首页 > 最新文献

2020 Fifth International Conference on Informatics and Computing (ICIC)最新文献

英文 中文
Analysis of Higher Education Performance Measurement Using Academic Scorecard and Analytical Hierarchy Process 基于学业记分卡和层次分析法的高等教育绩效评价分析
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288628
Titus Kristanto, Walid Maulana Hadiansyah, M. Nasrullah
Higher education has an important role in educating the nation's life through education. The higher education management process must have a standardization that has been determined in accordance with Permenristekdikti Number 44 of 2015 concerning National Higher Education Standards. To achieve the quality of higher education performance, it is necessary to rank the accreditation of study programs and higher education according to Permenristekdikti Number 32 of 2016 concerning Accreditation of Study Programs and Higher Education. The purpose of this study was to analyze comprehensive higher education performance measurements. This research method uses the Academic Scorecard approach with the Analytical Hierarchy Process. The Academic Scorecard method used is a combination of Permenristekdikti Number 44 of 2015 in the form of determining from each cluster, while data processing uses the Analytical Hierarchy Process in the form of decision making with several criteria. The results of the research are the level of importance of Academic Management Perspective of 16.79%, Stakeholder Perspective 19.73%, Internal Business Process Perspective 57.45%, and Innovation and Learning Perspective 55.52%. Meanwhile, from the Academic Scorecard, the perspective attainment level reached 41.72%.
高等教育在教育国民生活中具有重要作用。高等教育管理过程必须具有根据2015年关于国家高等教育标准的第44号Permenristekdikti确定的标准化。为了实现高等教育绩效的质量,有必要根据2016年关于学习计划和高等教育认证的Permenristekdikti第32号法令对学习计划和高等教育的认证进行排名。本研究的目的是分析综合高等教育绩效测量。本研究方法采用学术记分卡方法和层次分析法。使用的学术记分卡方法是2015年Permenristekdikti第44号的组合,以每个集群的形式进行确定,而数据处理则使用层次分析法(analytic Hierarchy Process)以若干标准的决策形式进行决策。研究结果显示,学术管理视角的重要性为16.79%,利益相关者视角为19.73%,内部业务流程视角为57.45%,创新与学习视角为55.52%。与此同时,从学业计分卡来看,学生的视角素养水平达到41.72%。
{"title":"Analysis of Higher Education Performance Measurement Using Academic Scorecard and Analytical Hierarchy Process","authors":"Titus Kristanto, Walid Maulana Hadiansyah, M. Nasrullah","doi":"10.1109/ICIC50835.2020.9288628","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288628","url":null,"abstract":"Higher education has an important role in educating the nation's life through education. The higher education management process must have a standardization that has been determined in accordance with Permenristekdikti Number 44 of 2015 concerning National Higher Education Standards. To achieve the quality of higher education performance, it is necessary to rank the accreditation of study programs and higher education according to Permenristekdikti Number 32 of 2016 concerning Accreditation of Study Programs and Higher Education. The purpose of this study was to analyze comprehensive higher education performance measurements. This research method uses the Academic Scorecard approach with the Analytical Hierarchy Process. The Academic Scorecard method used is a combination of Permenristekdikti Number 44 of 2015 in the form of determining from each cluster, while data processing uses the Analytical Hierarchy Process in the form of decision making with several criteria. The results of the research are the level of importance of Academic Management Perspective of 16.79%, Stakeholder Perspective 19.73%, Internal Business Process Perspective 57.45%, and Innovation and Learning Perspective 55.52%. Meanwhile, from the Academic Scorecard, the perspective attainment level reached 41.72%.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"51 Suppl 53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection and Simulation of Vacant Parking Lot Space Using EAST Algorithm and Haar Cascade 基于EAST算法和Haar级联的停车场空置空间检测与仿真
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288513
Rizki Alfarizi Harahap, Eri Prasetyo Wibowo, Robby Kurniawan Harahap
Frequent loss of time caused by finding a vacant parking space is an undesirable event by vehicle users. This paper discusses making simulation software that can provide information about available parking spots. The methods used include character recognition with the EAST text detector algorithm, vehicle detection with the Haar cascade classification algorithm, and Detection of vacant parking spots. This research presents a detector using feature text to detect vehicles in parking slots. The three methods are then combined into a simulation system. Python and OpenCV libraries are used as simulation tools in this research. The simulation runs using 60 seconds of video-stream, then observes the results every 10 seconds. The results obtained that the information can appear in the form of a text containing the available parking slots. This simulation system can facilitate the monitoring of parking areas, mainly for vacant parking slots, and make parking systems more efficient for parking management.
经常因寻找空车位而造成的时间损失是车辆使用者不希望发生的事情。本文讨论了如何制作仿真软件来提供可用停车位的信息。使用的方法包括使用EAST文本检测器算法进行字符识别,使用Haar级联分类算法进行车辆检测,以及使用空闲停车位检测。本研究提出了一种利用特征文本检测车位内车辆的检测器。然后将这三种方法组合成一个仿真系统。本研究使用Python和OpenCV库作为仿真工具。模拟使用60秒的视频流运行,然后每10秒观察一次结果。结果表明,该信息可以以包含可用车位的文本形式出现。该仿真系统可以方便地对停车区域进行监控,主要针对空置车位,使停车系统更高效地进行停车管理。
{"title":"Detection and Simulation of Vacant Parking Lot Space Using EAST Algorithm and Haar Cascade","authors":"Rizki Alfarizi Harahap, Eri Prasetyo Wibowo, Robby Kurniawan Harahap","doi":"10.1109/ICIC50835.2020.9288513","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288513","url":null,"abstract":"Frequent loss of time caused by finding a vacant parking space is an undesirable event by vehicle users. This paper discusses making simulation software that can provide information about available parking spots. The methods used include character recognition with the EAST text detector algorithm, vehicle detection with the Haar cascade classification algorithm, and Detection of vacant parking spots. This research presents a detector using feature text to detect vehicles in parking slots. The three methods are then combined into a simulation system. Python and OpenCV libraries are used as simulation tools in this research. The simulation runs using 60 seconds of video-stream, then observes the results every 10 seconds. The results obtained that the information can appear in the form of a text containing the available parking slots. This simulation system can facilitate the monitoring of parking areas, mainly for vacant parking slots, and make parking systems more efficient for parking management.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128144796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Mining Classification Approach to Predict The Duration of Contraceptive Use 预测避孕持续时间的数据挖掘分类方法
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288568
Yudhi Dwi Fajar Maulana, Y. Ruldeviyani, D. Indra Sensuse
Family planning program implementation in Indonesia has a plethora of challenges. One of the biggest challenges to implement the family planning program in Indonesia is the huge percentage of contraceptive discontinuation rates for around 29% in 2019. Based on that problem, the data mining classification approach is proposed to produce a model that can predict the duration of contraceptive use by productive couples. Through Cross-Industry Standard Process for Data Mining (CRISP-DM) process, it tested four experiments to seven data mining techniques with 39.594 contraceptives used histories dataset which is sourced from the Demography and Health Survey of Indonesia (DHS) in 2017. The result shows that the Adaboost data mining technique produced the best performance of contraceptive used prediction model, with the accuracy score of the classification model as 85.1%, precision score as 85.1%, recall score as 85.2%, and F1 as 85.1%. The model produced in this study can be used to estimate the length/duration of a particular type of contraceptive method which is used by each productive couple. That information is useful to prevent discontinuation potencies among contraceptive users for a further period.
计划生育项目在印尼的实施面临着诸多挑战。在印度尼西亚实施计划生育计划面临的最大挑战之一是,2019年避孕药具中断率高达29%左右。针对这一问题,提出了数据挖掘分类方法,建立了一个能够预测生育夫妇避孕持续时间的模型。通过跨行业数据挖掘标准流程(CRISP-DM)流程,对来自2017年印度尼西亚人口与健康调查(DHS)的39.594个避孕药具使用历史数据集进行了4项实验和7种数据挖掘技术的测试。结果表明,Adaboost数据挖掘技术产生的避孕药使用预测模型性能最佳,分类模型的准确率得分为85.1%,准确率得分为85.1%,召回率得分为85.2%,F1得分为85.1%。本研究中产生的模型可用于估计每对育龄夫妇所使用的一种特定避孕方法的长度/持续时间。这一信息有助于防止避孕药具使用者在今后一段时间内出现停药效力。
{"title":"Data Mining Classification Approach to Predict The Duration of Contraceptive Use","authors":"Yudhi Dwi Fajar Maulana, Y. Ruldeviyani, D. Indra Sensuse","doi":"10.1109/ICIC50835.2020.9288568","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288568","url":null,"abstract":"Family planning program implementation in Indonesia has a plethora of challenges. One of the biggest challenges to implement the family planning program in Indonesia is the huge percentage of contraceptive discontinuation rates for around 29% in 2019. Based on that problem, the data mining classification approach is proposed to produce a model that can predict the duration of contraceptive use by productive couples. Through Cross-Industry Standard Process for Data Mining (CRISP-DM) process, it tested four experiments to seven data mining techniques with 39.594 contraceptives used histories dataset which is sourced from the Demography and Health Survey of Indonesia (DHS) in 2017. The result shows that the Adaboost data mining technique produced the best performance of contraceptive used prediction model, with the accuracy score of the classification model as 85.1%, precision score as 85.1%, recall score as 85.2%, and F1 as 85.1%. The model produced in this study can be used to estimate the length/duration of a particular type of contraceptive method which is used by each productive couple. That information is useful to prevent discontinuation potencies among contraceptive users for a further period.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Efficient Routing Protocol AOMDV on MANET (Mobile Ad-Hoc Network) with Malicious Node 带有恶意节点的移动自组网(MANET)节能路由协议AOMDV
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288654
S. Masruroh, Angga Zain Sauqy Perdana, Hendra Bayu Suseno, Andrew Fiade, D. Khairani, H. Sukmana
Mobile Ad-Hoc Network (MANET) has problems in terms of dynamic topology changes, limited energy consumption, and without the support of existing infrastructure. Also, another problem with MANET is the malicious node. A malicious node has a purpose to disrupt the operation of the routing protocol that is running on the network. Therefore, energy efficiency evaluation is needed at MANET. This research uses the AOMDV routing protocol. Data collection methods use literature studies and simulation methods using NS2, NAM, and AWK to evaluate the performance of the AOMDV routing protocol. Quality of Service (QoS) parameters used in this research are throughput, packet loss, jitter, and energy used to examine the energy efficiency used. The simulation is carried out using a malicious node, assuming the malicious node appears at different times. The results of this study that the value of throughput decreases, the value of packet loss increases, the value of unbalanced jitter, and the energy used is also increasing.
移动自组织网络(MANET)存在动态拓扑变化、能量消耗有限以及缺乏现有基础设施支持等问题。此外,MANET的另一个问题是恶意节点。恶意节点的目的是破坏正在网络上运行的路由协议的运行。因此,MANET需要进行能效评估。本研究采用AOMDV路由协议。数据收集方法采用文献研究和仿真方法,采用NS2、NAM和AWK对AOMDV路由协议的性能进行评估。本研究中使用的服务质量(QoS)参数包括吞吐量、数据包丢失、抖动和用于检查所使用的能源效率的能量。假设恶意节点在不同时间出现,使用一个恶意节点进行仿真。本研究结果表明,吞吐量值降低,丢包值增加,不平衡抖动值增加,所使用的能量也在增加。
{"title":"Energy Efficient Routing Protocol AOMDV on MANET (Mobile Ad-Hoc Network) with Malicious Node","authors":"S. Masruroh, Angga Zain Sauqy Perdana, Hendra Bayu Suseno, Andrew Fiade, D. Khairani, H. Sukmana","doi":"10.1109/ICIC50835.2020.9288654","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288654","url":null,"abstract":"Mobile Ad-Hoc Network (MANET) has problems in terms of dynamic topology changes, limited energy consumption, and without the support of existing infrastructure. Also, another problem with MANET is the malicious node. A malicious node has a purpose to disrupt the operation of the routing protocol that is running on the network. Therefore, energy efficiency evaluation is needed at MANET. This research uses the AOMDV routing protocol. Data collection methods use literature studies and simulation methods using NS2, NAM, and AWK to evaluate the performance of the AOMDV routing protocol. Quality of Service (QoS) parameters used in this research are throughput, packet loss, jitter, and energy used to examine the energy efficiency used. The simulation is carried out using a malicious node, assuming the malicious node appears at different times. The results of this study that the value of throughput decreases, the value of packet loss increases, the value of unbalanced jitter, and the energy used is also increasing.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Family Deed Certificate for Privacy and Data Security 隐私和数据安全的区块链家庭契约证书
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288528
Po Abas Sunarya, Henderi, Sulistiawati, Alfiah Khoirunisa, Pipit Nursaputri
The rapid development of technology has caused some systems to have changed; most of them in the Industrial Revolution 4.0 era using new methods from various aspects of people's lives. Family Deed Certificate is a family identity that contains data about arrangements, relationships, and the number of family members. A family certificate is an essential thing for every citizen to have. However, related problems that occur are still using conventional systems that cause problems such as loss of family deed, and various manipulations of identity data. Thus, from this problem emerged a solution to guarantee all data and information security using blockchain technology. Blockchain technology is a technology for recording transactions with modern technology, which can only be added but cannot be changed or replaced. Blockchain technology can support various fields such as banking, education, health, and priorities for governance. For this research, this is applied in the field of government, which is a blockchain technology family certificate, various problems in terms of a family certificate that is a copy of a lot of family member data, and editing a deed of change, is very inflexible. With the family certificate system, blockchain technology, data security can be guaranteed so that there is no data falsification and can replace any loss on the family deed. This system uses the literature method that contains and how blockchain works. The Certificate of Family Deed on the blockchain is expected to impact the digital world positively.
技术的快速发展导致一些制度发生了变化;它们大多在工业革命4.0时代使用新方法从人们生活的各个方面。家庭契据证书是一种家庭身份,包含有关安排、关系和家庭成员数量的数据。家庭证明是每个公民必不可少的东西。然而,发生的相关问题仍然是使用传统系统,导致诸如丢失家庭契约,以及各种身份数据操纵等问题。因此,从这个问题中产生了一种利用区块链技术保证所有数据和信息安全的解决方案。区块链技术是一种用现代技术记录交易的技术,只能添加,不能更改或替换。区块链技术可以支持银行、教育、健康和优先治理等各个领域。对于这项研究,这是应用在政府领域的,这是一个区块链技术的家庭证书,各种各样的问题就家庭证书而言,它是大量家庭成员数据的副本,并且编辑变更契据,是非常不灵活的。通过家庭证书系统,区块链技术,可以保证数据安全,不存在数据伪造,可以替代家庭契据上的任何损失。该系统使用包含区块链工作原理的文献方法。预计区块链上的家庭契约证书将对数字世界产生积极影响。
{"title":"Blockchain Family Deed Certificate for Privacy and Data Security","authors":"Po Abas Sunarya, Henderi, Sulistiawati, Alfiah Khoirunisa, Pipit Nursaputri","doi":"10.1109/ICIC50835.2020.9288528","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288528","url":null,"abstract":"The rapid development of technology has caused some systems to have changed; most of them in the Industrial Revolution 4.0 era using new methods from various aspects of people's lives. Family Deed Certificate is a family identity that contains data about arrangements, relationships, and the number of family members. A family certificate is an essential thing for every citizen to have. However, related problems that occur are still using conventional systems that cause problems such as loss of family deed, and various manipulations of identity data. Thus, from this problem emerged a solution to guarantee all data and information security using blockchain technology. Blockchain technology is a technology for recording transactions with modern technology, which can only be added but cannot be changed or replaced. Blockchain technology can support various fields such as banking, education, health, and priorities for governance. For this research, this is applied in the field of government, which is a blockchain technology family certificate, various problems in terms of a family certificate that is a copy of a lot of family member data, and editing a deed of change, is very inflexible. With the family certificate system, blockchain technology, data security can be guaranteed so that there is no data falsification and can replace any loss on the family deed. This system uses the literature method that contains and how blockchain works. The Certificate of Family Deed on the blockchain is expected to impact the digital world positively.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Diagnosis of Feline Skin Disease Using C4.5 Algorithm 基于C4.5算法的猫皮肤病诊断
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288520
Triyanna Widiyaningtyas, I. Made Wirawan, Sabilla Halimatus Mahmud
Cats are one type of animal that is very popular with many people, and there is even a community of cat fans known as cat lovers. The health indicator in cats lies in the condition of their skin, so it needs special care to maintain their skin condition. Many cat owners are not aware of the skin diseases suffered by their cats. This is due to the owner's limited knowledge of the diseases experienced by cats and the difficulty in identifying the similar symptoms experienced by cats. To overcome this problem, we need a method to diagnose skin diseases that occur in cats. Diagnosis of symptoms of cat skin disease can be done by a classification method in data mining. In this study, the classification method used to diagnose skin diseases in cats is the C4.5 algorithm. The dataset used was obtained from the animal clinic “Purple Shop” in Malang. The algorithm testing process is carried out using k-fold cross-validation. Algorithm performance evaluation is measured by using a confusion matrix, namely by measuring the value of accuracy, precision, and recall. The results of this study indicate that the resulting accuracy value is 95.42%, the average precision is 96.93%, and the average recall is 97.19%. These results indicate that the C4.5 algorithm shows a very high level of performance and can be applied to diagnose symptoms of skin disease in cats.
猫是一种非常受人欢迎的动物,甚至有一个猫迷社区被称为爱猫者。猫的健康指标在于它们的皮肤状况,所以需要特别的护理来保持它们的皮肤状况。许多猫的主人没有意识到他们的猫患有皮肤病。这是由于主人对猫所患疾病的知识有限,而且很难识别猫所患的类似症状。为了解决这个问题,我们需要一种诊断猫皮肤疾病的方法。猫皮肤病的症状诊断可以通过数据挖掘中的分类方法来完成。在本研究中,诊断猫皮肤病的分类方法是C4.5算法。使用的数据集来自玛琅的动物诊所“紫色商店”。算法测试过程使用k-fold交叉验证进行。算法性能评价是通过使用混淆矩阵来衡量的,即通过测量准确率、精密度和召回率的值来衡量。研究结果表明,所得准确率为95.42%,平均准确率为96.93%,平均查全率为97.19%。这些结果表明,C4.5算法显示出非常高的性能水平,可以应用于诊断猫的皮肤病症状。
{"title":"Diagnosis of Feline Skin Disease Using C4.5 Algorithm","authors":"Triyanna Widiyaningtyas, I. Made Wirawan, Sabilla Halimatus Mahmud","doi":"10.1109/ICIC50835.2020.9288520","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288520","url":null,"abstract":"Cats are one type of animal that is very popular with many people, and there is even a community of cat fans known as cat lovers. The health indicator in cats lies in the condition of their skin, so it needs special care to maintain their skin condition. Many cat owners are not aware of the skin diseases suffered by their cats. This is due to the owner's limited knowledge of the diseases experienced by cats and the difficulty in identifying the similar symptoms experienced by cats. To overcome this problem, we need a method to diagnose skin diseases that occur in cats. Diagnosis of symptoms of cat skin disease can be done by a classification method in data mining. In this study, the classification method used to diagnose skin diseases in cats is the C4.5 algorithm. The dataset used was obtained from the animal clinic “Purple Shop” in Malang. The algorithm testing process is carried out using k-fold cross-validation. Algorithm performance evaluation is measured by using a confusion matrix, namely by measuring the value of accuracy, precision, and recall. The results of this study indicate that the resulting accuracy value is 95.42%, the average precision is 96.93%, and the average recall is 97.19%. These results indicate that the C4.5 algorithm shows a very high level of performance and can be applied to diagnose symptoms of skin disease in cats.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123308567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foreign Exchange Prediction using CEEMDAN and Improved FA-LSTM 基于CEEMDAN和改进FA-LSTM的外汇预测
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288615
Mustika Ulina, Ronsen Purba, Arwin Halim
In Foreign Exchange (Forex) Prediction with high accuracy it becomes a challenge because time series data has chaotic characteristics, uncertainty, and complexity. To improve the accuracy of the forex prices prediction, prediction models are proposed which Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) and Improved Firefly Algorithm-Long Short Term Memory (IFA-LSTM). In this model the preprocessing data using the CEEMDAN to decomposed into IMF sequence and residual sequence. LSTM prediction models are established for all each characteristic series from CEEMDAN deposition. IFA is applied to optimize neural network structure to improve the performance of the model prediction accuracy. We compare our proposed models with LSTM and CEEMDAN-LSTM models, the experimental results show that the proposed models performs better in the prediction of forex time series.
由于时间序列数据具有混沌、不确定性和复杂性等特点,对外汇交易进行高精度预测是一个挑战。为了提高外汇价格预测的准确性,提出了基于自适应噪声的完全集成经验模态分解(CEEMDAN)和改进萤火虫算法-长短期记忆(IFA-LSTM)的预测模型。在该模型中,预处理数据采用CEEMDAN分解为IMF序列和残差序列。建立了CEEMDAN沉积各特征序列的LSTM预测模型。应用IFA优化神经网络结构,提高模型的预测精度。我们将所提出的模型与LSTM和CEEMDAN-LSTM模型进行了比较,实验结果表明,所提出的模型对外汇时间序列的预测效果更好。
{"title":"Foreign Exchange Prediction using CEEMDAN and Improved FA-LSTM","authors":"Mustika Ulina, Ronsen Purba, Arwin Halim","doi":"10.1109/ICIC50835.2020.9288615","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288615","url":null,"abstract":"In Foreign Exchange (Forex) Prediction with high accuracy it becomes a challenge because time series data has chaotic characteristics, uncertainty, and complexity. To improve the accuracy of the forex prices prediction, prediction models are proposed which Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) and Improved Firefly Algorithm-Long Short Term Memory (IFA-LSTM). In this model the preprocessing data using the CEEMDAN to decomposed into IMF sequence and residual sequence. LSTM prediction models are established for all each characteristic series from CEEMDAN deposition. IFA is applied to optimize neural network structure to improve the performance of the model prediction accuracy. We compare our proposed models with LSTM and CEEMDAN-LSTM models, the experimental results show that the proposed models performs better in the prediction of forex time series.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"23 3 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130295517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combination of LSTM and CNN for Article-Level Propaganda Detection in News Articles 结合LSTM和CNN进行新闻文章级宣传检测
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288532
Dimas Sony Dewantara, I. Budi
Propaganda is a way of disseminating information, regardless of whether the information is true or not. Propaganda usually uses bias in obscuring the understanding of the propaganda targets. News articles are one of the media that is often used in spreading propaganda. Text classification in the form of propaganda detection in news articles is a crucial thing to do in relation to preventing the spread of the propaganda. Long Short-Term Memory (LSTM) is a variant of the Recurrent Neural Network (RNN) which has been widely used in text classification. However, LSTM has a weakness in the form of a tendency to high bias in extracting context from information through word order. Convolutional Neural Network (CNN) in text analysis can perform important feature extraction through the use of convolutional layers but is weak when assigned to context extraction. This research tries to compare LSTM, CNN and the combination of the two methods in text classification in the form of propaganda detection in news articles. The combination of each method is proved to improve classification performance and also shorten the required running time.
宣传是一种传播信息的方式,不管信息是否真实。宣传通常使用偏见来模糊对宣传对象的理解。新闻文章是一种经常用于传播宣传的媒介。新闻文章中以宣传检测的形式进行文本分类,是防止宣传传播的一项重要工作。长短期记忆(LSTM)是递归神经网络(RNN)的一种变体,已广泛应用于文本分类。然而,LSTM在通过词序从信息中提取上下文时存在高偏差的倾向。卷积神经网络(CNN)在文本分析中可以通过使用卷积层进行重要的特征提取,但在上下文提取中表现较弱。本研究试图比较LSTM、CNN以及两者结合的方法在新闻文章中以宣传检测的形式进行文本分类。结果表明,各方法的结合不仅提高了分类性能,而且缩短了所需的运行时间。
{"title":"Combination of LSTM and CNN for Article-Level Propaganda Detection in News Articles","authors":"Dimas Sony Dewantara, I. Budi","doi":"10.1109/ICIC50835.2020.9288532","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288532","url":null,"abstract":"Propaganda is a way of disseminating information, regardless of whether the information is true or not. Propaganda usually uses bias in obscuring the understanding of the propaganda targets. News articles are one of the media that is often used in spreading propaganda. Text classification in the form of propaganda detection in news articles is a crucial thing to do in relation to preventing the spread of the propaganda. Long Short-Term Memory (LSTM) is a variant of the Recurrent Neural Network (RNN) which has been widely used in text classification. However, LSTM has a weakness in the form of a tendency to high bias in extracting context from information through word order. Convolutional Neural Network (CNN) in text analysis can perform important feature extraction through the use of convolutional layers but is weak when assigned to context extraction. This research tries to compare LSTM, CNN and the combination of the two methods in text classification in the form of propaganda detection in news articles. The combination of each method is proved to improve classification performance and also shorten the required running time.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125712974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting the Selling Price of Cars Using Business Intelligence with the Feed-forward Backpropagation Algorithms 基于前馈反向传播算法的商业智能汽车销售价格预测
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288594
N. Idris, Aspian Achban, Siti Andini Utiarahman, Jorry Karim, F. Pontoiyo
The automotive industry is increasingly competitive every year by releasing cars featured with innovative specifications offered by automotive manufacturing companies. The specifications, supported by the technology and performance a car has, are a tool to determine a car's price. However, today the automotive industry frequently releases a new product or type of car with the latest specifications, affecting a car's price to change. It perplexes car manufacturing companies when they are determining a car's price. Responding to this issue, an approach to a decision-making strategy to predict a car's price is needed. One of the approaches that can be implemented is business intelligence with its primary aspects i.e. descriptive, predictive, and prescriptive. Using the concept, we implement Business Intelligence and use the feed-forward backpropagation algorithm to predicts the selling price of a car based on its specification and predict a car price based on the latest specification which has never been on sale. The research findings, identified by using a dataset containing the specifications of BMW, reveal that the actual price and predicted price are close at a mean error of 11.46%. Besides, the research findings also state that the predicted price of a new car with new specifications is $55,754. This research aims to analyze the estimation of the price of a car with the latest specification, which is the focus of the implementation of the business intelligence method we do.
汽车制造企业每年都会推出具有创新规格的汽车,因此汽车行业的竞争日益激烈。由汽车的技术和性能支持的规格是决定汽车价格的工具。然而,今天的汽车工业经常发布最新规格的新产品或汽车类型,影响汽车的价格变化。这让汽车制造公司在确定汽车价格时感到困惑。针对这一问题,需要一种预测汽车价格的决策策略方法。可以实现的方法之一是商业智能,其主要方面是描述性、预测性和说明性。利用这个概念,我们实现了商业智能,并使用前馈反向传播算法根据汽车的规格预测汽车的销售价格,并根据从未销售过的最新规格预测汽车的价格。通过使用包含宝马规格的数据集确定的研究结果显示,实际价格和预测价格接近,平均误差为11.46%。此外,研究结果还表明,一辆新规格的新车的预测价格为55,754美元。本研究旨在分析最新规格汽车的价格估计,这是我们所做的商业智能方法实现的重点。
{"title":"Predicting the Selling Price of Cars Using Business Intelligence with the Feed-forward Backpropagation Algorithms","authors":"N. Idris, Aspian Achban, Siti Andini Utiarahman, Jorry Karim, F. Pontoiyo","doi":"10.1109/ICIC50835.2020.9288594","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288594","url":null,"abstract":"The automotive industry is increasingly competitive every year by releasing cars featured with innovative specifications offered by automotive manufacturing companies. The specifications, supported by the technology and performance a car has, are a tool to determine a car's price. However, today the automotive industry frequently releases a new product or type of car with the latest specifications, affecting a car's price to change. It perplexes car manufacturing companies when they are determining a car's price. Responding to this issue, an approach to a decision-making strategy to predict a car's price is needed. One of the approaches that can be implemented is business intelligence with its primary aspects i.e. descriptive, predictive, and prescriptive. Using the concept, we implement Business Intelligence and use the feed-forward backpropagation algorithm to predicts the selling price of a car based on its specification and predict a car price based on the latest specification which has never been on sale. The research findings, identified by using a dataset containing the specifications of BMW, reveal that the actual price and predicted price are close at a mean error of 11.46%. Besides, the research findings also state that the predicted price of a new car with new specifications is $55,754. This research aims to analyze the estimation of the price of a car with the latest specification, which is the focus of the implementation of the business intelligence method we do.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"755 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GIS-Based MCDM for Central Business Suitability in a Small City 基于gis的小城市中心业务适宜性MCDM研究
Pub Date : 2020-11-03 DOI: 10.1109/ICIC50835.2020.9288586
Herlawati Herlawati, E. Abdurachman, Y. Heryadi, Haryono Soeparno
Extended urbanization phenomenon in smaller-sized cities in Java should be considered by the government. However, the local governments can only use the plans from the central government. The negative effects of this, among others, are improper land use allocation, lack of facilities, and crimes that are difficult to handle. This study proposes a geographic information system (GIS)-based method to analyze the proper central business district in Karawang, a small district in Java, Indonesia. Multi-criteria analysis of factors affecting the candidate locations was used through a weighted sum method in a model. The spatial data were retrieved and analyzed using a GIS tool to classify region into urban, peri-urban, and rural. Some central business locations have been found after reclassification which is located near the toll gates. Two locations in the north of Karawang were classified have the potential to become the new central business locations.
爪哇小城市的延伸城市化现象应该得到政府的考虑。但是,地方政府只能使用中央政府的计划。其负面影响包括土地分配不当、设施缺乏、难以处理的犯罪等。本研究提出了一种基于地理信息系统(GIS)的方法来分析印尼爪哇岛小地区卡拉旺的适当中央商务区。在模型中采用加权和法对影响候选位置的因素进行多准则分析。利用GIS工具对空间数据进行检索和分析,将区域划分为城市、近郊和农村。重新分类后发现一些中心营业地点位于收费站附近。卡拉旺北部的两个地点被归类为有潜力成为新的中央商业地点。
{"title":"GIS-Based MCDM for Central Business Suitability in a Small City","authors":"Herlawati Herlawati, E. Abdurachman, Y. Heryadi, Haryono Soeparno","doi":"10.1109/ICIC50835.2020.9288586","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288586","url":null,"abstract":"Extended urbanization phenomenon in smaller-sized cities in Java should be considered by the government. However, the local governments can only use the plans from the central government. The negative effects of this, among others, are improper land use allocation, lack of facilities, and crimes that are difficult to handle. This study proposes a geographic information system (GIS)-based method to analyze the proper central business district in Karawang, a small district in Java, Indonesia. Multi-criteria analysis of factors affecting the candidate locations was used through a weighted sum method in a model. The spatial data were retrieved and analyzed using a GIS tool to classify region into urban, peri-urban, and rural. Some central business locations have been found after reclassification which is located near the toll gates. Two locations in the north of Karawang were classified have the potential to become the new central business locations.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 Fifth International Conference on Informatics and Computing (ICIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1