Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970077
Tasya Nurfauziah Ramadhani Rohimat, F. Nhita, I. Kurniawan
Lung cancer is the leading cause of death in the world. There are two types of lung cancer, i.e., non-small cell lung cancer and small cell lung cancer. The major cause of lung cancer is smoking. However, there are several cases of non-small lung cancer, with 7% of women with lung cancer in Taiwan having a smoking history. Early detection of cancer will help it go faster and save lives every year. Nowadays, the technology being used is very helpful in the medical field because it uses microarray technology which can help detect cancer in the early phase by analyzing DNA and RNA. In this study, we utilized GA combined with SVM for the classification of Non-Small Cell Lung Cancer in a non-smoking female with microarray data. Hyperparameter tuning is performed to improve model performance. We discovered that SVM with a linear kernel performs better than alternative kernels with accuracy and F1-score values of 0.91 and 0.91, respectively.
{"title":"Implementation of Genetic Algorithm-Support Vector Machine on Gene Expression Data in Identification of Non-Small Cell Lung Cancer in Nonsmoking Female","authors":"Tasya Nurfauziah Ramadhani Rohimat, F. Nhita, I. Kurniawan","doi":"10.1109/IC2IE56416.2022.9970077","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970077","url":null,"abstract":"Lung cancer is the leading cause of death in the world. There are two types of lung cancer, i.e., non-small cell lung cancer and small cell lung cancer. The major cause of lung cancer is smoking. However, there are several cases of non-small lung cancer, with 7% of women with lung cancer in Taiwan having a smoking history. Early detection of cancer will help it go faster and save lives every year. Nowadays, the technology being used is very helpful in the medical field because it uses microarray technology which can help detect cancer in the early phase by analyzing DNA and RNA. In this study, we utilized GA combined with SVM for the classification of Non-Small Cell Lung Cancer in a non-smoking female with microarray data. Hyperparameter tuning is performed to improve model performance. We discovered that SVM with a linear kernel performs better than alternative kernels with accuracy and F1-score values of 0.91 and 0.91, respectively.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970186
Ika Asti Astuti, Ibnu Hadi Purwanto, Tonny Hidayat, Dhimas Adi Satria, Haryoko, Rizky Purnama
3D is widely used in industries such as cinema, architecture, health and others. The 3D model must be rendered before it can be used. The number of rendering engines available today is definitely a difficult choice. Blender is an open source application that can be used to perform 3D rendering. There are two rendering engine options in Blender, namely Eevee and Cycles. The focus of this research is to compare the two rendering engines in Blender based on rendering speed, file size and rendering quality. There are five scene cases that are used as a dataset. As a result, the Eevee rendering engine has faster time than the Cycle engine. For the file size on both rendering engines is not so significant. The quality of rendering on Cycles rendering is better than Eevee. The factors that affect the rendering of 3D model are the number of objects, the number of vertices, the rendering engine, the amount of light used, the intensity level of shadows, materials, and textures.
{"title":"Comparison of Time, Size and Quality of 3D Object Rendering Using Render Engine Eevee and Cycles in Blender","authors":"Ika Asti Astuti, Ibnu Hadi Purwanto, Tonny Hidayat, Dhimas Adi Satria, Haryoko, Rizky Purnama","doi":"10.1109/IC2IE56416.2022.9970186","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970186","url":null,"abstract":"3D is widely used in industries such as cinema, architecture, health and others. The 3D model must be rendered before it can be used. The number of rendering engines available today is definitely a difficult choice. Blender is an open source application that can be used to perform 3D rendering. There are two rendering engine options in Blender, namely Eevee and Cycles. The focus of this research is to compare the two rendering engines in Blender based on rendering speed, file size and rendering quality. There are five scene cases that are used as a dataset. As a result, the Eevee rendering engine has faster time than the Cycle engine. For the file size on both rendering engines is not so significant. The quality of rendering on Cycles rendering is better than Eevee. The factors that affect the rendering of 3D model are the number of objects, the number of vertices, the rendering engine, the amount of light used, the intensity level of shadows, materials, and textures.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/ic2ie56416.2022.9970053
M. David, Clelland Mr, Jeffrey M Donaldson Mrs, G. Dunwoody, Clive Efford Mr, Robert Goodwill, M. John, Leech Mr, Eric Martlew, Mr Lee, Scott Mr, G. Stringer, David Wilshire
Members disclosed their pecuniary interests pursuant to the resolution of the House of 13 July 1992. Details of the declarations are published in a separate Annex. Mrs Gwyneth Dunwoody was called to the Chair. Ordered, That members of the public be admitted during the examination of witnesses unless the Committee otherwise orders. the Chairman, brought up, read the first and second time, and agreed to. The Committee's programme of work (choice of inquiries). The Committee considered this matter. [Adjourned till Wednesday 12 October at half-past Two o'clock.
{"title":"Proceedings committee","authors":"M. David, Clelland Mr, Jeffrey M Donaldson Mrs, G. Dunwoody, Clive Efford Mr, Robert Goodwill, M. John, Leech Mr, Eric Martlew, Mr Lee, Scott Mr, G. Stringer, David Wilshire","doi":"10.1109/ic2ie56416.2022.9970053","DOIUrl":"https://doi.org/10.1109/ic2ie56416.2022.9970053","url":null,"abstract":"Members disclosed their pecuniary interests pursuant to the resolution of the House of 13 July 1992. Details of the declarations are published in a separate Annex. Mrs Gwyneth Dunwoody was called to the Chair. Ordered, That members of the public be admitted during the examination of witnesses unless the Committee otherwise orders. the Chairman, brought up, read the first and second time, and agreed to. The Committee's programme of work (choice of inquiries). The Committee considered this matter. [Adjourned till Wednesday 12 October at half-past Two o'clock.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970076
Sofi Defiyanti, A. Ashari, D. Lelono
Ontology has played a significant role in various domains for the organization of computer-managed knowledge in recent years. Ontology is used to organize and classify objects in certain domains so that ontology can maximize new knowledge at a more detailed level. One of the domains that apply ontology is the data mining domain. Combining these two knowledge fields is targeted to represent the formal knowledge generated in the data mining process. One of them is that the ontology can help choose the right algorithm or technology so that the ontology can improve the data mining process results. To research in this field, it is necessary to compile, map and analyze the literature on the current state of the data mining ontology by looking at the contributions made from research journals and conferences originating from several relevant electronic databases. Systematic mapping study is a method to achieve this goal by integrating automatic and manual searches from various sources by developing a classification scheme. In this article, the Systematic mapping study starts with 12,819 articles from 1998 to 2019, and then the inclusion and exclusion criteria are carried out into 74 articles selected for review. The review has examined how papers are distributed annually. The material has been generated with the greatest contribution, an overview of the present state of the research, and the identification of gaps and prospective future avenues. The review provides an integrated and consolidated body of knowledge in the data mining ontology domain that can be used as a starting point for research to explore possible ideas from the topic of data mining ontology research.
{"title":"A Systematic Study for Organizing Research Topics in Ontology Data Mining Domain","authors":"Sofi Defiyanti, A. Ashari, D. Lelono","doi":"10.1109/IC2IE56416.2022.9970076","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970076","url":null,"abstract":"Ontology has played a significant role in various domains for the organization of computer-managed knowledge in recent years. Ontology is used to organize and classify objects in certain domains so that ontology can maximize new knowledge at a more detailed level. One of the domains that apply ontology is the data mining domain. Combining these two knowledge fields is targeted to represent the formal knowledge generated in the data mining process. One of them is that the ontology can help choose the right algorithm or technology so that the ontology can improve the data mining process results. To research in this field, it is necessary to compile, map and analyze the literature on the current state of the data mining ontology by looking at the contributions made from research journals and conferences originating from several relevant electronic databases. Systematic mapping study is a method to achieve this goal by integrating automatic and manual searches from various sources by developing a classification scheme. In this article, the Systematic mapping study starts with 12,819 articles from 1998 to 2019, and then the inclusion and exclusion criteria are carried out into 74 articles selected for review. The review has examined how papers are distributed annually. The material has been generated with the greatest contribution, an overview of the present state of the research, and the identification of gaps and prospective future avenues. The review provides an integrated and consolidated body of knowledge in the data mining ontology domain that can be used as a starting point for research to explore possible ideas from the topic of data mining ontology research.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970094
Siti Chairunnisa, Nadika Sigit Sinatrya, Yogi Muliandi, Andy Syahrizal, M. R. Shihab, Dwinanda Kinanti S.
The concept of the extended enterprise conceives initially as a means to improve and acquire efficiencies compared to traditional business process reengineering. The concept has proven to be beneficial in the manufacturing sectors. Nowadays, innovative strategies established on proven concepts are in demand for modern companies to lessen expenditures, amplify the bottom line, and enhance agility to better respond to market volatilities. This study aims to determine how the extended enterprise concept may be implemented within a software development company's environment by assessing the company's readiness based on an extended enterprise maturity model and assessing the readiness of extended enterprise implementation in XYZ Inc. This study is part of a more comprehensive intertwined field of extended enterprise implementation studies. Within this study, we employ qualitative methods and data analysis based on interviews, examining existing documents in the company, and literature reviews. Results found within XYZ Inc. are a good candidate for further implementation of the extended enterprise because it already has the foundation and governance based on extended enterprise characteristics.
{"title":"Analysis of Extended Enterprise Implementation Case Study: Software Production House","authors":"Siti Chairunnisa, Nadika Sigit Sinatrya, Yogi Muliandi, Andy Syahrizal, M. R. Shihab, Dwinanda Kinanti S.","doi":"10.1109/IC2IE56416.2022.9970094","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970094","url":null,"abstract":"The concept of the extended enterprise conceives initially as a means to improve and acquire efficiencies compared to traditional business process reengineering. The concept has proven to be beneficial in the manufacturing sectors. Nowadays, innovative strategies established on proven concepts are in demand for modern companies to lessen expenditures, amplify the bottom line, and enhance agility to better respond to market volatilities. This study aims to determine how the extended enterprise concept may be implemented within a software development company's environment by assessing the company's readiness based on an extended enterprise maturity model and assessing the readiness of extended enterprise implementation in XYZ Inc. This study is part of a more comprehensive intertwined field of extended enterprise implementation studies. Within this study, we employ qualitative methods and data analysis based on interviews, examining existing documents in the company, and literature reviews. Results found within XYZ Inc. are a good candidate for further implementation of the extended enterprise because it already has the foundation and governance based on extended enterprise characteristics.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127534375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970168
Eriya, Farah Nur Amani Bahreisy, F. Nugrahani
One of the diseases still suffered by many Indonesian people, especially in the city of Depok, is respiratory disease. Currently, respiratory tract disease is a case with a high number of sufferers. An effort to handle these cases is to provide counseling and education for the community. This education aims to enable people to apply a healthy lifestyle independently and prevent various types of diseases. During the COVID-19 pandemic, this role was somewhat difficult to carry out due to limited movement and space. As a solution to this problem, the part of information technology is crucial. One is utilizing multimedia technology as a medium for health education for the community, namely animation. Animation can describe and visualize something so that information can be presented clearly and visually. This study aims to develop animation as a medium of health education for the community, especially in respiratory health. The animation video was generated using the MDLC (Multimedia Development Life Cycle) method. The resulting animated video can inform the public about health that focuses on the health of the respiratory system. 85 % of users stated that this animated video helps them to understand the material presented.
{"title":"Development of Animation as a Medium for Public Health Education","authors":"Eriya, Farah Nur Amani Bahreisy, F. Nugrahani","doi":"10.1109/IC2IE56416.2022.9970168","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970168","url":null,"abstract":"One of the diseases still suffered by many Indonesian people, especially in the city of Depok, is respiratory disease. Currently, respiratory tract disease is a case with a high number of sufferers. An effort to handle these cases is to provide counseling and education for the community. This education aims to enable people to apply a healthy lifestyle independently and prevent various types of diseases. During the COVID-19 pandemic, this role was somewhat difficult to carry out due to limited movement and space. As a solution to this problem, the part of information technology is crucial. One is utilizing multimedia technology as a medium for health education for the community, namely animation. Animation can describe and visualize something so that information can be presented clearly and visually. This study aims to develop animation as a medium of health education for the community, especially in respiratory health. The animation video was generated using the MDLC (Multimedia Development Life Cycle) method. The resulting animated video can inform the public about health that focuses on the health of the respiratory system. 85 % of users stated that this animated video helps them to understand the material presented.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/ic2ie56416.2022.9970149
{"title":"Envisioning the Future of ICT for the New Globalization","authors":"","doi":"10.1109/ic2ie56416.2022.9970149","DOIUrl":"https://doi.org/10.1109/ic2ie56416.2022.9970149","url":null,"abstract":"","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970180
Arif Ridho Lubis, O. S. Sitompul, M. K. Nasution, Elviawaty, Muisa Zamzami
Social media is used as a place of interaction between users. On Twitter social media there is a lot of data that can be used, especially community data that will be used to explore the characteristics of the data. In this study, there are several characteristics of community data such as tweet data, user data, slang words, standard words and non-standard words. all of the data is used to determine user habits, this study creates a model that can determine user habits. This research uses a regression tree whose process will check the frequency of the most words for each user in the community tweet, then check the highest frequency and looping to get a pattern, the test carried out by the model from the Regression Tree can determine habits with test data as many as 4 users then it is found that the habit in the Indonesian standup community is “Tonton”.
{"title":"Feature Extraction of Tweet data Characteristics to Determine Community Habits","authors":"Arif Ridho Lubis, O. S. Sitompul, M. K. Nasution, Elviawaty, Muisa Zamzami","doi":"10.1109/IC2IE56416.2022.9970180","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970180","url":null,"abstract":"Social media is used as a place of interaction between users. On Twitter social media there is a lot of data that can be used, especially community data that will be used to explore the characteristics of the data. In this study, there are several characteristics of community data such as tweet data, user data, slang words, standard words and non-standard words. all of the data is used to determine user habits, this study creates a model that can determine user habits. This research uses a regression tree whose process will check the frequency of the most words for each user in the community tweet, then check the highest frequency and looping to get a pattern, the test carried out by the model from the Regression Tree can determine habits with test data as many as 4 users then it is found that the habit in the Indonesian standup community is “Tonton”.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127247369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1109/IC2IE56416.2022.9970015
Chiadighikaobi Ikenna Rene, N. Katuk, Baharudin Osman
This paper discusses the cryptographic algorithms used in lightweight authentication schemes for the Internet of Things (IoT) systems. IoT systems contain sensors categorised as constraint devices with limitations in computing capability and limited power supply. Therefore, the traditional cryptographic algorithms are unsuitable for the IoT environment as they consist of complex processing and use vast amounts of energy to operate. In addressing this issue, researchers proposed lightweight cryptographic algorithms so that they can be used for securing authentication schemes for IoT systems. This area is proliferating, and many schemes have been proposed. However, a question arises as to how the lightweight features are achieved in the algorithms. Hence, this paper analyses the literature to fill the gap by conducting a scoping study to answer three pre-defined research questions. Our analysis demonstrates that lightweight features were primarily achieved using elliptic curve cryptography, hash functions and exclusive OR operation. Furthermore, three measures were mostly used in evaluating the schemes' effectiveness: security, low storage, and low computation cost. Finally, BAN logic, AVISPA, Proverif, and ROR were the three methods used for validating the authentication schemes again security attacks. This survey would help researchers understand lightweight cryptographic algorithms and decide on the standard performance measures and techniques for validating the authentication schemes, particularly for IoT systems.
{"title":"A Survey of Cryptographic Algorithms for Lightweight Authentication Schemes in the Internet of Things Environment","authors":"Chiadighikaobi Ikenna Rene, N. Katuk, Baharudin Osman","doi":"10.1109/IC2IE56416.2022.9970015","DOIUrl":"https://doi.org/10.1109/IC2IE56416.2022.9970015","url":null,"abstract":"This paper discusses the cryptographic algorithms used in lightweight authentication schemes for the Internet of Things (IoT) systems. IoT systems contain sensors categorised as constraint devices with limitations in computing capability and limited power supply. Therefore, the traditional cryptographic algorithms are unsuitable for the IoT environment as they consist of complex processing and use vast amounts of energy to operate. In addressing this issue, researchers proposed lightweight cryptographic algorithms so that they can be used for securing authentication schemes for IoT systems. This area is proliferating, and many schemes have been proposed. However, a question arises as to how the lightweight features are achieved in the algorithms. Hence, this paper analyses the literature to fill the gap by conducting a scoping study to answer three pre-defined research questions. Our analysis demonstrates that lightweight features were primarily achieved using elliptic curve cryptography, hash functions and exclusive OR operation. Furthermore, three measures were mostly used in evaluating the schemes' effectiveness: security, low storage, and low computation cost. Finally, BAN logic, AVISPA, Proverif, and ROR were the three methods used for validating the authentication schemes again security attacks. This survey would help researchers understand lightweight cryptographic algorithms and decide on the standard performance measures and techniques for validating the authentication schemes, particularly for IoT systems.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}