Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923494
I. M. Krisna Dwitama, Muhammad Salman Al Farisi, Ika Alfina, A. Dinakaramani
Informal text is heavily used by Indonesian in social media. However, NLP tool that can process such text is still very limited. In this work, we built a morphological analyzer for informal text in Indonesian by adding new rules for informal words to an existing Indonesian morphological analyzer named Aksara. Moreover, we also enrich the Aksara lexicon with informal words. The tool can perform tokenization, lemmatization, and part-of-speech (POS) tagging. Aksara uses a rule-based method using a finite-state transducer with a compiler named Foma. To evaluate the tool, we created a gold standard of 102 sentences with 1434 tokens which around 30 % are informal. The test results show that our tool has a tokenization accuracy of 97.21 %, while lemmatization accuracy for case insensitive is 90.37 %, and POS tagging evaluation reached an F1-Score value of 80%.
{"title":"Building Morphological Analyzer for Informal Text in Indonesian","authors":"I. M. Krisna Dwitama, Muhammad Salman Al Farisi, Ika Alfina, A. Dinakaramani","doi":"10.1109/ICACSIS56558.2022.9923494","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923494","url":null,"abstract":"Informal text is heavily used by Indonesian in social media. However, NLP tool that can process such text is still very limited. In this work, we built a morphological analyzer for informal text in Indonesian by adding new rules for informal words to an existing Indonesian morphological analyzer named Aksara. Moreover, we also enrich the Aksara lexicon with informal words. The tool can perform tokenization, lemmatization, and part-of-speech (POS) tagging. Aksara uses a rule-based method using a finite-state transducer with a compiler named Foma. To evaluate the tool, we created a gold standard of 102 sentences with 1434 tokens which around 30 % are informal. The test results show that our tool has a tokenization accuracy of 97.21 %, while lemmatization accuracy for case insensitive is 90.37 %, and POS tagging evaluation reached an F1-Score value of 80%.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923464
Othman O. Khalifa, M. Z. Ahmed, R. Saeed, Aliyu Musa Kida, A. Albagoul, A.N. Esgiar
The ease of adaptability of Internet of Things (IoT) enables multiple devices to communicate with the aim of shearing data and information resources. The IoT architecture of operation is by default centralized. However, the distributed and decentralized architecture of Blockchain enables efficient and scalable connectivity between conventional devices and IoT devices. A Blockchain is considered as a technology with a distributed ledger that enables data transactions with integrity. In this paper, an analysis of the benefits and drawbacks of integrating IoT and Blockchain technology is efficiently conducted. A problem is formulated to analyze the system model by considering both internal and external attacks on a network. Also, a security analysis is conducted by formulating equations. Use-case analysis is proposed to seamlessly locate an IoT device and ensure access control for inbound and outbound link throughout the IoT system. In our results, MATLAB2019b is used in presenting graphical results for compromised node, cooperative nodes, and total number of node count. This analysis is conducted using stochastic approach to determine successful defense for node attach in percentage counts.
{"title":"A Stochastic Approach for Blockchain Internet of Things Integration","authors":"Othman O. Khalifa, M. Z. Ahmed, R. Saeed, Aliyu Musa Kida, A. Albagoul, A.N. Esgiar","doi":"10.1109/ICACSIS56558.2022.9923464","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923464","url":null,"abstract":"The ease of adaptability of Internet of Things (IoT) enables multiple devices to communicate with the aim of shearing data and information resources. The IoT architecture of operation is by default centralized. However, the distributed and decentralized architecture of Blockchain enables efficient and scalable connectivity between conventional devices and IoT devices. A Blockchain is considered as a technology with a distributed ledger that enables data transactions with integrity. In this paper, an analysis of the benefits and drawbacks of integrating IoT and Blockchain technology is efficiently conducted. A problem is formulated to analyze the system model by considering both internal and external attacks on a network. Also, a security analysis is conducted by formulating equations. Use-case analysis is proposed to seamlessly locate an IoT device and ensure access control for inbound and outbound link throughout the IoT system. In our results, MATLAB2019b is used in presenting graphical results for compromised node, cooperative nodes, and total number of node count. This analysis is conducted using stochastic approach to determine successful defense for node attach in percentage counts.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923484
T. Mustaqim, C. Fatichah, N. Suciati
The Detection of acute lymphoblastic leukemia (ALL) subtypes on multicellular microscopic images is significant for early diagnosis to support the treatment process. Recently, the object detection with a deep learning approach shows good accuracy and fast computation time in the medical field. Therefore, we propose using the You Only Look Once (YOLO) method, namely the Yolov4 and Yolov5 models, to detect the L1, L2, and L3 subtypes. However, both models still have high GFLOPS values and high number of parameters. This paper proposes a modification of Yolov4 and Yolov5 by replacing the standard backbone convolution module with the GhostNet convolution module. The GhostNet module can reduce the GFLOPS value and the number of parameters. Overall., the Yolo backbone modification model has comparable results with the original Yolo model with a slight difference with a value of 1.4 % in the Yolov4 backbone modification model and 2.4 % in the Yolov5 backbone modification model. The number of parameters and GFLOPS values of the two models modified was reduced by 35% and 40%, respectively.
在多细胞显微镜图像上检测急性淋巴细胞白血病(ALL)亚型对于早期诊断支持治疗过程具有重要意义。近年来,基于深度学习的目标检测方法在医学领域显示出良好的准确性和快速的计算时间。因此,我们建议使用You Only Look Once (YOLO)方法,即Yolov4和Yolov5模型来检测L1、L2和L3亚型。然而,这两种模型仍然具有高GFLOPS值和高参数数量。本文提出了对Yolov4和Yolov5的改进,将标准骨干卷积模块替换为GhostNet卷积模块。GhostNet模块可以减少GFLOPS的值和参数的数量。整体。, yolo4和yolo5改性模型的差异值分别为1.4%和2.4%,与原yolo4和yolo5改性模型的差异值基本相当。修正后的两种模型的参数个数和GFLOPS值分别减少了35%和40%。
{"title":"Modification of YOLO with GhostNet to Reduce Parameters and Computing Resources for Detecting Acute Lymphoblastic Leukemia","authors":"T. Mustaqim, C. Fatichah, N. Suciati","doi":"10.1109/ICACSIS56558.2022.9923484","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923484","url":null,"abstract":"The Detection of acute lymphoblastic leukemia (ALL) subtypes on multicellular microscopic images is significant for early diagnosis to support the treatment process. Recently, the object detection with a deep learning approach shows good accuracy and fast computation time in the medical field. Therefore, we propose using the You Only Look Once (YOLO) method, namely the Yolov4 and Yolov5 models, to detect the L1, L2, and L3 subtypes. However, both models still have high GFLOPS values and high number of parameters. This paper proposes a modification of Yolov4 and Yolov5 by replacing the standard backbone convolution module with the GhostNet convolution module. The GhostNet module can reduce the GFLOPS value and the number of parameters. Overall., the Yolo backbone modification model has comparable results with the original Yolo model with a slight difference with a value of 1.4 % in the Yolov4 backbone modification model and 2.4 % in the Yolov5 backbone modification model. The number of parameters and GFLOPS values of the two models modified was reduced by 35% and 40%, respectively.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923480
Thami Endamora Daulay, K. Junus, L. M. Hasani
Technologies are becoming more accessible to both adults and young people. Although technology can form many opportunities, it exposes children to many threats, including cyberbullying. This research aims to develop an interactive game prototype to foster an understanding of cyberbullying in elementary school students. This research uses the User-Centered Design method with a qualitative approach in designing interaction designs based on user needs. Then, the prototype is piloted to users to evaluate user experiences and learning outcomes. Based on the evaluation results, the game prototype provides a positive user experience regarding satisfaction, learnability, effectiveness, immersion, motivation, and emotion. Participants were able to elaborate on positive ways of interacting through digital platforms. However, they had difficulties in responding appropriately to negative behavior and content on digital platforms. The findings of this research and suggestions for future improvements are presented.
{"title":"Developing a User-Centered Educational Game to Prevent Cyberbullying Among Elementary School Students","authors":"Thami Endamora Daulay, K. Junus, L. M. Hasani","doi":"10.1109/ICACSIS56558.2022.9923480","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923480","url":null,"abstract":"Technologies are becoming more accessible to both adults and young people. Although technology can form many opportunities, it exposes children to many threats, including cyberbullying. This research aims to develop an interactive game prototype to foster an understanding of cyberbullying in elementary school students. This research uses the User-Centered Design method with a qualitative approach in designing interaction designs based on user needs. Then, the prototype is piloted to users to evaluate user experiences and learning outcomes. Based on the evaluation results, the game prototype provides a positive user experience regarding satisfaction, learnability, effectiveness, immersion, motivation, and emotion. Participants were able to elaborate on positive ways of interacting through digital platforms. However, they had difficulties in responding appropriately to negative behavior and content on digital platforms. The findings of this research and suggestions for future improvements are presented.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132092726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923536
R. Priambodo, P. W. Handayani, D. I. Sensuse, Ryan Randy Suryono, Kautsarina
The World Health Organization (WHO) strategy for Ending Preventable Maternal Mortality (EPMM) accommodates guidelines and objectives to lower the level of the global Maternal Mortality Ratio (MMR). Regular antenatal care (ANC) visits could increase maternal satisfaction, hence activities in ANC include risk identification, prevention, and management of pregnancy-related diseases, which could lead to maternal death. The health recommender system in healthcare helps patients and health professionals perform early predictions and receive meaningful recommendations based on patients' up-to-date health records. However, implementations of this application in maternal care are still few. Therefore, we conducted a semi-structured interview to five physicians working in maternal care to explore the challenge. The interview data were afterwards analyzed using qualitative content analysis. This qualitative study has identified six major challenges related to technological issues, such as the ability to display critical information, simplicity, compatibility, correctness, consistency, and fulfillment of functionalities required to adhere to maternal care guidelines, as well as challenges related to regulations and policies. This study contributes knowledge about the implementation of health recommender systems for maternal care and provides recommendations to application vendors and health regulators for the implementation of this system in Indonesia.
{"title":"Health Recommender System for Maternal Care Implementation Challenges: A Qualitative Analysis of Physicians' Perspective","authors":"R. Priambodo, P. W. Handayani, D. I. Sensuse, Ryan Randy Suryono, Kautsarina","doi":"10.1109/ICACSIS56558.2022.9923536","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923536","url":null,"abstract":"The World Health Organization (WHO) strategy for Ending Preventable Maternal Mortality (EPMM) accommodates guidelines and objectives to lower the level of the global Maternal Mortality Ratio (MMR). Regular antenatal care (ANC) visits could increase maternal satisfaction, hence activities in ANC include risk identification, prevention, and management of pregnancy-related diseases, which could lead to maternal death. The health recommender system in healthcare helps patients and health professionals perform early predictions and receive meaningful recommendations based on patients' up-to-date health records. However, implementations of this application in maternal care are still few. Therefore, we conducted a semi-structured interview to five physicians working in maternal care to explore the challenge. The interview data were afterwards analyzed using qualitative content analysis. This qualitative study has identified six major challenges related to technological issues, such as the ability to display critical information, simplicity, compatibility, correctness, consistency, and fulfillment of functionalities required to adhere to maternal care guidelines, as well as challenges related to regulations and policies. This study contributes knowledge about the implementation of health recommender systems for maternal care and provides recommendations to application vendors and health regulators for the implementation of this system in Indonesia.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131774009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923474
Maudy Insan Tania, Nori Wilantika
To improve the quality of e-learning in an educational institution., knowledge related to the current state of e-learning is needed. This knowledge can be obtained by doing an e-learning evaluation. Evaluating e-learning can provide an overview of the current state of e-learning in institutions to form suggestions for improvement in the future. Evaluation in this study was conducted using the e-learning Maturity Model (eMM). Data was collected using a study of documentation and a survey with a self-administrated questionnaire to respondents who were selected by purposive sampling method. Based on the assessment results, the maturity of e-learning at Politkenik Statistika STIS is at level 3, which indicates the results of e-learning practices have been seen in the organization. Still, formalization is needed to ensure the sustainability of e-learning in the organization. Maturity measurement results can also be used to identify still-inefficient processes and develop improvement strategies for these identified processes. The result of this paper offer guidance to other organizations to perform similar assessments and extends the literature on e-learning maturity assessment.
{"title":"Enhancement of e-Learning According to Process-based Maturity Assessment","authors":"Maudy Insan Tania, Nori Wilantika","doi":"10.1109/ICACSIS56558.2022.9923474","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923474","url":null,"abstract":"To improve the quality of e-learning in an educational institution., knowledge related to the current state of e-learning is needed. This knowledge can be obtained by doing an e-learning evaluation. Evaluating e-learning can provide an overview of the current state of e-learning in institutions to form suggestions for improvement in the future. Evaluation in this study was conducted using the e-learning Maturity Model (eMM). Data was collected using a study of documentation and a survey with a self-administrated questionnaire to respondents who were selected by purposive sampling method. Based on the assessment results, the maturity of e-learning at Politkenik Statistika STIS is at level 3, which indicates the results of e-learning practices have been seen in the organization. Still, formalization is needed to ensure the sustainability of e-learning in the organization. Maturity measurement results can also be used to identify still-inefficient processes and develop improvement strategies for these identified processes. The result of this paper offer guidance to other organizations to perform similar assessments and extends the literature on e-learning maturity assessment.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923448
Arief Taufik Budiman, Putu Wuri Handayani
IT Governance is important for organizations that use information technology to support their business processes. Within the Ministry of Finance, IT governance is regulated by Minister of Finance Regulation Number 97/PMK.01/ 2017. Currently, there are several obstacles faced by the Secretariat of the Tax Court with regard to IT governance. This research was conducted to determine the maturity level of IT governance and provide recommendations for improvement aimed at improving the implementation of IT governance at the current Tax Court Secretariat. The research method uses mixed method with 4 stages, namely coding, data entry, data display and decision making. Primary data were obtained through interviews and focus group discussions of ten resource persons consisting of the Head of the ICT Operations and Maintenance Subdivision, functional officials, and IT staff. Maturity level measurement show that there are 5 processes managed configuration, managed problem, managed IT change, managed asset, and managed knowledge at the capability level 1 (performed) and 5 processes managed risk, managed service request, managed continuity, managed security, and managed requirement definition at the capability level 2 (managed). The benefit of this research is to provide recommendations to Secretariat of the Tax Court for improving IT governance based on the best activities provided by COBIT 2019
{"title":"Maturity Evaluation and Improvement Recommendation of Information Technology Governance with the Control Objective of Information and Related Technology 2019 Framework: A Case Study of Tax Court Secretariat","authors":"Arief Taufik Budiman, Putu Wuri Handayani","doi":"10.1109/ICACSIS56558.2022.9923448","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923448","url":null,"abstract":"IT Governance is important for organizations that use information technology to support their business processes. Within the Ministry of Finance, IT governance is regulated by Minister of Finance Regulation Number 97/PMK.01/ 2017. Currently, there are several obstacles faced by the Secretariat of the Tax Court with regard to IT governance. This research was conducted to determine the maturity level of IT governance and provide recommendations for improvement aimed at improving the implementation of IT governance at the current Tax Court Secretariat. The research method uses mixed method with 4 stages, namely coding, data entry, data display and decision making. Primary data were obtained through interviews and focus group discussions of ten resource persons consisting of the Head of the ICT Operations and Maintenance Subdivision, functional officials, and IT staff. Maturity level measurement show that there are 5 processes managed configuration, managed problem, managed IT change, managed asset, and managed knowledge at the capability level 1 (performed) and 5 processes managed risk, managed service request, managed continuity, managed security, and managed requirement definition at the capability level 2 (managed). The benefit of this research is to provide recommendations to Secretariat of the Tax Court for improving IT governance based on the best activities provided by COBIT 2019","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923441
Muhammad Hafizh Syafi'i, Candra Wiranursamsu, Hede Jacobeth Mangngi Uly, Ketut Wisnu Wardhana, Ikha Prasetyani, Octo Mario Pasaribu, Asep Adang Supriyadi, Syachrul Arief, Rudy AG Gultom, Kasih Prihantoro
The airport is one of the vital objects that must be owned by a national capital to support transportation, economic and defense security activities. For the presence of this airport to work properly and provide full support to the National Capital, planning is needed in determining the strategic location of the airport. By using a Geographic Information System (GIS) we can present spatial data and can analyze parameters for planning airport development including the type of land cover, conditions of disaster vulnerability, the existence of a road network, the existence of river areas, land suitability conditions, land slope and air defense points. By using the AHP (Analytical Hierarchy Process) method, the weight of each parameter is obtained to determine the magnitude of the influence of one parameter on other parameters. The weight for each parameter is 7% for land cover, 6% for disaster-prone, 17% for soil carrying capacity, 16% for road access, 15% for rivers, 27% for land slope, and 12 % for air defense points. Then from the results of the weighting overlay analysis carried out using ArcGIS software and following the parameters and values of each sub-parameter used, there are 5 areas that are considered suitable to be used as locations for the construction of a new airport in the IKN Nusantara area. The 1st area is in the district. Waru, North Penajam Paser Regency, which has an area of 543.05 Ha, is 27 Km from IKN; The 2nd with 16 Km, located in the Sepaku with an area coverage of about 311.11 Ha; The distance of the 3rd location with IKN is 12 Km and has a wide coverage of around 251.98 Ha located in the Penajam and Sepaku; and the 4th and 5th locations are in Sepaku has an area of272.91 Ha and 67.78 Ha, respectively 16.4 Km and 19.6 Km apart.
机场是支持交通、经济和国防安全活动的国家资本必须拥有的重要对象之一。为了使机场的存在正常运作并为国家首都提供充分支持,需要在确定机场的战略位置方面进行规划。通过使用地理信息系统(GIS),我们可以提供空间数据,并可以分析规划机场发展的参数,包括土地覆盖类型、灾害易损性条件、道路网络的存在、河流区域的存在、土地适宜性条件、土地坡度和防空点。运用层次分析法,求得各参数的权重,以确定一个参数对其他参数的影响程度。各参数权重分别为:土地覆盖7%、易损性6%、土壤承载能力17%、道路通道16%、河流15%、土地坡度27%、防空点12%。然后根据ArcGIS软件进行的加权叠加分析的结果,根据所使用的各子参数的参数和值,得出5个适合作为IKN Nusantara地区新机场建设地点的区域。第一个区域在这个地区。Waru, North Penajam Paser Regency,面积543.05公顷,距离IKN 27公里;第二个16公里,位于雪帕库,面积约311.11公顷;拥有IKN的第三个地点距离为12公里,位于Penajam和Sepaku,覆盖范围约为251.98公顷;第四和第五名位于雪帕库,面积分别为272.91公顷和67.78公顷,分别相距16.4公里和19.6公里。
{"title":"Determining An Optimal Airport Location For Country Capital Case Study: Capital Region Nusantara","authors":"Muhammad Hafizh Syafi'i, Candra Wiranursamsu, Hede Jacobeth Mangngi Uly, Ketut Wisnu Wardhana, Ikha Prasetyani, Octo Mario Pasaribu, Asep Adang Supriyadi, Syachrul Arief, Rudy AG Gultom, Kasih Prihantoro","doi":"10.1109/ICACSIS56558.2022.9923441","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923441","url":null,"abstract":"The airport is one of the vital objects that must be owned by a national capital to support transportation, economic and defense security activities. For the presence of this airport to work properly and provide full support to the National Capital, planning is needed in determining the strategic location of the airport. By using a Geographic Information System (GIS) we can present spatial data and can analyze parameters for planning airport development including the type of land cover, conditions of disaster vulnerability, the existence of a road network, the existence of river areas, land suitability conditions, land slope and air defense points. By using the AHP (Analytical Hierarchy Process) method, the weight of each parameter is obtained to determine the magnitude of the influence of one parameter on other parameters. The weight for each parameter is 7% for land cover, 6% for disaster-prone, 17% for soil carrying capacity, 16% for road access, 15% for rivers, 27% for land slope, and 12 % for air defense points. Then from the results of the weighting overlay analysis carried out using ArcGIS software and following the parameters and values of each sub-parameter used, there are 5 areas that are considered suitable to be used as locations for the construction of a new airport in the IKN Nusantara area. The 1st area is in the district. Waru, North Penajam Paser Regency, which has an area of 543.05 Ha, is 27 Km from IKN; The 2nd with 16 Km, located in the Sepaku with an area coverage of about 311.11 Ha; The distance of the 3rd location with IKN is 12 Km and has a wide coverage of around 251.98 Ha located in the Penajam and Sepaku; and the 4th and 5th locations are in Sepaku has an area of272.91 Ha and 67.78 Ha, respectively 16.4 Km and 19.6 Km apart.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"62 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/ICACSIS56558.2022.9923452
Nadika Sigit Sinatrya, I. Budi, Aris Budi Santoso
The unstable nature and complex behavior of the stock market make the prediction or forecasting process very difficult. The high level of debt and the declining price-earning ratio have bad implications for investment in metals and mining sector. This paper proposes a classification model for stock price movement based on financial news data, historical stock prices and commodity price data. We experiment with Support Vector Machine (SVM), Naive Bayes, and K-Nearest Neighbor (KNN) algorithm. The classifier then categorized the price into “up”, “down”, and “constant”. The result shows that the best model is achieved by Naive Bayes Algorithm with an accuracy of 60% in three days period by combining copper price and sentiment analysis features.
{"title":"Classification of Stock Price Movement With Sentiment Analysis and Commodity Price: Case Study of Metals and Mining Sector","authors":"Nadika Sigit Sinatrya, I. Budi, Aris Budi Santoso","doi":"10.1109/ICACSIS56558.2022.9923452","DOIUrl":"https://doi.org/10.1109/ICACSIS56558.2022.9923452","url":null,"abstract":"The unstable nature and complex behavior of the stock market make the prediction or forecasting process very difficult. The high level of debt and the declining price-earning ratio have bad implications for investment in metals and mining sector. This paper proposes a classification model for stock price movement based on financial news data, historical stock prices and commodity price data. We experiment with Support Vector Machine (SVM), Naive Bayes, and K-Nearest Neighbor (KNN) algorithm. The classifier then categorized the price into “up”, “down”, and “constant”. The result shows that the best model is achieved by Naive Bayes Algorithm with an accuracy of 60% in three days period by combining copper price and sentiment analysis features.","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.1109/icacsis56558.2022.9922960
{"title":"ICACSIS 2022 Committee","authors":"","doi":"10.1109/icacsis56558.2022.9922960","DOIUrl":"https://doi.org/10.1109/icacsis56558.2022.9922960","url":null,"abstract":"","PeriodicalId":165728,"journal":{"name":"2022 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126261692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}