Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034652
Julianto Lemantara, M. J. Dewiyani Sunarto, B. Hariadi, T. Sagirani, Tania Amelia
In evaluating the student’s learning outcomes, essay exams were commonly used by teachers to measure the level of student’s understanding of the learning material. However assessing essay answers was more difficult in reality because it contained teacher’s subjectivity and required a longer correction time. In addition, detecting similarity in essay answers between students also required more teacher’s efforts. In previous studies, a prototype of essay answer assessment and plagiarism detection had been successfully created. However, the prototype display still needed an improvement based on the evaluation results given by biology teachers in East Java Province as the application users. The previous prototype also still carried the Latent Semantic Analysis (LSA) method which had several weaknesses. Therefore, this study aimed to produce prototypes that had better display and text similarity methods. The Generalized Latent Semantic Analysis (GLSA) method was chosen because it was able to cover the weaknesses of the LSA method. GLSA was able to detect sentences that had syntactic errors or missing common words. Based on the evaluation results, this study succeeded in producing a prototype with a better display value. The level of user satisfaction increased by 6.12%. In addition, the study succeeded in using the GLSA method as a substitute for LSA for creating better prototype essay assessment and automatic plagiarism detection.
{"title":"Prototype of Automatic Essay Assessment and Plagiarism Detection on Mobile Learning \"Molearn\" Application Using GLSA Method","authors":"Julianto Lemantara, M. J. Dewiyani Sunarto, B. Hariadi, T. Sagirani, Tania Amelia","doi":"10.1109/ISRITI48646.2019.9034652","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034652","url":null,"abstract":"In evaluating the student’s learning outcomes, essay exams were commonly used by teachers to measure the level of student’s understanding of the learning material. However assessing essay answers was more difficult in reality because it contained teacher’s subjectivity and required a longer correction time. In addition, detecting similarity in essay answers between students also required more teacher’s efforts. In previous studies, a prototype of essay answer assessment and plagiarism detection had been successfully created. However, the prototype display still needed an improvement based on the evaluation results given by biology teachers in East Java Province as the application users. The previous prototype also still carried the Latent Semantic Analysis (LSA) method which had several weaknesses. Therefore, this study aimed to produce prototypes that had better display and text similarity methods. The Generalized Latent Semantic Analysis (GLSA) method was chosen because it was able to cover the weaknesses of the LSA method. GLSA was able to detect sentences that had syntactic errors or missing common words. Based on the evaluation results, this study succeeded in producing a prototype with a better display value. The level of user satisfaction increased by 6.12%. In addition, the study succeeded in using the GLSA method as a substitute for LSA for creating better prototype essay assessment and automatic plagiarism detection.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034621
Husein Nabil, S. M. Nasution, Ratna Astuti Nugrahaeni
Maze Chase is a game that has a maze background. In this game there are players who have the task, which is to take all the points in the labyrinth. In the Maze Chase game there is also an NPC (Non-Playable Character) that aims to chase players so that players cannot take all the points in the labyrinth. Players can be considered to have won the game is that all the points in the labyrinth have been taken by the player. The author implements the A* and RIBS path search algorithms for NPCs so that NPCs can chase players. That way we get the travel time comparison to the players on each path search algorithm. After testing the average travel time to NPC players with the A* algorithm faster 0.116196% than NPC with the RIBS algorithm.
{"title":"Comparison of Real Time Iterative Deepening Best First Search Algorithm and A* Algorithm on Maze Chase Game NPC","authors":"Husein Nabil, S. M. Nasution, Ratna Astuti Nugrahaeni","doi":"10.1109/ISRITI48646.2019.9034621","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034621","url":null,"abstract":"Maze Chase is a game that has a maze background. In this game there are players who have the task, which is to take all the points in the labyrinth. In the Maze Chase game there is also an NPC (Non-Playable Character) that aims to chase players so that players cannot take all the points in the labyrinth. Players can be considered to have won the game is that all the points in the labyrinth have been taken by the player. The author implements the A* and RIBS path search algorithms for NPCs so that NPCs can chase players. That way we get the travel time comparison to the players on each path search algorithm. After testing the average travel time to NPC players with the A* algorithm faster 0.116196% than NPC with the RIBS algorithm.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034608
Carensy Donabela, M. A. Ulin Nuha, Rini Wisnu Wardhani, Mohamad Syahral, Dion Ogi, Dedy Septono Catur Putranto
Polarization Automation based on EDU-QCRY 1 is a system designed to facilitate the use of EDU-QCRY 1 devices in simulation of sending Quantum Bit (Qubit). Polarization automation utilizes quantum mechanical properties on the EDU QCRY 1 device, which will produce bits through polarization automation on the EDU-QCRY 1 quantum polarizator device. Polarization rotation will be done automatically and randomly using an ultrasonic piezomotor device that receives random voltage input on the Arduino Uno microcontroller. The random voltage input is based on a random source from the accelerometer sensor. The measurement results of the accelerometer sensor will be processed and converted into voltage as input to perform automatic and random polarization rotations on the EDU QCRY polariator device. Furthermore, the automatic polarization results will produce a series of numbers that run on the principle of anti-cloning and quantum mechanical properties.
{"title":"Design of Automated Polarization based on EDU-QCRY 1","authors":"Carensy Donabela, M. A. Ulin Nuha, Rini Wisnu Wardhani, Mohamad Syahral, Dion Ogi, Dedy Septono Catur Putranto","doi":"10.1109/ISRITI48646.2019.9034608","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034608","url":null,"abstract":"Polarization Automation based on EDU-QCRY 1 is a system designed to facilitate the use of EDU-QCRY 1 devices in simulation of sending Quantum Bit (Qubit). Polarization automation utilizes quantum mechanical properties on the EDU QCRY 1 device, which will produce bits through polarization automation on the EDU-QCRY 1 quantum polarizator device. Polarization rotation will be done automatically and randomly using an ultrasonic piezomotor device that receives random voltage input on the Arduino Uno microcontroller. The random voltage input is based on a random source from the accelerometer sensor. The measurement results of the accelerometer sensor will be processed and converted into voltage as input to perform automatic and random polarization rotations on the EDU QCRY polariator device. Furthermore, the automatic polarization results will produce a series of numbers that run on the principle of anti-cloning and quantum mechanical properties.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134306798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034572
Thusitha Shaleendra, Buddhi Tharuka Wishvamali, N. Gunarathne, S. Hareendran, P. Abeygunawardhana
With the vast growth of the population, increased production of agricultural products is necessary. Although the amount of land available for agriculture is limited, the demand for food products based on agriculture is expanding. The Organic food supply is scarce in the current food market; hence, their retail prices are higher than the other agricultural products which were produced with the use of pesticides. In this context, Greenhouse production is widely used all over the world with minimal pesticides and weedicides including Sri Lanka. Automated Greenhouses can be used to increase production with a minimum amount of human labor. With less use of human hours, it will produce more harvest than conventional Greenhouses which need constant human attention and care. The installation of automated Greenhouses is costly although their long-term benefits are higher than a conventional one. For this reason, introducing the concept to cultivators would be difficult, as they are reluctant to invest their money on unfamiliar technology. There is a hesitance to embrace technology since they don’t have the first-hand experience in operating an automated Greenhouse. Therefore, in this paper, we present a simulated model of automated Greenhouse using Augmented reality, through which a client can visually experience the workings of IoT Greenhouse based on theoretical models beforehand to make an informed decision to invest in automated Greenhouses.
{"title":"Simulation of the Influence of environmental factors related to Greenhouses using Augmented Reality","authors":"Thusitha Shaleendra, Buddhi Tharuka Wishvamali, N. Gunarathne, S. Hareendran, P. Abeygunawardhana","doi":"10.1109/ISRITI48646.2019.9034572","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034572","url":null,"abstract":"With the vast growth of the population, increased production of agricultural products is necessary. Although the amount of land available for agriculture is limited, the demand for food products based on agriculture is expanding. The Organic food supply is scarce in the current food market; hence, their retail prices are higher than the other agricultural products which were produced with the use of pesticides. In this context, Greenhouse production is widely used all over the world with minimal pesticides and weedicides including Sri Lanka. Automated Greenhouses can be used to increase production with a minimum amount of human labor. With less use of human hours, it will produce more harvest than conventional Greenhouses which need constant human attention and care. The installation of automated Greenhouses is costly although their long-term benefits are higher than a conventional one. For this reason, introducing the concept to cultivators would be difficult, as they are reluctant to invest their money on unfamiliar technology. There is a hesitance to embrace technology since they don’t have the first-hand experience in operating an automated Greenhouse. Therefore, in this paper, we present a simulated model of automated Greenhouse using Augmented reality, through which a client can visually experience the workings of IoT Greenhouse based on theoretical models beforehand to make an informed decision to invest in automated Greenhouses.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034600
Shofyan Arsyad Widhiono, Muhammad Ary Murti, C. Setianingsih
In this modern age, electricity has become essential things in every aspect of living. To ensure its proper use, a program created to help regulate electricity usage based on user defined priority. In this study Priority Queue Algorithm is used to measure how long every can stay active so it will not drain user’s monthly electricity target usage. The calculation process is done on android device then the execution order to turn the devices on or off are sent to database MySQL The result obtained from this research that priority queue algorithm is able to regulate electricity usage based on rule testing and fast response time to control and retrieve data from the database, 0.006s average time on manual control system, 0.005s average time on automatic control system, and 0.004s average time on retrieving data.
{"title":"Electronic Loads Control and Management Using Priority Queue Algorithm on Android Based Smartphone","authors":"Shofyan Arsyad Widhiono, Muhammad Ary Murti, C. Setianingsih","doi":"10.1109/ISRITI48646.2019.9034600","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034600","url":null,"abstract":"In this modern age, electricity has become essential things in every aspect of living. To ensure its proper use, a program created to help regulate electricity usage based on user defined priority. In this study Priority Queue Algorithm is used to measure how long every can stay active so it will not drain user’s monthly electricity target usage. The calculation process is done on android device then the execution order to turn the devices on or off are sent to database MySQL The result obtained from this research that priority queue algorithm is able to regulate electricity usage based on rule testing and fast response time to control and retrieve data from the database, 0.006s average time on manual control system, 0.005s average time on automatic control system, and 0.004s average time on retrieving data.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133899615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034654
Fahrudin Mukti Wibowo, M. Sidiq, Imadudin Alif Akbar, A. Basuki, D. Rosiyadi
The massive spread of harmful content on the internet is hard to filter. Meanwhile, blacklist content filtering cannot keep up with the rapid growth of content creations. As a result, an extra protection layer is required to provide a safe internet for children. However, implementing a network or application firewall requires an expert’s knowledge and complicated maintenance. In this paper, we proposed a framework to automate internet protection by using whitelist packet filtering. We use the blockchain smart contract as the secure collaboration media to determine the filtering rules. Meanwhile, the SDN controller automates the packet filtering by installing the determined forwarding rules into the network switches. We evaluate the whitelist packet filtering by using Mininet for the network emulation and Ethereum Rinkeby networks for the smart contract implementation. The result shows that the proposed whitelist system can filter the packet without incurring significant latency. It supports fast content update with a maximum speed of ≈ 1200 valid contents per-minute by using a three-votes verification system.
{"title":"Collaborative Whitelist Packet Filtering Driven by Smart Contract Forum","authors":"Fahrudin Mukti Wibowo, M. Sidiq, Imadudin Alif Akbar, A. Basuki, D. Rosiyadi","doi":"10.1109/ISRITI48646.2019.9034654","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034654","url":null,"abstract":"The massive spread of harmful content on the internet is hard to filter. Meanwhile, blacklist content filtering cannot keep up with the rapid growth of content creations. As a result, an extra protection layer is required to provide a safe internet for children. However, implementing a network or application firewall requires an expert’s knowledge and complicated maintenance. In this paper, we proposed a framework to automate internet protection by using whitelist packet filtering. We use the blockchain smart contract as the secure collaboration media to determine the filtering rules. Meanwhile, the SDN controller automates the packet filtering by installing the determined forwarding rules into the network switches. We evaluate the whitelist packet filtering by using Mininet for the network emulation and Ethereum Rinkeby networks for the smart contract implementation. The result shows that the proposed whitelist system can filter the packet without incurring significant latency. It supports fast content update with a maximum speed of ≈ 1200 valid contents per-minute by using a three-votes verification system.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034671
Yunifa Miftachul Arif, S. M. S. Nugroho, M. Hariadi
Many tourist cities in developing countries, especially in Indonesia, have exciting tourism destinations. However, some of them do not use a good management concept, for example, to develop tourism destinations. Early process in the development of the destination is making priority selection appropriately. They should consider the success level of tourism destinations. This paper discusses implementations of the 6AsTD framework and TOPSIS method as a combination concept to select destinations priority that recommended to do development. 6AsTD has six components that reflect successful tourism destinations. All components used in the process of the TOPSIS method as input criteria. This research used 11 tourism destinations data bundles in Batu City. The result is a tourism destination with the highest priority has a score of 0.88, and the lowest priority has a score of 0.19.
{"title":"Selection of Tourism Destinations Priority using 6AsTD Framework and TOPSIS","authors":"Yunifa Miftachul Arif, S. M. S. Nugroho, M. Hariadi","doi":"10.1109/ISRITI48646.2019.9034671","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034671","url":null,"abstract":"Many tourist cities in developing countries, especially in Indonesia, have exciting tourism destinations. However, some of them do not use a good management concept, for example, to develop tourism destinations. Early process in the development of the destination is making priority selection appropriately. They should consider the success level of tourism destinations. This paper discusses implementations of the 6AsTD framework and TOPSIS method as a combination concept to select destinations priority that recommended to do development. 6AsTD has six components that reflect successful tourism destinations. All components used in the process of the TOPSIS method as input criteria. This research used 11 tourism destinations data bundles in Batu City. The result is a tourism destination with the highest priority has a score of 0.88, and the lowest priority has a score of 0.19.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034665
S. Madhusudhanan, Renjith R. Nair
Security threats and attacks are increasing day by day with an inclination that insinuates most of the multidisciplinary Machine Learning (ML) applications. Artificial Intelligence (AI) is playing a major role in most of these multidisciplinary ML applications which help applications to sample, learn and decide to act wisely depending on the situation. The intelligence required for processing the data and take decisions opens the door towards vulnerabilities. This will take place when it converges with the world of Internet. Design of a secure realm that mitigates the attacks against privacy preservation in multidisciplinary ML applications is of paramount concern. Thus, it is a must to have an understanding of the security threats and attacks that can affect the ML applications or ML models. In this work we have listed various research work that has developed security models to defend the attacks on multidisciplinary ML applications including the traditional or existing ML and deep learning solutions. Then, we have categorized various security threats and attacks against some of the existing multidisciplinary ML applications. Finally, we have listed some defensive strategies that can enrich and complement to build a secure and efficient multidisciplinary ML model or application.
{"title":"Converging Security Threats and Attacks Insinuation in Multidisciplinary Machine Learning Applications: A Survey","authors":"S. Madhusudhanan, Renjith R. Nair","doi":"10.1109/ISRITI48646.2019.9034665","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034665","url":null,"abstract":"Security threats and attacks are increasing day by day with an inclination that insinuates most of the multidisciplinary Machine Learning (ML) applications. Artificial Intelligence (AI) is playing a major role in most of these multidisciplinary ML applications which help applications to sample, learn and decide to act wisely depending on the situation. The intelligence required for processing the data and take decisions opens the door towards vulnerabilities. This will take place when it converges with the world of Internet. Design of a secure realm that mitigates the attacks against privacy preservation in multidisciplinary ML applications is of paramount concern. Thus, it is a must to have an understanding of the security threats and attacks that can affect the ML applications or ML models. In this work we have listed various research work that has developed security models to defend the attacks on multidisciplinary ML applications including the traditional or existing ML and deep learning solutions. Then, we have categorized various security threats and attacks against some of the existing multidisciplinary ML applications. Finally, we have listed some defensive strategies that can enrich and complement to build a secure and efficient multidisciplinary ML model or application.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034579
Aulia Pasca Sahida, B. Surarso, R. Gernowo
The selection of the right vendor is crucial for the success and competitiveness of manufacturing organizations. Vendor selection decision making has a wide scope and a high level of complexity, which is due to the involvement of various decision makers who have their own preferences. The involvement of various decision makers with their respective preferences, also causes differences in priority over the criteria used. In this paper, it is proposed to use the concept of Group Decision Support System (GDSS) to determine the best vendor based on the aggregation of the preferences of each decision maker. The proposed GDSS concept is to combine the Multi-Objective Optimization method on the basis of Ratio Analysis (MOORA) with the Copeland Score method. The MOORA method is used as a ranking method based on the criteria and weight ratio of each decision maker. The results of ranking using the MOORA method each decision maker is then aggregated using the Copeland Score method, to get the final vendor ranking. The results show that Alternative 5 (Yogatama) has the highest score, so it is ranked first and shows as the best alternative. Sensitivity analysis showed that the proposed GDSS concept was solid, with a low percentage of change.
选择合适的供应商对制造企业的成功和竞争力至关重要。供应商选择决策具有广泛的范围和高度的复杂性,这是由于各种决策者的参与,他们有自己的偏好。不同的决策者以他们各自的偏好参与其中,也造成了对所使用标准的优先次序的差异。本文提出了利用群体决策支持系统(Group Decision Support System, GDSS)的概念,通过汇总各决策者的偏好来确定最佳供应商。本文提出的GDSS概念是将基于Ratio Analysis (MOORA)的多目标优化方法与Copeland Score方法相结合。采用MOORA法根据各决策者的标准和权重比进行排序。使用MOORA方法进行排名的结果,然后使用Copeland Score方法对每个决策者进行汇总,以获得最终的供应商排名。结果显示,选择5 (Yogatama)得分最高,因此排名第一,显示为最佳选择。敏感性分析表明,提出的GDSS概念是可靠的,具有低百分比的变化。
{"title":"The combination of the MOORA method and the Copeland Score method as a Group Decision Support System (GDSS) Vendor Selection","authors":"Aulia Pasca Sahida, B. Surarso, R. Gernowo","doi":"10.1109/ISRITI48646.2019.9034579","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034579","url":null,"abstract":"The selection of the right vendor is crucial for the success and competitiveness of manufacturing organizations. Vendor selection decision making has a wide scope and a high level of complexity, which is due to the involvement of various decision makers who have their own preferences. The involvement of various decision makers with their respective preferences, also causes differences in priority over the criteria used. In this paper, it is proposed to use the concept of Group Decision Support System (GDSS) to determine the best vendor based on the aggregation of the preferences of each decision maker. The proposed GDSS concept is to combine the Multi-Objective Optimization method on the basis of Ratio Analysis (MOORA) with the Copeland Score method. The MOORA method is used as a ranking method based on the criteria and weight ratio of each decision maker. The results of ranking using the MOORA method each decision maker is then aggregated using the Copeland Score method, to get the final vendor ranking. The results show that Alternative 5 (Yogatama) has the highest score, so it is ranked first and shows as the best alternative. Sensitivity analysis showed that the proposed GDSS concept was solid, with a low percentage of change.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ISRITI48646.2019.9034653
Ekasari Nugraheni
The 2019 Presidential Election in Indonesia causes sharp political polarization. The battle of discourse between two massive camps took place on social media. Various aspects of public opinion showing how people think and act can be found easily. Twitter as the most popular microblogging platform, offers a place to express a variety of thoughts and opinions. This makes Twitter as a source of opinion mining that can be used to detect people's emotional feelings about an event. This paper explores the pre-processing stages of text classification for the emotion recognition based on Twitter conversations that correlate with the debate of Indonesian presidential candidates. Data pre-processing is an important step in sentiment analysis because the results of the analysis are strongly affected by the quality of the data provided. A combination of data processing has been carried out using Indonesian Twitter datasets. The accuracy of the analysis was tested using a deep learning model MLP and LSTM. The results show that the use of appropriate pre-processing techniques can improve accuracy.
{"title":"Indonesian Twitter Data Pre-processing for the Emotion Recognition","authors":"Ekasari Nugraheni","doi":"10.1109/ISRITI48646.2019.9034653","DOIUrl":"https://doi.org/10.1109/ISRITI48646.2019.9034653","url":null,"abstract":"The 2019 Presidential Election in Indonesia causes sharp political polarization. The battle of discourse between two massive camps took place on social media. Various aspects of public opinion showing how people think and act can be found easily. Twitter as the most popular microblogging platform, offers a place to express a variety of thoughts and opinions. This makes Twitter as a source of opinion mining that can be used to detect people's emotional feelings about an event. This paper explores the pre-processing stages of text classification for the emotion recognition based on Twitter conversations that correlate with the debate of Indonesian presidential candidates. Data pre-processing is an important step in sentiment analysis because the results of the analysis are strongly affected by the quality of the data provided. A combination of data processing has been carried out using Indonesian Twitter datasets. The accuracy of the analysis was tested using a deep learning model MLP and LSTM. The results show that the use of appropriate pre-processing techniques can improve accuracy.","PeriodicalId":367363,"journal":{"name":"2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}