Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982457
A. Supriyanto, Dwi Agus Diartono, B. Hartono, Herny Februariyanti
The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities.
{"title":"Inclusive Security Models To Building E-Government Trust","authors":"A. Supriyanto, Dwi Agus Diartono, B. Hartono, Herny Februariyanti","doi":"10.1109/ICICoS48119.2019.8982457","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982457","url":null,"abstract":"The low attention to security and privacy causes some problems on data and information that can lead to a lack of public trust in e-Gov service. Security threats are not only included in technical issues but also non-technical issues and therefore, it needs the implementation of inclusive security. The application of inclusive security to e-Gov needs to develop a model involving security and privacy requirements as a trusted security solution. The method used is the elicitation of security and privacy requirements in a security perspective. Identification is carried out on security and privacy properties, then security and privacy relationships are determined. The next step is developing the design of an inclusive security model on e-Gov. The last step is doing an analysis of e-Gov service activities and the role of inclusive security. The results of this study identified security and privacy requirements for building inclusive security. Identification of security requirements involves properties such as confidentiality (C), integrity (I), availability (A). Meanwhile, privacy requirement involves authentication (Au), authorization (Az), and Non-repudiation (Nr) properties. Furthermore, an inclusive security design model on e-Gov requires trust of internet (ToI) and trust of government (ToG) as an e-Gov service provider. Access control is needed to provide solutions to e-Gov service activities.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127175137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982496
Zikri Irfandi, M. R. Shihab, A. Hidayanto
The purpose of this study is to investigate the provision and demand of eParticipation of a local government, conducted in Metro City, Indonesia. Using the Citizens Web Empowerment Index (CWEI), an assessment of 60 Metro City government websites was conducted to measure eParticipation's provision. Furthermore, a survey involving 397 respondents from the Metro City residents was conducted to evaluate the demand of eParticipation. The results showed that eParticipation level provided by Metro city is low, having CWEI score of 13.42 percent. This research also found that citizens' needs for eParticipation were quite high, with specific participative purposes such as information disclosure, media for aspirations and complaints, online surveys / polls, online communication and consultation with the mayor, and digital voting. Unified Theory of Acceptance and Use of Technology (UTAUT) is utilized to determine citizen's intention to use eParticipation services, which reveal that all hypotheses were accepted. Finally, recommendations were made to improve eParticipation services with the aim of increased citizen empowerment in government.
{"title":"eParticipation Provision and Demand Analysis of a Regional Government: Insights from Metro City","authors":"Zikri Irfandi, M. R. Shihab, A. Hidayanto","doi":"10.1109/ICICoS48119.2019.8982496","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982496","url":null,"abstract":"The purpose of this study is to investigate the provision and demand of eParticipation of a local government, conducted in Metro City, Indonesia. Using the Citizens Web Empowerment Index (CWEI), an assessment of 60 Metro City government websites was conducted to measure eParticipation's provision. Furthermore, a survey involving 397 respondents from the Metro City residents was conducted to evaluate the demand of eParticipation. The results showed that eParticipation level provided by Metro city is low, having CWEI score of 13.42 percent. This research also found that citizens' needs for eParticipation were quite high, with specific participative purposes such as information disclosure, media for aspirations and complaints, online surveys / polls, online communication and consultation with the mayor, and digital voting. Unified Theory of Acceptance and Use of Technology (UTAUT) is utilized to determine citizen's intention to use eParticipation services, which reveal that all hypotheses were accepted. Finally, recommendations were made to improve eParticipation services with the aim of increased citizen empowerment in government.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982444
H. A. Widjaja, Meyliana, Erick Fernando, Surjandy, Denardo Grady, Bellarika Liejaya, Mareta Puspa Siwi
This study aims to develop models and indicators for evaluating ERP implementation in Human Capital Management (HCM) in higher education institutions. The development of the ERP Quality model is based on the IS success model of DeLone and Mclean and the ERP quality model developed by Deshmukh. This research model consists of variable 9, namely information quality, system quality, vendor quality, training, hardware and software, top management support, skill of workforce, project management, perceive ERP benefits and ERP system success. Analysis using SPSS software using questionnaires that are distributed directly to 32 respondents. The results of this study are in the form of ERP Quality models with 9 variables and 44 instruments that have been validated in accordance with the provisions of the Validity and reliability test. From this result can be used in research with respondents who are more appropriate or larger in a Higher Education sector who want to evaluate the performance of the use of ERP on HCM
{"title":"Development and Validation of Instruments for Evaluation Enterprise Resource Planning on Human Resource Management in Higher Education Sector","authors":"H. A. Widjaja, Meyliana, Erick Fernando, Surjandy, Denardo Grady, Bellarika Liejaya, Mareta Puspa Siwi","doi":"10.1109/ICICoS48119.2019.8982444","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982444","url":null,"abstract":"This study aims to develop models and indicators for evaluating ERP implementation in Human Capital Management (HCM) in higher education institutions. The development of the ERP Quality model is based on the IS success model of DeLone and Mclean and the ERP quality model developed by Deshmukh. This research model consists of variable 9, namely information quality, system quality, vendor quality, training, hardware and software, top management support, skill of workforce, project management, perceive ERP benefits and ERP system success. Analysis using SPSS software using questionnaires that are distributed directly to 32 respondents. The results of this study are in the form of ERP Quality models with 9 variables and 44 instruments that have been validated in accordance with the provisions of the Validity and reliability test. From this result can be used in research with respondents who are more appropriate or larger in a Higher Education sector who want to evaluate the performance of the use of ERP on HCM","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982404
Apiladosi Priambodo, P. W. Handayani, A. Pinem
The emerging of new financial technology business and digital transformation will make the banking sector to continuously innovate their digital products and service, process automation and compliance with government regulation. Therefore, a XYZ bank in Indonesia expect to have more IT projects in the future. However, currently there are still many IT projects that exceeding the timeline. Thus, this study aims to evaluate the critical success factor in IT project in banking industry that will hopefully increase the number of IT project success when implemented. The study began with CSF collection from previous studies and 15 CSFs were identified. These factors are group in four categories namely customer, team, organization and project. The prioritization was conducted using entropy method. The questionnaires were distributed and there were 51 respondents who filled out the complete questions. The authors also tried to asked input regarding the most importance factor for IT project implementation. The result shows that Subject Matter Expert (SME) of the project is the most importance factor on the customer category. In the project category, development environment is the most important. In the organization and team category, communication and project manager skill are the most important factor in each subsequent category.
{"title":"Success Factor for IT Project Implementation in Banking Industry: A Case Study","authors":"Apiladosi Priambodo, P. W. Handayani, A. Pinem","doi":"10.1109/ICICoS48119.2019.8982404","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982404","url":null,"abstract":"The emerging of new financial technology business and digital transformation will make the banking sector to continuously innovate their digital products and service, process automation and compliance with government regulation. Therefore, a XYZ bank in Indonesia expect to have more IT projects in the future. However, currently there are still many IT projects that exceeding the timeline. Thus, this study aims to evaluate the critical success factor in IT project in banking industry that will hopefully increase the number of IT project success when implemented. The study began with CSF collection from previous studies and 15 CSFs were identified. These factors are group in four categories namely customer, team, organization and project. The prioritization was conducted using entropy method. The questionnaires were distributed and there were 51 respondents who filled out the complete questions. The authors also tried to asked input regarding the most importance factor for IT project implementation. The result shows that Subject Matter Expert (SME) of the project is the most importance factor on the customer category. In the project category, development environment is the most important. In the organization and team category, communication and project manager skill are the most important factor in each subsequent category.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132134085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982481
R. Magdalena, Y. Ruldeviyani, D. I. Sensuse, C. Bernando
The era of Industry 4.0 has created highly automated industries through advanced digital technologies, such as Internet of Things, big data analytics, and data visualization. The latter technology has been widely used in industries in the form of dashboards. A dashboard is a Business Intelligence (BI) tool that provides analytical data information to be used as decision making by corporate executives and business managers to optimize the performance of systems and processes. To support its business in the Maintenance, Repair, and Overhaul (MRO) industry, BI Dashboard was developed and utilized at PT XYZ. However, the use of the BI dashboard in the organization is still very low and even abandoned by users. Therefore, a strategy for increasing the use of the BI dashboard is needed. This study describes such strategy, which involves the conduct of user testing and heuristic evaluation. The results of the study are recommendations that can be used to improve the BI dashboard.
{"title":"Methods to Enhance the Utilization of Business Intelligence Dashboard by Integration of Evaluation and User Testing","authors":"R. Magdalena, Y. Ruldeviyani, D. I. Sensuse, C. Bernando","doi":"10.1109/ICICoS48119.2019.8982481","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982481","url":null,"abstract":"The era of Industry 4.0 has created highly automated industries through advanced digital technologies, such as Internet of Things, big data analytics, and data visualization. The latter technology has been widely used in industries in the form of dashboards. A dashboard is a Business Intelligence (BI) tool that provides analytical data information to be used as decision making by corporate executives and business managers to optimize the performance of systems and processes. To support its business in the Maintenance, Repair, and Overhaul (MRO) industry, BI Dashboard was developed and utilized at PT XYZ. However, the use of the BI dashboard in the organization is still very low and even abandoned by users. Therefore, a strategy for increasing the use of the BI dashboard is needed. This study describes such strategy, which involves the conduct of user testing and heuristic evaluation. The results of the study are recommendations that can be used to improve the BI dashboard.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124869252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982382
Alvina Rahmi, S. Adhy
Electronic money based on servers, known as e-wallet, is a non-cash payment device. The number and amount of electronic money distributed in Indonesia has increased since the Gerakan Nasional Non Tunai (GNNT) launched by Bank Indonesia Governor on August 14, 2014. This study discussed factors influencing consumer behavioral intent to use in Indonesia's e-wallet adoption of Technology Acceptance Model (TAM), which is perceived as useful and user-friendly, as well as other variables of trust, enjoyment perception, feature, and m-payment experience. Data collection method used was quantitative method. Data were collected with questionnaires through google form provided that respondents have and have used GoPay, OVO and or DANA. The number of respondents were 343. Using the SmartPLS application, data were analyzed using the Structural Equation Modeling (SEM) method using Partial Least Square (PLS). The results showed that perceived enjoyment, m-payment experience and trust had a positive and significant influence on the behavioral intention to use in using e-wallet. Perceived ease of use also influenced trust and usefulness positively and significantly. Whereas the perceived ease of use and perceived usefulness had a positive but insignificant influence on behavioral intention to use, feature had a negative and insignificant influence on the behavioral intention to use in using the e-wallet.
{"title":"Analysis of Server-Based Electronic Money Acceptance Using Partial Least Square Method","authors":"Alvina Rahmi, S. Adhy","doi":"10.1109/ICICoS48119.2019.8982382","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982382","url":null,"abstract":"Electronic money based on servers, known as e-wallet, is a non-cash payment device. The number and amount of electronic money distributed in Indonesia has increased since the Gerakan Nasional Non Tunai (GNNT) launched by Bank Indonesia Governor on August 14, 2014. This study discussed factors influencing consumer behavioral intent to use in Indonesia's e-wallet adoption of Technology Acceptance Model (TAM), which is perceived as useful and user-friendly, as well as other variables of trust, enjoyment perception, feature, and m-payment experience. Data collection method used was quantitative method. Data were collected with questionnaires through google form provided that respondents have and have used GoPay, OVO and or DANA. The number of respondents were 343. Using the SmartPLS application, data were analyzed using the Structural Equation Modeling (SEM) method using Partial Least Square (PLS). The results showed that perceived enjoyment, m-payment experience and trust had a positive and significant influence on the behavioral intention to use in using e-wallet. Perceived ease of use also influenced trust and usefulness positively and significantly. Whereas the perceived ease of use and perceived usefulness had a positive but insignificant influence on behavioral intention to use, feature had a negative and insignificant influence on the behavioral intention to use in using the e-wallet.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982408
Annisa Andarrachmi, W. Wibowo
The Information and Communication Network Center (BJIK) is one of the centers in the Agency for the Assessment and Application of Technology (BPPT). BJIK develops a network monitoring information system called Simontik to protect the BPPT system from threats where antivirus softwares and firewalls fail to give the level of protection needed. The random nature of threats makes it difficult to develop a rule-based system to predict the existence of intrusion. In this research, we apply a deep learning model to predict network intrusion. We found that our deep learning model using deep neural network and random forest algorithm can produce 99.91% accuracy compared to 98.11% using support vector machine algorithm.
{"title":"Data Mining Implementation for Monitoring Network Intrusion","authors":"Annisa Andarrachmi, W. Wibowo","doi":"10.1109/ICICoS48119.2019.8982408","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982408","url":null,"abstract":"The Information and Communication Network Center (BJIK) is one of the centers in the Agency for the Assessment and Application of Technology (BPPT). BJIK develops a network monitoring information system called Simontik to protect the BPPT system from threats where antivirus softwares and firewalls fail to give the level of protection needed. The random nature of threats makes it difficult to develop a rule-based system to predict the existence of intrusion. In this research, we apply a deep learning model to predict network intrusion. We found that our deep learning model using deep neural network and random forest algorithm can produce 99.91% accuracy compared to 98.11% using support vector machine algorithm.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116796049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982456
Muhammad Naufal Furqon, K. Khadijah, S. Suhartono, R. Kusumaningrum
Indonesia has a diverse genre of music (music genre) and is spread throughout the provinces in Indonesia. Indonesian music genres include angklung, gamelan, and kulintang. The Indonesian music genre has some similarities in terms of sound such as angklung and kulintang because it is made of wood and gamelan which has various types such as Javanese gamelan and Balinese gamelan which have a similar sound so that listeners are difficult to use to stream the right music. Because of this, the Indonesian music genre is more difficult to recognize because the instruments that build are diverse and have similarities with each other. One of the tools that can be used to facilitate the introduction of the Indonesian music genre is classification. The classification carried out needs to find the appropriate parameters to determine an accurate Indonesian music genre. In this study using the mel-spectrogramand the Deep Recurrent Neural Network (DRNN)method for music classification problems. The parameters and DRNN architecture tested are dropout value, the number of Gated Recurrent Unit(GRU) hidden layer, and the output activation. In this study using 0.25; 0.5; 0.75 as a dropout value, 4, 5, and 6 as the number of GRU hidden layer, and sigmoid, softmax as the output activation. The data used are 1000 music clips with 30 seconds duration of 192kbps quality obtained from youtube as well as compact disk (CD). The highest accuracy value of 83.28% is obtained by using a dropout value of 0.25, the number of GRU hidden layers of 6, and the output activation of softmax.
{"title":"Indonesian Music Genre Classification on Indonesian Regional Songs Using Deep Recurrent Neural Network Method","authors":"Muhammad Naufal Furqon, K. Khadijah, S. Suhartono, R. Kusumaningrum","doi":"10.1109/ICICoS48119.2019.8982456","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982456","url":null,"abstract":"Indonesia has a diverse genre of music (music genre) and is spread throughout the provinces in Indonesia. Indonesian music genres include angklung, gamelan, and kulintang. The Indonesian music genre has some similarities in terms of sound such as angklung and kulintang because it is made of wood and gamelan which has various types such as Javanese gamelan and Balinese gamelan which have a similar sound so that listeners are difficult to use to stream the right music. Because of this, the Indonesian music genre is more difficult to recognize because the instruments that build are diverse and have similarities with each other. One of the tools that can be used to facilitate the introduction of the Indonesian music genre is classification. The classification carried out needs to find the appropriate parameters to determine an accurate Indonesian music genre. In this study using the mel-spectrogramand the Deep Recurrent Neural Network (DRNN)method for music classification problems. The parameters and DRNN architecture tested are dropout value, the number of Gated Recurrent Unit(GRU) hidden layer, and the output activation. In this study using 0.25; 0.5; 0.75 as a dropout value, 4, 5, and 6 as the number of GRU hidden layer, and sigmoid, softmax as the output activation. The data used are 1000 music clips with 30 seconds duration of 192kbps quality obtained from youtube as well as compact disk (CD). The highest accuracy value of 83.28% is obtained by using a dropout value of 0.25, the number of GRU hidden layers of 6, and the output activation of softmax.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129759483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982532
Helmi Piliang, R. Kusumaningrum
Music is one of the entertainments for the community both in Indonesia and throughout the world. Music is enjoyed in the form of instruments and has lyrics that can express emotions. The emotions produced by a song can be distinguished based on the lyrics. Songs that are in accordance with the mood are sometimes needed to enjoy music, so we need tools to distinguish emotions in the song called classification. This study uses the Recurrent Neural Network method to classify emotions based on song lyrics. The parameters of the Recurrent Neural Network that were tested in this study were hidden size, learning rate, and dropout. Data in this study were divided into development dataset and dataset testing. K-fold cross-validation is used in the model training process. The highest accuracy obtained was 82.4 percent during the testing process. Accuracy is obtained by using a hidden size parameter of 128, a learning rate of 0, 01, and a dropout of 0, 4. The highest accuracy model is used as a basis for classifying emotions based on Indonesian song lyrics into happy and sad classes. When the live process uses 10 complete songs, the average accuracy is 83.13 percent.
{"title":"Music Emotion Classification Based on Indonesian Song Lyrics Using Recurrent Neural Network","authors":"Helmi Piliang, R. Kusumaningrum","doi":"10.1109/ICICoS48119.2019.8982532","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982532","url":null,"abstract":"Music is one of the entertainments for the community both in Indonesia and throughout the world. Music is enjoyed in the form of instruments and has lyrics that can express emotions. The emotions produced by a song can be distinguished based on the lyrics. Songs that are in accordance with the mood are sometimes needed to enjoy music, so we need tools to distinguish emotions in the song called classification. This study uses the Recurrent Neural Network method to classify emotions based on song lyrics. The parameters of the Recurrent Neural Network that were tested in this study were hidden size, learning rate, and dropout. Data in this study were divided into development dataset and dataset testing. K-fold cross-validation is used in the model training process. The highest accuracy obtained was 82.4 percent during the testing process. Accuracy is obtained by using a hidden size parameter of 128, a learning rate of 0, 01, and a dropout of 0, 4. The highest accuracy model is used as a basis for classifying emotions based on Indonesian song lyrics into happy and sad classes. When the live process uses 10 complete songs, the average accuracy is 83.13 percent.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICICoS48119.2019.8982438
Damayanti Elisabet, D. I. Sensuse, Shidiq Al Hakim
Reasoning diagnosis and treatments in human medical health fields are a complicated task. While the effort of doctors, physicians, or clinicians to study medical journals and another source of knowledge is hardly done. Studies tried to design and develop a medical health system that imitates the way humans determine diagnoses by studying past cases and medical journals using case-based reasoning (CBR). This study reviews research publications in human medical health that used CBR using the Kitchenham method. The result of this study is identification challenge developing the human medical health system and the reason for using CBR, identification kinds of knowledge that have been used and methods for capturing knowledge, and identification of implementation using CBR in human medical health.
{"title":"Implementation of Case-Method Cycle for Case-Based Reasoning in Human Medical Health: A Systematic Review","authors":"Damayanti Elisabet, D. I. Sensuse, Shidiq Al Hakim","doi":"10.1109/ICICoS48119.2019.8982438","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982438","url":null,"abstract":"Reasoning diagnosis and treatments in human medical health fields are a complicated task. While the effort of doctors, physicians, or clinicians to study medical journals and another source of knowledge is hardly done. Studies tried to design and develop a medical health system that imitates the way humans determine diagnoses by studying past cases and medical journals using case-based reasoning (CBR). This study reviews research publications in human medical health that used CBR using the Kitchenham method. The result of this study is identification challenge developing the human medical health system and the reason for using CBR, identification kinds of knowledge that have been used and methods for capturing knowledge, and identification of implementation using CBR in human medical health.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"39 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131872956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}