首页 > 最新文献

2021 Sixth International Conference on Informatics and Computing (ICIC)最新文献

英文 中文
K-Means Algorithm and Levenshtein Distance Algorithm for Sentiment Analysis of School Zonation System Policy 基于k -均值算法和Levenshtein距离算法的学区政策情感分析
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632943
Muhammad Haris Al Farisi, Arini, Luh Kesuma Wardhani, Iik Muhamad Malik Matin, Yusuf Durachman, R. Adelina, Faisal Nurdin
Equity and quality of education must be guaranteed in the national education system. To that end, the government issued a new student admission policy with a zoning system. To ensure the implementation of new student admissions (PPDB), the zoning system needs to be evaluated for community responses. However, evaluation using conventional techniques still has limitations. Sentiment analysis is a new approach to explore computing-based opinion. In this paper, we conduct a sentiment analysis of the new student admissions system (PPDB) zoning policy. We identify two types of sentiment namely positive and negative. We used the Levenshtein Distance algorithm for word normalization and clustered using the K-Means algorithm. The results of clustering are classified based on the confusion matrix. The data sources that we use are taken from 200 comments on Facebook and Youtube channels. The results obtained from public sentiment towards this policy are more negative sentiments than positive sentiments. The results obtained from the accuracy of the K-Means algorithm are 84%, while the combination of the k-means algorithm with Levenshtein distance reaches 90% accuracy.
教育公平和教育质量必须在国家教育体系中得到保障。为此,政府出台了分区制的新招生政策。为了确保新学生入学(PPDB)的实施,需要对分区制度进行评估,以了解社区的反应。然而,使用传统技术进行评估仍然存在局限性。情感分析是一种探索基于计算的意见的新方法。本文对新招生制度(PPDB)分区政策进行了情感分析。我们确定了两种情绪,即积极的和消极的。我们使用Levenshtein Distance算法进行单词规范化,并使用K-Means算法进行聚类。基于混淆矩阵对聚类结果进行分类。我们使用的数据来源来自Facebook和Youtube频道上的200条评论。从公众对这项政策的看法中得到的结果是负面情绪多于正面情绪。K-Means算法得到的结果准确率为84%,而K-Means算法与Levenshtein距离的结合准确率达到90%。
{"title":"K-Means Algorithm and Levenshtein Distance Algorithm for Sentiment Analysis of School Zonation System Policy","authors":"Muhammad Haris Al Farisi, Arini, Luh Kesuma Wardhani, Iik Muhamad Malik Matin, Yusuf Durachman, R. Adelina, Faisal Nurdin","doi":"10.1109/ICIC54025.2021.9632943","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632943","url":null,"abstract":"Equity and quality of education must be guaranteed in the national education system. To that end, the government issued a new student admission policy with a zoning system. To ensure the implementation of new student admissions (PPDB), the zoning system needs to be evaluated for community responses. However, evaluation using conventional techniques still has limitations. Sentiment analysis is a new approach to explore computing-based opinion. In this paper, we conduct a sentiment analysis of the new student admissions system (PPDB) zoning policy. We identify two types of sentiment namely positive and negative. We used the Levenshtein Distance algorithm for word normalization and clustered using the K-Means algorithm. The results of clustering are classified based on the confusion matrix. The data sources that we use are taken from 200 comments on Facebook and Youtube channels. The results obtained from public sentiment towards this policy are more negative sentiments than positive sentiments. The results obtained from the accuracy of the K-Means algorithm are 84%, while the combination of the k-means algorithm with Levenshtein distance reaches 90% accuracy.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sustainable Learning Micro-Credential using Blockchain for Student Achievement Records 使用区块链进行学生成绩记录的可持续学习微证书
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632913
Bambang Mardisentosa, U. Rahardja, Kenita Zelina, Fitra Putri Oganda, Marviola Hardini
This research objective is to present assessment and management to ensure the confidentiality of documents that are permanent, transparent, and sustainable for students by utilizing Blockchain technology and can be accessed directly by students. Maintained confidentiality of documents allows students to personalize the value of education and produce permanent documentation in formal and informal learning and determine the lifelong learning path of each individual. The method in this research using the Literature Review Study to learn problems from research with the theme of blockchain-based student achievement credentials in the world of education. The implication of this research is to provide an analysis of the use of blockchain micro-credentials on student achievement records in universities using the Literature Review Study Method. The results show that blockchain guarantees a foundation for student achievement record credentials that are durable, secure, and offer solid administration in managing student credentials. They can control them on an ongoing basis. Universities are also given the advantage of increasing student file security and reducing administrative and bureaucratic costs. Further research can be carried out by combining blockchain with AI innovation and private key and decentralized cloud to address issues concerning productivity, flexibility, capacity, and tighter security. With future updates, it is hoped that the use of blockchain in student achievement credentials can become more mature and can be applied to 1000 universities in Indonesia.
本研究的目标是通过利用区块链技术,提供评估和管理,以确保文件的保密性,这些文件对学生来说是永久、透明和可持续的,并且可以由学生直接访问。文件的保密性使学生能够个性化教育的价值,并在正式和非正式的学习中产生永久的文件,并确定每个人的终身学习路径。本研究采用文献综述研究的方法,从以教育领域基于区块链的学生成就证书为主题的研究中学习问题。本研究的含义是使用文献综述研究方法分析区块链微证书对大学学生成绩记录的使用。结果表明,区块链保证了学生成绩记录证书的基础,这些证书持久、安全,并在管理学生证书方面提供了可靠的管理。他们可以持续地控制它们。大学在提高学生档案安全性和减少行政和官僚成本方面也具有优势。可以将区块链与人工智能创新、私钥和去中心化云相结合,进一步研究解决生产力、灵活性、容量和更严格的安全性问题。随着未来的更新,希望区块链在学生成绩证书中的使用能够变得更加成熟,并可以应用于印度尼西亚的1000所大学。
{"title":"Sustainable Learning Micro-Credential using Blockchain for Student Achievement Records","authors":"Bambang Mardisentosa, U. Rahardja, Kenita Zelina, Fitra Putri Oganda, Marviola Hardini","doi":"10.1109/ICIC54025.2021.9632913","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632913","url":null,"abstract":"This research objective is to present assessment and management to ensure the confidentiality of documents that are permanent, transparent, and sustainable for students by utilizing Blockchain technology and can be accessed directly by students. Maintained confidentiality of documents allows students to personalize the value of education and produce permanent documentation in formal and informal learning and determine the lifelong learning path of each individual. The method in this research using the Literature Review Study to learn problems from research with the theme of blockchain-based student achievement credentials in the world of education. The implication of this research is to provide an analysis of the use of blockchain micro-credentials on student achievement records in universities using the Literature Review Study Method. The results show that blockchain guarantees a foundation for student achievement record credentials that are durable, secure, and offer solid administration in managing student credentials. They can control them on an ongoing basis. Universities are also given the advantage of increasing student file security and reducing administrative and bureaucratic costs. Further research can be carried out by combining blockchain with AI innovation and private key and decentralized cloud to address issues concerning productivity, flexibility, capacity, and tighter security. With future updates, it is hoped that the use of blockchain in student achievement credentials can become more mature and can be applied to 1000 universities in Indonesia.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Fuzzy-based Dynamic Reward for Discovery Activity in Appreciative Serious Game 欣赏型严肃游戏中发现活动的模糊动态奖励
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632894
Hanny Haryanto, Aripin, Acun Kardianawati, Umi Rosyidah, E. Z. Astuti, Erlin Dolphina
Interactivity and experience as the main characteristics of serious game has made it considered one of the most promising learning tools. Those characteristics supported mainly by game activity. Therefore, activity design is one of the most important element in developing serious game. One of the activity design concepts is to use Appreciative Learning, which consists of the stages of Discovery, Dream, Design and Destiny. The activity of exploration in Discovery stage is the main activity which is dominated by search and exploration. Because it is a search and exploration activity, it takes a long time and contains uncertainty in achievement. Dynamic rewards are needed to support the continuity of this Discovery activity. A good reward keeps the player’s focus on searching and exploration by providing indicators of achievement. This study uses fuzzy logic to form dynamic reward behavior in Discovery activities. Fuzzy logic considered one of the artificial intelligence methods that is suitable for games because of lightweight computation and could produce expressive AI behavior. The criteria used as input are the percentage of exploration and time, which will generate dynamic rewards for Discovery activities. The results of this study, fuzzy logic can produce three levels of variance of reward.
交互性和体验作为严肃游戏的主要特征,使其成为最有前途的学习工具之一。这些特征主要由游戏活动支持。因此,活动设计是开发严肃游戏的重要元素之一。活动设计理念之一是运用欣赏学习,包括发现、梦想、设计和命运四个阶段。发现阶段的探索活动是以搜索和探索为主导的主要活动。因为这是一个搜索和探索的活动,它需要很长时间,并包含成果的不确定性。需要动态奖励来支持这种发现活动的连续性。优秀的奖励通过提供成就指示,让玩家专注于搜索和探索。本研究运用模糊逻辑来形成发现活动中的动态奖励行为。模糊逻辑被认为是一种适用于游戏的人工智能方法,因为它的计算量很轻,可以产生富有表现力的人工智能行为。作为输入的标准是探索和时间的百分比,这将为探索活动产生动态奖励。本研究结果表明,模糊逻辑可以产生三个层次的奖励方差。
{"title":"Fuzzy-based Dynamic Reward for Discovery Activity in Appreciative Serious Game","authors":"Hanny Haryanto, Aripin, Acun Kardianawati, Umi Rosyidah, E. Z. Astuti, Erlin Dolphina","doi":"10.1109/ICIC54025.2021.9632894","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632894","url":null,"abstract":"Interactivity and experience as the main characteristics of serious game has made it considered one of the most promising learning tools. Those characteristics supported mainly by game activity. Therefore, activity design is one of the most important element in developing serious game. One of the activity design concepts is to use Appreciative Learning, which consists of the stages of Discovery, Dream, Design and Destiny. The activity of exploration in Discovery stage is the main activity which is dominated by search and exploration. Because it is a search and exploration activity, it takes a long time and contains uncertainty in achievement. Dynamic rewards are needed to support the continuity of this Discovery activity. A good reward keeps the player’s focus on searching and exploration by providing indicators of achievement. This study uses fuzzy logic to form dynamic reward behavior in Discovery activities. Fuzzy logic considered one of the artificial intelligence methods that is suitable for games because of lightweight computation and could produce expressive AI behavior. The criteria used as input are the percentage of exploration and time, which will generate dynamic rewards for Discovery activities. The results of this study, fuzzy logic can produce three levels of variance of reward.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115154757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Baseline Reduction Methods for Emotion Recognition Based On Electroencephalogram Signals 基于脑电图信号的情绪识别基线缩减方法的比较
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632948
I. M. Agus Wirawan, Retantyo Wardoyo, D. Lelono, Sri Kusrohmaniah, Saifudin Asrori
Emotions play an essential role in human social interactions. Its importance has sparked research on emotion recognition mainly based on electroencephalogram signals. However, differences in individual characteristics significantly affect the electroencephalogram signal pattern and impact the emotion recognition process. Several studies have used the baseline reduction approach with the Difference method to represent the differences in individual characteristics on electroencephalogram signals. On the other hand, the baseline reduction process on signal data, in general, can also use the Relative Difference and Fractional Difference methods. Therefore, the contribution of this research is to compare the performance of the three baseline reduction methods on emotion recognition based on electroencephalogram signals. In this study, feature extraction and representation were also carried out using Differential Entropy and 3D Cube. Furthermore, Convolutional Neural Network and Decision Tree methods are used to classify emotions. The experimental results using the DEAP dataset show that the Relative Difference and Fractional Difference methods are superior in reducing the baseline electroencephalogram signal compared to the Difference method. In addition, the Relative Difference and Fractional Difference methods produce a smoother electroencephalogram signal pattern in the baseline reduction process.
情感在人类社会交往中起着至关重要的作用。它的重要性引发了主要基于脑电图信号的情绪识别研究。然而,个体特征的差异会显著影响脑电图信号模式,从而影响情绪识别过程。一些研究使用基线缩减法和差分法来表示脑电图信号上个体特征的差异。另一方面,信号数据的基线约简过程,一般也可以采用相对差分法和分数差分法。因此,本研究的贡献在于比较三种基线缩减方法在基于脑电图信号的情绪识别中的表现。在本研究中,还使用微分熵和三维立方体进行了特征提取和表示。此外,使用卷积神经网络和决策树方法对情绪进行分类。基于DEAP数据集的实验结果表明,相对差分法和分数差分法在降低基线脑电图信号方面优于差分法。此外,相对差分法和分数差分法在基线还原过程中产生更平滑的脑电图信号模式。
{"title":"Comparison of Baseline Reduction Methods for Emotion Recognition Based On Electroencephalogram Signals","authors":"I. M. Agus Wirawan, Retantyo Wardoyo, D. Lelono, Sri Kusrohmaniah, Saifudin Asrori","doi":"10.1109/ICIC54025.2021.9632948","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632948","url":null,"abstract":"Emotions play an essential role in human social interactions. Its importance has sparked research on emotion recognition mainly based on electroencephalogram signals. However, differences in individual characteristics significantly affect the electroencephalogram signal pattern and impact the emotion recognition process. Several studies have used the baseline reduction approach with the Difference method to represent the differences in individual characteristics on electroencephalogram signals. On the other hand, the baseline reduction process on signal data, in general, can also use the Relative Difference and Fractional Difference methods. Therefore, the contribution of this research is to compare the performance of the three baseline reduction methods on emotion recognition based on electroencephalogram signals. In this study, feature extraction and representation were also carried out using Differential Entropy and 3D Cube. Furthermore, Convolutional Neural Network and Decision Tree methods are used to classify emotions. The experimental results using the DEAP dataset show that the Relative Difference and Fractional Difference methods are superior in reducing the baseline electroencephalogram signal compared to the Difference method. In addition, the Relative Difference and Fractional Difference methods produce a smoother electroencephalogram signal pattern in the baseline reduction process.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125899586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Text Mining for Sentiment Analysis of Online Lectures During the Covid-19 Pandemic 新冠肺炎疫情期间在线讲座情感分析文本挖掘的实现
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632981
El Miana Assni Ernamia, Asti Herliana, D. Alamsyah, A. Ihsan, Yusron Razak
Strategy against the spread of the Covid-19 virus in Indonesia by enacting Large-Scale Social Restrictions. The implementation of the Scale Social Restrictions forced all universities in Indonesia to close their institutes and conduct lectures online. Online lectures are considered as a solution to continue the teaching process during a pandemic. However, the lack of adaptation and sudden changes caused various responses and public opinions on social media. For this reason, this study aims to conduct text mining on Twitter in order to analyze public sentiment on the topic of "online lectures" the data obtained are classified into 2 classes (positive and negative). The results of the accuracy of the nave Bayes test with the cross validation technique obtained a result of 81.57%. For class precision, positive predictions are 100%, while for negative predictions the results are 73.06% and recall from true positive is 63.13% for true negative is 100%. And for the accuracy of K-Nearest Neighbor 62.10%, for class precision positive prediction is 62.06% while for negative prediction results are 62.13% and recall from true positive is 62.24% for true negative is 61.95%
通过实施大规模社会限制来防止Covid-19病毒在印度尼西亚传播的战略。规模社会限制的实施迫使印度尼西亚所有大学关闭其研究所并在网上进行讲座。在线讲座被认为是在大流行期间继续教学过程的解决方案。然而,由于缺乏适应和突然的变化,在社交媒体上引起了各种各样的反应和舆论。因此,本研究的目的是在Twitter上进行文本挖掘,以分析公众对“在线讲座”这一话题的情绪,所获得的数据分为两类(正面和负面)。交叉验证技术对贝叶斯均值检验的准确率为81.57%。对于类精度,正面预测为100%,而对于负面预测,结果为73.06%,真阳性召回率为63.13%,真阴性为100%。k近邻的正确率为62.10%,类精度的正预测结果为62.06%,负预测结果为62.13%,真阳性召回率为62.24%,真阴性召回率为61.95%
{"title":"Implementation of Text Mining for Sentiment Analysis of Online Lectures During the Covid-19 Pandemic","authors":"El Miana Assni Ernamia, Asti Herliana, D. Alamsyah, A. Ihsan, Yusron Razak","doi":"10.1109/ICIC54025.2021.9632981","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632981","url":null,"abstract":"Strategy against the spread of the Covid-19 virus in Indonesia by enacting Large-Scale Social Restrictions. The implementation of the Scale Social Restrictions forced all universities in Indonesia to close their institutes and conduct lectures online. Online lectures are considered as a solution to continue the teaching process during a pandemic. However, the lack of adaptation and sudden changes caused various responses and public opinions on social media. For this reason, this study aims to conduct text mining on Twitter in order to analyze public sentiment on the topic of \"online lectures\" the data obtained are classified into 2 classes (positive and negative). The results of the accuracy of the nave Bayes test with the cross validation technique obtained a result of 81.57%. For class precision, positive predictions are 100%, while for negative predictions the results are 73.06% and recall from true positive is 63.13% for true negative is 100%. And for the accuracy of K-Nearest Neighbor 62.10%, for class precision positive prediction is 62.06% while for negative prediction results are 62.13% and recall from true positive is 62.24% for true negative is 61.95%","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"34 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Recognition-based Door Locking System with Two-Factor Authentication Using OpenCV 基于OpenCV的人脸识别双因素认证门锁系统
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632928
Muhammad Arif Azhari Halim, M. Othman, Aa Zezen Zaenal Abidin, E. Hamid, N. Harum, W. Shah
This project develops a face recognition-based door locking system with two-factor authentication using OpenCV. It uses Raspberry Pi 4 as the microcontroller. Face recognition-based door locking has been around for many years, but most of them only provide face recognition without any added security features, and they are costly. The design of this project is based on human face recognition and the sending of a One-Time Password (OTP) using the Twilio service. It will recognize the person at the front door. Only people who match the faces stored in its dataset and then inputs the correct OTP will have access to unlock the door. The Twilio service and image processing algorithm Local Binary Pattern Histogram (LBPH) has been adopted for this system. Servo motor operates as a mechanism to access the door. Results show that LBPH takes a short time to recognize a face. Additionally, if an unknown face is detected, it will log this instance into a "Fail" file and an accompanying CSV sheet.
本课题利用OpenCV开发了一个基于人脸识别的双因素认证门锁系统。它使用树莓派4作为微控制器。基于人脸识别的门锁已经存在很多年了,但大多数门锁只提供人脸识别功能,没有任何附加的安全功能,而且价格昂贵。这个项目的设计是基于人脸识别和使用Twilio服务发送一次性密码(OTP)。它会认出站在前门的人。只有与存储在数据集中的人脸相匹配,然后输入正确的OTP的人才能打开门。本系统采用Twilio服务和图像处理算法局部二值模式直方图(Local Binary Pattern Histogram, LBPH)。伺服电机作为进入门的机构。结果表明,LBPH识别人脸需要很短的时间。此外,如果检测到未知的人脸,它将把这个实例记录到“Fail”文件和附带的CSV表中。
{"title":"Face Recognition-based Door Locking System with Two-Factor Authentication Using OpenCV","authors":"Muhammad Arif Azhari Halim, M. Othman, Aa Zezen Zaenal Abidin, E. Hamid, N. Harum, W. Shah","doi":"10.1109/ICIC54025.2021.9632928","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632928","url":null,"abstract":"This project develops a face recognition-based door locking system with two-factor authentication using OpenCV. It uses Raspberry Pi 4 as the microcontroller. Face recognition-based door locking has been around for many years, but most of them only provide face recognition without any added security features, and they are costly. The design of this project is based on human face recognition and the sending of a One-Time Password (OTP) using the Twilio service. It will recognize the person at the front door. Only people who match the faces stored in its dataset and then inputs the correct OTP will have access to unlock the door. The Twilio service and image processing algorithm Local Binary Pattern Histogram (LBPH) has been adopted for this system. Servo motor operates as a mechanism to access the door. Results show that LBPH takes a short time to recognize a face. Additionally, if an unknown face is detected, it will log this instance into a \"Fail\" file and an accompanying CSV sheet.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128414414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptation of the meCUE 2.0 Version for User Experience(UX) Measurement Approach into Indonesian Context 用户体验(UX)测量方法的meCUE 2.0版本在印尼环境中的改编
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9633008
Aang Kisnu Darmawan, Moh. Bhanu Setyawan, Adi Fajaryanto Cobantoro, Fauzan Masykur, Agus Komarudin, Mohammad Waail al Wajieh
The user experience (UX) of an item must be evaluated by assessing its user experience as a key feature of product growth. There are several frameworks for user experience assessment questionnaires, one of which is very popular: meCUE. However, the meCUE framework was originally developed in German, then in English, and no research has yet been conducted to develop the Indonesian version of the meCUE framework. This study aims to adapt the meCUE 2.0 framework into the Indonesian version using cross-cultural adaptation and reliability testing. The meCUE 2.0 framework is a user experience questionnaire consisting of 33 questions detailed in Modules I and II, on Perception of instrumental and non-instrumental product qualities, Module III on Emotions, and Module IV on Consequences. This adaptation version is then tested against the Smart Regency Service Application, namely Pamekasan Smart Mobile Application (PSMA), involving 15 respondents from technical and non-technical backgrounds who will be given facial validity and 60 respondents to verify the validity of the Indonesian version of meCUE 2.0 for the various populations. The test results of Cronbach's Alpha from the adaptation version in Indonesian for the meCUE 2.0 framework are 0.868 for module I, 0.870 for module II, 0.894 for module III, and 0.841 for module IV, which concludes that this version can be relied on for use by user experience practitioners. This adaptation version is expected to help researchers and user experience practitioners in Indonesia evaluate product user experiences.
一个产品的用户体验(UX)必须通过将其用户体验作为产品增长的一个关键特征来评估。用户体验评估问卷有几个框架,其中一个非常流行:meCUE。然而,meCUE框架最初是用德语开发的,然后是英语,并且尚未进行研究以开发meCUE框架的印尼语版本。本研究旨在采用跨文化适应和信度测试的方法,将meCUE 2.0框架改编为印尼版本。meCUE 2.0框架是一份用户体验问卷,由33个问题组成,具体在模块I和II中,关于仪器和非仪器产品质量的感知,模块III关于情感,模块IV关于后果。然后,这个改编版本针对智能摄事服务应用程序,即Pamekasan智能移动应用程序(PSMA)进行测试,涉及15名来自技术和非技术背景的受访者,他们将进行面部有效性测试,60名受访者将验证印度尼西亚版meCUE 2.0对不同人群的有效性。meCUE 2.0框架的印尼语改编版Cronbach’s Alpha测试结果为模块一0.868,模块二0.870,模块三0.894,模块四0.841,该版本可供用户体验从业者信赖使用。该适应版本有望帮助印度尼西亚的研究人员和用户体验从业人员评估产品用户体验。
{"title":"Adaptation of the meCUE 2.0 Version for User Experience(UX) Measurement Approach into Indonesian Context","authors":"Aang Kisnu Darmawan, Moh. Bhanu Setyawan, Adi Fajaryanto Cobantoro, Fauzan Masykur, Agus Komarudin, Mohammad Waail al Wajieh","doi":"10.1109/ICIC54025.2021.9633008","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9633008","url":null,"abstract":"The user experience (UX) of an item must be evaluated by assessing its user experience as a key feature of product growth. There are several frameworks for user experience assessment questionnaires, one of which is very popular: meCUE. However, the meCUE framework was originally developed in German, then in English, and no research has yet been conducted to develop the Indonesian version of the meCUE framework. This study aims to adapt the meCUE 2.0 framework into the Indonesian version using cross-cultural adaptation and reliability testing. The meCUE 2.0 framework is a user experience questionnaire consisting of 33 questions detailed in Modules I and II, on Perception of instrumental and non-instrumental product qualities, Module III on Emotions, and Module IV on Consequences. This adaptation version is then tested against the Smart Regency Service Application, namely Pamekasan Smart Mobile Application (PSMA), involving 15 respondents from technical and non-technical backgrounds who will be given facial validity and 60 respondents to verify the validity of the Indonesian version of meCUE 2.0 for the various populations. The test results of Cronbach's Alpha from the adaptation version in Indonesian for the meCUE 2.0 framework are 0.868 for module I, 0.870 for module II, 0.894 for module III, and 0.841 for module IV, which concludes that this version can be relied on for use by user experience practitioners. This adaptation version is expected to help researchers and user experience practitioners in Indonesia evaluate product user experiences.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131927596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Avoiding Lookup Table in AES Algorithm AES算法中避免查找表
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632897
Ragiel Hadi Prayitno, S. Sudiro, S. Madenda
This article describes the AES encryption and decryption process without using lookup tables in the MixColumns transformation. The encryption process consists of transforming subbytes, shiftrows, mixcolumns and addroundkey. The process was carried out for 10 rounds, but in round 10 the mixcolumns transformation was not carried out. The decryption process consists of inverse mixcolumns, inverse shiftrows, inverse subbytes and addroundkey. In this study, the AES encryption and decryption process was carried out using two methods, namely based on the lookup table and without using the lookup table on the MC/IMC transformation. The method in this article is applied to Matlab software. The experimental results show that the encryption and decryption process using a lookup table is slower than the method without a lookup table. The encryption process without a lookup table on the MC transformation takes 0.091 seconds while using a lookup table takes 0.399 seconds. The decryption process without a lookup table on the IMC transformation takes 0.149 seconds while using a lookup table takes 0.206 seconds.
本文描述了在MixColumns转换中不使用查找表的AES加密和解密过程。加密过程包括转换子字节、移位、混合列和地址键。该过程进行了10轮,但在第10轮中没有进行混合列转换。解密过程由逆混合列、逆移位、逆子字节和地址键组成。本研究采用基于查找表和不使用查找表对MC/IMC变换进行AES加解密的两种方法。本文的方法在Matlab软件中得到了应用。实验结果表明,使用查找表的加解密过程比不使用查找表的方法要慢。在MC转换中不使用查找表的加密过程需要0.091秒,而使用查找表需要0.399秒。在IMC转换上不使用查找表的解密过程需要0.149秒,而使用查找表需要0.206秒。
{"title":"Avoiding Lookup Table in AES Algorithm","authors":"Ragiel Hadi Prayitno, S. Sudiro, S. Madenda","doi":"10.1109/ICIC54025.2021.9632897","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632897","url":null,"abstract":"This article describes the AES encryption and decryption process without using lookup tables in the MixColumns transformation. The encryption process consists of transforming subbytes, shiftrows, mixcolumns and addroundkey. The process was carried out for 10 rounds, but in round 10 the mixcolumns transformation was not carried out. The decryption process consists of inverse mixcolumns, inverse shiftrows, inverse subbytes and addroundkey. In this study, the AES encryption and decryption process was carried out using two methods, namely based on the lookup table and without using the lookup table on the MC/IMC transformation. The method in this article is applied to Matlab software. The experimental results show that the encryption and decryption process using a lookup table is slower than the method without a lookup table. The encryption process without a lookup table on the MC transformation takes 0.091 seconds while using a lookup table takes 0.399 seconds. The decryption process without a lookup table on the IMC transformation takes 0.149 seconds while using a lookup table takes 0.206 seconds.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Requirements Engineering Model using Goal-Oriented Modelling with Text Pre-Processing Technique 基于目标建模和文本预处理技术的自动化需求工程模型
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632980
R. Delima, Retantyo Wardoyo, K. Mustofa
Requirements engineering (RE) is an essential initial stage in the software engineering process. RE activities include elicitation, analysis, specification, and validation. The efficiency of the RE process relies heavily on a systems analyst to perform software specifications. Automation of activities in RE can increase time efficiency. In this study, the Automatic Requirements Engineering Model (AREM) was developed to automate the analysis, specification, and validation processes of the RE. The model was developed by integrating a goal-oriented model and text pre-processing technique. At the elicitation stage, is developed a standard input document that refers to the GORE elements. The requirements analysis was developed by applying the breadth-first search method, forward chaining, and the agent approach. Text pre-processing techniques were used for document extraction and preparation of requirements specifications. The model produces requirements specifications in the form of goal trees, class diagrams, use case diagrams, and sequence diagrams
需求工程(RE)是软件工程过程中必不可少的初始阶段。可重构活动包括引出、分析、规范和验证。RE过程的效率在很大程度上依赖于系统分析人员执行软件规范。RE中活动的自动化可以提高时间效率。在本研究中,开发了自动化需求工程模型(AREM),用于自动化需求工程的分析、规范和验证过程。该模型通过集成面向目标的模型和文本预处理技术来开发。在启发阶段,开发了一个引用GORE元素的标准输入文档。应用广度优先搜索法、前向链和代理方法进行需求分析。文本预处理技术用于文档提取和需求规范的准备。模型以目标树、类图、用例图和序列图的形式产生需求规范
{"title":"Automatic Requirements Engineering Model using Goal-Oriented Modelling with Text Pre-Processing Technique","authors":"R. Delima, Retantyo Wardoyo, K. Mustofa","doi":"10.1109/ICIC54025.2021.9632980","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632980","url":null,"abstract":"Requirements engineering (RE) is an essential initial stage in the software engineering process. RE activities include elicitation, analysis, specification, and validation. The efficiency of the RE process relies heavily on a systems analyst to perform software specifications. Automation of activities in RE can increase time efficiency. In this study, the Automatic Requirements Engineering Model (AREM) was developed to automate the analysis, specification, and validation processes of the RE. The model was developed by integrating a goal-oriented model and text pre-processing technique. At the elicitation stage, is developed a standard input document that refers to the GORE elements. The requirements analysis was developed by applying the breadth-first search method, forward chaining, and the agent approach. Text pre-processing techniques were used for document extraction and preparation of requirements specifications. The model produces requirements specifications in the form of goal trees, class diagrams, use case diagrams, and sequence diagrams","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unraveling the Complexity of Developing a National Cyber Defense Sovereignty Policy: A Case Study of Indonesia 揭示发展国家网络防御主权政策的复杂性:以印度尼西亚为例
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632946
R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon
Developing effective policies to build cyber sovereignty is not easy. Such a complex policy ecosystem requires holistic and comprehensive thinking. Indonesia as a developing country feels the need to conduct a thorough study of the issues behind the high complexity. The purpose of this study is to describe and at the same time unravel the complexities of managing cyber ecosystems in Indonesia. The research methodology used is qualitative, where data is obtained through interviews with a number of experts, literature review, and direct observation in the field. The first three steps of Soft System Methodology are being used as the baseline of this study. The result is a rich picture segmented into eleven main domains, which form the ecosystem of cyber defense.
制定有效的政策来建立网络主权并非易事。如此复杂的政策生态系统,需要统筹兼顾的思维。印度尼西亚作为一个发展中国家认为有必要对高度复杂性背后的问题进行彻底的研究。本研究的目的是描述并同时揭示印度尼西亚管理网络生态系统的复杂性。使用的研究方法是定性的,其中数据是通过与一些专家的访谈,文献回顾,并在该领域的直接观察获得的。软系统方法论的前三个步骤被用作本研究的基线。其结果是一幅丰富的画面,分为11个主要领域,形成了网络防御的生态系统。
{"title":"Unraveling the Complexity of Developing a National Cyber Defense Sovereignty Policy: A Case Study of Indonesia","authors":"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon","doi":"10.1109/ICIC54025.2021.9632946","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632946","url":null,"abstract":"Developing effective policies to build cyber sovereignty is not easy. Such a complex policy ecosystem requires holistic and comprehensive thinking. Indonesia as a developing country feels the need to conduct a thorough study of the issues behind the high complexity. The purpose of this study is to describe and at the same time unravel the complexities of managing cyber ecosystems in Indonesia. The research methodology used is qualitative, where data is obtained through interviews with a number of experts, literature review, and direct observation in the field. The first three steps of Soft System Methodology are being used as the baseline of this study. The result is a rich picture segmented into eleven main domains, which form the ecosystem of cyber defense.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 Sixth International Conference on Informatics and Computing (ICIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1