Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320698
C. Pickerling, Hendrawan Armanto, E. Setyaningsih
Numerous research has been done on scheduling, however only a few results an optimal schedule. Thus are schedule is made manually. The most frequently used algorithm for scheduling problem is genetic algorithm, but in this research we used Symbiotic Organisms Search Algorithm. This algorithm is used to simulate the behavior of organisms in their environment because of their dependence on the survival of the other species. We tested the algorithm for scheduling laboratory activities and after a number of trials, we concluded that this algorithm is able to provide an optimal solution for scheduling problem with 87.17% accuracy.
{"title":"Symbiotic organisms search algorithm for scheduling laboratory sessions in University","authors":"C. Pickerling, Hendrawan Armanto, E. Setyaningsih","doi":"10.1109/CAIPT.2017.8320698","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320698","url":null,"abstract":"Numerous research has been done on scheduling, however only a few results an optimal schedule. Thus are schedule is made manually. The most frequently used algorithm for scheduling problem is genetic algorithm, but in this research we used Symbiotic Organisms Search Algorithm. This algorithm is used to simulate the behavior of organisms in their environment because of their dependence on the survival of the other species. We tested the algorithm for scheduling laboratory activities and after a number of trials, we concluded that this algorithm is able to provide an optimal solution for scheduling problem with 87.17% accuracy.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320704
Paramitha Nerisafitra, T. D. Wulan
Monitoring volcanic activity is extremely important to detect anomalies that may changes in the activity of Mt. Merapi. In this paper we proposed Multi Layer Perceptron (MLP) method to detect anomaly and to determine activities of each quake in seismic data. This method that has been developed in this research has been tasted against such several types of quakes as volcanic A (VA), volcanic B (VB), multiphase (MP), and avalance using data of the same time period. The experimetal results showed an average accuracy of 81,7 % in determining the activity of each quake type of Mt. Merapi seismic activity.
{"title":"A neurocomputing approach for anomaly detection of Mt. Merapi monitoring activity","authors":"Paramitha Nerisafitra, T. D. Wulan","doi":"10.1109/CAIPT.2017.8320704","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320704","url":null,"abstract":"Monitoring volcanic activity is extremely important to detect anomalies that may changes in the activity of Mt. Merapi. In this paper we proposed Multi Layer Perceptron (MLP) method to detect anomaly and to determine activities of each quake in seismic data. This method that has been developed in this research has been tasted against such several types of quakes as volcanic A (VA), volcanic B (VB), multiphase (MP), and avalance using data of the same time period. The experimetal results showed an average accuracy of 81,7 % in determining the activity of each quake type of Mt. Merapi seismic activity.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320727
Sang-Baek Lee, Kyu-Chul Lee
This paper presents the design of the Korean medicine symptom diagnosis system. In the ordinary korean medicine symptom diagnosis situation, the patient describes their symptoms and the korean medicine doctor makes a diagnosis based on the symptoms. In order to develop the symptom diagnosis system that can diagnose itself, the system has to understand human natural language. In this paper, we use morpheme and synonyms to give understandable information to the system in terms of the information retrieval system. We design database schema that consists of NoSQL document-oriented databases-MongoDB to get a better performance at unstructured and semi-structured data. We also use Word2Vec that is kind of word embedding to solve synonyms problem.
{"title":"Design of the Korean medicine symptom diagnosis system using Word2Vec","authors":"Sang-Baek Lee, Kyu-Chul Lee","doi":"10.1109/CAIPT.2017.8320727","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320727","url":null,"abstract":"This paper presents the design of the Korean medicine symptom diagnosis system. In the ordinary korean medicine symptom diagnosis situation, the patient describes their symptoms and the korean medicine doctor makes a diagnosis based on the symptoms. In order to develop the symptom diagnosis system that can diagnose itself, the system has to understand human natural language. In this paper, we use morpheme and synonyms to give understandable information to the system in terms of the information retrieval system. We design database schema that consists of NoSQL document-oriented databases-MongoDB to get a better performance at unstructured and semi-structured data. We also use Word2Vec that is kind of word embedding to solve synonyms problem.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"624 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320691
A. Lawi, Ali Akbar Velayaty, Z. Zainuddin
Identifying potential consumers for direct marketing to very large data is a difficult and impossible task to do manually. Therefore, the machine learning approach needs to help analyze the data to contribute in determining the marketing strategy policy. In this paper, vector machine support methods using the Adaboost algorithm are investigated to classify potential customers for direct marketing of large bank data marketing. The adaboost algorithm aims to build a better model than the model generated from a single classifier. Data obtained from UCI machine learning repository. Total data is processed as many as 9280 data with the number of attributes of 20 classes and 1 target class. Training data and test data are divided into 70% and 30%. This classification predicts the prospects for a deposit subscription. The results show that the SVM method using Adaboost algorithm obtained accuracy is 95.07% and the sensitivity is 91.65% higher than the ordinary SVM approach.
{"title":"On identifying potential direct marketing consumers using adaptive boosted support vector machine","authors":"A. Lawi, Ali Akbar Velayaty, Z. Zainuddin","doi":"10.1109/CAIPT.2017.8320691","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320691","url":null,"abstract":"Identifying potential consumers for direct marketing to very large data is a difficult and impossible task to do manually. Therefore, the machine learning approach needs to help analyze the data to contribute in determining the marketing strategy policy. In this paper, vector machine support methods using the Adaboost algorithm are investigated to classify potential customers for direct marketing of large bank data marketing. The adaboost algorithm aims to build a better model than the model generated from a single classifier. Data obtained from UCI machine learning repository. Total data is processed as many as 9280 data with the number of attributes of 20 classes and 1 target class. Training data and test data are divided into 70% and 30%. This classification predicts the prospects for a deposit subscription. The results show that the SVM method using Adaboost algorithm obtained accuracy is 95.07% and the sensitivity is 91.65% higher than the ordinary SVM approach.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134034835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320656
O. Jihye, Dong-Hee Noh, Y. Sohn
With world population growth, increasing agricultural production with a declining agricultural workforce has brought a new spotlight on agricultural ICT. As the cultivable land in South Korea is relatively small, farmers prefer the high productivity of greenhouse cultivation. In this case, labor efficiency can be achieved by developing an integrated smart platform to collect environmental information and control the greenhouse facility. This requires the construction of a network to transfer the sensed information to the control server and transfer commands from the control server to the control device. When installing a Wi-Fi communication network inside a greenhouse, verifying the communication stability is crucial. Therefore, this study measured the wireless communication transmission/reception ratio and confirmed that the communication distance varied according to the crop density.
{"title":"Empirical test of Wi-Fi environment stability for smart farm platform","authors":"O. Jihye, Dong-Hee Noh, Y. Sohn","doi":"10.1109/CAIPT.2017.8320656","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320656","url":null,"abstract":"With world population growth, increasing agricultural production with a declining agricultural workforce has brought a new spotlight on agricultural ICT. As the cultivable land in South Korea is relatively small, farmers prefer the high productivity of greenhouse cultivation. In this case, labor efficiency can be achieved by developing an integrated smart platform to collect environmental information and control the greenhouse facility. This requires the construction of a network to transfer the sensed information to the control server and transfer commands from the control server to the control device. When installing a Wi-Fi communication network inside a greenhouse, verifying the communication stability is crucial. Therefore, this study measured the wireless communication transmission/reception ratio and confirmed that the communication distance varied according to the crop density.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320706
Kwangsoo Jo, Junyoung Heo, Jinman Jung, Bongjae Kim, Hong Min
There are many applications related to interworking drones and ground wireless sensor networks to collect sensing data. A drone serves as a sink that collects all of the data on an entire wireless sensor network. Existing studies focus on reducing the energy consumption and flight distance of drones by using predetermined information such as the drone's trajectory, sensor locations, and the network topology, among other types. In this paper, we propose a rendezvous point estimation scheme that takes into account the drone speed and the mean of the data collection delay without any predetermined information. Simulation results show that our scheme is more reliable in terms of data collection.
{"title":"A rendezvous point estimation considering drone speed and data collection delay","authors":"Kwangsoo Jo, Junyoung Heo, Jinman Jung, Bongjae Kim, Hong Min","doi":"10.1109/CAIPT.2017.8320706","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320706","url":null,"abstract":"There are many applications related to interworking drones and ground wireless sensor networks to collect sensing data. A drone serves as a sink that collects all of the data on an entire wireless sensor network. Existing studies focus on reducing the energy consumption and flight distance of drones by using predetermined information such as the drone's trajectory, sensor locations, and the network topology, among other types. In this paper, we propose a rendezvous point estimation scheme that takes into account the drone speed and the mean of the data collection delay without any predetermined information. Simulation results show that our scheme is more reliable in terms of data collection.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320738
J. Suroso, R. E. Tarigan, Fatkhurozaq B. Setyawan
Like other industries, logistic services especially for inner city deliveries currently also facing immense changes due digital disruption. Although many logistics companies use information technology in their business models, but not all of them make information technology as their core business. With the new technology developments, new competitor, new business model and changing customer behavior, the company should also change to optimize technology support. Therefore, this startup company for logistic and especially in last mile deliveries will make an information systems to support their business by using Design Thinking (DT) approach as Information System Strategic Planning (ISSP). With Design Thinking and Personas approach, hopefully able to create a system with good user experiences and user satisfaction while using the product. The result is defined proper business flow and developing website and android applications to facilitate business activities. The conclusion of this research is Design thinking is one of alternative method that can be used to make strategic planning of information system for company, either new company (start-up) or corporate.
{"title":"Information systems strategic planning: Using design thinking method at startup company","authors":"J. Suroso, R. E. Tarigan, Fatkhurozaq B. Setyawan","doi":"10.1109/CAIPT.2017.8320738","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320738","url":null,"abstract":"Like other industries, logistic services especially for inner city deliveries currently also facing immense changes due digital disruption. Although many logistics companies use information technology in their business models, but not all of them make information technology as their core business. With the new technology developments, new competitor, new business model and changing customer behavior, the company should also change to optimize technology support. Therefore, this startup company for logistic and especially in last mile deliveries will make an information systems to support their business by using Design Thinking (DT) approach as Information System Strategic Planning (ISSP). With Design Thinking and Personas approach, hopefully able to create a system with good user experiences and user satisfaction while using the product. The result is defined proper business flow and developing website and android applications to facilitate business activities. The conclusion of this research is Design thinking is one of alternative method that can be used to make strategic planning of information system for company, either new company (start-up) or corporate.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320717
Fajrin Nurman Arifin, Oktalia Juwita
Nowdays, tourism becomes an object that is being development targeted by government. Government efforts in the development of tourism is done through many ways and media, one of which is a service through information system. Information system in its governance and development requires a structured pattern for the direction of its development more effectively and efficiently. Therefore we need a way to be managed better. Mc Farlan matrix has a pattern of governance development by grouping based on the criteria of needs and objectives of information system development according to the strategy of the organization, whereas IT Balanced Scorecard (BSC) method is a pattern analysis conducted to measure organizational readiness or initial conditions. Both methods show a way that can be used to manage, classify and measure of the development of organizational information systems as a form of tourism carrying capacity.
{"title":"Governance of information system development as tourism support used IT balanced scorecard and McFarlan","authors":"Fajrin Nurman Arifin, Oktalia Juwita","doi":"10.1109/CAIPT.2017.8320717","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320717","url":null,"abstract":"Nowdays, tourism becomes an object that is being development targeted by government. Government efforts in the development of tourism is done through many ways and media, one of which is a service through information system. Information system in its governance and development requires a structured pattern for the direction of its development more effectively and efficiently. Therefore we need a way to be managed better. Mc Farlan matrix has a pattern of governance development by grouping based on the criteria of needs and objectives of information system development according to the strategy of the organization, whereas IT Balanced Scorecard (BSC) method is a pattern analysis conducted to measure organizational readiness or initial conditions. Both methods show a way that can be used to manage, classify and measure of the development of organizational information systems as a form of tourism carrying capacity.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320686
Ki-Sang Kim, Hyung-Il Choi
The Adaboost extracts an optimal set of weak classifiers in stages. On each stage, it chooses the optimal classifier by minimizing the weighted error classification. It also reweights training data so that the next round would focus on data that are difficult to classify. The typical Adaboost algorithm assigns the same weight to each training datum on the first round of a training process. In this paper, we propose to assign different initial weights based on some statistical properties of involved features. In experimental results, we assess that the proposed method shows higher performance than the typical one.
{"title":"Adjusting initial weights for Adaboost learning","authors":"Ki-Sang Kim, Hyung-Il Choi","doi":"10.1109/CAIPT.2017.8320686","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320686","url":null,"abstract":"The Adaboost extracts an optimal set of weak classifiers in stages. On each stage, it chooses the optimal classifier by minimizing the weighted error classification. It also reweights training data so that the next round would focus on data that are difficult to classify. The typical Adaboost algorithm assigns the same weight to each training datum on the first round of a training process. In this paper, we propose to assign different initial weights based on some statistical properties of involved features. In experimental results, we assess that the proposed method shows higher performance than the typical one.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114964054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320670
Suk-June Choi, Jin Kwak
DDoS attacks using the CLDAP protocol are increasing. CLDAP is an open-standard application that allows access to and maintenance of a wide range of network directory information. DDoS attacks using the CLDAP protocol exploit this, and can significantly increase the packet amplification rate as compared to existing UDP flooding attacks; this can immediately disable small and medium sized servers. Therefore, research is needed to reduce the packet amplification of UDP flooding attacks that exploit the CLDAP protocol. In this paper, we propose a method to reduce DDoS attacks that use the CLDAP protocol.
{"title":"A study on reduction of DDoS amplification attacks in the UDP-based CLDAP protocol","authors":"Suk-June Choi, Jin Kwak","doi":"10.1109/CAIPT.2017.8320670","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320670","url":null,"abstract":"DDoS attacks using the CLDAP protocol are increasing. CLDAP is an open-standard application that allows access to and maintenance of a wide range of network directory information. DDoS attacks using the CLDAP protocol exploit this, and can significantly increase the packet amplification rate as compared to existing UDP flooding attacks; this can immediately disable small and medium sized servers. Therefore, research is needed to reduce the packet amplification of UDP flooding attacks that exploit the CLDAP protocol. In this paper, we propose a method to reduce DDoS attacks that use the CLDAP protocol.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}