Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415778
Syech Pranata, T. Mantoro, M. A. Ayu, Anton Satria Prabuwon, D. A. Dewi
Along with today's fast-growing technology, machines/devices especially mobile devices have been developed using many sensors to simplify the user's activities. One of the most known and frequently used sensors is called accelerometer, daily used as a step counter, image stabilization, and user interfaces control. However, activity recognition is considered a difficult task due to the reality that each activity has its unique features and there is no clear analytical way to analyze sensor data into specific forms of action in general. This study examines the potential and exciting ability of the accelerometer to recognize user activity by making simple prototype to support the implementation of this user activity recognition. After data acquisition, deep learning classifier will be used to differentiate activities. This research will show the efficiency and utilization of using accelerometer combined with deep learning in recognizing user activity, which can be associated with many applications for advance study such as falling detection, abnormality detection, and prediction of human behavior.
{"title":"Recognizing User Activity Using a Smartphone's Accelerometer and Deep Neural Network Classifier","authors":"Syech Pranata, T. Mantoro, M. A. Ayu, Anton Satria Prabuwon, D. A. Dewi","doi":"10.1109/ICCED51276.2020.9415778","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415778","url":null,"abstract":"Along with today's fast-growing technology, machines/devices especially mobile devices have been developed using many sensors to simplify the user's activities. One of the most known and frequently used sensors is called accelerometer, daily used as a step counter, image stabilization, and user interfaces control. However, activity recognition is considered a difficult task due to the reality that each activity has its unique features and there is no clear analytical way to analyze sensor data into specific forms of action in general. This study examines the potential and exciting ability of the accelerometer to recognize user activity by making simple prototype to support the implementation of this user activity recognition. After data acquisition, deep learning classifier will be used to differentiate activities. This research will show the efficiency and utilization of using accelerometer combined with deep learning in recognizing user activity, which can be associated with many applications for advance study such as falling detection, abnormality detection, and prediction of human behavior.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415850
Zaenal Alamsyah, T. Mantoro, Umar Adityawarman, M. A. Ayu
RSA is a popular asymmetric key algorithm with two keys scheme, a public key for encryption and private key for decryption. RSA has weaknesses in encryption and decryption of data, including slow in the process of encryption and decryption because it uses a lot of number generation. The reason is RSA algorithm can work well and is resistant to attacks such as brute force and statistical attacks. in this paper, it aims to strengthen the scheme by combining RSA with the One Time Pad algorithm so that it will bring up a new design to be used to enhance security on two-factor authentication. Contribution in this paper is to find a new scheme algorithm for an enhanced scheme of RSA. One Time Pad and RSA can combine as well.
RSA是一种流行的非对称密钥算法,它有两个密钥方案,一个用于加密的公钥和一个用于解密的私钥。RSA在数据的加解密方面存在弱点,包括加解密过程缓慢,因为它使用了大量的数字生成。原因是RSA算法可以很好地工作,并且可以抵抗暴力破解和统计攻击等攻击。在本文中,它旨在通过将RSA与One Time Pad算法相结合来加强该方案,从而提出一种用于增强双因素认证安全性的新设计。本文的贡献在于为RSA的增强方案找到了一种新的方案算法。One Time Pad和RSA也可以合并。
{"title":"Combination RSA with One Time Pad for Enhanced Scheme of Two-Factor Authentication","authors":"Zaenal Alamsyah, T. Mantoro, Umar Adityawarman, M. A. Ayu","doi":"10.1109/ICCED51276.2020.9415850","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415850","url":null,"abstract":"RSA is a popular asymmetric key algorithm with two keys scheme, a public key for encryption and private key for decryption. RSA has weaknesses in encryption and decryption of data, including slow in the process of encryption and decryption because it uses a lot of number generation. The reason is RSA algorithm can work well and is resistant to attacks such as brute force and statistical attacks. in this paper, it aims to strengthen the scheme by combining RSA with the One Time Pad algorithm so that it will bring up a new design to be used to enhance security on two-factor authentication. Contribution in this paper is to find a new scheme algorithm for an enhanced scheme of RSA. One Time Pad and RSA can combine as well.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134338220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415786
Z. R. Mahayuddin, A. Saif
Edge features or characteristics are the significant local intensity variation of pictorial structure in an image or frame or video sequence. Edge detection process finds the existence and position of pixels causes by significant differences in intensity of the images or frames or video sequences. However, selection of appropriate edge features specially to detect moving objects using aerial types of video sequences is still an elusive research concern because of various constraints for aerial frames, i.e. various altitudes, lack of features available for detection, motion variation etc. This research proposes comparative evaluation of different edge features based moving object detection methods to make it easy to decide which edge features based detection method is appropriate for extraction of moving object from aerial frames. Proposed research selected three edge features for detection, i.e. Sobel, Prewitt and Canny for moving object extraction to process high and low pictorial brightness variation for aerial video sequences. Proposed research illustrates the comparative performance of edge features based moving object detection. Each of the method is evaluated with extensive experimental analysis with standard performance metrics. Experimental results demonstrate effective comparison among each method with various performance metrics to ensure optimum detection performance for moving objects.
{"title":"Edge Feature based Moving Object Detection Using Aerial Images: A Comparative Study","authors":"Z. R. Mahayuddin, A. Saif","doi":"10.1109/ICCED51276.2020.9415786","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415786","url":null,"abstract":"Edge features or characteristics are the significant local intensity variation of pictorial structure in an image or frame or video sequence. Edge detection process finds the existence and position of pixels causes by significant differences in intensity of the images or frames or video sequences. However, selection of appropriate edge features specially to detect moving objects using aerial types of video sequences is still an elusive research concern because of various constraints for aerial frames, i.e. various altitudes, lack of features available for detection, motion variation etc. This research proposes comparative evaluation of different edge features based moving object detection methods to make it easy to decide which edge features based detection method is appropriate for extraction of moving object from aerial frames. Proposed research selected three edge features for detection, i.e. Sobel, Prewitt and Canny for moving object extraction to process high and low pictorial brightness variation for aerial video sequences. Proposed research illustrates the comparative performance of edge features based moving object detection. Each of the method is evaluated with extensive experimental analysis with standard performance metrics. Experimental results demonstrate effective comparison among each method with various performance metrics to ensure optimum detection performance for moving objects.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121287214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415775
Anang Suryana, Mukhlis Ali, Samsul Pahmi, Muhammad Mahmud, Duddy Suherman, A. Dera, Ilham Fazrul Iman, Teja Nuralam
Factors causing pollution both water and air and fires can be caused by the pollution of liquefied petroleum gas (LPG) that comes from gas network leaks from National gas Company (PGN) to households. For National gas Company (PGN) due to LPG gas pipeline leaks can cause quantitative losses. To prevent losses caused by LPG network leaks that are distributed to households, a gas pipeline leak detection system can be applied using the concept of fluid mechanics. Where the position of the gas pipe leakage can be known by the difference in gas pressure at the two ends of the pipe. The difference in pressure on the small gas pipe after the calculation by including the friction factor then the pipe has a leak, but if the difference is greater then the pipe is in normal condition. To detect leaks quickly, the pressure monitoring data will be monitored in a database that is displayed in front end point of the location of leakage of household gas pipes to officers who monitor the performance of the household gas pipeline. The results of this study indicate that the distance or position of the gas leak in the gas pipeline network can be measured by the difference between the two pressures at both ends of the gas pipe that is leaking. The error resulting from the reading of the pressure sensor which produces the calculated distance value to the measurement result of the actual distance of the gas leak position in the pipeline is 0.63% which shows the results of this study are very good.
{"title":"Detection of Leak Position in Household LPG Distribution Pipes Using Gas Pressure Sensors and Continuity Equation","authors":"Anang Suryana, Mukhlis Ali, Samsul Pahmi, Muhammad Mahmud, Duddy Suherman, A. Dera, Ilham Fazrul Iman, Teja Nuralam","doi":"10.1109/ICCED51276.2020.9415775","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415775","url":null,"abstract":"Factors causing pollution both water and air and fires can be caused by the pollution of liquefied petroleum gas (LPG) that comes from gas network leaks from National gas Company (PGN) to households. For National gas Company (PGN) due to LPG gas pipeline leaks can cause quantitative losses. To prevent losses caused by LPG network leaks that are distributed to households, a gas pipeline leak detection system can be applied using the concept of fluid mechanics. Where the position of the gas pipe leakage can be known by the difference in gas pressure at the two ends of the pipe. The difference in pressure on the small gas pipe after the calculation by including the friction factor then the pipe has a leak, but if the difference is greater then the pipe is in normal condition. To detect leaks quickly, the pressure monitoring data will be monitored in a database that is displayed in front end point of the location of leakage of household gas pipes to officers who monitor the performance of the household gas pipeline. The results of this study indicate that the distance or position of the gas leak in the gas pipeline network can be measured by the difference between the two pressures at both ends of the gas pipe that is leaking. The error resulting from the reading of the pressure sensor which produces the calculated distance value to the measurement result of the actual distance of the gas leak position in the pipeline is 0.63% which shows the results of this study are very good.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"11 27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415823
Paikun, Riyan Rizkiyansah, Mira Novita, Ari Riana, A. O. Irlan
The construction of classrooms which are the main means of education and learning activities is always carried out every year, to meet the needs of classrooms which in 2020 are now experiencing a shortage of 15,931 classrooms. The implementation of school construction so far in Indonesia has been carried out in a self-managed manner, and the construction system uses conventional methods, so it requires a lot of human resources, requires a very long time, and always leaves construction waste. The existing precast construction method is still limited to certain building components, so if the implementation of classroom construction uses the precast method, it is still combined with conventional methods and only speeds up the time a little, and still leaves construction waste, therefore there needs to be a solution so that the implementation of classroom construction does not require a lot of human resources, does not require a long time, and does not leave construction waste. To solve this problem, this research offers an instant school room construction design solution, as a method of implementing the construction of new classrooms. This study uses a pure experimental method and results in the construction design of all building components in classroom construction, including modules of sloop structure components, main columns, beams, walls, floors and roof truss. With this design building components can be produced precast, so that the implementation of the construction of new classrooms at school locations, only providing locations that are ready, then assembling all building components that are produced precast. Using this design can build new classrooms quickly, does not require a lot of human resources, and does not leave construction waste. The design of instant construction of new classrooms in schools, is the right solution as an environmentally friendly method of construction.
{"title":"Instant Construction Design Environmentally Friendly for Building a New Classroom School","authors":"Paikun, Riyan Rizkiyansah, Mira Novita, Ari Riana, A. O. Irlan","doi":"10.1109/ICCED51276.2020.9415823","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415823","url":null,"abstract":"The construction of classrooms which are the main means of education and learning activities is always carried out every year, to meet the needs of classrooms which in 2020 are now experiencing a shortage of 15,931 classrooms. The implementation of school construction so far in Indonesia has been carried out in a self-managed manner, and the construction system uses conventional methods, so it requires a lot of human resources, requires a very long time, and always leaves construction waste. The existing precast construction method is still limited to certain building components, so if the implementation of classroom construction uses the precast method, it is still combined with conventional methods and only speeds up the time a little, and still leaves construction waste, therefore there needs to be a solution so that the implementation of classroom construction does not require a lot of human resources, does not require a long time, and does not leave construction waste. To solve this problem, this research offers an instant school room construction design solution, as a method of implementing the construction of new classrooms. This study uses a pure experimental method and results in the construction design of all building components in classroom construction, including modules of sloop structure components, main columns, beams, walls, floors and roof truss. With this design building components can be produced precast, so that the implementation of the construction of new classrooms at school locations, only providing locations that are ready, then assembling all building components that are produced precast. Using this design can build new classrooms quickly, does not require a lot of human resources, and does not leave construction waste. The design of instant construction of new classrooms in schools, is the right solution as an environmentally friendly method of construction.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132416981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415810
Kamdan, Ivana Lucia Kharisma, Dini Oktarina Dwi Handayanil, Umar Aditiawarman, H. A. Maarif
Fingerprint biometrics provide higher confidence in the identity verification process and help create user accountability. Fingerprint as one of the most popular types of biometrics and one of the simplest and most valuable security data that can be protected by all secure physical access to the building. There are various types of biometrics such as fingerprints, iris, voice, body, palms, heart rate and the advantages and disadvantages of each type of biometrics are also discussed in this paper. Lots of security devices that rely on fingerprints as identity verification. Therefore, safeguarding identification is required at the time of distribution by disguising it. XOR Logic's security method in fingerprint biometrics can help maintain data security.
{"title":"Fingerprint Encryption for Biometrics Security using XOR Logic","authors":"Kamdan, Ivana Lucia Kharisma, Dini Oktarina Dwi Handayanil, Umar Aditiawarman, H. A. Maarif","doi":"10.1109/ICCED51276.2020.9415810","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415810","url":null,"abstract":"Fingerprint biometrics provide higher confidence in the identity verification process and help create user accountability. Fingerprint as one of the most popular types of biometrics and one of the simplest and most valuable security data that can be protected by all secure physical access to the building. There are various types of biometrics such as fingerprints, iris, voice, body, palms, heart rate and the advantages and disadvantages of each type of biometrics are also discussed in this paper. Lots of security devices that rely on fingerprints as identity verification. Therefore, safeguarding identification is required at the time of distribution by disguising it. XOR Logic's security method in fingerprint biometrics can help maintain data security.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road construction projects consist of rigid pavement and flexible pavement. Rigid pavement uses concrete material while flexible pavement uses asphalt material. Flexible pavement is still an option because of its flexible characteristics, but the need for asphalt is still not comparable with the availability of asphalt. Based on previous research, asphalt availability in Indonesia is only 50%, while the remaining 50% is still imported. Besides that, in Indonesia there are a lot of oil waste that can be harmful to living things and the environment. The lack of asphalt and the large amount of oil waste are serious problems that must be addressed, therefore how to overcome the shortage of asphalt as well as handling oil waste. Can oil waste be used and engineered into an innovative product. The solution to this problem is to make a new type of asphalt. This asphalt is made by treating oil waste, damar stones and four kinds of twigs of plants and leaves. This asphalt is produced using pure experimental methods, namely by boiling resin stones using oil waste, sprinkling formula ash made from twigs and leaves of several types of plants. The results of this new type of asphalt experiment are then tested in a laboratory and compared with the characteristics and properties of asphalt penetration 60/70. Based on experimental results it is proven that oil waste and damar stone can be used to make asphalt by adding formula ash from several branches of plants and leaves. This new type of asphalt is a solution to overcome the amount of oil waste and is very useful so that asphalt production in Indonesia increases
{"title":"Pure Experiments Creating New Types of Asphalt Using Oil Waste, Resin Stones and Plant Branchs","authors":"Paikun, Rico Sihotang, Debby Rahmawati, Cece Suhendi, Liana Herlina","doi":"10.1109/ICCED51276.2020.9415779","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415779","url":null,"abstract":"Road construction projects consist of rigid pavement and flexible pavement. Rigid pavement uses concrete material while flexible pavement uses asphalt material. Flexible pavement is still an option because of its flexible characteristics, but the need for asphalt is still not comparable with the availability of asphalt. Based on previous research, asphalt availability in Indonesia is only 50%, while the remaining 50% is still imported. Besides that, in Indonesia there are a lot of oil waste that can be harmful to living things and the environment. The lack of asphalt and the large amount of oil waste are serious problems that must be addressed, therefore how to overcome the shortage of asphalt as well as handling oil waste. Can oil waste be used and engineered into an innovative product. The solution to this problem is to make a new type of asphalt. This asphalt is made by treating oil waste, damar stones and four kinds of twigs of plants and leaves. This asphalt is produced using pure experimental methods, namely by boiling resin stones using oil waste, sprinkling formula ash made from twigs and leaves of several types of plants. The results of this new type of asphalt experiment are then tested in a laboratory and compared with the characteristics and properties of asphalt penetration 60/70. Based on experimental results it is proven that oil waste and damar stone can be used to make asphalt by adding formula ash from several branches of plants and leaves. This new type of asphalt is a solution to overcome the amount of oil waste and is very useful so that asphalt production in Indonesia increases","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415783
Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Fitria Amastini, Afifah Nefiratika, M. R. Shihab, B. Ranti
Today, technology is improving rapidly and transforming insurance business into Insurance Technology (InsurTech). InsurTech is an ecosystem of focused, innovation-based organizations that has the vision to deliver value for clients. PT XYZ is a health insurance company that is changing into InsurTech to provide opportunities focusing on flexibility, effectiveness, and accelerating the automation process of routine activities that are cost-effective and focus on user's experience. With InsurTech, XYZ will be easier to reach end users directly and buying process for customer to be easier and quicker. However, there are still so many challenges for InsurTech based on IT decision domains. XYZ's current CIO has multiple roles such also as Chief Finance Officer (CFO), Chief Support Officer (CSO), and Chief Organization Development & Corporate Planning. This gives the difficulty for project's decision making. Besides, XYZ has not IT Steering Committee (ITSC) yet. This make XYZ difficulty on prioritization process, project's budget estimation, and control. This paper will explain the previous InsurTech research as the state-of-the-art. The results and conclusion is XYZ needs to change and improve its four of IT decision domains, prioritization on all types including prioritization level, and activities related with its employees and senior executives' knowledge, skill, behaviour, and leadership.
{"title":"Implication of InsurTech to Implementation IT Decision Domain Perspective: The Case Study of Insurance XYZ","authors":"Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Fitria Amastini, Afifah Nefiratika, M. R. Shihab, B. Ranti","doi":"10.1109/ICCED51276.2020.9415783","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415783","url":null,"abstract":"Today, technology is improving rapidly and transforming insurance business into Insurance Technology (InsurTech). InsurTech is an ecosystem of focused, innovation-based organizations that has the vision to deliver value for clients. PT XYZ is a health insurance company that is changing into InsurTech to provide opportunities focusing on flexibility, effectiveness, and accelerating the automation process of routine activities that are cost-effective and focus on user's experience. With InsurTech, XYZ will be easier to reach end users directly and buying process for customer to be easier and quicker. However, there are still so many challenges for InsurTech based on IT decision domains. XYZ's current CIO has multiple roles such also as Chief Finance Officer (CFO), Chief Support Officer (CSO), and Chief Organization Development & Corporate Planning. This gives the difficulty for project's decision making. Besides, XYZ has not IT Steering Committee (ITSC) yet. This make XYZ difficulty on prioritization process, project's budget estimation, and control. This paper will explain the previous InsurTech research as the state-of-the-art. The results and conclusion is XYZ needs to change and improve its four of IT decision domains, prioritization on all types including prioritization level, and activities related with its employees and senior executives' knowledge, skill, behaviour, and leadership.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-15DOI: 10.1109/ICCED51276.2020.9415844
D. Gustian, Falentino Sembiring, R. Amelia, Eneng Nurhasanah, Siti Waelah, Nia Anggraeni
Electricity subsidy is the Indonesian Government program through PT. PLN (Persero) to the underprivileged community. Hopefully this program can ease the burden of society due to the economic impacts that occur. There is a problem in the distribution process that has been happening is not on target, it certainly resulted in a financial loss that has been issued by the Government and people who do not feel government assistance. This research uses a comparison of Data Mining classification method based on optimization algorithm to get the best model. Solutions that are expected to assist the Government in reducing financial losses in the delivery process are occurring as well as providing benefits for the government to properly process the distribution of targets. Research provides results that the C4.5 method with the Genetic Algorithm (GA) optimization is a better level of accuracy than Particle Swarm Optimization (PSO) and Differential Evolutin (DE) with a value of 92.28% accuracy.
{"title":"Comparison Data Mining based on Optimization Algorithms in Receiving Electricity Subsidies","authors":"D. Gustian, Falentino Sembiring, R. Amelia, Eneng Nurhasanah, Siti Waelah, Nia Anggraeni","doi":"10.1109/ICCED51276.2020.9415844","DOIUrl":"https://doi.org/10.1109/ICCED51276.2020.9415844","url":null,"abstract":"Electricity subsidy is the Indonesian Government program through PT. PLN (Persero) to the underprivileged community. Hopefully this program can ease the burden of society due to the economic impacts that occur. There is a problem in the distribution process that has been happening is not on target, it certainly resulted in a financial loss that has been issued by the Government and people who do not feel government assistance. This research uses a comparison of Data Mining classification method based on optimization algorithm to get the best model. Solutions that are expected to assist the Government in reducing financial losses in the delivery process are occurring as well as providing benefits for the government to properly process the distribution of targets. Research provides results that the C4.5 method with the Genetic Algorithm (GA) optimization is a better level of accuracy than Particle Swarm Optimization (PSO) and Differential Evolutin (DE) with a value of 92.28% accuracy.","PeriodicalId":344981,"journal":{"name":"2020 6th International Conference on Computing Engineering and Design (ICCED)","volume":"13 11-12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}