EXPERIENCE METHODAhmad Nurul Fajar, Deska Rayipangesti Internet usage in Indonesia is increased and The development has forced many companies to adapt the changes, especially to support sales activities. The problem is how to make people interested to use a new application named SugarCRM Sales Connect that can provide ease in doing the job to the user to manage the entire sales data.The method used in this research is User Experience. This method is very effective for analyzing Usability an application because it can determine whether the user will return or not to the site. Methods of data collection consists of two parts, namely literature, a questionnaires survey and Usability Testing. The outcome of this study was to determine the level of Usability on the application.The results are :(1).First result relate with Usability. It was measured with five dimensions is Learnability, Efficiency, Memorability, Errors, and Satisfaction. This study evaluates the use of their SugarCRM application Sales Connect that can be seen from the Open-Ended Question and Usability Testing. Ease of use for accessing the content will be the factors that affect the usability of the user. The result is very less or low Usability on the application.The second result is User Experience was measured by six dimensions: Usability, Content, Pleasure, Perceived Usability, Classical Aesthetics and Expressive Aesthetics and the results obtained by the respondents assessment is smaller than the middle value (> 3.00) so that it can be categorized as not good and show that the respondents assessment on SugarCRM Sales Connect arrested classified as negative because it is below the average ie 2.58 Usability, Content is 2.51, Pleasure is 1.54, Perceived Usability is 1.44, Classical Aesthetics is 2.41 and Expressive Aesthetics is 1.93. Topic: Human computer interaction 69 Android Based Application for Recognition of Indonesian Restaurant Menus Using Convolution Neural NetworkWindra Swastika, Yoko, Hendry Setiawan, Mochamad Subianto Indonesia has a lot of typical food which is rich in flavor. However, compared with countries such as China, Thailand or India, Indonesian food is not widely known by the international community. One of the factors that cause Indonesian food is less popular is that the food information can not be accessed easily by foreign travelers during a visit to Indonesia. Food name is written on the restaurant menu can be read, but not really showing the information about the food, such as ingredients, how the food is prepared or a picture about the food itself. Hence, it is required to facilitate foreign travelers who want to find out information about Indonesian food based on restaurant menus. An Android based application has been developed to show food information. The application captures a text on the restaurant menus, process and recognize the text using convolution neural network (CNN). The recognized text is then matched with predetermined database to show the information about the food. The application was able to recognize 100% of the menus when the menus uses Sans Serif Font. However, the accuracy dropped into 56% when the menus uses Times New Roman. Topic: Image processing and pattern recognition 70 Infrared Thermal Imaging Analysis In Breast Health Classification Using Wavelet Transformation AlgorithmEvy Poerbaningtyas Breast cancer is one cause of death number 2 after cervical cancer. It becomes a challenge of how to improve Disease Free Survival (DFS) and Overall Survival (OS), so it is necessary to know more deeply how a cancer grows and develops. Cancer-based medical devices such as SPECT, PET, MRI, Mammography can cause side effects in post-test patients. The development of cancer cells greatly affects the cell metabolic processes and angiogenesis, as well as generate heat energy. If cancer cells develop, the heat energy and infrared radiation on the skin surface is higher. Infrared camera is one of the tools that can be used to represent infrared radiation. The use of infrared cameras in breast health screening does not result in post-test side effects. Infrared cameras can represent the distribution of heat energy in the form of thermal imaging. Disorders of heat energy distribution in breast tissue, indicating the presence of abnormalities in the breast. The application of wavelet transform method in analyzing heat image of cancer on the distribution of heat energy, can determine breast health with 97% sensitivity and 75% specification. Topic: Image processing and pattern recognition 71 Chicken Meat Freshness Identification using the Histogram Color FeatureRosa Andrie Asmara (a*), Faisal Rahutomo (b*) and Qonitatul Hasanah(c*) Identifying the chicken meat freshness level is necessary since it involves the quality of the meat consumed. This research aims at identifying the freshness level of chicken meat based on the color histogram feature. The color histogram feature that used is RGB. RGB value is acquired from the image sample of chicken breast meat. First Order Statistical Method is used to reduce the color feature dimension such as Mean, Max, Min, and Standard Deviation. The value is then classified using Na?ve Bayes Classifier, Support Vector Machines (SVM) Classifier and C4.5 Decision Tree. The Classification method then compared for analyzing the best classifier. The freshness of chicken meat level defined in three class, fresh, medium, and old. The chicken meat classified as fresh from 0 to 4 hours been slaughtered, 4-6 hours classified as medium, and more than 6 hours classified as old. The result of color histogram feature by Na?ve Bayes method shows 38.24%, Support Vector Machine (SVM) shows 50%, whereas C4.5 decision tree method shows 70.59% classification accuracy. The classification process of the chicken meat?s freshness level based on the color histogram feature suggests using C4.5 method which Topic: Image processing and pattern recognition 72 Colour image segmentation for malaria parasites detection using cascading methodYonathan Ferry Hendrawan, Cucun Very Angkoso, Rima Tri Wahyuningrum Malaria disease is one of the deadliest diseases. According to WHO report, in 2016, there were 212 million malaria cases with 429,000 estimated deaths around the world. Rapid and accurate detection of malarial infection could certainly help in reducing the above numbers. This paper focuses on segmentation and detection of microscopy images infected with malaria parasites using colour-based cascading method. The method begins with RGB normalization process, followed by gamma correction, then noise reduction, exposure compensation, edge enhancement, fuzzy c-means clustering, and lastly, morphological processes. We used the method to detect malaria infection for four plasmodium types and three malaria development phases in 574 images. The experimental results demonstrated that the method achieved 97.92%, 98.60%, and 98.26% for sensitivity, specificity, and accuracy . These results suggest that the proposed method is able to detect malaria in microscopy images robustly. Topic: Image processing and pattern recognition 73 Indonesian Traffic Sign Detection Using RGBN and Shape ClassifierCahya Rahmad, Rosa Andrie Asmara, Isna Fauzia Rahmah* This paper presents automatic traffic sign detection which is necessary to be developed to support several expert systems such as driver assistance and autonomous driving system. The work was mainly focused on automatic detection placed in local roads. There were some major issues on detecting process such as damaged signs, faded color, and natural condition. Therefore, this paper is proposed to address some of these issues and will be done in four main step. The first step is segmenting image based on RGBN thresholding (Normalized RGB). The second step is applying median filter to remove the noise and identify the candidate regions. The third step is labeling the image and identifying the candidate regions. The last one is detecting traffic sign by processing the result blobs from the extraction process and classifying traffic sign by the shape. The propose method has been tasted on Indonesia local road. The results of the experimental work reveal that this approach showed above 91% accuracy in extracting traffic signs Topic: Image processing and pattern recognition 74 Retinal Blood Vessel Segmentation Using Multi-Scale Line Operator and K-Means for Data PreprocessingWinda Cahyaningrum(a). Randy Cahya Wihandika(a). Agus Wahyu Widodo(a) The vascular changes in retinal blood vessel are precursor of a disease, such as diabetic retinopathy, stroke and hypertension. Changes can be seen by analyzing retinal image manually, but it takes a long time. In this research we propose the automation of vascular segmentation processes in retinal image so that can assist in analysis process, which is an important step in retinal image analysis. The segmentation process is done by detecting the linear structures using the multi-scale line operator and preprocessing the images using k-means. Linear structure detection using single-scale line operator is performed on several different scales, then the results of each scale are combined. Image preprocessing using k-means algorithm aims to remove the optic disc area, which will be detected as false positive. The k-means algorithm is employed to cluster three parts in the retinal image, which are the background, foreground, and vessel. The performance of the proposed method was evaluated using the DRIVE and STARE datasets. The segmentation result was observed visually and shows that the K-Means algorithm can remove false positive and preserve true positive around the optic disc area. The evaluation using the DRIVE dataset shows the average accuracy and area under curve of 0.9421299 and 0.78004, respectively, whereas it reaches the accuracy and area under curve of 0.949293361 and 0.778, respectively, using the STARE dataset. Topic: Image processing and pattern recognition 75 Fast Traffic Sign Recognition Using Eigen-FaceHurriyatul Fitriyah, Edita Rosana Widasari Most traffic sign recognitions utilizes Template Matching which compare detected sign with templates. Studies on this method have shown outstanding recognition accuracy. Nevertheless, the Template Matching burdens a system in term of memory usage since it has to store numerous templates. Eigen-face is a basic method used in face recognition. It is efficient and practical since a system only needs to store Eigenface and Weights that associated with it. This paper developed a traffic sign recognition using Eigen-Face. The Indonesian traffic signs which consist of (1) warning sign in yellow, (2) prohibitory sign in red, and (3) regulatory sign in blue were applied. All possible traffic signs were first converted into grayscale intensity and stacked into one matrix. Eigenvalues and Eigenvectors of matrix?s Covariance were then calculated. Eigenvectors selected were assigned as Eigenface. The developed algorithm use 1 Eigenface. Each traffic sign has Weight associated with the Eigenface. Tested image were compared to the Eigenface and its Weight were determined. It would be assigned to the traffic sign with the smallest Euclidian distance of Weight. The algorithm were tested using the traffic signs in road-side with recognition accuracy of 0.9. Compare to the Template Matching method, the developed method were 0.3 s faster. Topic: Image processing and pattern recognition 76 On The Usage of Hybrid 1-D Convolutional Network and Long- Short-Term- Memory Network for Multiple-Site Fatigue Damage Prediction on Aircraft Lap JointsMuhammad Ihsan Mas, Timotius Devin, Lintang Adyuta Sutawika, Mohamad Ivan Fanany Multiple site fatigue damage is a problem that affects many operators of aging aircraft. The methods currently in place for prediction of such damage are conservative and sensitive to noise and cannot fully account for grain-level material variations, which results in aircraft being more conservatively designed than they need to be. The authors augmented the dataset of the FAA AR-07/22 report into a sizable body of variable- and constant-amplitude multiple-site fatigue damage sequences. This was done implementing and tuning the existing Walker crack growth model, implementing the plastic zone linkup criteria for crack interaction, as well as adding Gaussian noise at different stages of the computation. The interim model used for predicting the damage is a hybrid 1-D convolution and bi-directional LSTM model, which achieved an average of 70.7% accuracy, 110.3% MAPE, and 6.5% MSE on the interim version of the dataset. A detailed breakdown of the error characteristics and the hyperparameters that have salient effects on the performance of the model are also examined. Topic: Image processing and pattern recognition 77 Eye Gaze Tracking for Wheelchair Control using Kernelized Correlation Filters trackerSigit Adinugroho, Yuita Arum Sari Severe disability can affect the way human exploring the environment. In order to accommodate severely disabled people to move freely, a eye gazed movement tracker is introduced as a control method for an electric wheelchair. First, an eye is pinpointed from a face by using Haar cascade classifier. Then, Hough transform is applied to locate a pupil. After detection phase, the location of the pupil is tracked using Kernelized Correlation Filters tracker. Direction is derived from the relative position of the pupil to the eye. Results show that the method effectively detect the direction with great accuracy. Topic: Image processing and pattern recognition 78 Color Correction as a Preprocessing Phase for V-channel Otsu segmentation in Tomato ImagesYuita Arum Sari, Sigit Adinugroho, Abidatul Izzah, Ratna Widyastuti When capturing tomato images by smartphone camera in unconditional lighting condition may reduces the clustering evaluation of determining its ripeness. Therefore, applying method for increasing the quality of an image, the preprocessing technique is utilized. In this paper a new framework is proposed, in which combining color correction method of captured image and segmentation phase afterwards by using V-channel Otsu segmentation. At the first stage, captured tomato image is corrected as a calibration method with linear regression with combined of stepwise model and color constancy. Then corrected image is transformed to HSV color channel in order to obtain V channel. It produces good segmentation for images which has glossy in some parts that is suitable for tomato images, in which has round shape. After having segmented image, is then cluster the color feature by using 6-Means clustering algorithm. The proposed method overcomes the problem indicated by the decline in MSE value after color correction. Topic: Image processing and pattern recognition 79 Identifying Arabica Coffee Bean Varieties through Feature ExtractionMaria Mediatrix Sebatubun, M. Agung Nugroho Based on the research of Indonesian Coffee and Cocoa Research Institute findings, has 15 varieties of Arabica coffee with their unique morphologies. The morphology of green beans coffee which has colour, texture, size and circularity features are used as standardization to calculate the price and the quality of green beans coffee. Meanwhile, coffee farmers have difficulties to distinguish the coffee varieties based on the features of green beans coffee. Generally, the way of the distinguish the varieties of the coffee is through their own visual perception in form of the tree, leaves, and green beans coffee. They find it difficult to distinguish the coffee varieties due to the similarity of the varieties forms and colours. This research proposes to solve the problem through the image processing method as the second opinion to help the coffee farmers in identifying the coffee varieties.The research is conducted in three steps processes: The first is pre-processing by cropping the image of green beans coffee. The second is extracting the image feature of green beans coffee with Gray Level Co-occurrence Matrices (GLCM) and circularity feature. The last is classifying the feature with multilayer perceptron. The results of the image processing method indicate that the accuracy is 90% with sensitivity is 90%, and 90% specific. Topic: Image processing and pattern recognition 80 Feature Selection with Genetic Algorithm for Alcoholic detection using electroencephalographyRivaldy Septyasurya, Indah A. Siradjuddin, and Arif Muntasa Electroencephalography (EEG) is a technique of recording human brain waves through electrodes mounted on the human scalp. The obtained signal data can be used as a detector of alcoholic criteria. Currently, the used method to detect an alcoholic through a urine test or a breathalyzer test, and it takes time and hassle. Therefore, the usage of EEG for alcoholic detection is proposed in this research. There are four stages in this research. First, noise removal of the recorded signal using Independent Component Analysis. Second, feature extraction with Discrete Wavelet Transform. Third, extracted features from the previous stage are selected based on the importance of each feature using Genetic Algorithm, and final stage is the alcoholic detection with Learning Vector Quantization. Experiments were conducted on 64 channels of EEG data, and the feature selection stage using Genetic Algorithm makes the accuracy of the detection process is increased. The average accuracy of the detection is 74.6%. Topic: Image processing and pattern recognition 81 The Influences of Translation and Scale on the Result of Content-Based Image RetrievalBudi Hartono, Veronica Lusiana This study was related to content-based image retrieval. In CBIR, users look for images in image data using image queries without the help of text description. There were many challenges to get good CBIR results. Several factors which influence the success level of CBIR include: varying shapes and sizes of objects, different image resolution, and variation of image intensity. The proposed CBIR model would be used to discover the influences of translation and scale of the results of image retrieval. Translation influences difference of object position, and scale influences difference of object size. Usually there is difference between image queries and image data. Image pre-processing used adaptive histogram equalization and quantization of grey level 3 bit. Feature extraction process used four texture features, which were entropy, energy, contrast, and homogeneity, that obtained from Grey Level Co-occurrence Matrix (GLCM). The measurement of image similarity level was performed by calculating Euclidean distance of feature values of image queries and image data. Topic: Image processing and pattern recognition 82 Automatic Arrhythmia Identification Based on Electrocardiogram Data Using Hybrid of Support Vector Machine and Genetic AlgorithmReiza Adi Cahya (a), Candra Dewi (b), Bayu Rahayudi (c) Electrocardiogram (ECG) recordings provide insights on a person?s cardiac activity, and can be used to identify heartbeat abnormalities, or arrhythmia, they might suffer. Automatic ECG interpretation can be achieved via machine learning techniques to aid physicians. This research aims to model a ECG classifier based on Support Vector Machine (SVM) and Genetic Algorithm (GA) to classify a normal beat and three types of arrhythmia. SVM with radial basis function (RBF) kernel were used because of its superiority in handling the large amount of numerical features generated from the ECG. GA was used to enhance the SVM by performing feature selection to generate dataset with optimal amount of features, limiting possibilities of feature redundancy. ECG dataset used for model training and testing were obtained from the Massachusetts Institute of Technology?Beth Israel Hospital (MIT?BIH) arrhythmia database. The GA-SVM classifier then was compared to SVM-only classifier to ensure that GA is indeed able to improve the capabilities of SVM. Results show that in classifying six-seconds ECG recording with 120 training data dan 20 testing data, GA-SVM yielded better average accuracy of 82.5%, compared to 47% yielded by SVM-only classifier. Topic: Image processing and pattern recognition 83 A Review Paper on Attendance Marking System based on Face RecognitionKhem Puthea, Rudy Hartanto and Risanuri Hidayat Attendance marking system has been become a challenging, intriguing and accurately in the real-time system. It is tough to mark the attendance of a student in the large classroom, and there are many students attend the class. Many attendance management systems have been implemented in the current research. However, the attendance management system by using facial recognition still has issues which allow the research to improve the current research to make the attendance management system working well. The paper will do a literature review on the previous worked from different researcher has done on their research paper. This paper does not only provide the literature review on the earlier work or related work, but it also provide the deep analysis of Principal Component Analysis , discussion, suggestion for future work. Topic: Image processing and pattern recognition 84 Indonesian Food Items Labeling for Tourism Information Using Convolution Neural NetworkRenaldi Primaswara Prasetya; Fitra A. Bachtiar Abstract-The process of recognition and classification of food through digital image processing system has developed and widely applied, especially to know the nutrients or food ingredients contained. This system is certainly useful if applied to help foreign tourists who are in Indonesia who want to know information about Indonesian food, considering they are not accustomed to the type of food in Indonesia. The types of food in Indonesia vary diverse in each city area but have similar physical appearance to each other. In this research, we will apply Convolution Neural Network method to classify Indonesian food type and extract the name or information about the food. By using CNN method, obtained the results of the food classification which is quite reliable reached 77% accompanied by information in accordance with the type of food. I. INTRODUCTION AND BACKGROUND The process of recognition and classification of food by using computer vision method becomes quite interesting research as done by [1] - [4], food classification process can be used to know information about nutrition or material contained in the food, even also used to know calorie content [5] in food. It is often used for someone who is on the diet or for someone who is in the process of health restoration [6], and many other applications. Some difficulties in recognition and classification of food is the diversity of food types especially food in Indonesia Type of food in each region or city in Indonesia, has its own characteristics and is very diverse, but in appearance has an almost indistinguishable similarity. Sometimes it make own difficulties for foreign tourists who travel to Indonesia who want to know the type of food information, and the content of food in Indonesia, considering the tourists are not accustomed to eating Indonesian food. Even, Indonesian citizens may not be able to recognize a type of food that is a typical food in a particular area. Getting information manually of direct submission is quite time consuming and needs to remember it, even we can forget it, while information through browsing cannot be done if we do not know the type of food before. Therefore, in this research we will do the process of classification on Indonesian food which will give information about the name of food and food content by using CNN method which have ability in process of deep learning and processing big data of food which is diverse. The process of recognition is conduct by inputting the food image as an input that will be recognized directly by the system. Initially, input image will undergo a training process first through feature extraction with feedforward and backpropagation approaches by involving the convolution process as well as the looping process to reduce the spatial size of the image. The results of the classification of food names that have been recognized by the system will then be translated through information obtained from the wikipedia website. Convolution Neural Network generally has three main layer components used in the classification process including convolution layer, layer pooling and activation function. In this research will be used max pooling function at layer pooling, while in phase of activation function will be used activation function of ReLU. Convolutional Neural Network (CNN) is the development of Multilayer Perceptron (MLP) designed to process two-dimensional data. CNN is a reliable method of deep learning to solve complex problems and requires large data sets [2], so it is expected to be able utilized to classify Indonesian food types that are quite diverse but have similarities with each other. II. RESULTS To know the performance of Convolution Neural Network method in recognizing some types of Indonesian food, we do some experiments and testing involving 5 types of food and performs 45 times experiments. This experiment implemented on Intel Core i5-5200U processor 2.7GHz using python 3.6.1. Training dataset image of the Indonesian food was taken from website using fatkun batch downloader which consist of 350 ? 500 images on each type of Indonesian The dataset of food used is limited to traditional Javanese food such as rujak cingur, gudeg, soup tuna, soup soto, and gado-gado. The results of classification and information about some Indonesian foods that have been recognized by the system are shown as follows: III. CONCLUSION The convolution neural network method is quite good and accurate in recognizing several types of Indonesian food that has similarities with each other. This is evidenced by the accuracy that reached 77% by using 500 times the iteration process. Some deficiency in this research are, the system is less able to distinguish between buntut soup and soto soup. In addition, this method has a deficiency in distinguishing between positive image (food data) and negative image (non-food data), so it still allows unnecessary recognition process when it detects an object that is not actually a food. For future work, it can consider the number of iterations and learning rate although the computation process will run longer. In addition, further research can also utilize other recognition methods such as Haar Cascade method so it could reduce the level of error in the process of recognition. REFERENCES [1] C. Paper, ?Highly Accurate Food / Non-Food Image Classification Based on a Deep Convolutional Neural Network,? no. September 2015, 2016. [2] P. Napoletano, G. Ciocca, P. N. B, and R. Schettini, ?Food Recognition and Leftover Estimation for Daily Diet Monitoring Food Recognition and Leftover Estimation,? no. November, 2015. [3] M. Ogawa, ?Comparative Study of the Routine Daily Usability of FoodLog : A Smartphone-based Food Recording Tool Assisted by Image Retrieval Journal of Diabetes,? no. February, 2014. [4] L. Herranz, L. Herranz, S. Jiang, S. Member, and R. Xu, ?Modeling Restaurant Context for Food Recognition Modeling restaurant context for food recognition,? no. October 2016, 2017. [5] H. Kagaya, ?Food Detection and Recognition Using Convolutional Neural Network,? no. 2. [6] L. Notes and C. Science, ?FooDD : Food Detection Dataset for Calorie Measurement Using Food Images FooDD : Food Detection Dataset for Calorie,? no. January 2016, 2015. [7] Hubel, D. and Wiesel, T. (1968). Receptive fields and functional architecture of monkey striate cortex. Journal of Physiology (London), 195, 215?243. Topic: Image processing and pattern recognition 85 Explicit One-dimensional Radial Basis Function for Digital Image InpaintingDon Bosco Surya Atmaja, Pranowo, Suyoto Digital image inpainting is the process of repairing the damaged part of the image by filling that part using the information surrounding part. In this paper, we propose a new inpainting algorithm based on the heat equation. In our approach, pixel value is analogous to temperature. So the missing pixel values in the damaged parts are filled by diffusing the pixel values from surrounding areas. The spatial derivatives of the heat equation are discretized numerically using one-dimensional Radial Basis Function (RBF) method and the spatial derivative is discretized using explicit Euler method. Various numerical experiments on real images are conducted to show the accuracy of our algorithm. Topic: Image processing and pattern recognition 86 Improving Performance Batik Image Classification based on Bag of Visual Word using Ensemble ClassifierMulaab, Achmad Jauhari Automatic feature descriptor from images is an important role in the textural image retrieval and classification. In particular, batik image classification is essential to preserve the wealth of traditional art of Indonesia. Image batik has its unique pattern characteristic such as color intensity, ornament visualisation and ornament size. In order to recognise any patterns of batik need feature extraction methods. The scale invariant feature transform (SIFT ) can be used as an image feature descriptor in some applications. This paper presents an efficient based on Bag of Visual Words (BoVW) with features of scale invariant feature transform (SIFT) and implement ensemble classifier, support vector machine and naive bayes classifier for improving classification accuracy Topic: Image processing and pattern recognition 87 Arabic Letter Segmentation using Modified Connected Component LabelingFakhry Ikhsan Firdaus (a), Achmad Khumaini (b), Fitri Utaminingrum (c) The Arabic letters are very different from the Latin. Arabic letters can be interconnected with other letters, in addition, the Arabic letters also have many variety of shapes based on its position. The important point to obtain high accuracy for recognizing Latin Arabic letter is the segmentation process. This is a challenge when we will segment each letter. Especially if the letter is interconnected. Many researchers have proposed methods for segmenting Arabic writing in the previous research. In this paper, we propose Modified Connected Component Labeling (MCCL) to perform Arabic letter segmentation. Performance of Connected Component Labeling (CCL) in the previous research to separate each interconnected object still needs an improving. For under certain conditions there are still letters that are connected with other letters so that the letters are still not segmented correctly. To solve that problem, we apply MCCL with multiple rules based on moment location, object location, and height of the object to segment each letter. We evaluate our proposed method using quantitative analysis compared to CCL method. Our method successfully segmented each Arabic letter. Referring to the testing results, the performance of MCCL is better than CCL. Topic: Image processing and pattern recognition 88 Synthesizing Representation 3D Facial Model Using Several 2D Image Facial ModelCahyo Darujati(a,*b), Agustinus Bimo Gumelar(b), Supeno Mardi Susiki Nugroho(a), Mochamad Hariadi(a) This paper describes a method for synthesizing and representing 3D facial model from 2D facial data source. There are many 3D facial creation methods based on 2D images, but oftenly they have a significant drawback, the methods is not always possible to obtain enough information about the proportions of the human face, especially if the data source are conducting from the frontal face acquisition. In this paper, we are proposed adapting method to generate and synthesize 3D face model from several 2D images using an average polygonal method. The method is applied to all the object?s control points, which is get into the correctable area. Control points and distances between them are used to extract eyes, nose and other fragments from a face, and to find links between them in different projections. The experimental results show that the fitting algorithm optimizes across parameters that deﬁne face shape and texture, it also can be used as a signiﬁcant feature for other purpose of facial recognition. Topic: Image processing and pattern recognition 89 Smoker?s Detection System based Tongue Reflectance Analysis in Hyperspectral ImagingIqbal Fachrizal, Bramma Kiswanjaya, Adhi Harmoko Saputro Smoker and non-smoker tongue is hard to differentiate visually, even by an experienced doctor or dentist. One of the most objective ways to recognize the smoker tongue is by using tools such as a camera. In this paper, we proposed a system that contains two parts, hardware, and software. The hardware consists of the workbench, camera slider, mini studio box, two halogen light source and hyperspectral camera with a spectral range between 400-1000 nm connected to PC via camera link. The system complemented with hyperspectral image processing software built up especially to analyze the smoker tongue. The reflectance values of tongue surface was extracted from respondent tongue image that previously corrected using white and dark hyperspectral image references. Averaging all of the spectral data have been done to transform the existing features into a lower dimensional space. The principal component analysis (PCA) was used to compute and select the features subset which will be used as an input to the classifier. The support vector machine (SVM) classifier is used as image classification model since it performs excellently to choose the best hyperplane separator between two different classes. Fifty hyperspectral images was classified as normal tongue and smoker?s tongue which examined and analyzed by the system. Filled up questionnaires cross-checked evaluation of the system results and interviewing respondents by a dentist to validate the accuracy of the system analysis. The result of the tongue analyzing the system to identify the smoker is satisfying with its accuracy. Topic: Image processing and pattern recognition 90 Text Detection and Recognition using Multiple Phase Method On Various Product Label for Visual Impaired PeopleRizdania (a), Fitri Utaminingrum (a) This paper reviews one of a noteworthy objective in research range of computer vision and digital image processing, which are text detection and recognition. Text detection and recognition is one of the popular research fields. The result of the study is useful for the visual impaired people, because it may help them in buying and choosing their preferred product in the market. This study applied Multiple Phase (MP) method for the text detection process and the text recognition. The text detection was going through some phases which are the Maximally Stable Extremal Regions (MSER) detection, canny edge detection, region filtering, and Optical Character Recognition (OCR).The OCR was used for text recognition process. The experimental result for our proposed method performance was 80,88%, which was better compared to the previous research which used the two-stages classifier that was only 69% of performance. Topic: Image processing and pattern recognition 91 A Simplified Approach to Assist Motor Neuron Disease Patients to Communicate through Video OculographySudhir Rao Rupanagudi (a), Varsha G. Bhat (a), Pranay M. R. (a), Samarth S. (a), Shreya K. Gurikar (a), Harshitha Srinivas T. (b), Soundarya M. (b), Chandana S. (b), Gaana M. (b), Sampritha S. Taggarse (c), Sahana R. (c), Sushmitha Y.S. (c) Several people over the past few decades are unfortunately succumbing to the dreaded Motor Neuron Disease also known as Amyotrophic lateral sclerosis (Lou Gehrig?s disease), the cause of which is still uncertain. Patients suffering from the same, exhibit a slow degeneration of their central nervous system which in turn affects several of their abilities such as locomotion and also speech. This paper describes a simplified setup and also elaborates two methodologies to convert a sequence of eye winks or blinks into meaningful sentences using Video Oculography and in turn assist such patients to communicate. The algorithms discussed not only are accurate but are also 2 times faster than their predecessor algorithms. All experiments were conducted using MATLAB 2011b and SIMULINK and the setup was verified by trials conducted over 50 individuals. Topic: Image processing and pattern recognition 92 Exudate Extraction from Fundus Images: An Embedded System ApproachVasanthi Satyananda (a), Narayanaswamy K V(a), Karibasappa(b) Diabetic Retinopathy is one of the medical conditions that a person suffering from Diabetes Mellitus may encounter. One of the major symptoms of this disorder is the presence of exudates in the retinal areas of the eyes. In recent years, research to automate diagnosis of this disease in order to assist the doctors for faster treatments is gaining importance. This paper reveals one such approach of extracting exudates with a perspective of embedded systems. The VLSI architecture has been tested on Spartan 3E FPGA and the software is developed on MATLAB R2011b. An accuracy of 80% was obtained for the novel approach explored in this paper. It can also be witnessed that the speed of the algorithm increases by 2 folds when implemented using embedded system, instead of software. Topic: Image processing and pattern recognition 93 Spatial Distribution Mapping of Carotenoid Content in Amaranthus tricolor L. Leaves during Storage Days using hyperspectral imagingMardhiyatna, Adhi Harmoko Saputro, Cuk Imawan This study was carried out to develop an alternative method for determination of carotenoid content in Amaranthus tricolor L. leaves using hyperspectral imaging in range 400-1000 nm. The hyperspectral imaging system consists of a workbench, light source, Teflon plate, linear motorized slider, and line scanning hyperspectral camera that connected to PC using Camera Link interface. Spectral data in the region of interest (ROI) in each leaf were extracted from the hyperspectral images. The measured carotenoid content was determined used spectrophotometer UV-Vis. Partial Least Square regression was used to build the prediction model between the reflectance spectra and the measured carotenoid content. The spatial distribution mapping of carotenoid content in leaves was obtained by applying the PLS prediction model to each pixel in the segmented hyperspectral image (background removed). Spatial distribution is illustrated with color gradient used to describe the carotenoid values in leaves. Total of 30 pieces of Amaranthus tricolor L. leaves were utilized in this study. The leaves selected was free from visual defect. Ten leaves were randomly chosen for each day for 0th day, the first day, the second day. During storage, the remaining sample was stored in the refrigerator. The results show that the developed model was good with correlation coefficients is 0.87 and root mean square error of 0.04 in the prediction of carotenoid content. The overall performance confirmed that hyperspectral imaging could be used to determined carotenoid content. Topic: Image processing and pattern recognition 94 Prediction of Soluble Solid Contents Mapping on Averrhoa Carambola using Hyperspectral ImagingMaisyarah Yuniar Rangkuti, Cuk Imawan, and Adhi Harmoko Saputro In this research, hyperspectral imaging system has been developed to determine the quality of fruits based on the profile mapping of soluble solid content (SSC) in Averrhoa carambola with combining spectral and spatial analysis. The proposed system consists of a Specim FX-10 Hyperspectral Camera with spectral range 400-1000 nm, workbench slider, two 150 Watt halogen lamps tungsten fitted with an angle of 45? to illuminate in the camera?s field of view and a personal computer. A push-broom technique is applied to acquire hyperspectral images from all sample in the visible and near infrared region of 400-1000 nm. The region of interest (ROI) of each sample is obtained at 15 ? 15 pixels from the center position of each sample. All of the samples were analyzed using partial least squares (PLS) to obtain prediction models for SSC mapping on star fruit. The developed model is then used to create the distribution mapping of the soluble solids content on the starfruit. The performance of the prediction model was evaluated by observing the correlation coefficient, and root means square error. The number of samples used is 250 samples. The prediction model of PLS result provided correlation coefficient of 0.91 and root mean square errors of 0.50. The overall performance showed that hyperspectral imaging system might be useful to predict and to map soluble solid content of star fruit and suitable in an industrial sorting fruit system. Topic: Image processing and pattern recognition 95 Prediction System of Bruising Depth of Guava using Visual-NIR ImagingIda Ratna Nila, Cuk Imawan, and Adhi Harmoko Saputro This paper presents a proposed system to detect bruising depth on guava during its shelf-life time based Visual NIR image. The hardware of system consists of the workbench equipped with the hyperspectral camera and two 150 W halogen lamp. The proposed image processing technique perform hypercube image correction, feature extraction, feature selection and prediction model. The averaging value of spatial distribution was used as feature extraction of the local area of the bruise part. The partial least square was used to select the best feature that has an appropriate correlation with the target. The multivariate regression was performed to develop a model of the bruising depth prediction system. A total of 173 guava samples were used for analysis and divided into two groups (unbruised and bruise). Bruises were manually induced using steel ball with a constant height to simulate a damage caused by mechanical injury. Samples were analyzed in 1st, 3rd, 4th, 5th, and 6th days. The first 35 guavas was used as a sample for the calibration model, whereas the remaining 138 were used for the prediction model. Relationships between shelf-life time and bruise depth were investigated. Finally, the optimised model was used to generate the distribution map of bruising depth in the guava samples under various shelf-life time after bruising. The result was found to be helpful for the application in the industry to disquish the bruise and unbruised guava. Topic: Image processing and pattern recognition 96 Feature Fusion based on Spatial Texture and Spectral Pattern to predict Soluble Solid Content in Star Fruit using Hypercube ImagingAdhi Harmoko Saputro, Maisyarah Yuniar Rangkuti, Cuk Imawan This study was carried out to develop a novel feature fusion based on spatial texture and spectral pattern to predict soluble solid content in star fruit using hypercube imaging. The hypercube imaging was acquired using line scanning hyperspectral camera in range 400-1000 nm that connected to PC using Camera Link interface. The starfruit object was recorded on a workbench that equipped with a light source, Teflon plate, and linear motorized slider. Spatial data was selected in the region of interest (ROI) of each star fruit side. Some 224 bands was used as spectral data in each pixel of spatial data. The reference soluble solid content was determined using Brix Refractometer. Energy and contrast value of gray level co-occurrence matrix was used as spatial feature while as a partial least square regression parameter in selected wavelength was used as a spectral feature. The fusion feature on both spectra and spatial was used to compute the predicted soluble solid content. Total of 200 pieces of star fruit was utilized in this research. The results show that the proposed technique has correlation coefficients of 0.98 in the prediction of soluble solid content. Based on this result, the proposed technique can predict the star fruit sweetness level and suitable in an industrial sorting system for star fruit quality. Topic: Image processing and pattern recognition 97 Prediction of Paddy Field Area based on Aerial Photography using Multispectral CameraPrasepvianto Estu Broto, Adhi Harmoko Saputro, Dony Kushardono Calculation of paddy field area is necessary to know to predict a number of the paddy production in some region. In this paper, we proposed a system to predict paddy field area automatically based on aerial photography that collected using the multispectral camera. The multispectral camera is mounted on the wing of an integrated aircraft with GPS to provide position information of the resulting image. The multispectral images from the camera are then processed using texture segmentation. The threshold value is obtained by using Otsu method to convert the multispectral image into a binary image. Ground Sampling Distance (GDS) is computed by knowing the height of the aircraft flying and the field of view of the camera. GSD values can be used to calculate the area by multiplying by the number of pixels of each class. The system evaluation is performed by comparing the results of software processing with manual processing and calculated by confusion matrix. The accuracy of the system that has been made is 98%. This research was succeeded to make an automatic prediction system of paddy field area based on aerial remote sensing which the output is information of paddy field area. Topic: Image processing and pattern recognition 98 Integration of Color-Cue and Motion-Cue for Visual Object TrackingNaser Jawas (a*), I Wayan Budi Sentana (b) Visual object tracking is a fundamental problem in Computer Vision. Motion cue is one of the popular feature to be used to track an object in image sequences. However, if the object is lack of texture, it is hard to use only motion cue information to track object pricisely because the motion cue is relied to texture information. There are another cue such as color cue which can be used to track object based on the color information. This cue is also has disadvantages when the tracked object changes color. The disadvantages of both cues make the tracking acuracy low. Therefore, in this research, we propose a simple motion integration algorithm to use both motion and color cue to track object. The motion cue is extracted using optical flow and color cue is extracted using histogram of the object part. A simple distance and average distribution calculation are applied to integrate both cues. The results show that this integration gives a better tracking accuracy. Topic: Image processing and pattern recognition 99 Low Budget IoT Node for Learning Enviroment Monitoring using Open Source PeripheralsMuladi Muladi, Heru W. Herwanto, Samsul Hidayat One important factor in the implementation of education is a healthy and comfortable study space. This factor affects student achievement as well as physical health. Comfortable classrooms also affect spiritual health. Environmental factors that affect comfort are temperature, humidity, oxygen levels, carbon gas content, and illumination. Therefore, the comfort of the classroom should always be maintained by providing electronic devices such as air conditioners, fans, and lighting lamps. The arrangement of these tools needs to be done in accordance with the conditions and activities in the room so that the desired comfortable conditions can be provided. To make this arrangement required real-time space comfort information at some point in the room. IoT technology based on wireless communication was developed to carry out these measurements. Affordable prices will help schools or educational institutions provide more accurate measurements involving multiple IoT-based measurements in a single room. Using an open source device, an IoT node capable of measuring temperature, humidity, light intensity, carbon gas levels, and noise accurately can be provided at a budget of less than 50 dolars. This article describes the process of developing and testing the device that results in accordance with the planning made. Topic: Information infrastructure for smart living spaces 100 IoT based Electrical Energy Consumption Monitoring System Protoype : Case Study in G4 Building Universitas Negeri MalangDyah Lestari, Irawan Dwi Wahyono, Irham Fadlika Energy monitoring system becomes an important subject to provide information of electricity usage for the users. Moreover, with rapid development in information technology, especially IoT, it is possible to establish better energy monitoring system by providing real-time consumption data. In this paper, IoT based Electrical Energy Consumption Monitoring System Protoype for G4 Building Universitas Negeri Malang is developed. Real-time measurement of the energy consumption utilizes current and voltage sensors for each wiring phase of the building electrical panel. For the IoT system, data is processed and displayed in Web based system using Public Subscribe method. This prototype is implemented during work-hours and achieving 88.90% accuracy based on the electrical data of the G4 Building Topic: Information infrastructure for smart living spaces 101 Tourism Destination Rating System Based on Social Media Analysis (Proposal and dataset development)Diana Mayangsari Ramadhani (a*), Faisal Rahutomo (b), Cahya Rahmad (b) It is very important for tourists to get information about their next adventure. Many websites offer those tips, one of them is Tripadvisor which has a destination rating feature that makes it easier. However, the rating score is managed manually by filling a scoring page available on each tourism location. This paper collect datasets for tourism destination automatic rating system based on social media analysis. The first dataset is a category and sub-category of adjective, which helps the semantic analysis process. The second dataset is a manual review of the tourist destination which is done by 11 people, added with the review from Tripadvisor. Results from the second database are used as the supporting data for the rate. Topic: Information retrievel 102 Location-Based Event Detection using Spatial Autocorrelation within Geotagging Twitter StreamRizal Setya Perdana, Aryo Pinandito Event detection is a research study of detection non-trivial event that occurs in specific time and location. Twitter are among the most popular microblogging application on internet which user is easy to broadcast an event occurrence in the form short text messages, link, and audio-video content. The massive growth number of user-generated content from Twitter is increasingly becoming potential as a sensor of event occurrence. This paper is aimed to improve the detection process of finding an event occurrence by considering the real location from coordinates in Twitter geotagging feature. Previous work has only focused on textual frequency by clustering words to detect the occurrence of an event, the major drawback of such approach is assuming that an event occurrence is globally occur. In this research we apply GearysC due to its sensitivity to differences in small neighborhoods for measure spatial autocorrelation. We evaluate GearysC method by variance the weight matrix using k-Nearest Neighbors classification algorithm. The evaluation performance using F1-measure gives 0.7 accuracy and optimal Geographically Weighted Regression (GWR) coefficient is 0.3 Topic: Information retrievel 103 Implementation of Query Expansion in IndonesianFaisal Rahutomo, Miftahul Ulum Classic information retrieval problems are increasing both precision and recall values. Many approaches are developed to boost the system performance. One of the approaches is to expand the query term. This approach goal is to retrieve more result related to the query term but not limited to the query string. This paper implements the query expansion approach in Indonesian. Indonesian thesaurus dictionary is used to expand the query. Performance evaluation was done for three different schemes: or, and, and phrase. The best results were given by phrase scheme. The scheme increased 3% recall value with no impact on precision value. Topic: Information retrievel 104 Analysis of Indonesian Stemmer Support for Conceptual IndexerFaisal Rahutomo, Danny Prasetyo Text search engine indexer usually uses many processes. On of the process is term stemming in order to acquire the term root form. The impact of this process decreases the vector space, or decrease the index matrix. The process is also understood as indexing the concept rather to the string form. The problem arises in this subject, is it correct that stemmer algorithm can decrease the string forms of terms into a common concept or meaning. This paper examines two famous Indonesian stemmer performance on conceptual indexing: Indonesian Porter and Nazief & Andriani. The evaluations were measured by Indonesian thesaurus dictionary. The evaluation results showed facts that both Porter and Nazief & Adriani stemmer give low support for conceptual indexing. Support values are 11.21% and 18.51% for Indonesian Porter and Nazief Adriani respectively. Topic: Information retrievel 105 Focused Web Crawler for Indonesian RecipeGusti Ahmad Fanshuri Alfarisy and Fitra A. Bachtiar Crawlers are commonly used to traverse and store all public webs that are connected through links. However, the conventional crawlers could not be used for crawling or storing web pages with a particular topic. Thus, in order to store a web page in the case of Indonesian recipes, focused crawlers proposed. This paper, propose focused web crawler for Indonesian food recipes using simple classification of the web page based on the analysis of Indonesian recipes available on the internet, providing priority levels of a link through anchor text and URLs, and restricting the traverse by the depth. The results show that the proposed crawler can collect recipes on the web based on user query. I. INTRODUCTION AND BACKGROUND Today, a lot of the data available on the internet is generated by the internet users themselves that can be accessed publicly. For instance such as Facebook posts, video content on Youtube or image on the Instagram that impact on tremendous velocity and volume of data available on the internet. This case also applied to recipes. Not only written by the bloggers or official website, but also written by the internet users openly. In Indonesia, all recipes on the internet are not well organized that associated with the unavailability of the search engine that focused on Indonesian recipes. The most widely used search engines are Google and Bing which are designed to index all web pages that do not focus on certain topics like recipes. Therefore, if all the Indonesian recipes available on the internet can be collected, it will provide many advantages. This collected data can be exploited more widely such as diets for chronic diseases, calorie estimation, classification, clustering, information extraction, recipe search engine, or the generation of the new recipes based on a collection of recipes. In order to collect web pages, a web robot called web crawler is used that became the basis of collecting the web before indexing is performed by search engines [1]. However, since web page volume is extremely large, it is very difficult for the web crawler to explore all area. Even for the general search engine, it can?t reach all the web pages available on the internet [2]. The crawler method that commonly used and found in web crawler library is using breath first and depth first [3]. Furthermore, it is highly likely that spesific query which is relevant is not indexed in search engines. Thus, the objective of the web crawler can be directed to specific need which is traversing deeply the web that relevant to the topic [4]. This specific objective of web crawler called as focused web crawler that search, collect, index, and maintain as much relevant web as possible on the query and avoid collect or traverse the irrelevant web [5]. Therefore, this study emphasizes the application of focused web crawler devoted to Indonesian recipes. Firstly, the user query is determined and the seed URL is retrieved from a third party search engine that is already mature. Simple classification techniques are used that provide good results on a characteristic of recipes. This classification technique is based on the analysis of 100 different recipes that include food, beverage, and snack. The next visit also determined based on the priority value obtained from the similarity of anchor text and URL to the query through Jaccard similarity. The depth of visits is also given with certain threshold to minimize irrelevant web visits and handling tunneling phenomena in a focused web crawler. By using this technique, the focused web crawler can be applied to Indonesian recipes. II. RESULTS The testing is performed on four different query for 100 web page for each query. It is intended to test how robust the crawler using the different keyword that includes food, beverage, and snack. The keyword is chosen as follows : 1. Resep Ayam Goreng (Fried Chicken Recipe) 2. Resep Brownies (Brownies Recipe) 3. Resep Ikan Nila (Tilapia Recipe) 4. Resep Teh Susu (Milk Tea Recipe) The results show that the proposed method can download the relevant web page on Indonesian recipes. Whereas by using crawler that uses breath first search, a lot of irrelevant web pages are downloaded even using good seed URL. III. CONCLUSION The proposed method for focused web crawler for Indonesian recipe is comprised of recipe classification and the priority level of the visit. In classifying whether a page is a recipe or not, a simple technique is used that used the index of the word in a web page. The priority value is given based on the value of similarity between keywords with URL and anchor text. The depth of the visit is also limited to minimize irrelevant visits. As a result of the proposed method, 327 of the 400 downloaded web pages are relevant to the recipe topic. This shows that the focused crawler with this technique can be used to download recipes for Indonesian cuisine based on the query of the user. As a result of the proposed method, 327 of the 400 downloaded web pages are relevant to the recipe topic. This shows that the focused crawler with this technique can be used to download recipes for Indonesian cuisine based on the query of the user. In the future study, term extraction for the relevant page may be used to increase the efficiency of crawler when a lot of irrelevant pages are visited. REFERENCES [1] S. Brin and L. Page, ?Reprint of: The anatomy of a large-scale hypertextual web search engine,? Comput. Networks, vol. 56, no. 18, pp. 3825?3833, 2012. [2] L. Jayaratne and S. Lanka, ?A STATE-OF-THE-ART SURVEY : FOCUSED WEB CRAWLING USING NAMED ENTITY RECOGNITION FOR,? vol. 4, no. 1, pp. 45?54, 2014. [3] ?A collection of awesome web crawler,spider and resources in different languages.? [Online]. Available: https://github.com/BruceDone/awesome-crawler. [Accessed: 16-Aug-2017]. [4] A. Gupta and P. Anand, ?Focused web crawlers and its approaches,? 2015 1st Int. Conf. Futur. Trends Comput. Anal. Knowl. Manag. ABLAZE 2015, pp. 619?622, 2015. [5] S. Chakrabarti, M. Berg, and B. Dom, ?Focused crawling: A New Approach to Topic- Specific Web Resource Discovery,? Comput. Networks, vol. 31, pp. 1623?1640, 1999. Topic: Information retrievel 106 IMPROVING CLASSIFICATION PERFORMANCE OF PUBLIC COMPLAINTS WITH TF-IGM WEIGHTINGFakhris Khusnu Reza Mahfud, Aris Tjahyanto Currently Media Center e-Wadul still uses manual labeling in the process of complaint submission, as a result Media Center administration takes a longer time in coordinating with regional work unit (SKPD) to respond to complaints registered. Therefore, it is necessary to classify complaints based on SKPD to speed up the timing of complaint submission. The challenge of the study is that data consists of many classes that are more than two classes. The proposed method of this research is TF-IGM weighting that can overcome multiclass problems. TF-IGM can calculate distinguishing class precisely of a term. The famous Term Frequency-Inverse-Document Frequency (TF-IDF) and TF-Binary weighting methods are also used as a comparison. The classification is performed on Support Vector Machine (SVM), Naive Bayes and K-Nearest Neighbor (KNN) algorithm. In this research, the incoming public complaints will be processed through the pre-process stage, feature selection stage, term weighting stage, and classification stage. Accuracy, precision, recall and f-measure values were used in this study to evaluate classification performance. Index Terms : E-Government, Media Center E-Wadul, Text Mining, Text Classification, TF-IGM INTRODUCTION Media Center E-wadul is one of E-Government application which is used by Surabaya City Government to accommodate peoples participation in complaint, information and suggestion on urban development process implemented by Surabaya City Government. Complaints, information or suggestions coming into the media center e-wadul will go through several processes. In the first process, the incoming information will be submitted by the E-Wadul media center administrator to the relevant regional work unit (SKPD) in the Surabaya City Government through the Public Complaints Service Team (TPKPM). After the admin gets answers from the SKPD then the admin responds to complaints on the media center E-Wadul within 1x24 hours. The problem lies in the process of submitting complaints from the admin to SKPD because the labeling of complaints is done manually based on SKPD that handles the complaint. As a result, SKPD and administrator should take a long time to respond the public complaints on media center E-wadul. To solve the problem, this research proposes automatic text classification. Text classification or text categorization is the task of assigning one or more than one categories to the documents in a collection form a set of known categories [1]. The stages of the text classification consist of feature extraction, feature selection and classification [1]. Several methods of classification are often used in processing the text i.e SVM [2][3][1][4], Naive bayes [4][1] and KNN [2]. The challenge of the study is that data consists of many classes that are more than two classes. The appropriate weighting and can represent the document can have a direct impact on improving the classification results [2]. In previous studies the classification was used in the Thai restaurant review [5], agricultural documents [3], twitter social networks [4], news texts and academic abstracts [6]. Other studies suggest that the Term Frequency Inverse Gravity Moment (TF-IGM) can precisely calculate the class distinguishing power of a word and take advantage of the inter-class word distribution [2]. TF-IDF was used as a comparison in this study as it proved effective in previous studies [2]. The method proposed in this study is the classification because the complaint data already has a label in accordance with the SKPD. Naive Bayes, KNN and SVM classification methods were used in this study. TF-IGM was used as a term weighting in this study, TF-IDF and TF-binary was also performed as a comparison. TF-IDF is used because it has been proven to be an effective scheme in information retrieval and other text mining tasks [2]. METHOD In this research the method used is data preparation method, preprocess method, feature selection method and classification method. Data Preparation Data collected from March 2017 until April 2017 with data collection method using R. Package software used is "Rvest", then the data has been collected will be stored in .csv format. Preprocess After going through the data preparation stage, then proceed to the pre-process stage. In the first step, case folding. Case folding, tokenizing, filtering, stemming. Term Weighting Term weighting by the TF-IGM, TF-IDF and TF-binary method. The purpose of this weighting is to look for terms that can represent a document by converting it into a vector form. Excess TF-IDF is efficient, easy and has accurate results [7]. The advantages of TF-IGM are able to precisely determine the strength of the distinguishing class of a term[2]. Classification Method Classification method that will be used in this research is SVM, Naive Bayes and KNN. SVM is a classifier that has the purpose to find the function of the separator (hyperplane) with the largest margin, it can separate the two data sets optimally. SVM is very effective and fast to solve text data problem. Text data matches the SVM algorithm because text tends to have a high dimension [8]. Naive Bayes is a simple probabilistic classifier based on the Bayes theorem. This classifier can be very efficient and accurate especially when the number of variables is high [8]. KNN is an algorithm that works by comparing the distance of input data with a number of k training data closest [9]. This algorithm is robust to overcoming noisy training data [10]. Performance calculation Calculation of performance in this research is accuracy, precision, recall, and F-measure Accuracy is the value of the comparison between the values of data that are correctly classified with all data [4]. Precision is the ratio between the amount of data in a class that is correctly classified with all data in the same class [4]. Recall is the comparison between the amount of data in a class that is correctly classified with all data classified in the same class [4]. F-measure is a single parameter of the size of a retrieval success that combines recall and precision [4]. REFERENCES [1] A. Rehman, K. Javed, and H. A. Babri, ?Feature selection based on a normalized difference measure for text classification,? Inf. Process. Manag., vol. 53, no. 2, pp. 473?489, Mar. 2017. [2] K. Chen, Z. Zhang, J. Long, and H. Zhang, ?Turning from TF-IDF to TF-IGM for term weighting in text classification,? Expert Syst. Appl., vol. 66, pp. 245?260, Dec. 2016. [3] A. D. Putri, ?Klasifikasi Dokumen Teks Menggunakan Metode Support Vector Machine dengan Pemilihan Fitur Chi-Square.,? 2013. [4] A. A. Arifiyanti, ?Tesis - EKSTRAKSI FITUR PADA KONTEN JEJARING SOSIAL TWITTER BERBAHASA INDONESIA DALAM PENINGKATAN KINERJA KLASIFIKASI.? 2015. [5] N. Claypo and S. Jaiyen, ?Opinion mining for Thai restaurant reviews using neural networks and mRMR feature selection,? in Computer Science and Engineering Conference (ICSEC), 2014 International, 2014, pp. 394?397. [6] A. Hamzah, ?Klasifikasi teks dengan na?ve bayes classifier (nbc) untuk pengelompokan teks berita dan abstract akademis,? in Prosiding Seminar Nasional, 2012. [7] S. Robertson, ?Understanding inverse document frequency: on theoretical arguments for IDF,? J. Doc., vol. 60, no. 5, pp. 503?520, Oct. 2004. [8] C. MEGAWATI, ?ANALISIS ASPIRASI DAN PENGADUAN DI SITUS LAPOR! DENGAN MENGGUNAKAN TEXT MINING,? 2015. [9] A. D. Arifin, I. Arieshanti, and A. Z. Arifin, ?Implementasi Algoritma K-Nearest Neighbor Yang Berdasarkan One Pass Clustering Untuk Kategorisasi Teks,? 2012. [10] F. P. Shah and V. Patel, ?A review on feature selection and feature extraction for text classification,? in Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on, 2016, pp. 2264?2268. Topic: Information retrievel 107 Increased Information Retrieval Capabilities on e-Commerce Websites using Scrapping TechniquesDeborah Kurniawati, Dany Triawan When the number of accessible sources of information is so much and even unlimited, the information retrieval process becomes very complicated. Visiting information resources one by one and comparing data or information from all the information sources visited will add much time to the process of rediscovering the information. It takes a technique that can gather information from multiple sources into a single entity to facilitate the process of information retrieval. This study uses 3 e-commerce websites as a source of information. By utilizing the crawling procedure will generate new variables that can store data from the source information, which then these data will be stored in a database. Web crawling works by taking html tags as needed, using scrapping techniques. Furthermore, by collecting the data in the database, the information retrieval process can be done easily, and by using the query this process can be done in less time with 100% precision. Topic: Information retrievel 108 Document Term Rewieghting Algoritm based on User Relevant Feedback to FIRS (Fuzzy Information Retrieval System)Nurudin Santoso Indexing in IRS (Information Retrieval System) is not possible anymore to be done manually due to the size of the document. Therefore, the process must be performed automatically. It is based on 2 factors ts (term frequency) and idf (inverse document frequency). However, the relevant retrieved document can be different according to users justification. In this research, user can do reorder relevant retrieved document that can be used as reference to do term re-weighting. DTRA (Document Term Reweigthing Algorithm) is proposed to determine delta vector as differential vector to gain the different relevant retrieved document order between machine and user. It is used to increase or decrease document term weight. The test shows that the time computation of indexing was 79.85 seconds for 6146 documents with 269217 terms. While in implementation DTRA in FIRS (Fuzzy Information Retrieval System) application the value of DS (Degree of Satisfaction) document will increase or decrease based on user relevant feedback. So FIRS give information based on automatically by machine and user feedback. Based on testing on FIRS performance, the best characteristic threshold filter is in 0.7 or higher and the characteristic of DTRA is linear or O(N) by Big OH notation. Topic: Information retrievel 109 Architectural Design of Token based Authentication of MQTT Protocol in Constrained IoT DevicesAdhitya Bhawiyuga, Mahendra Data, Andri Warda An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time Topic: Information security 110 Cryptography on audio files using the blowfish algorithmNuniek Fahriani (a*) Deni Sutaji (b) Onny Kartika Waluya (c) Blowfish is a 64-bit block cipher with variable key length. The algorithm consists of two part : Key expansion and data encryption. Allowing its use in cryptography. In general, cryptography is about constructing and analyze communication protocols that can block an opponent. Various aspects of information security, Such as confidential data, Data integrity, Authentication and nonrepudance Is the center of modern cryptography. This case implementation with encryption and decryption techniques on audio files using java programming, aims to secure the audio data contained in it can be maintained and can only be read by user who have the cryptographic key. Topic: Information security 111 Statistical Comparison of Grain versions Implementation in Raspberry piAri Kusyanti, Syahifudin Shahid Internet of Things (IoT) is an interconnection among devices or ?things? that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Raspberry pi as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Raspberry pi. Topic: Information security 112 Area and Speed Optimized Mix Column Architecture Designs for AESSudhir Rao Rupanagudi (a), Varsha G. Bhat (a), Abhiram Srisai (a), Harshavardhan M. (a), Durgaprasad S (b), Namitha S. (b), Harshitha Y. (b), Harshitha B.A. (c), Kavya K. R. (c), Feba Chellappan (c), Vachana G.N. (d), Surekha M.H. (d), Vathsala V. (d), Vasanti Satyananda (d) With the evolution of The Internet, there has been a huge spurt in online transactions and also an increase in sharing of private, confidential and sensitive information over the web. This in turn has increased the requirement of highly secure and swift methodologies to protect such data using modern cryptographic techniques such as the AES. In this paper two such novel approaches to improvise the timing of execution of the AES technique, have been discussed. This has been achieved by optimizing the architecture of the most important section of the AES ? The mix column step. A speed efficiency of over 1.27 times was achieved as compared to previous algorithms. Moreover, in a VLSI perspective, an average area optimization of 3 times was also achieved. All experiments were conducted using the Xilinx Artix-7 series of FPGA. Topic: Information security 113 Implementation of Fully Homomorphic Encryption using NFLlibArinta Primandini Auza, Rifki Sadikin Fully homomorphic encryption allows us to perform the computation on encrypted data. After Gentry showed that this scheme is implementable, research on this area has developed rapidly. Several cyrptosystems based on the hardness of LWE problem have been proposed to achieve the fully homomorphic properties. In this study, our aim is to implement the Ring-based BGV scheme with NFLlib and to compare the performance with previous studies. NFLlib is an open-source C++ library dedicated to ideal lattice cryptography which optimizes the underlying operations on $$R_p = Z_p[x]/(x^n+1)$$. Topic: Information security 114 Mitigation of DoS Attacks on Software Defined NetworksProf. Trupti Lotlikar, Dr. Deven Shah In recent years, Software-Defined Network (SDN) is becoming popular network architecture that is dynamic, manageable, cost effective and adaptable. Our agenda for this paper is to implement SDN network which consists assorted topologies connecting numerous hosts, switches and controllers. The implemented framework monitors the various events occur in the network, identifies malicious events causing DoS attack and mitigate the same. Through implementation, we elaborate different ways of making SDN more secure. kEYWORDS :SDN-Software Defined Networks, Dos Attacks. Topic: Information security 115 Service Discovery using Zone Routing Protocol for ad hoc networksDesy Intan Permatasari, Irma Wulandari Service discovery is the availability of services that can be used and accessed by other nodes by using searching and multicasting mechanisms. Service discovery in ad hoc network is used to locate services as needed by the requesting node. To support the search for services in an ad hoc network, a service advertisement process is required. The problem that arises is the movement of nodes that are always dynamic and each node acts as a service provider or service directory that stores the cache of the service provider around the node. The messaging mechanism of the routing protocol also influences the service search time in the ad hoc environment. To solve these problems, the researcher proposed to use routing protocol in sending messages from one node to another node. Service discovery performed on the routing protocol is expected to reduce the service search delay and reduce overhead. Service discovery in an ad hoc environment is an issue that is still being researched to date, because in an ad-hoc network environment there is no administrative central point governing nodes on the network. Nodes are divided into several zones and each zone implements a hierarchical structure for the routing process as well as the sharing of node zones across the network. This makes the message spreading process only occur in the corresponding node zone. The main advantages of routing protocol zones are saving time during the service discovery and service advertisement process. The results showed that the search service by using routing protocol zone routing protocol can reduce the delay up to 33.22 ms and reduce the message overhead up to 16, 61%. Topic: Information-centric networking 116 Improving End-to-End Network Throughput Using Multiple Best Paths Routing in Software Defined NetworkingWidhi Yahya, Achmad Basuki, Sabriansyah Rizqika Akbar, Wildan Maulana The use of shortest path algorithms for routing a packet in the network has a tendency to elect only one single best path, even though there are several paths that have same best path criteria. Using only one best path may cause bottleneck in the networks. This paper proposes a method to utilize multiple best path based on link utilization in order to increase end-to-end network throughput. The method uses DFS (Depth-First Search) algorithm to find multiple paths and elect the best paths based on link utilization. To distribute the traffic across multiple selected best paths, the group action feature of OpenvSwitch is utilized. The testing result shows that the proposed method can increase end-to-end network throughput by 34.74%. Topic: Information-centric networking 117 An Initial Framework of Hybrid Evolutionary Algorithm (EA) with Multiple Criteria Decision Making (MCDM): Plant ForecastingJanuardi Nasir, Azizul Azhar Bin Ramli Crop forecasting is very important for the needs of dragon fruit planting in the tropics as uncertain climate can make it difficult for farmers to determine the appropriate time to plant. That is why farmers need logical information. To find a suitable time to planting. This research framework aims to build a system for forecasting the plant season based on rainfall humidity and wind direction by combining the evolution algorithm (EA) which has four algorithms that can be used, one of which Grammatical Evolution (GE) Will be combined with one of the fuzzy methods of multiple criteria decision makings. A decision-making method that aims to establish an alternative forecasting of a number of alternatives based on certain criteria so that in the incorporation of this algorithm will have a good adaptive level so that it can get a prediction model. Topic: Intelligent transportation systems 118 LOCATION DETERMINATION OF CITY TRANSPORT SHELTER BASED ON THE PREDICTION OF PASSENGER OCUPANCY ON ROUTE OPTIMIZATION SYSTEM (Studi Case : City Transport in Bandung)Sri Suryani Prasetiyowati, Yuliant Sibaroni, Mahmud Imrona Transportation is a very strategic research area to be developed and it is related to population mobility. The problems associated with transportation are complex, such as capacity and facilities of roads, the type and number of transportation modes, and also the behavior of passengers and the drivers, and the regulations in the field of transportation. One of the modes of public transportation is city transport. This mode of transportation is very interesting to discuss, because it has some unique characteristics, such as the number of mode or route of city transport that increases over time, the behavior of the city transport drivers when pickup or drop the passengers in any place. Solutions to overcome the attitude of the undisciplined driver and passengers is done by forcing the driver to drop and pick up the passengers on the provided place. The determination of the location of shelters at this particular location will be the focus of this study where the determination of the shelter is based on the high passenger occupancy rate based on the Kriging method. The result obtained is a system that can display the location points, which is the proposed a shelters for city transport, with the average passenger occupancy approaching the required passenger capacity. Topic: Intelligent transportation systems 119 Evaluation of Information Technology Implementation on Business Goal Improve And Maintain Business Process Functionality at Economic Development Group East Java Representative OfficeAwalludiyah Ambarwati, Ariinta Deraya Ratulangi Economic Development Group East Java Representative Office is one of the groups/divisions in a institution that uses the most information system application in every business process. This group activity includes collecting and processing raw data from survey into final data, calculating and determining the inflation rate of East Java, as well as empowering Micro, Small and Medium Enterprises (MSMEs) that can drive economic growth. As a Representative Office in East Java, all Information Technology/Information System (IT/IS) implementations refer to the Information Systems Management Department located at the headquarters. However, this group able to develop applications as needed to support their activities. This research was conducted to evaluate IT/IS implementation in order to ensure alignment between IT goals and the organizations business objectives. This assessment taken from internal perspective views of Balanced Scorecard focusing on business goal Improve And Maintain Business Process Functionality using Control Objectives for Information and Related Technology (COBIT) 4.1. There are two domains and several IT Process used to measure maturity level and gap analysis. Domain Plan and Organise (PO) consist of two IT Process namely PO2 and PO3. While domain Acquire and Implement (AI) consist of six IT process, there are AI1, AI2, AI4, AI5, AI6, and AI7. The research results obtained existing maturity level value in Economic Development Group East Java Representative is 3.64. This value is categorized as managed and measured level. It indicates this group had an integrated information system which could support the business process. Topic: IT management and governance 120 Modified Genetic Algorithm for High School Time-Table Scheduling with Fuzzy Time WindowRuth Ema Febrita (a), Wayan Firdaus Mahmudy (a) Time-table scheduling in educational institution is a very complex problem due to many regulations that must be considered referred to hard and soft constraint. Crowded schedulling in high schools level can make students too tired and distracted during the learning process. Time-table sceduling which offer the right time window is the purpose of this research, so the students will have their best time to study every subject, which requires different thinking portion. We proposed a modified genetic algorithm with fuzzy time-window to solve this problem. The proposed method has been successed to find optimum solution for this problem, with the best pop size set at 210, crossover rate=0.7, mutation rate=0.3 and maximum iteration set at 80 generations. Topic: IT management and governance 121 A Review on Information System Audit Using COBIT FrameworkHeru Nugroho Information System (IS) audit comprises a formal review of the risks related to a firm?s information systems and operations, and an assessment of whether adequate internal controls can ensure efficiency, effectiveness, integrity, and security of the firm?s data and IS assets. IS/IT audits are carefully planned processes that focus on high-risk areas within the organization. Selection of the areas can originate with the board of directors, an audit committee, a governmental agency, or an external audit organization. In general, IT audits help organizations monitor how they do business and protect the interests of managers, employees, customers, and investors. Control Objectives for Information and related Technology (COBIT) is a comprehensive set of resources that contains all the information organizations need to adopt an IT governance and control framework. COBIT provides good practices across a domain and process framework in a manageable and logical structure to help optimize IT-enabled investments and ensure that IT is successful in delivering against business requirements. In this paper, we find that paper about IT/IS audit using COBIT is had difference perspective. Base on the review from sixteen paper, there is 81,25% with a title IT/IS Audit but the content is about Maturity or Capability Level. The discussion paper is expected to provide new knowledge to other researchers who focused his research on the area of information systems audit. This paper is expected to provide new enlightenment that information system audit is different with the maturity/ capability level which is also examined in the COBIT 4.1 framework. Topic: IT management and governance 122 Heuristic Evaluation and ISO 9126 in Implementation of Decision Support Sytem for Selection of Outstanding Marketing Officer BRI Katamso YogyakartaRipto Mukti Wibowo 1,2) , Adhistya Erna Permanasari 2), Indriana Hidayah 2) Decision Support System (DSS) computerized using the Multi-Criteria Decision Making is expected to help the decision maker to provide alternative decisions, while the final decision is determined by the decision maker. After the development process of the system of Election of marketing Officer (MO) conducted the evaluation process. With an evaluation of the designed system is expected to provide answers to existing problems and improve goal attainment. Evaluation used to evaluate DSS is using heuristic evaluation and ISO 9126. ISO 9126 to determine the level of effectiveness, efficiency, satisfaction. Heuristic Evaluation system to help evaluate User Interface Selection of DSS MO. Based on the ISO and heuristic evaluation, the general design of the interface and some of the factors effectiveness, efficiency, satisfaction resulted in the average value of 3.75 and the DSS can be used by the BRI Katamso but there are still some things that need to be improved, especially in ease of use. Topic: IT management and governance 123 Design of inverted L Antenna for UHF TV receiver ApplicationChandrasena Setiadi(a*), Erfan Rohadi(b), Moechammad Sarosa(c), Isa Mahfudi(d*) Generally, antennas functioned as a television receiver has big dimensions with quiet diffculty installation process. In this research, the proposed Inverted L antenna been numerically analyzed to design the television antenna receiver at 500 MHz. The characteristic of proposed IL antenna has been investigated by adjusting the height of the IL antenna (h), the size of the conducting plane (px ? py) and the horizontal element length (L and L1) is optimized so that the input impedance matches the designed frequency. The inverted L antenna falls from the coaxial cable with the inner and outer radii respectively 0.255 mm and 1.095 mm. In the calculation, the height of the antenna (h) is adjusted from 23 mm up to 38mm, the size of conducting plane (px ? py) was 40mm x 160mm, 50mm x 200mm, 60mm x 200mm and the length of horizontal elements are optimized so that the input impedance at 50 Ohm. In the calculation the electromagnetic simulator WIPL-D Simulator is used. When the size of conducting plane 60 x 200mm, the height of the IL antena 38mm, the length of horizontal elements L1 = 17mm, L = 93mm, the return loss bandwidth characteristic (-10dB) of 11.3% and the directivite gains of 3, 57dBi have been achieved at the resonant frequency of 639MHz. The proposed IL antenna promises for the television antenna system. The future work will be adressed to enhance the bandwidth of the proposed antenna. Topic: Media, game and mobile technologies 124 Metamorphosys edugame using 2048 game rulesArik Kurniawati, Fahrur Rozi, Yonathan Ferry Hendrawan A game can have many derivatives encompassing diverse topics. One of those games is 2048 game which originally is all about adding numbers. This paper describes how we built a game that introduces its player to metamorphosis process using 2048 game rules on a mobile platform. The experimental results showed that teenagers and adults could play the game well, but not so for children. Topic: Media, game and mobile technologies 125 Advertisement Compares to Application Overview in the Successful Factor of a Mobile Photography ApplicationRizdania (a), Herman Tolle (a) The availability of various kinds of Android applications provide the users to get any mobile application that can support their daily activities, whether it supports the work or other needs. Too many applications available often confuse the user to make a decision which application they have to install to their smartphone. By using the exploratory factor analysis (EFA), this study analyzes the factors that may influence users to make a decision whether or not installing a particular application from photography category in Play store. The result obtained three main factors, with most variables, interpret the factor is an external factor. The main factors are labeled as Advertisement factor, Application Overview factor, and Users? Side factor. This paper finds that psychologically users consider third party references to discover the satisfaction of photography application functionality. Topic: Media, game and mobile technologies 126 Optimized Walking Straight Guidance System for Visually Impaired Person That Use Android SmartphoneRosa Andrie Asmara; Fais Al Huda; Cahya Rahmad; Banni Satria Andoko A person with problems in the visual organs whose often called visually impaired person, either total or partial blindness has obstacles in doing motor activities, especially activities that require a person to move from a place to another such as walking have veering tendency. This problem can risk the safety of the visually impaired person when walking in public area. Thus the need for an application that can help people with special needs is felt important enough to support ease of activity for these people. This research proposes a mobile app based system to guide someone to walk straight using the motion sensors on the smartphone and audio-based guidance. The low-pass filter was applied to magnetometer and accelerometer data to reduce noise that resulted when the user walks. The results of this study can be used to train the visually impaired person to reduce the veering habits. Topic: Media, game and mobile technologies 127 Design of Public Transportation Navigation System Based on Android Wear Wearable DeviceKomang Candra Brata (a*), Nurizal Dwi Priandani (a), Aryo Pinandito (b), Mahardeka Tri Ananta (a) The application of information technology in the field of navigation in public transportation and the popularity of the Android operating system on mobile devices led to a variety of mobile application that is aiming to facilitate users in navigating with their desired mode of transportation. Google Maps application, which is provided by Android-based mobile devices, is currently able to provide information and navigation on public transportation although its availability is still limited to certain areas and cities. Its limitation brings up mobile device navigation applications to be built by local developers to provide information and navigation in using public transport in such area. When people are navigating on public transport by utilizing mobile device applications, they may experience difficulties in operating their mobile devices or are not allowed to use their smartphone during the trip. Finding stops or interchanges to take or how long they have to stay on the line before they have to get off or switch to another line become more difficult. To overcome these problems, this research proposed a design and evaluate a new input interaction method that utilizes Android Wear-based wearable devices in implementing an intuitive local public transport navigation system. The proposed system is expected to assist users in public transport navigation by utilizing Android Wear-based wearable devices such as Android smartwatch and its embedded sensors. The proposed design in this research includes the smartwatch user interface and its usage scenarios, system architecture, and communication method between Android Wear smartwatch and Android application that is hosted on Android-based mobile devices. Topic: Media, game and mobile technologies 128 Improvement of Content Delivery Effectiveness and Efficiency in Responsive Web Design Using Material Design Guidelines and User Centered DesignAryo Pinandito, Hanifah Muslimah Az-zahra, Anggi Valeria Putri Nowadays, web pages are not only being accessed by computers with a large screen. They were mostly accessed via mobile devices such as tablets and smartphones that relatively have smaller screen size. Almost every websites have their own style and visual appearance in terms of contents and information delivery. Even though they were visually looks different, they were mostly designed and developed by using one of the following base layouts: one column, two columns, or three columns. When it comes to mobile devices, the way to properly deliver contents and information on a smaller screen size become a challenging matter. Responsive Web Design approach in current web technology allows a single web page to be visualized in different layout based on the screen size of accessing device. Such layout changing may affect the amount of information to be displayed on screen, hence affecting the effectiveness and efficiency of contents and information delivery of a web page. This study compares the effectiveness and efficiency of a web page that is being displayed on a computer screen, tablet, and smartphones. This study also tries to show on how of layout modeling based on Materials Design Guidelines and User Centered Design approaches may improve the effectiveness and efficiency of contents and information delivery of a web page on smaller screens. Several responsive website layouts that comes in 1 column, 2 columns, and 3 columns on tablet and smartphone were evaluated. The research shows that User Centered Design approach improves the effectiveness and efficiency of contents delivery on website with 1 and 2 columns for both tablet and smartphone. As for the web pages which are designed in 3 columns on tablet version, Materials Design Guidelines shows better effectiveness and efficiency on smartphone screen. Topic: Media, game and mobile technologies 129 English-Indonesian Translation using Neural Machine Translation with Attention: Experimental StudyM.Octaviano Pratama Neural Machine Translation (NMT) is become state of the art and promising deep learning technique that used in Machine Translation (MT) research. It outperforms Statistical Machine Translation (SMT) in various machine translation tasks. NMT can be implemented into various languages, one of NMT task is English-to-Indonesian translation. Previous research in English-to-Indonesian translation used Recurrent Neural Network (RNN) as language model with less parallel training corpus. In this research, NMT with attention model is performed to English-to-Indonesian large-scale parallel corpus in parallel computing. The perplexity value evaluation of model is performed for model evaluation, meanwhile bilingual evaluation is performed by using BLEU score and RIBES score. NMT with attention model can outperform RNN in English-to-Indonesian translation task. Topic: Natural language processing 130 Road Traffic Topic Modeling on Twitter using Latent Dirichlet AllocationAhmad Fathan Hidayatullah (a), Muhammad Rifqi Maarif (b) Twitter has been widely used by some institutions in Indonesia to spread important information to the public. TMC (Traffic Management Center) as the one of the part in the Indonesian National Police has utilized Twitter as the medium to share about traffic information to the society. This research aims to create the topic model regarding traffic information on Indonesian Twitter messages. The data used in this research are retrieved from the official Twitter account of the Traffic Management Center in Java. LDA (Latent Dirichlet Allocation) is the method to build the topic model from the dataset. The topic model obtained will represent what kind of topics which posted by TMC in each region in Java. Thus, the result of this experiments could illustrate the problems and important information that happened in Java. Topic: Natural language processing 131 Deep Belief Network Optimization in Speech RecognitionMurman Dwi Prasetio (a*), Tomohiro Hayashida (b), Ichiro Nishizaki (c), Shinya Sekizaki (d) The paradigm theory of neural network (NN) is expressing from biological of human brain function system. In this study, we deal with the deep belief network (DBN) model using the speech as natural language processing for training the system. The characteristic of deep belief network is similar with neural network. Whereas, the performance of neural network depends on the structure itself and it is suitable to select the model and size of the network for the data to handle. In occasion, deep belief network has the advantage in speech recognition it can be generated the feature learning with a subsequent stage of supervised learning, in which, the training of each layer weights were first initializing by unsupervised way and then fine-tuned with the labeled data. Deep belief network (DBN) have many nonlinear hidden layers to produce posterior of probabilities that takes several frames of coefficient as input. This paper shows the good performance improvement of modularity in DBN as combination technique of computation. Topic: Natural language processing 132 Indonesian Explicit Semantic Analysis using Indonesian Wikipedia as The CorpusCarfin Febriawan Pratama Putra (a*), Faisal Rahutomo(b) Explicit Semantic Analysis is a method to represent meaning in a high-dimensional space of natural concepts derived from Wikipedia, the largest encyclopedia in existence. This method works at the level of texts meaning therefore, if there are two different texts which actually hold the same meaning but use different words to express it, this method will assess the two texts as highly similar. This study tried to implement ESA method in Indonesian Language. This method requires a very large corpus, this study will use Indonesian Wikipedia articles as the corpus. This research will implement ESA to calculate the score of essay online test. We use 400 answer texts from 40 questions given to 10 students. To determine the accuracy, the scores computed by the system are compared to the humans scores. Our experimental results showed that the percentage error of ESA algorithm is 65%, This level of error is too high to be used for automated essay scoring systems. Another test conducted by comparing ESA algorithm with other method such as Cosine Similarity, Euclidean Distance, and Jaccard. The results of those comparison concluded that ESA algorithm is not any better than those methods. Topic: Natural language processing 133 Classification Method Comparison on Indonesian Social Media Sentiment AnalysisTirana Noor Fatyanosa; Fitra A. Bachtiar Sentiment analysis from social media has turned out to be essential since individuals are normally genuine with their sentiment on giving their perspective. However, in turning social media into a sentiment analysis possess challenges such as comments are usually ambiguous, language barrier problem, slang words, redundant comment, and sentiment classification. This study attempted to distinguish the issues of sentiment classification from Indonesian social media on Jakarta governor election. Several steps are taken to overcome those problems that include preprocessing. The preprocessing strategy used are removing the unrelated tweet, removing URL, deleting duplicate lines, deleting similar lines, removing the unrelated word, removing hashtag, removing Twitter username, removing number in the comment, removing punctuation, checking slang words, and converting the slang word into appropriate word. The preprocessed sentiment is then classified into positive, negative, and neutral. The classification method used in this study are Summation method, Average on Tweet, and Average on Tweet with the threshold on objective score, Weighted Average, and Naive Bayes method. The experimental result shows that the best classification method is Average on Tweet with the threshold on the objective score that yields 58.6% precision. Topic: Natural language processing 134 Time Series Neural Network Model for Part-of-Speech Tagging Indonesian LanguageTheo Tanadi Part-of-speech tagging (POS tagging) is an important part in natural language processing. Many methods have been used to do this task, including neural network. This paper models a neural network that attempts to do POS tagging. A time series neural network is modelled to solve the problems that a basic neural network faces when attempting to do POS tagging. In order to enable the neural network to have text data input, the text data will get clustered first using Brown Clustering, resulting a binary dictionary that the neural network can use. To further the accuracy of the neural network, other features such as the POS tag, suffix, and affix of previous words would also be fed to the neural network. Topic: Natural language processing 135 Medical Named Entity Recognition for Indonesian Language Using Word RepresentationsArief Rahman Nowadays, Named Entity Recognition (NER) system is used on medical texts to obtain important medical information, like diseases, symptoms, and drugs. While most NER systems are applied to formal medical texts, informal medical texts like those from social media (also called free-texts) are starting to get recognition as a gold mine for medical information. We propose an approach to our Named Entity Recognition (NER) system in our medical knowledge management system by comparing two kinds of word representations: cluster-based word representation and distributed representation. Topic: Natural language processing 136 Indonesian Rule-Based Part-of-Speech Machine as Data PreprocessorAhmad Idham T Lubis, Kridanto Surendro In this paper we report our work in developing Part of Speech Tagging for Bahasa Indonesia using rule-based approaches. We use a corpus consists of 42000 tagged words. We use one tag set containing 21 part-of-speech subtags for Bahasa Indonesia. In this work we compared this work with known works in the same field, especially those that uses probabilistic or Hidden Markov Model. The results of the experiments show the comparison in time, accuracy, and precision. Topic: Natural language processing 137 Backpropagation Levenberg Marquardt in Solving Inverse Kinematics of Planar ManipulatorNurani Lathifah, Anik Nur Handayani, Heru Wahyu Herwanto, and Siti Sendari The inverse kinematics problem refers to finding the values of the joint variables that allow the manipulator to reach end-effector?s position and direction in the Cartesian space (or workspace). The joint variables are the angles between the links of planar manipulator. In this case the joint variables are found by using backpropagation Levenberg Marquardt. The result proves the proposed method capability to solve inverse kinematics problem in planar manipulator Topic: Robotic systems 138 Performance Analysis of A* Algorithm to Determine Shortest Path of Fire Fighting RobotAkhmad Alfan Hidayatullah, Anik Nur Handani, Muhammad Jauharul Fuady A* Algorithm is one of Best First Search Algorithm, that combines Uniform Cost Search and Greedy Best-First Search Algorithm. This paper will discuss performance analysis of A* Algorithm in the case of KRPAI (Indonesian Fire Fighting Robot Contest). Time complexity and space complexity is the criteria that we use in this paper. Time complexity is the time needed by algorithm to process the command. Whereas, space complexity is the memory usage by algorithm to process the command. Based on the experiments, A* Algorithm need an average of 4.270,72 and 14.192 bytes of memory to find a solution. We expect a lot of future search will improve the mapping capability of firefighting robot. Therefore, someday firefighting robot can be implemented in real life, and will reduce the fire disaster victims. Topic: Robotic systems 139 Development of Swarm Intelligence for Routing Algorithm Mobile MicrorobotsGandjar Kiswanto (a*), Rifkie Nurcahya Putra (a), Reza Afrianto (a), Mohamad Safhire (a) Complexity demanding to the researchers to make artificial intelligence. The focus of this study is about implementing swarm intelligence for routing algorithm on the visual servoing mobile microrobots control system. The robot moves by receiving task from a control system over a wireless connection. Routing algorithm used is the nature intelligence from ant colony. The result of this study is visual control system able to navigate multi mobile microrobots with swarm intelligence routing algorithm at once. The result shows, any robot that follows the desired target has its own radius of error. Therefore, the variations of error are within the radius. Topic: Robotic systems 140 A Control Scheme for Typist Robot using Artificial Neural NetworkWahyu K. Dewanto, Syamsiar Kautsar*, Khafidurrahman Agustianto In 2005, UNICEF estimated the number of children with disabilities under age 18 at 150 million. Indonesia had 11 million workers with disabilities. It was less than 50% of the total number of disabilities person (data in 2010). Various efforts have been made to help disabilities person to be able to work normally. There are a lot of researches of prosthetic limbs, artificial hands, and motorized wheelchairs. In this paper, a typist robot was built. It was designed for people with physical hand disability. It helped disability people to operate computer normally. The typist robot consists of 2 arm robots. Each arm has 3 degree of freedom (DOF). An IMUsensor is mounted on the user?s foot. It?s used to measure the user?s foot movement. A mini USB keyboard is used as the working object of the robot. Arfiticial Neural Network (ANN) was used to convert the user?s foot movement into arm robot movement. The implementation of ANN for typist robot controlling had a success rate of 82%. Topic: Robotic systems 141 KaiTo+: Mobile Touch Service on Indonesian RailwaysMuhammad Ashar The development of digital automatization system by synergizing intelligent communication technology (ICT) with various Indonesian railway user applications needs to be addressed digitally and integrated through Mobile Touch innovation to provide intelligent solutions reliably, safely, efficiently and comfortably environmentally Trains in Indonesia. The use of Mobile Touch Technology in various mobile applications is the focus of research by utilizing media such as smartphones, smartcards and smartwacth in online digital services that can be applied through features developed with Ubiquitous Computing framework in every railway area. KaiTo+ apps was designed to challenge and improve customer numbers and the effectiveness of digital service automation system utilization such as Multi Trip Cards, Multi Function Cards, Time Schedule, Pre-Order, Mobile WiFi, Digital payment, And Realtime Ticketing Systems. They were expected to provide simultaneous and synergistic service simultaneously on transportation interconnection system, payment, and other online information access. Topic: Smart appliances & wearable computing devices 142 A Systematic Review of Conceptual Frameworks of Smart City InitiativeRuci Meiyanti (a*), Dana Indra Sensuse (b) The smart city initiative that the first potential thing is the early stage of the smart city projects development. It is revealed by the conceptual frameworks. The conceptual frameworks of smart city initiative are the useful references to the developing project of the smart cities. There are researches about the variant conceptual frameworks of the smart city initiative. The purpose of this study is to increase the insight of the conceptual frameworks of smart city initiative. The method that is used in this study is the systematic review of Software Engineering and added with the Systematic literature review of Information Systems research. To do the systematic review, we collect the diversity of conceptual frameworks of smart city initiative from journal and conference publications indexed by Scopus in the last five years with related topics. The total distribution of smart cities topic was 162 literature. Then they were selected by the smart city frameworks became 30 literature, and finally selected by the conceptual frameworks of smart city initiative became 5 literature. The result of this research is fifteen elements that usually are used to construct in the conceptual frameworks of smart city initiative. They are expected to be a choice to make the appropriate conceptual frameworks of smart city initiative. Topic: Smart city 143 Mobile Application for Tourist Guide in SurabayaDian P. Hasari; Weny M. Rahmawati; Danang H. Sulaksono Surabaya as the second largest city in Indonesia was nominated as one of 12 cities with MICE (Meeting, Incentive, Conference, Exhibition) development causes Surabaya will be destination city for many tourist. As a result, government of Surabaya gives more attention to the development of tourism such as history, education and maritime tourism. One important thing on developing tourism sector is the ease to access information of the tourism site. As a smart city, many infrastructures in Surabaya have been equipped with internet access. All needs can be found online, start from education, administrations, till tourism sector use online system. This research?s goal is to design mobile based on android smartphone for Surabaya tour guide. The system provides tourism information and to manage tourism site effectively. This system gives recommendation of the MICE place, hotels or restaurant which is suitable for the user based on the other user?s visiting history. Association analysis with Apriori algorithm will be used to give recommendation place for tourists in Surabaya. Topic: Smart city 144 Performance of Next Generation Sequencing Data Processing with Hadoop-BAM in a Computer ClusterRifki Sadikin*, Rofithah Omar#, Nur Hidayah#, Andria Arisal* Big data technology such Hadoop already been used to deal with an increasingly amount of data produced by next generation sequencing in bioinformatics. In this paper, we present our result on processing bioinformatics data in various standardised formats in a computer clusters. We setup a hadoop clusters in a high performance computing infrastructure. Several Map-Reduce implementations using Hadoop-BAM and Picard tool are implemented. Hadoop-BAM is used for splitting the input data to conform Map-Reduce framework. While, Picard tool contains basic procedures for manipulation the input data. We experiment the implementation with varying length of input data and the number of cores to show correlation between the length of data and speed up gain. Our result show the exploitation of Big Data technology for processing bioinformatics data help to reduce computation time. Topic: Smart cloud technology 145 Automated Robot Movement in the Mapped Area Using Fuzzy Logic for Wheel Chair Prototype ApplicationSyahril Efendi (a), Baihaqi Siregar (b*), Hariadi Ramadhana (b), Ulfi Andayani (b), Fahmi (c*) The difficulties of the disabled (disabled, disability due to sick) to move make them unable to live independently. People with disabilities need supporting device move from place to place. For that we should provide a solution that can help people with disabilities to move from one room to another automatically. This study aim to create a wheelchair prototype in the form of a wheeled robot as a means to learn the automatic mobilization. Fuzzy logic algorithm was used to determine motion direction based on initial position, ultrasonic sensors reading in avoiding obstacles, infrared sensors reading as a black line reader for the wheeled robot to move smooth and smartphone as mobile controller. As the result, the proposed algorithm was able to work stable for automatic motion determination based on initial position, and also able to modernize the wheelchair movement from one room to another automatically. Topic: Smart Home and Building 146 Distributed scheduling of electric vehicles in a residential area in ThailandTumisang Keduetswe Nguvauva(a*),Somsak Kittipiyakul(a) The number of Electric Vehicles (EVs) is expected to rise in the coming future as an aim to be eco-friendly. However, a high penetration of EVs may result in a destabilization of the whole electric grid, which may cause power outages or even worse, transformer damage due to overloading. Smart Grid technology enables us to manage the charging of EVs in the form of demand side management. In this paper we propose a distributed scheduling scheme based on the work of [Chen et al, 2014] to coordinate the charging schedules of EVs in a residential area in Thailand, being supplied by a transformer. Each household is fitted with a smart meter that has energy management controller (EMC) capabilities for device scheduling. To prevent overloading of the transformer, the desired aggregated demand for the area for a particular time is known by every EMC. Each EMC determines the amount of energy available for charging its own EV so that the aggregate consumption in the area does not violate the desired aggregated demand. This is done in a distributed fashion using the average consensus algorithm. Numerical results show that our proposed algorithm is robust, fair, and efficient. Topic: Smart Home and Building 147 Implementation of Semantic System In The Smart Home Lights Device Based On AgentAgung Prasetio (a*), Sabriansyah Rizqika Akbar (a), Bayu Priyambadha (a) The IoT device provides the potential for obtaining data contextually, by observing and measuring the physical events occurring in the environment. Smart Home has great interest by IoT device developers. Using a semantic approach to data processing on IoT devices provides the ability to define, modify, and interpret better data. In this research uses Nodemcu ESP8266 as a microcontroller on sensor node and actuator node. Raspberry Pi3 is used as an agent that serves as a router and data collection center. Both devices already support wifi connectivity so as to facilitate the communication process. The sensor node is responsible for collecting data derived from the sensors process of the sensor module, the data obtained is sent to the agent to be initialized and inserted into the ontology. Agent performs the reasoning process to change existing data on the ontology according to the rule created and produce more representative and contextual data. The Actuator node performs a query against the current status of the lamp on the ontology as a reference for the action of switching on or off the lamp. Implementation in the form of lights on and off control system in smart home with semantic approach. Topic: Smart sensor networks 148 Message Queue Telemetry Transport Protocols Implementation for Wireless Sensor Networks Communication - A Performance ReviewSabriansyah Rizqika Akbar (a*), Kasyful Amron (a), Harry Mulya(a), Sofi Hanifah (a) Device identification based on host and the network address becomes an issue in interoperability between IP and non-IP based devices. Communication management and maintenance increase the complexity of the network and protocol linearly with the vast growth of device and communication interfaces in the Internet of Things (IoT) field. New identification schemes should be able to overcome those problems. One proposed solution for this problem is the publish/subscribe (pub/sub) data-centric communication approach that manages communication based on the interest of the data. Any devices sent and received the data based on categories or topics those devices define interested to have. One of well-known pub/sub protocol is Message Queue Telemetry Transport (MQTT) that underlying over the TCP/IP network and MQTT-SN in another side that specifically used in the Wireless Sensor Network (WSN). The purpose of this research is to implement the MQTT-SN protocol in WSN and observe its interplay with the MQTT protocol in TCP/IP network. In this projects, MQTT-SN device or generally called WSN Node built over an Arduino Nano Microcontroller with NRF24L01 as the wireless communication interface. The gateway discovery time will be counted since the sensor node send the search gateway messages until the sensor node receives gateway information. The pub/sub experimental communication scenario between WSN Node and IP based Host conducted with three different Quality of Services (QoS) level. Each of QoS level measure different communication steps. Based on the result, the average gateway discovery time needed by the sensor node is 123,406 $$\mu s$$. QoS level 0 implementation shows that the data was sent from a WSN Node reach MQTT gateway within a second. The QoS level 1 defines that the gateway was able to completely receive the data with 30% of data duplication when the sending interval time is 2 seconds longer than the timeout interval. And last, the QoS level 2 tells that the data was completely received by the gateway without any data lost nor duplication. Topic: Smart sensor networks 149 A Middleware for Address Network Interoperability Between Wifi and BleEko Sakti Pramukantoro, Rasidy Cakra Pratama, Adhitya Bhawiyuga, Achmad Basuki An IoT-based system can be composed of several physical nodes with different communication interfaces such as Wifi and Bluetooth Low Energy (BLE). This condition raises a problem of network interoperability in which a node is unable to send or receive the data from another node with different network protocols. This paper presents publish-subscribe based middleware as a bridge to enable the communication between Wifi and BLE-enabled nodes. The proposed middleware work as follows: first, Wi-Fi and BLE nodes act as publisher send data to the broker. Upon reception, the broker forwards the data to any subscriber nodes which subscribe the same topic. Evaluation is done by using the Interoperability assessment methodology and ours is qualified. Topic: Smart sensor networks 150 Design of an environmental gamma radiation monitoring system based on IoTI Putu Susila, Istofa, Ismet Isnaini, Gina Kusuma and Sukandar Internet of Things (IoT) is an interconnection of various devices for collecting and exchanging data over network. Application of IoT includes many domains such as environmental monitoring, smart home, smart energy monitoring, healthcare, agriculture and smart transportation. In this paper, we propose a design of a meteorological monitoring and environmental gamma radiation monitoring system for early detection of radioactive material in the environment. The study consists of system architecture, development of Arduino-based gamma radiation monitoring device, data transfer with MQTT protocol, storage of monitoring data to database, Raspberry Pi-based early warning system and development of user interface (UI) for data presentation. The prototype of the system has been developed and tested around our office at Serpong Nuclear Complex. The presence of radioactive material is simulated using check source which emits low dose rate gamma. The obtained results are analyzed and presented, while meteorological data is compared with monitoring result from existing meteorological monitoring system. The results showed that the proposed system is able to detect the presence of gamma radiation source and met the design requirement. Topic: Smart sensor networks 151 Development of an Adaptive interval value fuzzy number based on MCGDM model by Hybrid AHP and TOPSIS methodsYeni Kustiyahningsih In this research, a new adaptive interval value fuzzy multiple criteria group decision-making model is developed by integrating Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). The purpose of this research is to provide more accurate modeling, and performance rating better. Interval Value Fuzzy has a more effective representation, high flexibility, and more efficient computing. The modeling and representation of linguistic expressions in the form of interval fuzzy have an accuracy better than Fuzzy. The AIVFAHP approach is capable of elaborating complex multi-criteria problems into a hierarchical structure, considering the value of logical consistency in judgment and determining the optimal weight in multi-criteria decision-making. In determining the best alternative, the AIVFTOPSIS approach is well-suited for being able to make multi-decisions based on the concept that the chosen alternative has the shortest distance from the ideal solution and furthest from the ideal negative solution. The method is implemented in a Strengths, Weaknesses, Opportunities, and Threats (SWOT) based strategy selection problem for measurement e-learning. Topic: Software engineering 152 Towards a High Level Reference Architecture for Energy-aware Self-adaptive SoftwareMarimuthu C, K. Chandrasekaran Energy consumption of the battery powered user devices is a major research challenge of this decade. The researchers realized the importance of reducing the energy consumption of the software to improve the battery life-time. The existing research efforts are focusing on optimizing the source code of the software. It is very difficult to optimize the code without knowing the energy saving features. Therefore, in this research work we aim at considering energy-efficiency as the important NFR in the early stages of the SDLC. We have used feature models, context-awareness, self-adaptivity, and component-connector architecture styles for this research work. To achieve this, we have proposed a high level reference architecture for energy-aware self-adaptive software. Other major contributions of this paper are: energy-aware self-adaptive middleware components and high level energy-aware product architecture. We have showed the efficacy of the proposed approach with the help of example application scenario. Topic: Software engineering 153 Implementation of mobile-based monitoring sales system in Semi Tani ShopHendrik Setyo Utomo, Rabbini Sayyidati, Oky Rahmanto Sales transaction is an activity undertaken to sell goods, for example: agricultural medicines, solid fertilizer, liquid fertilizer, and others in cash or credit. Semi Tani Shop is one of agricultural store located in Tanah Laut. Semi Tani Store has a sales transaction management, inventory stock, and profit calculation done conventionally. The way that is done is using paper in the calculation of income statement and recording stock of goods. However, there is no bookkeeping sales transaction in any form and it makes hard to monitor the transaction history. This study aims to implement sales information system of agricultural store sales based on Mobile and sales data stored in local computer and store in cloud. The sales information system focuses on monitoring reports that can be accessed anywhere with the condition connected to the internet and have POS cloud system i.e OSPOS (Open Source Point of Sales). Method for this study using Prototype. The report is a Goods Stock report, Transaction Report and income statement. Implementation results help Semi Tani Shop owners in sales management using OSPOS, as well as monitoring of stocks, stock notes in specified quantities (thinning), transaction reports, and income statement with mobile android. Topic: Software engineering 154 Fuzzy Logic for the composition of animal feed of ruminants and non ruminantsDesy Intan Permatasari, Entin Martiana K, Lutfi Khuril Maula The challenge faced by farmers in Indonesia is to determine the composition of livestock feeds that fit the nutritional needs of farm animals. This is because the lack of knowledge of human resources resulting in nutrient content is not sufficient or could be excessive. In the science of farming, there is already a mathematical calculation in calculating the composition of farm animals. However, mathematical calculations can only be used by experts in the field of animal husbandry. To overcome these problems, this research will examine the recommendation system in determining the composition of livestock feed, especially ruminants and non ruminant animals using fuzzy logic. This research will combine fuzzy logic with simultaneus equation method in preparing feed composition. There are four main factors in determining the recommendation of animal feed, including the number of calories, calcium content, phosphorus, and chloride. Of the four main factors, the most important composition will be produced and in accordance with the specific species of livestock. The results of this study is the percentage of the composition factor of animal feed along with the price per composition. From the test results obtained that the recommendation of the composition of livestock is almost close to the composition of calculations performed mathematically. The percentage error of the test result is below 5%. Topic: Software engineering 155 Pioneering the Automation of Internal Quality Assurance System of Higher Education (IQAS-HE) Using DevOps ApproachAcep Taryana; Iwan Setiawan; Eko Bayu; Ari Fadli It was important to develop a software for managing the Internal Quality Assurance System for Higher Education (IQAS-HE). In addition, automation was a hot issue to develop the software that had capability to present some indicators of the quality assurance into a database. Possibly, some indicators were formulated when IQAS-HE was executed, and the indicators came be some new indicators for database. How to implement the indicators in the IQAS-HE that could be a part of database in the software for measurement the IQAS-HE automatically. Therefore, this research present the automation for developing a management tools required by higher education institutions in terms of quality improvement, using the DevOps approach. Furthermore, DevOps was an emerging paradigm for eliminate the split and barrier between developers and operating personnel that traditionally exist in many companies today. In this research, management tools aim to bridge the gap between stakeholders (customers) and developers to present software that had a good quality that could be a tool for improving the process of quality assurance of higher education continously. The research result show that a programming technique, which collaborated with in DevOps approach, was an important issue to obtain automation of IQHS-HE development. Topic: Software engineering 156 Software Architecture of e-Assessment on Higher EducationWardani Muhamad Currently computers technology has been involved to support learning process at university. Learning process, generally involved students and teachers in order to learn about materials on subject courses and also evaluate student competencies regularly. Teachers can evaluate student competencies or knowledge by e-assessment. E-assessment is one of the domains of e-learning which involves the use computer in assessment, include: setting, delivery, marking and reporting of assessments. Major benefit of e-assessment system is its flexibility in term of global access and devices used to access. When develop e-assessment system, we have to focuses on multi-dimensional approach, such as user friendly and student centric nature. Because of its complexity, software architecture need to define so software developer will develop software properly. By designing software architecture, view of the system that includes the system components, behavior of those components, and the ways the components interact could clearly defined. Architecture Description Language (ADL) used to clearly describe software architecture, because it provides a concrete syntax and formal framework for characterizing architectures Topic: Software engineering 157 Effective Communication for Stock Availability Optimization: Case Study BULOGkholid haryono, nurhidayat Bulog is one of the state-owned enterprises in Indonesia that is responsible for controlling the national stock of food supplies. It buys food products from farmer partners and stores them in a Bulog warehouse. This product will be issued gradually to maintain price stability and stock availability in the community / people. The relationship of Bulog and farmers partners as providers of food products is the key to the availability of Bulog goods. There are various incidents of cheating and disharmony of this relationship, so there are two consequences: (1) partners resign, and (2) procurement of unfair goods (fraud committed). Researchers propose a prototype system that will be tested to help solve the problem. Using the prototyping method and some SCRAM principles to get the ideal prototype application. The test results show improvement of partner and Bulog relationships. Potential fraud from previous practices can be solved by electronic communications and computer-based controls. The contribution of this research is the lessons that can be learned from each stage ranging from problem identification, method selection, and testing techniques Topic: Software engineering 158 A COMPARATIVE STUDY OF FILE TYPE SELECTION DURING DATA TRANSFER OF HOMOGEN ROUGH SURFACE FROM CAD MODEL TO CAE MODELG.A. Sipayung, R. Ismail, Kartini, E. Saputra, J. Jamari, A.P. Bayuseno Some types of rough surfaces are usually modeled first in CAD software. Rough surfaces that have been made will be processed for analysis through various methods, one of which is CAE software. To continue to CAE software, various file types can be used. This study discusses the selection of file extensions to the analysis process itself. Rough surfaces are imported first with various file type types, ie solidpart file (* sldprt), iges (* igs) file, step file (* stp), parasolid file (* x.t), and acis file (* sat). In this study, CAE software used is abaqus, while the model used is a homogeneous rough surface model. The five files of each file type are then inputted into CAE software and performed static contacts. The result of the static contact of each file is then compared with the three review parameters, namely CAD file size, ODB file size, and CAE file size. The result shows that file type differences do not make a geometry difference. Furthermore, the contacted and obtained surface is the parasolid file (* x.t) superior to the other four file types, obtained from the file size data of each smaller parameter. File size on parasolid file type is 39% smaller than file size in iges file type, where iges file is file type with largest file size. So in the next study, the research team suggested the use of file type parasolid type. Topic: Software engineering 159 Developing Food Sensory Test System with Preference Test (Hedonic and Hedonic Quality)Prawidya Destarianto, Hendra Yufit Riskiawan, Khafidurrohman Agustianto, Syamsiar Kautsar Bread is a food source of carbohydrates that are often consumed by the community. Various types of bread was produced to meet consumers curiosity, one of which is wheat bread. Manufacturers must be able to produce quality wheat bread and liked by consumers. Increasing the quality of bread will certainly have an impact on sales to be generated. One of the efforts in improving the quality of wheat bread is by doing Hedonic test and Hedonic Quality test. This study aims to develop a system capable of providing an assessment of wheat bread. This study develop machine learning system with supervised learning algorithm, then using the results of the initial Organoleptic test as Knowledge Based (KB). This test involved detection, recognition, discrimination, scaling and ability to express likes or dislikes (hedonic quality), using K-Means Clustering with expert judgment. Hedonic quality is used as a variable for assessing wheat bread products with 4 variables, which include flavor, taste, appearance, and texture. While the hedonic test using two classes: likes or dislikes. This KB used as Naive Bayes Classifier algorithm initial knowledge, The test results using 10 fold shown average accuracy 93.34%, while the final goal of the development of this system will create a system capable of providing an assessment of a wheat bread product. Topic: Software engineering 160 Muhammadiyah Orphanage information system in East Java Indonesia using Object Oriented and iconic process methodImmah Inayati, Hersa Farida Muhammadiyah is one of the largest community organizations in Indonesia, headed by ahmad dahlan in Yogyakarta. Assembly of social services is an institution engaged in Muhammadiyah in the social field for community activities. One of the areas of its sevice is the development of orphanages. In East Java, Muhammadiyah has 109 orphanages scattered in various regions and has been in operation for many years. However, the orphanage does not have an integrated information system that makes processing data easier, gives timely reports to donors, and is able to share information between institutions to increase the potential of each orphanage in East Java. To answer the problem, this paper presents the development of Muhammadiyah Orphanage information system in East Java Indonesia using Object Oriented method and iconic process. Topic: Software engineering 161 Optimizing Single Low-End LAMP Server Using NGINX Reverse Proxy CachingMahendra Data [1], Muhammad Luthfi [2], Widhi Yahya [3] This research aims to optimize single low-end Linux Apache MySQL PHP (LAMP) server. This kind of server usually used by newly born Indonesian startup that usually has a limited budget. We choose NGINX as reverse proxy caching for optimizing this single low-end LAMP server. The reason why we do not use NGINX as the web server, despite the fact that NGINX has better performance by many reviews, is because some popular web applications and framework only support Apache. This dependency force the startup owner to use Apache rather than NGINX as the web server. To evaluate the performance of this infrastructure, we test it using several scenarios. First, it tested to serve several static and dynamic contents. Then, we test it by downloading various size of files. Those scenarios have tested on a Virtual Private Server (VPS) hosted in DigitalOcean which has one vCPU and 1 GB of RAM that cost only USD 10 per month. Experiment result shows that the proposed architecture can decrease average CPU usage by 32% and decrease average latency by 12.5% but need 84.5 MB more memory in average which is required to run the reverse proxy application and to cache the content. We conclude that using NGINX as a reverse proxy on LAMP server is a good alternative solution to optimize the performance of the web server. Topic: Sustainable Technology 162 Persuasiveness Web 2.0 in Behavioral Intention: A Conceptual ModelYohana Dewi Lulu Widyasari(1,2),Lukito Edi Nugroho(1), Adhistya Erna Permanasari (1) The use of web 2.0 technology as a work tool or communication tool in individual activities grow significant and has begun to be also used in the organization. The Web 2.0 technology is not just an information technology system but also a social technology, which is still a debate of factors that can influence it. Aspects of social interaction owned by this technology impact on the behavior and attitude of the users. This research proposes a conceptual model intervention of persuasive technology that explains what the factor affect the users? behavioral intention to use technology in an organization. This study reviews of web 2.0 technology by using Theory of Planned Behavior and Behavior Change Support Systems to analysis its persuasiveness. In the present study, we tested a persuasive systems design model that had a significant impact on perceived persuasiveness and system usage. More specifically, the proposed model extends Theory of Planned Behavior to include seven constructs namely, Perceived Ease of Use, Perceived Usefulness, Attitude Toward The Behavior, Social Influence, Subjective Norm, Self-Efficacy, Perceived Behavioral Control. This model provides valuable insights into the factors that influence the acceptance or resistance of web 2.0 as persuasive technology by intended users and offers opportunities for future research in understanding the acceptance of persuasive technology Topic: Sustainable Technology 163 Photovoltaic Monitoring System Based on the Internet of Things to Support the Improvement of Solar Power Generation PerformanceWinasis, Azis Wisnu Widhi Nugraha, Suroso, Citra Amalia H.P. Today the worlds growing energy needs, in addition to climate change due to the greenhouse effect, leads to the rapid development of renewable energy utilization as an environmentally friendly alternative to the supply electrical energy. Among them is a solar power plant that utilizes solar energy as primary source. One of the implementation problems, especially in remote areas is the performance of the system is not monitored properly. This paper presents an internet of things based photovoltaic (PV) monitoring system and its implementation for the evaluation and improvement of performance on a 300 Wp PV system in Kalimanah Village, Purbalingga District, Central Java Province. Monitoring uses low-power wireless devices and utilizes the Internet network. Users everywhere can access monitoring data to perform performance evaluation of photovoltaic systems and use them to improve power plant performance. Analysis based on monitoring data shows that PV systems operate at low performance ratios of 5.42% due to low load and do not use maximum power point tracking (MPPT). The improvement effort is done by adding the burden can increase the performance ratio of PV system to 19.2%. Further load addition can increase energy utilization and reduce excess electricity from photovoltaics. Topic: Sustainable Technology 164 Internet of Thing Control System for Solar Power PlantAzis Wisnu Widhi Nugraha (a*), Winasis (a), Sidqi Fadillah (a) Batteries are important component on solar power plants. To maintain battery performance, it is important to prevent overdischarge or overcharge conditions. When the battery is overcharge, the energy source must be disconnected. While the battery is overdischarge, the load must be disconnected. This paper presents a model of solar power plant control system based on internet of things. The proposed system consist of three sensor and actuator node and a controller using Raspberry Pi which connected on TCP/IP networks. The first node is used to determine whether the battery is overcharge or overdischarge condition by sensing the battery voltage. The second node is used to control the power source (photovoltaic). While the third node is used to control the load. NodeRed and MQTT was installed on Raspberry Pi. NodeRed was used as controller applications while MQTT was used to transfer information between nodes and controllers. A controller algorithm is built on NodeRed to disconecting the power source when the battery was overcharge and disconnecting the load when the battery was overdischarge. The system was designed for manual or automatic operation. The proposed system was succeed protecting battery from overcharge and overdischarge condition on both automatic or manual operation. Topic: Sustainable Technology

SIET 2017 - Submission Management System