Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257154
Dexter M. Balajadia
Constructivism has been evolving as to how educators all over the world have been perceiving it to be a responsive frame of mind in the 21st century schools. “Imagineering”, conceived as a blend of imagination and engineering, now becomes a significant concept rooted from how teachers innovate the curriculum toward making their learners create new knowledge. This descriptive-survey study generally assessed how constructivist are the 270 pre-service teachers who are the future of the modern schools. The results revealed that the would-be teachers are much more imaginative and creative in designing teaching strategies, techniques, and assessment tools than in acquiring concepts for learning. Data further imply that while they are too aggressive in creating outputs, pre-service teachers tend to overlook the significance of knowledge acquisition prior to exploration and creation. It is important to note that pre-service teacher training be founded on capacity building and stimulation of imagination before making decisions on creative teaching. Recreating this study is highly recommended to further understand the procedure in preparing prospective teachers in the new millennium.
{"title":"Imagineering: Fostering constructivism among pre-service teachers","authors":"Dexter M. Balajadia","doi":"10.1109/ICSITECH.2017.8257154","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257154","url":null,"abstract":"Constructivism has been evolving as to how educators all over the world have been perceiving it to be a responsive frame of mind in the 21st century schools. “Imagineering”, conceived as a blend of imagination and engineering, now becomes a significant concept rooted from how teachers innovate the curriculum toward making their learners create new knowledge. This descriptive-survey study generally assessed how constructivist are the 270 pre-service teachers who are the future of the modern schools. The results revealed that the would-be teachers are much more imaginative and creative in designing teaching strategies, techniques, and assessment tools than in acquiring concepts for learning. Data further imply that while they are too aggressive in creating outputs, pre-service teachers tend to overlook the significance of knowledge acquisition prior to exploration and creation. It is important to note that pre-service teacher training be founded on capacity building and stimulation of imagination before making decisions on creative teaching. Recreating this study is highly recommended to further understand the procedure in preparing prospective teachers in the new millennium.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129277235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257164
Cahya Wahyuning Ilahi, Dyah Ayu Fladya Rizky, A. Wibawa, Ilmu Komputer
This paper discusses the perception of graduate students about learning in blended learning environments. Data were collected through a questionnaire survey using a modification of Web-based Learning Environment Instrument (WEBLEI) which consists of 4 scales: access, interaction, response and results. The research scale access results got a score of 77%, 76% of interaction, 82% of response, and 77% of result. Students feel satisfied and enjoy the learning process in blended learning environments for interacting easily and organizing the work groups without bordered by the time and places. Requirement to be able to apply blended learning that is support access.
{"title":"Blended learning in postgraduate program","authors":"Cahya Wahyuning Ilahi, Dyah Ayu Fladya Rizky, A. Wibawa, Ilmu Komputer","doi":"10.1109/ICSITECH.2017.8257164","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257164","url":null,"abstract":"This paper discusses the perception of graduate students about learning in blended learning environments. Data were collected through a questionnaire survey using a modification of Web-based Learning Environment Instrument (WEBLEI) which consists of 4 scales: access, interaction, response and results. The research scale access results got a score of 77%, 76% of interaction, 82% of response, and 77% of result. Students feel satisfied and enjoy the learning process in blended learning environments for interacting easily and organizing the work groups without bordered by the time and places. Requirement to be able to apply blended learning that is support access.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257172
G. S. Ajie, M. Marpaung, A. Kurniawan, M. Suryani, I. Suryana, E. Paulus
The development of information technology in every point of life, creates innovation in an easier way. An example of innovation that can be combined with children's education system is game-based learning. In this study, the game-based learning which involved gesture recognition as input has been developed. The matching string algorithm was used in the development process of the proposed game-based learning. The user should match the animal shadow with the suitable image of the animal by dragging and dropping using hand gestures. The user is trained to sharpen their ability to read visual images of animals and to develop their gesture as an interaction process. After the development process, the usability testing of the proposed game-based learning was conducted. The target user ranged from 7–8 years old. Based on the experiments, the results of the usability testing to the young learners concluded that the proposed game-based learning helps them studying the various animals from different ecosystems in an easier manner, and in a more interactive way. Statistically, this result was derived from the average value of the central tendency of the usability aspects that is 4.12.
{"title":"The development and usability testing of game-based learning as a medium to introduce zoology to young learners","authors":"G. S. Ajie, M. Marpaung, A. Kurniawan, M. Suryani, I. Suryana, E. Paulus","doi":"10.1109/ICSITECH.2017.8257172","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257172","url":null,"abstract":"The development of information technology in every point of life, creates innovation in an easier way. An example of innovation that can be combined with children's education system is game-based learning. In this study, the game-based learning which involved gesture recognition as input has been developed. The matching string algorithm was used in the development process of the proposed game-based learning. The user should match the animal shadow with the suitable image of the animal by dragging and dropping using hand gestures. The user is trained to sharpen their ability to read visual images of animals and to develop their gesture as an interaction process. After the development process, the usability testing of the proposed game-based learning was conducted. The target user ranged from 7–8 years old. Based on the experiments, the results of the usability testing to the young learners concluded that the proposed game-based learning helps them studying the various animals from different ecosystems in an easier manner, and in a more interactive way. Statistically, this result was derived from the average value of the central tendency of the usability aspects that is 4.12.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257111
Adila Afifah Rizki, I. Surjandari, Reggia Aldiana Wayasti
Association of Certified Fraud Examiners explains that there are 3 types of occupational fraud: financial statement fraud, asset misappropriation and corruption. Among these three, financial statement fraud caused the biggest losses, which amounted to $ 1,000,000 in 2014. Financial statement has important role as an indicator of the success of a company, also for depicting the overall condition of the company, deciding company's stock price, and determining whether the company could be granted a loan or not. Given its important role, many cases of fraud occur. Audit activities are conducted to minimize losses, but the number of available auditors is limited, and the time required for traditional audit is quite long. Therefore, an effective model of financial fraud detection is needed to help auditors in analyzing financial statements. Data mining algorithms, support vector machine (SVM) and artificial neural network (ANN), were applied in this study. The results of this study give insight to the auditor that significant indicators in detecting financial fraud are profitability and efficiency. Feature selection improves SVM algorithm accuracy to 88.37%. ANN produces the highest accuracy, 90.97%, for data without feature selection.
{"title":"Data mining application to detect financial fraud in Indonesia's public companies","authors":"Adila Afifah Rizki, I. Surjandari, Reggia Aldiana Wayasti","doi":"10.1109/ICSITECH.2017.8257111","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257111","url":null,"abstract":"Association of Certified Fraud Examiners explains that there are 3 types of occupational fraud: financial statement fraud, asset misappropriation and corruption. Among these three, financial statement fraud caused the biggest losses, which amounted to $ 1,000,000 in 2014. Financial statement has important role as an indicator of the success of a company, also for depicting the overall condition of the company, deciding company's stock price, and determining whether the company could be granted a loan or not. Given its important role, many cases of fraud occur. Audit activities are conducted to minimize losses, but the number of available auditors is limited, and the time required for traditional audit is quite long. Therefore, an effective model of financial fraud detection is needed to help auditors in analyzing financial statements. Data mining algorithms, support vector machine (SVM) and artificial neural network (ANN), were applied in this study. The results of this study give insight to the auditor that significant indicators in detecting financial fraud are profitability and efficiency. Feature selection improves SVM algorithm accuracy to 88.37%. ANN produces the highest accuracy, 90.97%, for data without feature selection.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114429316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257105
Suprihatin, I. R. Yanto, N. Irsalinda, Tuti Purwaningsih, Haviluddin, A. Wibawa
Numerous research and related applications of fuzzy clustering are still interesting and important. In this paper, modified Fuzzy C-Means (FCM) and Chicken Swarm Optimization (CSO) algorithm in order to improve local optima of Fuzzy Clustering presented by using UCI dataset. In this study, the proposed FCMCSO performance is also compared with three methods i.e. FCM based on Particle Swarm Optimization (FCMPSO), FCM based on Artificial Bee Colony (FCMABC), and also FCM. The simulation results indicated that the FCMCSO method have better performance than three other compared methods.
{"title":"A performance of modified fuzzy C-means (FCM) and chicken swarm optimization (CSO)","authors":"Suprihatin, I. R. Yanto, N. Irsalinda, Tuti Purwaningsih, Haviluddin, A. Wibawa","doi":"10.1109/ICSITECH.2017.8257105","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257105","url":null,"abstract":"Numerous research and related applications of fuzzy clustering are still interesting and important. In this paper, modified Fuzzy C-Means (FCM) and Chicken Swarm Optimization (CSO) algorithm in order to improve local optima of Fuzzy Clustering presented by using UCI dataset. In this study, the proposed FCMCSO performance is also compared with three methods i.e. FCM based on Particle Swarm Optimization (FCMPSO), FCM based on Artificial Bee Colony (FCMABC), and also FCM. The simulation results indicated that the FCMCSO method have better performance than three other compared methods.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123153983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257161
Juwita Annisa Fauzi, Dhaniyar, A. Wibawa, Eki Nugraha
Workload due to task on IT students depending on the specifications of IT Department was taken. It may cause burnout and mobbing. Burnout concept comprises emotional or physical exhaustion. Burnout mostly occurred because of mobbing experience. Mobbing related to personal conflict within the organization in the workplace. Burnout and mobbing can be affected by gender and grade. This research used quantitative method with enclosed questionnaire on two types of the subjects. This research has four hypotheses related to burnout and mobbing. The results showed that the hypotheses accepted were low mobbing (leads to non-mobbing) and high burnout (MNBH). The hypotheses were valid for burnout and mobbing in IT students based on gender and grade.
{"title":"Burnout and mobbing in IT students","authors":"Juwita Annisa Fauzi, Dhaniyar, A. Wibawa, Eki Nugraha","doi":"10.1109/ICSITECH.2017.8257161","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257161","url":null,"abstract":"Workload due to task on IT students depending on the specifications of IT Department was taken. It may cause burnout and mobbing. Burnout concept comprises emotional or physical exhaustion. Burnout mostly occurred because of mobbing experience. Mobbing related to personal conflict within the organization in the workplace. Burnout and mobbing can be affected by gender and grade. This research used quantitative method with enclosed questionnaire on two types of the subjects. This research has four hypotheses related to burnout and mobbing. The results showed that the hypotheses accepted were low mobbing (leads to non-mobbing) and high burnout (MNBH). The hypotheses were valid for burnout and mobbing in IT students based on gender and grade.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257095
Dewi Rahmawati, Lusiana Nurul Aini, R. Sarno, C. Fatichah, Dwi Sunaryono
Every organization needs one or more business processes to support the analysis, redesign, and implementation of an activity. Problems that occur when one or more business processes have in common that should identify the effectiveness and efficiency of the models from different processes. A common process model is determined by calculating the similarity of some business process model using a specific algorithm. This observation aims to compare two algorithms to calculate the value of behavioral similarity using Transition Adjacency Relations (TARs) and Naïve. From that comparison, we will find a suitable algorithm to calculate the value of that behavioral similarity. In this experiment, the authors will analyze the similarity of process models based on their behavior by comparing them using TARs and Naïve. The result of the behavioral similarity calculation with TARs algorithm is 0.36. Whereas the similarity calculated using naïve algorithm is 0.3016. Looking at the calculation of the similarity between these two algorithms, the value of the naïve algorithm is lower. From that, we concluded that between TARs and Naïve, TARs is superior. There are many possible causes for a low similarity value in Naïve, one of them is because the two models of business process is different when viewed by behavioral standpoint. Furthermore, it is likely influenced by the structure of a more complex business process model.
{"title":"Comparison of behavioral similarity use TARs and Naïve algorithm for calculating similarity in business process model","authors":"Dewi Rahmawati, Lusiana Nurul Aini, R. Sarno, C. Fatichah, Dwi Sunaryono","doi":"10.1109/ICSITECH.2017.8257095","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257095","url":null,"abstract":"Every organization needs one or more business processes to support the analysis, redesign, and implementation of an activity. Problems that occur when one or more business processes have in common that should identify the effectiveness and efficiency of the models from different processes. A common process model is determined by calculating the similarity of some business process model using a specific algorithm. This observation aims to compare two algorithms to calculate the value of behavioral similarity using Transition Adjacency Relations (TARs) and Naïve. From that comparison, we will find a suitable algorithm to calculate the value of that behavioral similarity. In this experiment, the authors will analyze the similarity of process models based on their behavior by comparing them using TARs and Naïve. The result of the behavioral similarity calculation with TARs algorithm is 0.36. Whereas the similarity calculated using naïve algorithm is 0.3016. Looking at the calculation of the similarity between these two algorithms, the value of the naïve algorithm is lower. From that, we concluded that between TARs and Naïve, TARs is superior. There are many possible causes for a low similarity value in Naïve, one of them is because the two models of business process is different when viewed by behavioral standpoint. Furthermore, it is likely influenced by the structure of a more complex business process model.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257080
Mohammad Sabar Jamil, Saiful Akbar
As a transportation mode, taxis facing low occupancy rate problems at certain time and over-demand at another. This issue is due to imbalance of supply and demand of taxi service. According to some studies the imbalance caused by inefficient taxis distribution. Recently, there are data sources available by utilizing GPS technology that can be used to obtain spatio-temporal information. This spatio-temporal information is valuable to develop intelligent taxi system. There are a lot of previous research related to intelligent taxi system in several research topics, one of which on the analysis hotspot area. This study utilizes Automatic ARIMA Model to perform time-series analysis to predict the passenger's hotspot area based on the spatio-temporal data provided from local taxi firm in Bandung. The challenge of this research is to use the right method in the data-preprocessing phase so the Automatic ARIMA Model can process the spatio-temporal data. Some of the alternatives proposed for preprocessing phase and experimental results show that grid mapping method can be used well in the preprocessing phase. Research results show that the Automatic ARIMA can be used to conduct an analysis of the spatio-temporal data. This is indicated by Mean Absolute Scaled Error (MASE) value 0.8797 for New York City dataset and 0.6338 for Bandung dataset. Cross-validation analysis also showed satisfactory results when the actual demand is quite large. However, if the actual demand is close to zero, the result of the analysis becomes less reliable. This can be understood as a lack in the quality of the data, not in the prediction model.
{"title":"Taxi passenger hotspot prediction using automatic ARIMA model","authors":"Mohammad Sabar Jamil, Saiful Akbar","doi":"10.1109/ICSITECH.2017.8257080","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257080","url":null,"abstract":"As a transportation mode, taxis facing low occupancy rate problems at certain time and over-demand at another. This issue is due to imbalance of supply and demand of taxi service. According to some studies the imbalance caused by inefficient taxis distribution. Recently, there are data sources available by utilizing GPS technology that can be used to obtain spatio-temporal information. This spatio-temporal information is valuable to develop intelligent taxi system. There are a lot of previous research related to intelligent taxi system in several research topics, one of which on the analysis hotspot area. This study utilizes Automatic ARIMA Model to perform time-series analysis to predict the passenger's hotspot area based on the spatio-temporal data provided from local taxi firm in Bandung. The challenge of this research is to use the right method in the data-preprocessing phase so the Automatic ARIMA Model can process the spatio-temporal data. Some of the alternatives proposed for preprocessing phase and experimental results show that grid mapping method can be used well in the preprocessing phase. Research results show that the Automatic ARIMA can be used to conduct an analysis of the spatio-temporal data. This is indicated by Mean Absolute Scaled Error (MASE) value 0.8797 for New York City dataset and 0.6338 for Bandung dataset. Cross-validation analysis also showed satisfactory results when the actual demand is quite large. However, if the actual demand is close to zero, the result of the analysis becomes less reliable. This can be understood as a lack in the quality of the data, not in the prediction model.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130531120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257207
Herbert Siregar, R. A. Sukamto, Tandry Syawaludin Soedijanto
Many organizations or institutions use third-party applications like Facebook, Twitter, and the like to spread their business information. Use of third-party applications is selected because the organization does not have to think about and spend some funds for app development. On the other hand the action has a weakness because the information that should be consumed by the internal party indirectly belongs to the other party and finally open the security gap if the information falls to the wrong party. In a broader sense the organization as the owner of the information can not feel the valuable potential for the information that has accumulated. This study shows an alternative solution for the information held to be internal consumption and can be perceived benefits for the present and the future. The scope of the research lies in a department at the university, the Department of Computer Science Education Universitas Pendidikan Indonesia. The results show that the potential data is very useful for the organization especially for decision-making considerations for interested parties. The convenience factor of users in using the application is also a matter that needs to be observed for the improvement of user retention.
{"title":"Upkabs: A prototype app to extract internal data potential for future interest","authors":"Herbert Siregar, R. A. Sukamto, Tandry Syawaludin Soedijanto","doi":"10.1109/ICSITECH.2017.8257207","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257207","url":null,"abstract":"Many organizations or institutions use third-party applications like Facebook, Twitter, and the like to spread their business information. Use of third-party applications is selected because the organization does not have to think about and spend some funds for app development. On the other hand the action has a weakness because the information that should be consumed by the internal party indirectly belongs to the other party and finally open the security gap if the information falls to the wrong party. In a broader sense the organization as the owner of the information can not feel the valuable potential for the information that has accumulated. This study shows an alternative solution for the information held to be internal consumption and can be perceived benefits for the present and the future. The scope of the research lies in a department at the university, the Department of Computer Science Education Universitas Pendidikan Indonesia. The results show that the potential data is very useful for the organization especially for decision-making considerations for interested parties. The convenience factor of users in using the application is also a matter that needs to be observed for the improvement of user retention.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257086
R. M. F. Ponighzwa, R. Sarno, Dwi Sunaryono
Lately, song industry has developed rapidly throughout the world. In the past, there were many applications which used song as their main themes, such as Shazam and Sound hound. Shazam and Sound hound could identify a song based on recorded one through the application. These applications work by matching the recorded song with an original song in the database. However, matching process is only based on the particular part of the spectrogram instead of an entire song's spectrogram. The disadvantages of this method arise though. This application could only identify the recorded original song. When application recorded a cover song, it cannot identify the title of the original song's since the spectrogram of a cover performance's and its original song's is entirely different. This paper exists to discuss how to recognize a cover song based on MPEG-7 standard ISO. KNN was used as classification method and combined with Audio Spectrum Projection and Audio Spectrum Flatness feature from MPEG-7 extraction. The result from this method identifies an original song from recorded cover of the original one. Result for experiment in this paper is about 75–80%, depends on testing data; whether the testing data is a dominant vocal song or dominant instrument song.
{"title":"Cover song recognition based on MPEG-7 audio features","authors":"R. M. F. Ponighzwa, R. Sarno, Dwi Sunaryono","doi":"10.1109/ICSITECH.2017.8257086","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257086","url":null,"abstract":"Lately, song industry has developed rapidly throughout the world. In the past, there were many applications which used song as their main themes, such as Shazam and Sound hound. Shazam and Sound hound could identify a song based on recorded one through the application. These applications work by matching the recorded song with an original song in the database. However, matching process is only based on the particular part of the spectrogram instead of an entire song's spectrogram. The disadvantages of this method arise though. This application could only identify the recorded original song. When application recorded a cover song, it cannot identify the title of the original song's since the spectrogram of a cover performance's and its original song's is entirely different. This paper exists to discuss how to recognize a cover song based on MPEG-7 standard ISO. KNN was used as classification method and combined with Audio Spectrum Projection and Audio Spectrum Flatness feature from MPEG-7 extraction. The result from this method identifies an original song from recorded cover of the original one. Result for experiment in this paper is about 75–80%, depends on testing data; whether the testing data is a dominant vocal song or dominant instrument song.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}