首页 > 最新文献

2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)最新文献

英文 中文
Real-Time 3-D Motion Gesture Recognition using Kinect2 as Basis for Traditional Dance Scripting 基于Kinect2的传统舞蹈脚本实时三维运动手势识别
A. Emanuel, Andreas Widjaja
This preliminary study presents a system capable of recognizing human gesture in real-time. The gesture is acquired from a Kinect2 sensor which provides skeleton joints represented by three-dimensional coordinate points. The model set consists of eight motion gestures is provided for basis of gesture recognition using Dynamic Time Warping (DTW) algorithm. DTW algorithm is utilized to identify in real time manner by measuring the shortest combined distances in x, y, and z coordinates in order to determined the matched gesture. It can be shown that the system is able to recognize these 8 motions in real time with some limitations. The findings of the this study will provide solid foundation of further research in which the ultimate goal of the research is to create system to automatically recognize sequence of motions in Indonesian traditional dances and convert them into standardized Resource Description Framework (RDF) scripts for the purpose of preserving these dances.
本初步研究提出了一个能够实时识别人类手势的系统。该手势由Kinect2传感器获取,该传感器提供由三维坐标点表示的骨骼关节。该模型集由8种运动手势组成,为动态时间扭曲(DTW)算法的手势识别提供了基础。DTW算法通过测量x、y、z坐标的最短组合距离来实时识别,从而确定匹配的手势。结果表明,该系统能够实时识别这8种运动,但存在一定的局限性。本研究的结果将为进一步的研究提供坚实的基础,研究的最终目标是创建一个系统,自动识别印度尼西亚传统舞蹈中的动作序列,并将其转换为标准化的资源描述框架(RDF)脚本,以保存这些舞蹈。
{"title":"Real-Time 3-D Motion Gesture Recognition using Kinect2 as Basis for Traditional Dance Scripting","authors":"A. Emanuel, Andreas Widjaja","doi":"10.1109/ICACSIS.2018.8618251","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618251","url":null,"abstract":"This preliminary study presents a system capable of recognizing human gesture in real-time. The gesture is acquired from a Kinect2 sensor which provides skeleton joints represented by three-dimensional coordinate points. The model set consists of eight motion gestures is provided for basis of gesture recognition using Dynamic Time Warping (DTW) algorithm. DTW algorithm is utilized to identify in real time manner by measuring the shortest combined distances in x, y, and z coordinates in order to determined the matched gesture. It can be shown that the system is able to recognize these 8 motions in real time with some limitations. The findings of the this study will provide solid foundation of further research in which the ultimate goal of the research is to create system to automatically recognize sequence of motions in Indonesian traditional dances and convert them into standardized Resource Description Framework (RDF) scripts for the purpose of preserving these dances.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICACSIS 2018 Index
{"title":"ICACSIS 2018 Index","authors":"","doi":"10.1109/icacsis.2018.8618222","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618222","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enumeration and Handling Security Issues of Government Official Web Application 政府官方网站应用程序的安全问题列举及处理
A. Fajar, S. Yazid
Web applications are one of the targets in information security attacks. Many security holes can be exploited can be source of damage and operational disruption of the application itself and even the IT infrastructure in it. Web Application Security Issues usually relate to problems that the developer or the owner may not aware or tend to ignore the issues. The main objective is to enumerate, describe and analyze security issues of the government official web application in Indonesia. The issues covers technical, environment and support issues of application development, configuration and security governance. Technical and environment issues identified using application vulnerability scanners tools. The result shows that web applications have most weakness in configuration issues, both application and security configuration. All of weaknesses that identified relate to technical development, application environment and support. The state of the art of the work lay on that how to improve the quality of web application development which often ignore security requirement during design, development, and deployment. That conditions may raise security issue when the web application has published that may affect other systems. The work recommend several approach to handle the security issues as a contribution to developer and the owner to fix the issues.
Web应用程序是信息安全攻击的目标之一。可以利用的许多安全漏洞可能是应用程序本身甚至其中的IT基础设施的破坏和操作中断的来源。Web应用程序安全问题通常与开发人员或所有者可能没有意识到或倾向于忽略的问题有关。主要目的是列举、描述和分析印度尼西亚政府官方web应用程序的安全问题。这些问题涵盖了应用程序开发、配置和安全治理的技术、环境和支持问题。使用应用程序漏洞扫描工具识别的技术和环境问题。结果表明,web应用程序在配置问题上最薄弱,无论是应用配置还是安全配置。所有确定的弱点都与技术开发、应用程序环境和支持有关。在web应用程序的设计、开发和部署过程中,安全需求往往被忽略,如何提高web应用程序的开发质量是当前工作的重点。当web应用程序发布时,这种情况可能会引起安全问题,从而可能影响其他系统。该工作推荐了几种处理安全问题的方法,作为对开发人员和所有者修复问题的贡献。
{"title":"Enumeration and Handling Security Issues of Government Official Web Application","authors":"A. Fajar, S. Yazid","doi":"10.1109/ICACSIS.2018.8618196","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618196","url":null,"abstract":"Web applications are one of the targets in information security attacks. Many security holes can be exploited can be source of damage and operational disruption of the application itself and even the IT infrastructure in it. Web Application Security Issues usually relate to problems that the developer or the owner may not aware or tend to ignore the issues. The main objective is to enumerate, describe and analyze security issues of the government official web application in Indonesia. The issues covers technical, environment and support issues of application development, configuration and security governance. Technical and environment issues identified using application vulnerability scanners tools. The result shows that web applications have most weakness in configuration issues, both application and security configuration. All of weaknesses that identified relate to technical development, application environment and support. The state of the art of the work lay on that how to improve the quality of web application development which often ignore security requirement during design, development, and deployment. That conditions may raise security issue when the web application has published that may affect other systems. The work recommend several approach to handle the security issues as a contribution to developer and the owner to fix the issues.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICACSIS 2018 Cover Page ICACSIS 2018封面
{"title":"ICACSIS 2018 Cover Page","authors":"","doi":"10.1109/icacsis.2018.8618245","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618245","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127103182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is Informatics Education Students ' Impression of Using Metacognitive Training System at The First Time? 信息学教育学生第一次使用元认知训练系统的印象如何?
W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah
The use of Metacognitive Training System (MTS) is relatively new in Indonesia. Previously, a prototype of MTS has been developed and applied in Universitas Gadjah Mada. To become a massive product, the prototype of the MTS must be tested on a larger scale. It is intended to capture user impression about a new product. In this paper, we present User Experience (UX) measurement for the developed MTS in larger scale, involving 90 undergraduate students of informatics education at Universitas Negeri Malang. Two UX measurement methods are used, including User Experience Questionnaires (UEQ) and short-interview. UEQ is used for capturing general impressions, whereas, short-interview is conducted to get deeper feedback about the efficacy of the MTS in their studies. The UX measurement result is benchmarked and revealed that Attractiveness, Efficiency, and Stimulation categorized excellent and the interview result shows that more than 75% respondent responds with the positive answer in five questions. With this result, it could be concluded that the MTS is ready for massive product.
元认知训练系统(MTS)的使用在印度尼西亚相对较新。此前,MTS的原型已经开发并应用于Gadjah Mada大学。为了成为一个大规模的产品,MTS的原型必须进行更大规模的测试。它旨在捕捉用户对新产品的印象。在本文中,我们以90名内玛琅大学信息学教育专业的本科生为研究对象,对已开发的MTS进行更大规模的用户体验(UX)测量。用户体验的测量方法有两种,分别是UEQ (User Experience questionnaire)和short-interview。UEQ是用来捕捉一般印象,而简短的访谈是为了获得关于MTS在研究中的效果的更深入的反馈。用户体验测量结果是基准,并显示吸引力,效率和刺激分类为优秀,面试结果显示,超过75%的受访者在五个问题中给出了肯定的答案。根据这一结果,可以得出结论,MTS已经准备好大规模生产。
{"title":"What is Informatics Education Students ' Impression of Using Metacognitive Training System at The First Time?","authors":"W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah","doi":"10.1109/ICACSIS.2018.8618171","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618171","url":null,"abstract":"The use of Metacognitive Training System (MTS) is relatively new in Indonesia. Previously, a prototype of MTS has been developed and applied in Universitas Gadjah Mada. To become a massive product, the prototype of the MTS must be tested on a larger scale. It is intended to capture user impression about a new product. In this paper, we present User Experience (UX) measurement for the developed MTS in larger scale, involving 90 undergraduate students of informatics education at Universitas Negeri Malang. Two UX measurement methods are used, including User Experience Questionnaires (UEQ) and short-interview. UEQ is used for capturing general impressions, whereas, short-interview is conducted to get deeper feedback about the efficacy of the MTS in their studies. The UX measurement result is benchmarked and revealed that Attractiveness, Efficiency, and Stimulation categorized excellent and the interview result shows that more than 75% respondent responds with the positive answer in five questions. With this result, it could be concluded that the MTS is ready for massive product.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Betawi Traditional Food Image Detection using ResNet and DenseNet 基于ResNet和DenseNet的传统食品图像检测
Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany
Technological developments in the field of Smart System is now growing and began to spread to various areas such as tourism sector. In this research, we developed a smart system for Betawi culinary tourism. Detection of traditional food names using images is a challenge because the variety of shape and direction of shooting is always different. The use of deep learning architecture is expected to overcome the problem, but the selection of effective deep learning architecture is also a problem. This study compares some deep learning architecture to determine the suitable architecture to detect culinary images. Based on our experimental results, DenseNet169 gives the best performance in terms of accuracy, error rate and training time when using CPU and ResNet50 when using GPU..
智能系统领域的技术发展正在不断发展,并开始向旅游部门等各个领域扩散。在这项研究中,我们开发了一个智能系统,用于Betawi烹饪旅游。使用图像检测传统食品名称是一项挑战,因为各种形状和拍摄方向总是不同的。使用深度学习架构有望克服这个问题,但选择有效的深度学习架构也是一个问题。本研究比较了一些深度学习架构,以确定适合检测烹饪图像的架构。根据我们的实验结果,DenseNet169在使用CPU和ResNet50时在准确性,错误率和训练时间方面给出了最好的性能。
{"title":"Betawi Traditional Food Image Detection using ResNet and DenseNet","authors":"Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany","doi":"10.1109/ICACSIS.2018.8618175","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618175","url":null,"abstract":"Technological developments in the field of Smart System is now growing and began to spread to various areas such as tourism sector. In this research, we developed a smart system for Betawi culinary tourism. Detection of traditional food names using images is a challenge because the variety of shape and direction of shooting is always different. The use of deep learning architecture is expected to overcome the problem, but the selection of effective deep learning architecture is also a problem. This study compares some deep learning architecture to determine the suitable architecture to detect culinary images. Based on our experimental results, DenseNet169 gives the best performance in terms of accuracy, error rate and training time when using CPU and ResNet50 when using GPU..","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of Factors that Influence Purchase Intention on Omni-channel Services 全渠道服务购买意愿影响因素分析
H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
The emergence of online and new digital media such as mobile applications and social media changed the retail business model and its consumers behaviors. These changes bring new challenges for companies and their stores to manage various channels. This phenomenon creates new idea to integrate them into Omni-channel services. It requires the readiness and complex maintenance because each channel has different characteristics. The consumers find difficulties in ensuring their transactions to be accurate and trustable. This study aims to analyze the factors that influence consumers to use Omni-channel services. It adopts the UTAUT2 with two new variables, such as personal innovativeness and perceived security. The quantitative approach is demonstrated using PLS-SEM with 168 respondents. As the results, social influence variable becomes the most influencing factor on purchasing intention in Omni-channel services, followed by performance expectation, and security perception. These factors become priority when a company formulates strategies for its omni-channel.
移动应用程序和社交媒体等在线和新型数字媒体的出现改变了零售商业模式及其消费者行为。这些变化给企业和门店的渠道管理带来了新的挑战。这种现象产生了将它们集成到全渠道服务中的新想法。由于每个通道具有不同的特性,因此需要做好准备并进行复杂的维护。消费者发现很难确保他们的交易是准确和可信的。本研究旨在分析影响消费者使用全渠道服务的因素。它采用UTAUT2,增加了个人创新和感知安全两个变量。使用PLS-SEM对168名受访者进行了定量分析。结果表明,社会影响变量成为全渠道服务购买意愿的最大影响因素,其次是绩效期望,其次是安全感知。这些因素成为企业制定全渠道战略的首要考虑因素。
{"title":"Analysis of Factors that Influence Purchase Intention on Omni-channel Services","authors":"H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICACSIS.2018.8618249","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618249","url":null,"abstract":"The emergence of online and new digital media such as mobile applications and social media changed the retail business model and its consumers behaviors. These changes bring new challenges for companies and their stores to manage various channels. This phenomenon creates new idea to integrate them into Omni-channel services. It requires the readiness and complex maintenance because each channel has different characteristics. The consumers find difficulties in ensuring their transactions to be accurate and trustable. This study aims to analyze the factors that influence consumers to use Omni-channel services. It adopts the UTAUT2 with two new variables, such as personal innovativeness and perceived security. The quantitative approach is demonstrated using PLS-SEM with 168 respondents. As the results, social influence variable becomes the most influencing factor on purchasing intention in Omni-channel services, followed by performance expectation, and security perception. These factors become priority when a company formulates strategies for its omni-channel.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma 精益方法在IT基础设施监控系统管理中的应用——以Kalbe农场为例
D. Pratama, R. F. Aji, S. Yazid
Monitoring system is a crucial part in establishing sophisticated IT infrastructure. Monitoring of IT infrastructure becomes indispensable for knowing the status and performance of technology components. Complex infrastructure, such as virtualization and cloud computing systems, boost up the number of nodes to be monitored. Notifications accumulate, which makes it more difficult to track problems. With lots of unneccessary notifications, the challenge to provide availabmty and improve service quality becomes more complex. A monitoring system that can deliver accurate monitoring information is needed. This research proposed a method to manage IT infrastructure monitoring system using Lean method. Lean method is a popular method of process management and has been successfully used in several IT process improvement projects. The results of this research show that lean methods can be applied to increase the quality of monitoring system, through the process stages that have been described in the lean implementation principle. Quantitatively it is known that after the lean method is applied, the number of network elements, nodes and interfaces monitored increases by 39%, 105% and 1%, respectively. While the alerts and events generated decreased by 77% and 49%, respectively. Qualitatively based on the identification of value achievement, the system can deliver the value expected by the customer, in which case the customer is a user of monitoring system.
监控系统是建立成熟的IT基础设施的重要组成部分。监视IT基础设施对于了解技术组件的状态和性能是必不可少的。复杂的基础设施,如虚拟化和云计算系统,增加了需要监控的节点数量。通知不断累积,这使得跟踪问题变得更加困难。由于存在大量不必要的通知,提供可用性和改进服务质量的挑战变得更加复杂。需要一个能够提供准确监测信息的监测系统。本研究提出了一种运用精益方法管理IT基础设施监控系统的方法。精益方法是一种流行的过程管理方法,并已成功地应用于多个IT过程改进项目。本研究的结果表明,精益方法可以通过精益实施原则中描述的过程阶段来提高监控系统的质量。定量可知,采用精益方法后,监控的网元、节点和接口数量分别增加39%、105%和1%。而生成的警报和事件则分别减少了77%和49%。在定性地识别价值实现的基础上,系统能够交付顾客所期望的价值,在这种情况下,顾客是监控系统的使用者。
{"title":"Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma","authors":"D. Pratama, R. F. Aji, S. Yazid","doi":"10.1109/ICACSIS.2018.8618260","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618260","url":null,"abstract":"Monitoring system is a crucial part in establishing sophisticated IT infrastructure. Monitoring of IT infrastructure becomes indispensable for knowing the status and performance of technology components. Complex infrastructure, such as virtualization and cloud computing systems, boost up the number of nodes to be monitored. Notifications accumulate, which makes it more difficult to track problems. With lots of unneccessary notifications, the challenge to provide availabmty and improve service quality becomes more complex. A monitoring system that can deliver accurate monitoring information is needed. This research proposed a method to manage IT infrastructure monitoring system using Lean method. Lean method is a popular method of process management and has been successfully used in several IT process improvement projects. The results of this research show that lean methods can be applied to increase the quality of monitoring system, through the process stages that have been described in the lean implementation principle. Quantitatively it is known that after the lean method is applied, the number of network elements, nodes and interfaces monitored increases by 39%, 105% and 1%, respectively. While the alerts and events generated decreased by 77% and 49%, respectively. Qualitatively based on the identification of value achievement, the system can deliver the value expected by the customer, in which case the customer is a user of monitoring system.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Indonesian Sentiments Using Indonesian Sentiment Lexicon by Considering Denial 用印尼情绪词汇分析印尼人的情绪,并考虑否认
F. Saputra, Yani Nurhadryani
The amount of public opinion can be very much against a trendy thing. Seeing this, it is not possible to read every opinion manually to get a conclusion from all opinions because it will take quite a lot of time. Sentiment analysis can be used as a solution to the problem. However, public opinion is not always written in just one sentence, it can even be written in more than one sentence. It should also be noted that sentences in Indonesian are divided into two based on their forms, namely simple sentences and compound sentences. Simple sentences only consist of one clause, while compound sentences consist of one or more clauses. Each clause in compound sentences can have differences based on whether there is denial the clause or not. Seeing this, this paper seeks to improve performance by considering the denial, sentence form in Indonesian, and punctuation that is used as a paused or finished intonation. Data used in this paper obtained from Twitter during the campaign of the election in West Java 2018. The methodology of model building consist of 4 stages: data preprocessing, feature extraction, classification, and evaluation. The model resulted in this paper has improved accuracy by 3% from 60.15% to 63.7%.
公众舆论的数量可能非常反对一件时髦的事情。看到这一点,不可能手动阅读每个意见,从所有意见中得出结论,因为这将花费相当多的时间。情感分析可以用来解决这个问题。然而,民意并不总是只用一句话来写,它甚至可以用不止一句话来写。还应该注意的是,印尼语的句子根据其形式分为两种,即简单句和复合句。简单句只由一个分句组成,而复合句由一个或多个分句组成。复合句中的每个分句根据是否存在否定分句而有差异。有鉴于此,本文试图通过考虑印尼语的否定、句式以及作为停顿语调或结束语调的标点符号来提高表现。本文中使用的数据是在2018年西爪哇选举期间从Twitter获得的。模型构建方法包括数据预处理、特征提取、分类和评价4个阶段。该模型的准确率从60.15%提高到63.7%,提高了3%。
{"title":"Analysis of Indonesian Sentiments Using Indonesian Sentiment Lexicon by Considering Denial","authors":"F. Saputra, Yani Nurhadryani","doi":"10.1109/ICACSIS.2018.8618142","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618142","url":null,"abstract":"The amount of public opinion can be very much against a trendy thing. Seeing this, it is not possible to read every opinion manually to get a conclusion from all opinions because it will take quite a lot of time. Sentiment analysis can be used as a solution to the problem. However, public opinion is not always written in just one sentence, it can even be written in more than one sentence. It should also be noted that sentences in Indonesian are divided into two based on their forms, namely simple sentences and compound sentences. Simple sentences only consist of one clause, while compound sentences consist of one or more clauses. Each clause in compound sentences can have differences based on whether there is denial the clause or not. Seeing this, this paper seeks to improve performance by considering the denial, sentence form in Indonesian, and punctuation that is used as a paused or finished intonation. Data used in this paper obtained from Twitter during the campaign of the election in West Java 2018. The methodology of model building consist of 4 stages: data preprocessing, feature extraction, classification, and evaluation. The model resulted in this paper has improved accuracy by 3% from 60.15% to 63.7%.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of User Awareness, Trust, and Privacy Concerns on Sharing Personal Information on Social Media: Facebook, Twitter, and Instagram 用户意识、信任和隐私问题对在社交媒体上分享个人信息的影响:Facebook、Twitter和Instagram
Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto
Facebook, Twitter, and Instagram are the most often and most widely used social-media sites, especially in Indonesia. The number of social-media users is increasing every year, accompanied by increased risks. One of those risks is to the security and privacy of users, as shown by the user-data leak experienced by Facebook in 2018. These issues led the authors to conduct research relating to the influence of privacy concerns, trust, and user awareness on the readiness to share personal information via social-media sites. A research model was developed based on several hypotheses. The research model was confirmed, and experiment was conducted from 340 social-media users through a questionnaire-based online survey over a period of 2 months. To confirm the structural model used in this research, reliability and validity analyses were performed. Structural equation model (SEM) analysis was used to detect relationships among constructs in the research model. The results of this research show that user awareness, trust, and privacy concerns have a positive and significant effect on sharing personal data on social media. Then we discussed the implications of our results for policy-making, practice, and future research.
Facebook、Twitter和Instagram是使用最频繁、最广泛的社交媒体网站,尤其是在印度尼西亚。社交媒体用户的数量每年都在增加,随之而来的是风险的增加。其中一个风险是用户的安全和隐私,正如Facebook在2018年经历的用户数据泄露所表明的那样。这些问题促使作者进行了有关隐私问题、信任和用户意识对通过社交媒体网站分享个人信息的准备程度的影响的研究。在几个假设的基础上建立了一个研究模型。对研究模型进行了验证,并对340名社交媒体用户进行了为期2个月的在线问卷调查。为了验证本研究中使用的结构模型,进行了信度和效度分析。使用结构方程模型(SEM)分析来检测研究模型中各构念之间的关系。本研究结果表明,用户意识、信任和隐私问题对在社交媒体上分享个人数据有积极而显著的影响。然后,我们讨论了我们的结果对政策制定、实践和未来研究的意义。
{"title":"Impact of User Awareness, Trust, and Privacy Concerns on Sharing Personal Information on Social Media: Facebook, Twitter, and Instagram","authors":"Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto","doi":"10.1109/ICACSIS.2018.8618220","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618220","url":null,"abstract":"Facebook, Twitter, and Instagram are the most often and most widely used social-media sites, especially in Indonesia. The number of social-media users is increasing every year, accompanied by increased risks. One of those risks is to the security and privacy of users, as shown by the user-data leak experienced by Facebook in 2018. These issues led the authors to conduct research relating to the influence of privacy concerns, trust, and user awareness on the readiness to share personal information via social-media sites. A research model was developed based on several hypotheses. The research model was confirmed, and experiment was conducted from 340 social-media users through a questionnaire-based online survey over a period of 2 months. To confirm the structural model used in this research, reliability and validity analyses were performed. Structural equation model (SEM) analysis was used to detect relationships among constructs in the research model. The results of this research show that user awareness, trust, and privacy concerns have a positive and significant effect on sharing personal data on social media. Then we discussed the implications of our results for policy-making, practice, and future research.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128704257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1