Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632978
Bayu Kumoro Yakti, S. Madenda, S. Sudiro, Purnamawan Musa
Digital images are images in digital formats or digital media such as hard drives. Digital images consist of bits (0 or 1) called pixels and have a high capacity for storing data and information. Steganography techniques try to hide the existence of confidential data. The Steganography technique perfectly closes secret messages in carrier images with high level security. Information and data will be manipulated so that it can be detected by human eyes. Least Significant Bit (LSB) is the method used in this study. The embedding and extracting processes in the proposed algorithms are performed using Matlab software and FPGA-based hardware simulation using Xilinx ISE. The purpose of this study is to compare the process speed of the LSB steganography algorithm in the two implementations. The input data on the encryption used is data in binary form and Red Green Blue (RGB) images and output data in stego images. Meanwhile, the input data in the decryption is a stego image and the output data is in the form of binary data. The experimental results showed that the steganography algorithm had been successfully performed on FPGA and Matlab. However, the process on FPGA is faster than the process on Matlab. The result of the encryption process is 696000 times faster than Matlab. Meanwhile, the decryption process is 236000 times faster than Matlab.
{"title":"Processing Speed Comparison of the Least Significant Bit (LSB) Steganography Algorithm on FPGA and Matlab","authors":"Bayu Kumoro Yakti, S. Madenda, S. Sudiro, Purnamawan Musa","doi":"10.1109/ICIC54025.2021.9632978","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632978","url":null,"abstract":"Digital images are images in digital formats or digital media such as hard drives. Digital images consist of bits (0 or 1) called pixels and have a high capacity for storing data and information. Steganography techniques try to hide the existence of confidential data. The Steganography technique perfectly closes secret messages in carrier images with high level security. Information and data will be manipulated so that it can be detected by human eyes. Least Significant Bit (LSB) is the method used in this study. The embedding and extracting processes in the proposed algorithms are performed using Matlab software and FPGA-based hardware simulation using Xilinx ISE. The purpose of this study is to compare the process speed of the LSB steganography algorithm in the two implementations. The input data on the encryption used is data in binary form and Red Green Blue (RGB) images and output data in stego images. Meanwhile, the input data in the decryption is a stego image and the output data is in the form of binary data. The experimental results showed that the steganography algorithm had been successfully performed on FPGA and Matlab. However, the process on FPGA is faster than the process on Matlab. The result of the encryption process is 696000 times faster than Matlab. Meanwhile, the decryption process is 236000 times faster than Matlab.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"27 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632930
Aang Kisnu Darmawan, Daniel Oranova Siahaan, Tony Dwi Susanto, Achmad Nizar Hidayanto, A'ang. Subiyakto, Tony Yulianto
Because the number of districts in Indonesia is four times that of cities, regency development requires serious consideration. However, very few studies are still available to explore districts from an ICT utility management perspective. This study aims to evaluate the user experience of a mobile-based smart regency application used in regencies. The method used is the User-Centered Cognitive Walkthrough (UC-CW), an enhanced Cognitive Walkthrough (CW) method. In this user experience evaluation method, the evaluator gives scenario-based tasks and several questions to mobile-app users to find problems that interfere with the learning process. This method is suitable for use on systems that have just been released because it can explore users' cognitive processes when using the system. Respondents in the study were ten users of mobile-based smart regency applications. The results show that many problematic features or functions cannot be used, or the data is still empty. This study contributes to the evaluation recommendations of user experience and provides input for application developers and policymakers to pay more attention to the factors that affect the user experience of smart regency application users in the regions.
{"title":"Adapting The User-Centered Cognitive Walkthrough (UC-CW) for Assessing the User Experience of Smart Regency Mobile-Apps Service in Indonesia","authors":"Aang Kisnu Darmawan, Daniel Oranova Siahaan, Tony Dwi Susanto, Achmad Nizar Hidayanto, A'ang. Subiyakto, Tony Yulianto","doi":"10.1109/ICIC54025.2021.9632930","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632930","url":null,"abstract":"Because the number of districts in Indonesia is four times that of cities, regency development requires serious consideration. However, very few studies are still available to explore districts from an ICT utility management perspective. This study aims to evaluate the user experience of a mobile-based smart regency application used in regencies. The method used is the User-Centered Cognitive Walkthrough (UC-CW), an enhanced Cognitive Walkthrough (CW) method. In this user experience evaluation method, the evaluator gives scenario-based tasks and several questions to mobile-app users to find problems that interfere with the learning process. This method is suitable for use on systems that have just been released because it can explore users' cognitive processes when using the system. Respondents in the study were ten users of mobile-based smart regency applications. The results show that many problematic features or functions cannot be used, or the data is still empty. This study contributes to the evaluation recommendations of user experience and provides input for application developers and policymakers to pay more attention to the factors that affect the user experience of smart regency application users in the regions.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632963
Marisa Marisa, Suhadi Suhadi, M. Nur, Prima Dina Atika, Sugiyatno Sugiyatno, Davi Afandi
Computers are very important in industrial processes because they play a role in the life cycle of the product systems that companies manufacture. Damage to production equipment often occurs due to lack of detailed periodic maintenance, making it difficult for operators and technicians to maintain production machines. Because it still uses a manual approach, the repair time is long and accurate at a high cost. Case-Based Reasoning (CBR), a problem solving technique based on previous experience and applied in the present, is one of the computer science disciplines commonly used by humans to help and facilitate work. CBR is used to find solutions by utilizing or analyzing case data collected previously. In this study to solve the problem by using the CBR method. Case representation, case indexing, case retrieval, case adaptation, and case maintenance are the five goals of CBR in knowledge formation. The process of finding and measuring cases with the greatest closeness is known as case retrieval. The purpose of this research is to create a way to automatically detect system failures on machines, so that if a malfunction occurs with a CBR-based system, it will be easier to detect early, repair faster, and be more accurate. The results of the research using the CBR method are that the accuracy of the system used is 90%, in accordance with the results of testing the tools produced, and effective for managing production machine repairs. While the test error is twenty times with the highest result of 33.33% and the lowest 0% according to the level of accuracy of the sensor on the object. The purpose of this research is to provide analysis for companies to detect damage to production machines for operators and management to follow up on existing damage. Recommendations from the research are used to improve production machines for companies that need a comprehensive repair treatment from the existing system to a system that has computer-based reasoning for cost efficiency and economics of repairing machine tools.
{"title":"Internet of Things-based Analysis of Factory Production Machine Damage Detection System Model Using Case-Based Reasoning Method","authors":"Marisa Marisa, Suhadi Suhadi, M. Nur, Prima Dina Atika, Sugiyatno Sugiyatno, Davi Afandi","doi":"10.1109/ICIC54025.2021.9632963","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632963","url":null,"abstract":"Computers are very important in industrial processes because they play a role in the life cycle of the product systems that companies manufacture. Damage to production equipment often occurs due to lack of detailed periodic maintenance, making it difficult for operators and technicians to maintain production machines. Because it still uses a manual approach, the repair time is long and accurate at a high cost. Case-Based Reasoning (CBR), a problem solving technique based on previous experience and applied in the present, is one of the computer science disciplines commonly used by humans to help and facilitate work. CBR is used to find solutions by utilizing or analyzing case data collected previously. In this study to solve the problem by using the CBR method. Case representation, case indexing, case retrieval, case adaptation, and case maintenance are the five goals of CBR in knowledge formation. The process of finding and measuring cases with the greatest closeness is known as case retrieval. The purpose of this research is to create a way to automatically detect system failures on machines, so that if a malfunction occurs with a CBR-based system, it will be easier to detect early, repair faster, and be more accurate. The results of the research using the CBR method are that the accuracy of the system used is 90%, in accordance with the results of testing the tools produced, and effective for managing production machine repairs. While the test error is twenty times with the highest result of 33.33% and the lowest 0% according to the level of accuracy of the sensor on the object. The purpose of this research is to provide analysis for companies to detect damage to production machines for operators and management to follow up on existing damage. Recommendations from the research are used to improve production machines for companies that need a comprehensive repair treatment from the existing system to a system that has computer-based reasoning for cost efficiency and economics of repairing machine tools.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632962
Erna Hikmawati, K. Surendro
Adaptive rule is a proposed development model of the association rule that answers the weaknesses of previous research and takes an inventory of current needs. In the adaptive rule the minimum support value is determined automatically by the system. In addition, it can generate rules that come from several different databases and rank the rules based on the specified criteria. In order not to become trapped into pseudo-science, this adaptive rule needs to be studied from the philosophy of science. According to the philosophy of science, science must fulfill three aspects, namely ontology, epistemology, and axiology. This paper contains a study conducted on the Adaptive rule starting from determining the side of ontology, epistemology, and axiology in accordance with the theory of the Philosophy of Science. In addition, the position of the adaptive rule on the scientific revolutions proposed by Thomas Kuhn was also analyzed to find out the position and opportunities in the future. If it is related to Thomas Kuhn's scientific revolutions theory, the Adaptive rule is currently in a crisis phase. To ensure that the adaptive rule is not pseudo-science, it is also reviewed the deductive testing phase proposed by Karl Popper. From the discussion and analysis carried out, it can be concluded that adaptive rules are not included in pseudo-science.
{"title":"Adaptive Rule from the Philosophy of Science Viewpoint","authors":"Erna Hikmawati, K. Surendro","doi":"10.1109/ICIC54025.2021.9632962","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632962","url":null,"abstract":"Adaptive rule is a proposed development model of the association rule that answers the weaknesses of previous research and takes an inventory of current needs. In the adaptive rule the minimum support value is determined automatically by the system. In addition, it can generate rules that come from several different databases and rank the rules based on the specified criteria. In order not to become trapped into pseudo-science, this adaptive rule needs to be studied from the philosophy of science. According to the philosophy of science, science must fulfill three aspects, namely ontology, epistemology, and axiology. This paper contains a study conducted on the Adaptive rule starting from determining the side of ontology, epistemology, and axiology in accordance with the theory of the Philosophy of Science. In addition, the position of the adaptive rule on the scientific revolutions proposed by Thomas Kuhn was also analyzed to find out the position and opportunities in the future. If it is related to Thomas Kuhn's scientific revolutions theory, the Adaptive rule is currently in a crisis phase. To ensure that the adaptive rule is not pseudo-science, it is also reviewed the deductive testing phase proposed by Karl Popper. From the discussion and analysis carried out, it can be concluded that adaptive rules are not included in pseudo-science.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632905
A. Suheryadi, W. P. Putra, Muhammad Anis Al Hilmi, Kurnia Adi Cahyanto, Firdaus
Location-based services have become very popular in recent years, among these services are navigation and location determination both indoor and outdoor. Determining an object location is often an interesting topic for study, various studies have been carried to determine the position of the object using several methods using either GPS, CCTV, Wireless or Bluetooth. One of the interesting cases to study is determine vehicle position in the indoor parking lots. It is important to record the parking location because it will make it easier for newcomers to locate their vehicles in the parking area. Various studies have suggested that Bluetooth is a promising wireless technology in indoor positioning system because of its cost-effectiveness and user-friendly features. In this study, We use several methods to record parking positions, including the K-Nearest Neighbor and Fingerprinting techniques based on the RSSI Bluetooth (Received Signal Strength Indicator) with distance calculation parameters using Manhattan Distance. The results of our study, it was found that the accuracy about 77% with Precision, Recall and F1-Score pessimistic approach reaching 87%, 85% and 85%.
{"title":"Vehicles Position Tracking in Parking lots Using K-Nearest Neighbor and Fingerprinting Based on RSSI Bluetooth","authors":"A. Suheryadi, W. P. Putra, Muhammad Anis Al Hilmi, Kurnia Adi Cahyanto, Firdaus","doi":"10.1109/ICIC54025.2021.9632905","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632905","url":null,"abstract":"Location-based services have become very popular in recent years, among these services are navigation and location determination both indoor and outdoor. Determining an object location is often an interesting topic for study, various studies have been carried to determine the position of the object using several methods using either GPS, CCTV, Wireless or Bluetooth. One of the interesting cases to study is determine vehicle position in the indoor parking lots. It is important to record the parking location because it will make it easier for newcomers to locate their vehicles in the parking area. Various studies have suggested that Bluetooth is a promising wireless technology in indoor positioning system because of its cost-effectiveness and user-friendly features. In this study, We use several methods to record parking positions, including the K-Nearest Neighbor and Fingerprinting techniques based on the RSSI Bluetooth (Received Signal Strength Indicator) with distance calculation parameters using Manhattan Distance. The results of our study, it was found that the accuracy about 77% with Precision, Recall and F1-Score pessimistic approach reaching 87%, 85% and 85%.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632976
Inayatulloh, Enggal Sriwardiningsih, Novingky Ferdinand, Maisyarah Rahmi Hasan, Ni Luh Ariningsih Sari, Y. Desnelita
Preceding research on e-learning quality of service were showed mostly in established countries; nevertheless, slight work has been made in emergent countries. This research observes the relations amongst electronic learning quality, electronic learning teacher, course material excellence and student satisfaction of electronic learning, in Indonesia. Analysis data composed from several higher education students in Indonesia. The research method uses a quantitative approach by distributing questionnaires to several universities in Indonesia through G-form and processing data using SMART PLS. The result show e-learning quality of service has a progressive effect on electronic learning teacher and material, electronic learning service quality has a positive influence on e-learning student satisfaction and electronic learning instructor and material has an optimistic influence on electronic learning student satisfaction.
{"title":"Factors Impact E-Learning System in Higher Education in Indonesia","authors":"Inayatulloh, Enggal Sriwardiningsih, Novingky Ferdinand, Maisyarah Rahmi Hasan, Ni Luh Ariningsih Sari, Y. Desnelita","doi":"10.1109/ICIC54025.2021.9632976","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632976","url":null,"abstract":"Preceding research on e-learning quality of service were showed mostly in established countries; nevertheless, slight work has been made in emergent countries. This research observes the relations amongst electronic learning quality, electronic learning teacher, course material excellence and student satisfaction of electronic learning, in Indonesia. Analysis data composed from several higher education students in Indonesia. The research method uses a quantitative approach by distributing questionnaires to several universities in Indonesia through G-form and processing data using SMART PLS. The result show e-learning quality of service has a progressive effect on electronic learning teacher and material, electronic learning service quality has a positive influence on e-learning student satisfaction and electronic learning instructor and material has an optimistic influence on electronic learning student satisfaction.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lack of developer knowledge of software security is one of the vulnerability factors in applications, especially the web, so it is necessary to have educational media that can provide an understanding of software security awareness with competencies measurement. In this study, a hands-on vulnerable web application was designed as a media for software security education. The application is developed using a design research methodology with a prototyping development method that produces two parts: the vulnerable and public applications. Both applications were tested using functional testing, security testing, and achievement measurement. Functional and security test results show that the application can run according to the designed functionality and the security case used. The measure of achievement shows that the mean value of the user’s score is 3.86 out of 20, the achievement total being 58 out of 300, with a standard deviation of 3.24. It is influenced by the diversity of basic competencies possessed by the user.
{"title":"Design and Development Hands-On Vulnerable Web Application as a Software Security Educational Media","authors":"Riama Kristallia, Hermawan Setiawan, Siti Manayra Sabiya","doi":"10.1109/ICIC54025.2021.9632902","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632902","url":null,"abstract":"Lack of developer knowledge of software security is one of the vulnerability factors in applications, especially the web, so it is necessary to have educational media that can provide an understanding of software security awareness with competencies measurement. In this study, a hands-on vulnerable web application was designed as a media for software security education. The application is developed using a design research methodology with a prototyping development method that produces two parts: the vulnerable and public applications. Both applications were tested using functional testing, security testing, and achievement measurement. Functional and security test results show that the application can run according to the designed functionality and the security case used. The measure of achievement shows that the mean value of the user’s score is 3.86 out of 20, the achievement total being 58 out of 300, with a standard deviation of 3.24. It is influenced by the diversity of basic competencies possessed by the user.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133387163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/icic54025.2021.9633013
{"title":"ICIC 2021 Table of Contents","authors":"","doi":"10.1109/icic54025.2021.9633013","DOIUrl":"https://doi.org/10.1109/icic54025.2021.9633013","url":null,"abstract":"","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632967
Afina Ramadhani, E. Sutoyo, Vandha Widartha
Information technology has become an essential component in various fields, one of which is in the world of tourism. This can be seen with the emergence of websites in the tourism sector, such as TripAdvisor. Bali, as a tourist destination that is well known to foreign countries, can use TripAdvisor as a place to promote tourist attractions in Bali, such as beaches. This study will conduct a sentiment analysis of tourist reviews on the five most favorite beaches in Bali, namely Double Six Beach, Seminyak, Nusa Dua, Delinking, and Cangue, on the TripAdvisor Website. The analysis results determine how tourists' opinions of the five beaches are using the Long Short-Term Memory (LSTM) architecture with sentiment classified in the form of positive and negative labels. This study uses a training and testing ratio of 80:20 with the undersampling method because it has the highest overall accuracy with Double Six Beach 83%, Seminyak 81%, Nusa Dua 84%, Kelingking 81%, and Canggu 84%. The prediction results obtained from the classification results are more dominant on the positive label. In addition to classifying for sentiment analysis, this study also measures the model’s performance created by calculating the value of precision, recall, F1-Score, macro average, and weight average for each beach classification result.
信息技术已成为各个领域的重要组成部分,其中之一就是旅游业。这可以从旅游领域网站的出现中看出,比如TripAdvisor。巴厘岛作为一个被国外熟知的旅游目的地,可以使用TripAdvisor作为推广巴厘岛旅游景点的地方,比如海滩。本研究将对巴厘岛最受欢迎的五个海滩的游客评论进行情感分析,即Double Six Beach, Seminyak, Nusa Dua, Delinking和Cangue,在TripAdvisor网站上。分析结果确定游客对五个海滩的看法是如何使用长短期记忆(LSTM)架构,并以积极和消极标签的形式对情绪进行分类。本研究采用欠采样的训练和测试比例为80:20,因为它的整体准确率最高,双六滩83%,水明漾81%,努沙杜瓦84%,柯灵京81%,仓谷84%。从分类结果中得到的预测结果在正标签上更占优势。除了对情感分析进行分类外,本研究还通过计算每个海滩分类结果的精度、召回率、F1-Score、宏观平均值和权重平均值的值来衡量模型的性能。
{"title":"LSTM-based Deep Learning Architecture of Tourist Review in Tripadvisor","authors":"Afina Ramadhani, E. Sutoyo, Vandha Widartha","doi":"10.1109/ICIC54025.2021.9632967","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632967","url":null,"abstract":"Information technology has become an essential component in various fields, one of which is in the world of tourism. This can be seen with the emergence of websites in the tourism sector, such as TripAdvisor. Bali, as a tourist destination that is well known to foreign countries, can use TripAdvisor as a place to promote tourist attractions in Bali, such as beaches. This study will conduct a sentiment analysis of tourist reviews on the five most favorite beaches in Bali, namely Double Six Beach, Seminyak, Nusa Dua, Delinking, and Cangue, on the TripAdvisor Website. The analysis results determine how tourists' opinions of the five beaches are using the Long Short-Term Memory (LSTM) architecture with sentiment classified in the form of positive and negative labels. This study uses a training and testing ratio of 80:20 with the undersampling method because it has the highest overall accuracy with Double Six Beach 83%, Seminyak 81%, Nusa Dua 84%, Kelingking 81%, and Canggu 84%. The prediction results obtained from the classification results are more dominant on the positive label. In addition to classifying for sentiment analysis, this study also measures the model’s performance created by calculating the value of precision, recall, F1-Score, macro average, and weight average for each beach classification result.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632989
Intan Maratus Sholihah, Hermawan Setiawan, Olga Geby Nabila
Cyber attacks are the main focus highlighted in all countries globally, both private and public sectors. It is undeniable that every private and public sector has a significant role in the digital world and cybersecurity. It is a reason for every country to improve and develop everything in cyber technology behind defense or attack. One of the solutions offered is to build a platform that can be used to share information to improve a coordinated and structured cybersecurity defense strategy. Data information, a list of attacks and threats can help stakeholders in each sector identify threats, attacks, and incidents in the cyber world. Therefore, this research will develop a web-based Information Sharing and Analysis Center (ISAC) platform to collect information and view a list of attacks and threats in the cyber world. The list of attacks and threats will be obtained through the Malware Information Sharing Platform (MISP). A two-factor authentication method will be implemented on the login form in the development of the ISAC platform. Two-factor authentication is a method used to secure user data from attackers. The research method used in building this platform is Design Research Methodology (DRM) with a prototyping development method. The results of this study obtained an ISAC portal that can be used to share information and display a list of threats and attacks received from the MISP platform.
{"title":"Design and Development of Information Sharing and Analysis Center (ISAC) as an Information Sharing Platform","authors":"Intan Maratus Sholihah, Hermawan Setiawan, Olga Geby Nabila","doi":"10.1109/ICIC54025.2021.9632989","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632989","url":null,"abstract":"Cyber attacks are the main focus highlighted in all countries globally, both private and public sectors. It is undeniable that every private and public sector has a significant role in the digital world and cybersecurity. It is a reason for every country to improve and develop everything in cyber technology behind defense or attack. One of the solutions offered is to build a platform that can be used to share information to improve a coordinated and structured cybersecurity defense strategy. Data information, a list of attacks and threats can help stakeholders in each sector identify threats, attacks, and incidents in the cyber world. Therefore, this research will develop a web-based Information Sharing and Analysis Center (ISAC) platform to collect information and view a list of attacks and threats in the cyber world. The list of attacks and threats will be obtained through the Malware Information Sharing Platform (MISP). A two-factor authentication method will be implemented on the login form in the development of the ISAC platform. Two-factor authentication is a method used to secure user data from attackers. The research method used in building this platform is Design Research Methodology (DRM) with a prototyping development method. The results of this study obtained an ISAC portal that can be used to share information and display a list of threats and attacks received from the MISP platform.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122197675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}