Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878527
M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka
Submission of information can use 3-dimensional (3D) images that will make information clearer and more interesting. Faculty of Computer Science and Information Technology (FKTI) one of the faculties located at Mulawarman University. Base rooms and laboratories are often used and if someone wants to do peripherals then he will look for additional peripherals. However, they do not have a device that can be used to know the pattern of each room function and the learning environment must have additional devices to facilitate the use of Augmented Reality 3D media. Therefore, it is necessary to have augmented reality media to provide an understanding of visual information for the faculty room and the basic laboratory of the FKTI program. Each scheme of determining markers is adjusted to the point where the camera will scan. Tests are carried out to show the results are done on plain paper that already has their own floor plan and in each room partition can display basic information about the room. Light testing is also done with the result that if the light is $gt300$ lux then it can be ascertained that AR visibility will appear quickly.
{"title":"Augmented Reality for Office and Basic Programming Laboratory Peripheral","authors":"M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka","doi":"10.1109/EIConCIT.2018.8878527","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878527","url":null,"abstract":"Submission of information can use 3-dimensional (3D) images that will make information clearer and more interesting. Faculty of Computer Science and Information Technology (FKTI) one of the faculties located at Mulawarman University. Base rooms and laboratories are often used and if someone wants to do peripherals then he will look for additional peripherals. However, they do not have a device that can be used to know the pattern of each room function and the learning environment must have additional devices to facilitate the use of Augmented Reality 3D media. Therefore, it is necessary to have augmented reality media to provide an understanding of visual information for the faculty room and the basic laboratory of the FKTI program. Each scheme of determining markers is adjusted to the point where the camera will scan. Tests are carried out to show the results are done on plain paper that already has their own floor plan and in each room partition can display basic information about the room. Light testing is also done with the result that if the light is $gt300$ lux then it can be ascertained that AR visibility will appear quickly.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127042411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878520
I. Patulak, M. Firdaus, N. Dengen
Current economic era is not only based on capital and human resources, but on information held by the company and no exception to small medium enterprise (SMEs). Correct information at the right time can determine positive business development, while lack of information can lead to failure. Commodity-Processed Furniture SMEs and Waste Utilization in Samarinda are research targets because they feel SMEs furniture is increasingly farther away with consumers in the current information age. Data collection is carried out by direct survey to the place of business and the community by recording, documenting photos, archives, and recording interviews. This research aims to show that existing modern media is suitable for use in e-business in Furniture SMEs in terms of increasing the coverage and sales of various products and services. The authors try to present business model solutions from SMEs furniture services in particular. Wood raw material for wood production waste is closer to being obtained from sawn timber companies along the lower reaches of the Mahakam River. The resulting waste is in the form of powder and specks. Commodities of finished and traded goods are pretty much like cosmetics, windows, doors, cabinets, tables, chairs, even gravestones. Social media such as Facebook, Instagram, WhatsApp, and Lne are the cornerstones of the e-business media in this design because it is the social media that is closest to the community.
{"title":"Design of e-Business Furniture SMEs From Commodity and Waste Utilization Perspective","authors":"I. Patulak, M. Firdaus, N. Dengen","doi":"10.1109/EIConCIT.2018.8878520","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878520","url":null,"abstract":"Current economic era is not only based on capital and human resources, but on information held by the company and no exception to small medium enterprise (SMEs). Correct information at the right time can determine positive business development, while lack of information can lead to failure. Commodity-Processed Furniture SMEs and Waste Utilization in Samarinda are research targets because they feel SMEs furniture is increasingly farther away with consumers in the current information age. Data collection is carried out by direct survey to the place of business and the community by recording, documenting photos, archives, and recording interviews. This research aims to show that existing modern media is suitable for use in e-business in Furniture SMEs in terms of increasing the coverage and sales of various products and services. The authors try to present business model solutions from SMEs furniture services in particular. Wood raw material for wood production waste is closer to being obtained from sawn timber companies along the lower reaches of the Mahakam River. The resulting waste is in the form of powder and specks. Commodities of finished and traded goods are pretty much like cosmetics, windows, doors, cabinets, tables, chairs, even gravestones. Social media such as Facebook, Instagram, WhatsApp, and Lne are the cornerstones of the e-business media in this design because it is the social media that is closest to the community.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878601
Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo
The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.
{"title":"Secured Data Transmission using Metadata Logger Manipulation Approach","authors":"Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo","doi":"10.1109/EIConCIT.2018.8878601","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878601","url":null,"abstract":"The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878673
Yolanda Gabyriela Ferandji, Diaraya, A. Lawi
Processing of image digital is a technology that can be used to enhance images and information about objects in images. Edge detection in digital image enhancement is a process that produces parts of image objects for segmentation and creativity of objects in the image. This research aims to get the best operators to detect the character of the word Lontara in Sanskrit manuscripts. This research also uses morphological operations in binary images to identify the many forms of the character of the word Lontara. Edge detection operators used are Sobel, Canny, Prewitt, and Roberts. There are 2 types of images used in this study are good quality images and poor-quality images. The parameter used to measure operator performance is Mean Square Error (MSE). The results we obtained from Roberts operator are the best operators to detect the location of the script with an MSE value of 0.8370 in images of good quality, MSE value of 0.8688 in images of poor quality.
{"title":"Performance Comparison of Image Edge Detection Operators for Lontara Sanskrit Scripts","authors":"Yolanda Gabyriela Ferandji, Diaraya, A. Lawi","doi":"10.1109/EIConCIT.2018.8878673","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878673","url":null,"abstract":"Processing of image digital is a technology that can be used to enhance images and information about objects in images. Edge detection in digital image enhancement is a process that produces parts of image objects for segmentation and creativity of objects in the image. This research aims to get the best operators to detect the character of the word Lontara in Sanskrit manuscripts. This research also uses morphological operations in binary images to identify the many forms of the character of the word Lontara. Edge detection operators used are Sobel, Canny, Prewitt, and Roberts. There are 2 types of images used in this study are good quality images and poor-quality images. The parameter used to measure operator performance is Mean Square Error (MSE). The results we obtained from Roberts operator are the best operators to detect the location of the script with an MSE value of 0.8370 in images of good quality, MSE value of 0.8688 in images of poor quality.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878512
Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin
Student achievement is one of the main focuses to increase university credibility. An early warning system is needed to prevent more risks. The early warning systems (EWS) of student achievement has been possible with a combination of case based reasoning (CBR), k-nearest neighbor (K-NN), and decision tree. CBR is used to obtain a solution that stores knowledge so that it can predict student achievement. This research is combining the Case Based Reasoning, K-Nearest Neighbor (K-NN), and Decision Tree (DT) methods for the prediction of student achievement that applied in the early warning system. The attributes of an early warning system of student achievement are genders, distances of residence, ages, high schools, majors, and grade point average (GPA) for six semesters. The results show that accuracy rate is 60.5% of 55 data in the early warning system of student achievement and a model CBR for Early Warning System of Student Achievement.
{"title":"Combination of Case Based Reasoning with Nearest Neighbor and Decision Tree for Early Warning System of Student Achievement","authors":"Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin","doi":"10.1109/EIConCIT.2018.8878512","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878512","url":null,"abstract":"Student achievement is one of the main focuses to increase university credibility. An early warning system is needed to prevent more risks. The early warning systems (EWS) of student achievement has been possible with a combination of case based reasoning (CBR), k-nearest neighbor (K-NN), and decision tree. CBR is used to obtain a solution that stores knowledge so that it can predict student achievement. This research is combining the Case Based Reasoning, K-Nearest Neighbor (K-NN), and Decision Tree (DT) methods for the prediction of student achievement that applied in the early warning system. The attributes of an early warning system of student achievement are genders, distances of residence, ages, high schools, majors, and grade point average (GPA) for six semesters. The results show that accuracy rate is 60.5% of 55 data in the early warning system of student achievement and a model CBR for Early Warning System of Student Achievement.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878574
M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi
Voice over Internet Protocol (VoIP) technology is easy to find even almost all instant messaging mobile applications already have features such as voice calls. The VoIP feature can only be used after the user is connected to the internet network, for the average smartphone user to use the internet network provided by the internet service provider (ISP). The VoIP is very dependent on the network used. Quality of Service (QoS) parameters such as delay, jitter, throughput and packet loss be used to measure the quality of the network. This study aims to analyze the performance of VoIP technology in one of the instant messaging mobile applications like WhatsApp uses Telkomsel ISP network and be adapted to International Telecommunication Union (ITU-T G.114) standards. Results of the research, the highest of delay generated by voice calls during indoor conditions is 56,6 ms, jitter is the most resulted voice call when the indoor condition is 0,5 ms, packet loss is the most generated voice call when the indoor condition is 7%. The resulting throughput in the voice call testing process is between 25.2 Mbps until 28.1 Mbps.
互联网协议语音(VoIP)技术很容易找到,甚至几乎所有的即时通讯移动应用程序都已经具有语音呼叫等功能。VoIP功能只能在用户接入互联网后使用,一般智能手机用户只能使用互联网服务提供商(ISP)提供的互联网。VoIP非常依赖于所使用的网络。时延、抖动、吞吐量、丢包等QoS (Quality of Service)参数用来衡量网络的质量。本研究旨在分析VoIP技术在即时通讯移动应用程序之一(如WhatsApp)中的性能,该应用程序使用Telkomsel ISP网络并适应国际电信联盟(ITU-T G.114)标准。研究结果表明,室内条件下语音通话产生的最大延迟为56,6 ms,室内条件为0,5 ms时产生的抖动最多,室内条件为7%时产生的丢包最多。在语音呼叫测试过程中产生的吞吐量在25.2 Mbps到28.1 Mbps之间。
{"title":"Quality of Service Voice over Internet Protocol in Mobile Instant Messaging","authors":"M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi","doi":"10.1109/EIConCIT.2018.8878574","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878574","url":null,"abstract":"Voice over Internet Protocol (VoIP) technology is easy to find even almost all instant messaging mobile applications already have features such as voice calls. The VoIP feature can only be used after the user is connected to the internet network, for the average smartphone user to use the internet network provided by the internet service provider (ISP). The VoIP is very dependent on the network used. Quality of Service (QoS) parameters such as delay, jitter, throughput and packet loss be used to measure the quality of the network. This study aims to analyze the performance of VoIP technology in one of the instant messaging mobile applications like WhatsApp uses Telkomsel ISP network and be adapted to International Telecommunication Union (ITU-T G.114) standards. Results of the research, the highest of delay generated by voice calls during indoor conditions is 56,6 ms, jitter is the most resulted voice call when the indoor condition is 0,5 ms, packet loss is the most generated voice call when the indoor condition is 7%. The resulting throughput in the voice call testing process is between 25.2 Mbps until 28.1 Mbps.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878604
Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin
Economic Dispatch (ED) of thermal power plant has a role in maintaining economic power system. The main purpose of ED is to set the control variables of power system so that the generators can generate maximum power according to load demand based on each generator characteristic with lower production cost. In this paper, the economic dispatch will be done in thermal power system using Novel Bat Algorithm (NBA) constrained by voltage stability. NBA is a recent optimization method that is developed build upon bat behavior. The result showed that the NBA can optimize the thermal power system by showing lower price of production cost. The NBA can reduce 9.23% of the production cost. Not only is the production cost smaller but also the power loss obtained by NBA. Voltage stability is also maintained in this research by showing better improvement of critical point with average 0.920 per unit. The proposed method is applied in real system of SULSELBAR 150 kV power system.
{"title":"Economic Dispatch using Novel Bat Algorithm Constrained by Voltage Stability","authors":"Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin","doi":"10.1109/EIConCIT.2018.8878604","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878604","url":null,"abstract":"Economic Dispatch (ED) of thermal power plant has a role in maintaining economic power system. The main purpose of ED is to set the control variables of power system so that the generators can generate maximum power according to load demand based on each generator characteristic with lower production cost. In this paper, the economic dispatch will be done in thermal power system using Novel Bat Algorithm (NBA) constrained by voltage stability. NBA is a recent optimization method that is developed build upon bat behavior. The result showed that the NBA can optimize the thermal power system by showing lower price of production cost. The NBA can reduce 9.23% of the production cost. Not only is the production cost smaller but also the power loss obtained by NBA. Voltage stability is also maintained in this research by showing better improvement of critical point with average 0.920 per unit. The proposed method is applied in real system of SULSELBAR 150 kV power system.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/eiconcit.2018.8878541
{"title":"[EIConCIT 2018 Back Cover]","authors":"","doi":"10.1109/eiconcit.2018.8878541","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878541","url":null,"abstract":"","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/EIConCIT.2018.8878626
Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah
One of the department tasks is to predict study duration-time of each student in order to anticipate dropout (DO), which causes the department performance to be poorly. Consequently, study duration-time of each student is indispensable. Furthermore, the evaluation showing whether the student will pass or fail would benefit the student/instructor and act as a guide for future recommendations/evaluations on performance. An in-depth study on the student academic evaluation techniques by using Naïve Bayes Classifier (NBC) has been implemented. The dataset with specific parameters among others age, place of birth, gender, high school status (public or private), department in high school, organization activeness, age at the start of high school level, and progress GPA (pGPA) and Total GPA (tGPA) of undergraduate program from semester 1–4 with three times graduation criteria (i.e., fast, on, and delay times) have been described and analyzed. The experimental results indicated that accuracy algorithm (AC) of 76.79% with true positive rate (TP) of 44.62% by using quality training data of 80% and 90% have a good performance accuracy value.
{"title":"Student Academic Evaluation using Naïve Bayes Classifier Algorithm","authors":"Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah","doi":"10.1109/EIConCIT.2018.8878626","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878626","url":null,"abstract":"One of the department tasks is to predict study duration-time of each student in order to anticipate dropout (DO), which causes the department performance to be poorly. Consequently, study duration-time of each student is indispensable. Furthermore, the evaluation showing whether the student will pass or fail would benefit the student/instructor and act as a guide for future recommendations/evaluations on performance. An in-depth study on the student academic evaluation techniques by using Naïve Bayes Classifier (NBC) has been implemented. The dataset with specific parameters among others age, place of birth, gender, high school status (public or private), department in high school, organization activeness, age at the start of high school level, and progress GPA (pGPA) and Total GPA (tGPA) of undergraduate program from semester 1–4 with three times graduation criteria (i.e., fast, on, and delay times) have been described and analyzed. The experimental results indicated that accuracy algorithm (AC) of 76.79% with true positive rate (TP) of 44.62% by using quality training data of 80% and 90% have a good performance accuracy value.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Current technological developments spur the application of pattern recognition in various fields, such as the introduction of signature patterns, fingerprints, faces, and handwriting. Human handwriting has differences between one another and often is difficult to read or difficult to recognize and this can hamper daily activities, such as transaction activities that require handwriting. Even though one of the human biometric features is handwriting. The purpose of this paper is to compare the algorithm of Artificial Neural Network (ANN) and Gaussian Naïve Bayes (GNB) in handwriting number recognition. Both of these algorithms are quite reliable in performing the classification process. ANN can do pattern recognition and provide good results. If the size of the training data is small, the accuracy of GNB provides good results. To recognize the handwriting pattern, the characteristics of the handwriting object are extracted using an invariant moment. The test results show that GNB produces a higher level of accuracy of 28.33% compared to the ANN of 11.67%. The resulting accuracy level is still very low. This is because the result extraction data has a small distance for each class or any number character.
{"title":"Comparison of Artificial Neural Network and Gaussian Naïve Bayes in Recognition of Hand-Writing Number","authors":"Herman, Lukman Syafie, Dolly Indra, As’ad Djamalilleil, Nirsal, Heliawaty Hamrul, Siska Anraeni, Lutfi Budi Ilmawan","doi":"10.1109/EIConCIT.2018.8878651","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878651","url":null,"abstract":"Current technological developments spur the application of pattern recognition in various fields, such as the introduction of signature patterns, fingerprints, faces, and handwriting. Human handwriting has differences between one another and often is difficult to read or difficult to recognize and this can hamper daily activities, such as transaction activities that require handwriting. Even though one of the human biometric features is handwriting. The purpose of this paper is to compare the algorithm of Artificial Neural Network (ANN) and Gaussian Naïve Bayes (GNB) in handwriting number recognition. Both of these algorithms are quite reliable in performing the classification process. ANN can do pattern recognition and provide good results. If the size of the training data is small, the accuracy of GNB provides good results. To recognize the handwriting pattern, the characteristics of the handwriting object are extracted using an invariant moment. The test results show that GNB produces a higher level of accuracy of 28.33% compared to the ANN of 11.67%. The resulting accuracy level is still very low. This is because the result extraction data has a small distance for each class or any number character.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}