Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285528
Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan
Data profiling is an abnormality in the search process data that undermine the value of the data. Type of data profiling analysis techniques to detect duplication of text within a single paragraph can by using a text cluster. In this paper aims at doing text algorithm transformation cluster with fingerprint method using Pentaho Data Integration (PDI). As for methods used to conduct implementation text cluster with Pentaho Data Integration is to do a mapping algorithm fingerprint method on component contained in Pentaho, then perform a transformation per component, and further evaluation of the results of a text cluster with open source data profiling tool. Implementation of text clusters with Pentaho Data Integration successfully done but there is still some rudimentary logic. The results from implementation of clusters number on the transformation by using Pentaho Data Integration is greater than a number of text clusters by using the OpenRefine tool.
数据剖析是在数据搜索过程中出现的一种异常现象,它破坏了数据的价值。类型的数据分析技术可以通过使用文本聚类来检测单个段落中的重复文本。本文的目的是利用Pentaho Data Integration (PDI)对指纹方法进行文本算法转换聚类。使用Pentaho Data Integration实现文本聚类的方法是对Pentaho中包含的组件做映射算法指纹方法,然后对每个组件进行转换,再使用开源数据分析工具对文本聚类的结果进行进一步评估。使用Pentaho Data Integration成功地实现了文本集群,但仍然存在一些基本的逻辑。使用Pentaho Data Integration实现簇数转换的结果大于使用OpenRefine工具实现的文本簇数转换的结果。
{"title":"Fingerprint clustering algorithm for data profiling using pentaho data integration","authors":"Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan","doi":"10.1109/ICITISEE.2017.8285528","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285528","url":null,"abstract":"Data profiling is an abnormality in the search process data that undermine the value of the data. Type of data profiling analysis techniques to detect duplication of text within a single paragraph can by using a text cluster. In this paper aims at doing text algorithm transformation cluster with fingerprint method using Pentaho Data Integration (PDI). As for methods used to conduct implementation text cluster with Pentaho Data Integration is to do a mapping algorithm fingerprint method on component contained in Pentaho, then perform a transformation per component, and further evaluation of the results of a text cluster with open source data profiling tool. Implementation of text clusters with Pentaho Data Integration successfully done but there is still some rudimentary logic. The results from implementation of clusters number on the transformation by using Pentaho Data Integration is greater than a number of text clusters by using the OpenRefine tool.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285539
A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi
East Java is one of the provinces in Indonesia that is often hit by floods. Recorded about 170 data flood disaster since 2011 to 2015 that hit the 31 districts and cities in East Java. The government's efforts in dealing with flood disaster require a decision support system in determining the areas to be targeted in the flood disaster mitigation process. National Disaster Management Agency, called BNPB, has issued guidance documents in conducting disaster risk mapping in Indonesia based on threat, vulnerability and capacity level. Index method is used to calculate the risk value based on a threshold nominal value of the certain range, even though some of the criterias involve preference values. This research proposes a new hybrid analytic hierarchy process (AHP) — natural break classification strategy to calculate flood risk index to solve the combination of nominal and preferences values of criterias that produce Spatial Decision Support System (SDSS). AHP method is used to calculate priority value of assessment according to hazard, vulnerability and capacity indexes. The priority value that is obtained from AHP method is classified by natural break into three level of flood risk consist of low, medium and high Flood risk mapping with AHP method — natural break obtain an effective classification than the index method.
{"title":"Spatial flood risk mapping in east Java, Indonesia, using analytic hierarchy process — natural breaks classification","authors":"A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi","doi":"10.1109/ICITISEE.2017.8285539","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285539","url":null,"abstract":"East Java is one of the provinces in Indonesia that is often hit by floods. Recorded about 170 data flood disaster since 2011 to 2015 that hit the 31 districts and cities in East Java. The government's efforts in dealing with flood disaster require a decision support system in determining the areas to be targeted in the flood disaster mitigation process. National Disaster Management Agency, called BNPB, has issued guidance documents in conducting disaster risk mapping in Indonesia based on threat, vulnerability and capacity level. Index method is used to calculate the risk value based on a threshold nominal value of the certain range, even though some of the criterias involve preference values. This research proposes a new hybrid analytic hierarchy process (AHP) — natural break classification strategy to calculate flood risk index to solve the combination of nominal and preferences values of criterias that produce Spatial Decision Support System (SDSS). AHP method is used to calculate priority value of assessment according to hazard, vulnerability and capacity indexes. The priority value that is obtained from AHP method is classified by natural break into three level of flood risk consist of low, medium and high Flood risk mapping with AHP method — natural break obtain an effective classification than the index method.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123084421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285503
Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis
Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.
印度尼西亚是一个农业国家。许多印尼人以务农为生。植物和害虫有关,有植物的地方就一定有害虫。害虫是破坏植物的动物。害虫吃植物并伤害鸟类就是一个例子。本研究开发设计了鸟类探测器和驱虫剂的原型。这个原型机有一个运动检测系统,它会产生一定频率的驱虫剂,这样鸟儿就会被打扰。该原型由PIR传感器作为检测器来检测鸟类的运动,并使用LC振荡器型colpit与压电超声传感器作为驱避器。实验结果表明,PIR传感器在探测距离为0 cm - 500 cm的情况下工作,在60 kHz左右的频率信号下会对鸟产生干扰。
{"title":"Design of birds detector and repellent using frequency based arduino uno with android system","authors":"Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis","doi":"10.1109/ICITISEE.2017.8285503","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285503","url":null,"abstract":"Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285531
Alfiah Fajriani, N. A. Setiawan, T. B. Adji
This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.
{"title":"Applying rough set theory for filtering large number of coronary artery disease (CAD) rules","authors":"Alfiah Fajriani, N. A. Setiawan, T. B. Adji","doi":"10.1109/ICITISEE.2017.8285531","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285531","url":null,"abstract":"This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285507
Antoni Wibowo, Harry Pujianto, D. R. S. Saputro
The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.
{"title":"Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction","authors":"Antoni Wibowo, Harry Pujianto, D. R. S. Saputro","doi":"10.1109/ICITISEE.2017.8285507","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285507","url":null,"abstract":"The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285554
G. Varshney, M. Misra
Due to the consistent number of phishing attacks there is a need to develop secure authentication schemes. These days phishing is mostly carried out using malicious browser extensions or other sophisticated credential stealing techniques such as CR/RT MITM phishing attack. Therefore, it is required to develop secure authentication schemes for handling these attacks. A set of popular authentication schemes has been analyzed in this paper and it is found that they are unsafe against credential stealing attacks such as CR/RT MITM phishing, malicious browser extensions, key loggers and malwares. A novel push notification based scheme that uses BTADDR as the user identification token and performs real time modification and verification of BLE device (Bluetooth 4.0+ Version) descriptor value for user authentication has been proposed in this paper. The scheme is better in terms of security provided by the existing two factor authentication schemes (OTP/PIN, QR Code/Barcode, Graphical password/ CAPTCHA) and the usual push notification based login authentication schemes that uses username as the user identification token. Scheme has been compared with other popular schemes using the Bonneau et al. assessment framework in terms of usability, deployability and security. The results obtained are promising which suggest Bluetooth based push notification schemes can be a good option for future web authentication.
{"title":"Push notification based login using BLE devices","authors":"G. Varshney, M. Misra","doi":"10.1109/ICITISEE.2017.8285554","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285554","url":null,"abstract":"Due to the consistent number of phishing attacks there is a need to develop secure authentication schemes. These days phishing is mostly carried out using malicious browser extensions or other sophisticated credential stealing techniques such as CR/RT MITM phishing attack. Therefore, it is required to develop secure authentication schemes for handling these attacks. A set of popular authentication schemes has been analyzed in this paper and it is found that they are unsafe against credential stealing attacks such as CR/RT MITM phishing, malicious browser extensions, key loggers and malwares. A novel push notification based scheme that uses BTADDR as the user identification token and performs real time modification and verification of BLE device (Bluetooth 4.0+ Version) descriptor value for user authentication has been proposed in this paper. The scheme is better in terms of security provided by the existing two factor authentication schemes (OTP/PIN, QR Code/Barcode, Graphical password/ CAPTCHA) and the usual push notification based login authentication schemes that uses username as the user identification token. Scheme has been compared with other popular schemes using the Bonneau et al. assessment framework in terms of usability, deployability and security. The results obtained are promising which suggest Bluetooth based push notification schemes can be a good option for future web authentication.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285536
D. A. Widodo, N. Iksan, Alfa Faridh Suni
Energy monitoring and controlling systems of smart street lighting system were highly dependent on the gateway in order to perform the communication between sensors and actuators to the users. M2M technology allows the process of device control more effectively because it is not centered on the Gateway but on the devices to device related. Congestion, delays and communication errors to be a challenge in the development of M2M technology. This research proposed M2M technology to make direct communication between devices and users with less congestion, delays and communication errors. The design of embedded zigbee using M2M technology was developed as dimmer control for LED lights and communication between devices. Furthermore, zigbee communication performance have been evaluated using received signal strength (RSSI) and network throughput. The ideal distance between zigbee in barrier area is approximately 30m and −83 dBm of RSSI. In loss area is approximately 65m and −80 dBm of RSSI. Performance of zigbee device communications shows the use of direct configuration is better than using a router. So that, on configuration via router, the number of transmitting nodes should be minimized.
{"title":"Design of embedded zigbee machine to machine smart street lighting system","authors":"D. A. Widodo, N. Iksan, Alfa Faridh Suni","doi":"10.1109/ICITISEE.2017.8285536","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285536","url":null,"abstract":"Energy monitoring and controlling systems of smart street lighting system were highly dependent on the gateway in order to perform the communication between sensors and actuators to the users. M2M technology allows the process of device control more effectively because it is not centered on the Gateway but on the devices to device related. Congestion, delays and communication errors to be a challenge in the development of M2M technology. This research proposed M2M technology to make direct communication between devices and users with less congestion, delays and communication errors. The design of embedded zigbee using M2M technology was developed as dimmer control for LED lights and communication between devices. Furthermore, zigbee communication performance have been evaluated using received signal strength (RSSI) and network throughput. The ideal distance between zigbee in barrier area is approximately 30m and −83 dBm of RSSI. In loss area is approximately 65m and −80 dBm of RSSI. Performance of zigbee device communications shows the use of direct configuration is better than using a router. So that, on configuration via router, the number of transmitting nodes should be minimized.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285487
M. Jayabalan, T. O'Daniel
The thrust of technological advancement in healthcare today lies in improving the quality and timeliness of patient services. Medical information is accessed through various means that require efficient methods for protecting patient privacy and security. Healthcare providers implement a set of information security mechanisms such as access control, authentication, log analysis etc. to protect disclosure of data to the unauthorized person. This research proposes a continuous and transparent access control framework based on a preliminary study. The proposed framework has three core components: adaptive authentication, risk analysis and data transparency mapped with Role Based Access Control. The adaptive authentication validates the user through behavior profiling, risk analysis measures the amount of risk in user data access, and data transparency allows patients and administrators to monitor data consumption and detect deviation from patient consent.
{"title":"Continuous and transparent access control framework for electronic health records: A preliminary study","authors":"M. Jayabalan, T. O'Daniel","doi":"10.1109/ICITISEE.2017.8285487","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285487","url":null,"abstract":"The thrust of technological advancement in healthcare today lies in improving the quality and timeliness of patient services. Medical information is accessed through various means that require efficient methods for protecting patient privacy and security. Healthcare providers implement a set of information security mechanisms such as access control, authentication, log analysis etc. to protect disclosure of data to the unauthorized person. This research proposes a continuous and transparent access control framework based on a preliminary study. The proposed framework has three core components: adaptive authentication, risk analysis and data transparency mapped with Role Based Access Control. The adaptive authentication validates the user through behavior profiling, risk analysis measures the amount of risk in user data access, and data transparency allows patients and administrators to monitor data consumption and detect deviation from patient consent.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285530
R. S. Yuwana, A. R. Yuliani, H. Pardede
In this paper we present an evaluation of six popular methods for Part-of-Speech (POS) tagging tasks of Indonesian language. They are Unigram, Hidden Markov Model, TnT, Brills, Naive Bayes, and Maximum Entropy taggers. Indonesian language, while is one of most spoken language in the world has very limited data for POS tagging tasks. Therefore, it is interesting to investigate and evaluate some popular approaches in POS tagging when dealing for such conditions. The results of our experiments show that Maximum Entropy provides the highest accuracy of all methods. It is consistently better even when the size of the training data is varied.
{"title":"On part of speech tagger for Indonesian language","authors":"R. S. Yuwana, A. R. Yuliani, H. Pardede","doi":"10.1109/ICITISEE.2017.8285530","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285530","url":null,"abstract":"In this paper we present an evaluation of six popular methods for Part-of-Speech (POS) tagging tasks of Indonesian language. They are Unigram, Hidden Markov Model, TnT, Brills, Naive Bayes, and Maximum Entropy taggers. Indonesian language, while is one of most spoken language in the world has very limited data for POS tagging tasks. Therefore, it is interesting to investigate and evaluate some popular approaches in POS tagging when dealing for such conditions. The results of our experiments show that Maximum Entropy provides the highest accuracy of all methods. It is consistently better even when the size of the training data is varied.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICITISEE.2017.8285510
Denny Andwiyan, M. Irsan, D. F. Murad, Djamaludin
Material Requirement Planning is a method to decide what, when and how many component and material needed for the production planning. This research studies how far the Material Requirement Planning's application could control material stock investment at PT. X, where the company is currently experiencing an increase in finished goods inventory. PT.X has two categories, namely Special Lighting lamps (SP) and General Lighitng. Among the two types of light bulbs that SP has increased quite significant inventory when compared with GL lights. Dengan rata-rata stock perbulan 4,505,864 pcs atau IDR 42. 78 Miliar Therefore, the author intends to find out more about the good and the control system to calculate and analyze the level of finished goods inventory optimum using the ABC method of analysis as a determinant of sales by product category, methods ordering quantity EOQ to see the finished product and Re Order Point is to an order goods so that the goods may ultimately be used in accordance with the expected. Dari Analisa diatas dapat disimpulkan bahwa dari total produk 267 pc yang hanya masuk kedalam kategori A dan B hanya 85 pcs. Sedangkan dilihat dari persediaan yang ada dapat diturunkan menjadi 66,8 % dari total persediaan yang ada dengan rata-rata perbulannya 4,505,864 pcs.
物料需求计划是一种决定生产计划所需的部件和材料的种类、时间和数量的方法。本研究研究了PT. X公司目前成品库存增加的情况下,物料需求计划的应用能在多大程度上控制物料库存投资。PT.X有两类,即特殊照明灯具(SP)和普通照明灯具。在这两种灯泡中,SP相比GL增加了相当大的库存。登干股票按比例卖出4,505,864件,折合印尼盾42卢比。因此,作者打算找出更多的控制系统来计算和分析产成品库存的最优水平,使用ABC分析方法作为销售的决定因素,按产品类别,EOQ的方法来看产成品的订购数量和重新订购点是一个订购的货物,使货物最终可以按照预期使用。达里Analisa数据,dapat dispulkan bahwa达里总产品267个阳汉雅masuk kedalam kategori A和B汉雅85个。Sedangkan dililhat dari persediaan yang ada dapat diturunkan menjadi 66,8 %达总perbulannya 4,505,864件。
{"title":"Planning analysis and control of inventory goods pt. x with material requirement planning method","authors":"Denny Andwiyan, M. Irsan, D. F. Murad, Djamaludin","doi":"10.1109/ICITISEE.2017.8285510","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285510","url":null,"abstract":"Material Requirement Planning is a method to decide what, when and how many component and material needed for the production planning. This research studies how far the Material Requirement Planning's application could control material stock investment at PT. X, where the company is currently experiencing an increase in finished goods inventory. PT.X has two categories, namely Special Lighting lamps (SP) and General Lighitng. Among the two types of light bulbs that SP has increased quite significant inventory when compared with GL lights. Dengan rata-rata stock perbulan 4,505,864 pcs atau IDR 42. 78 Miliar Therefore, the author intends to find out more about the good and the control system to calculate and analyze the level of finished goods inventory optimum using the ABC method of analysis as a determinant of sales by product category, methods ordering quantity EOQ to see the finished product and Re Order Point is to an order goods so that the goods may ultimately be used in accordance with the expected. Dari Analisa diatas dapat disimpulkan bahwa dari total produk 267 pc yang hanya masuk kedalam kategori A dan B hanya 85 pcs. Sedangkan dilihat dari persediaan yang ada dapat diturunkan menjadi 66,8 % dari total persediaan yang ada dengan rata-rata perbulannya 4,505,864 pcs.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}