Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590156
Wijayanti, Radius Tanone
UI/UX design in applications is very important because a good design can meet user needs and make users feel comfortable and understand the use of the application. An example is an online application for website-based Foreign Service Travel Expenses (BPDL). In making this application focused on potential users of this application, if the user cannot understand the application created, it will have an impact on the user and the system. Such as data entry errors in the service application process, wrong service timings, etc. The purpose of this UI/UX design is to overcome any problems that may arise. When implementing this design, the design thinking method used can influence the way decisions are made, generate new innovative ideas, and make it easier for users to use BPDL applications.
{"title":"Design Thinking and Emotional Intelligence in UI/UX Design of Website-Based Online Foreign Service Travel Expenses (BPDL) Applications","authors":"Wijayanti, Radius Tanone","doi":"10.1109/ICITech50181.2021.9590156","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590156","url":null,"abstract":"UI/UX design in applications is very important because a good design can meet user needs and make users feel comfortable and understand the use of the application. An example is an online application for website-based Foreign Service Travel Expenses (BPDL). In making this application focused on potential users of this application, if the user cannot understand the application created, it will have an impact on the user and the system. Such as data entry errors in the service application process, wrong service timings, etc. The purpose of this UI/UX design is to overcome any problems that may arise. When implementing this design, the design thinking method used can influence the way decisions are made, generate new innovative ideas, and make it easier for users to use BPDL applications.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"8 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590187
Pandapotan Siagian, Erick Fernando
Good air quality is very important in human health. However, air pollution has been polluted everywhere, whether in the house, in cities. This is caused by a growing industry that produces air pollution. Room air pollution and various cities will contribute to air pollution, which will cause problems for human health. This work measures the carbon monoxide level using the MQ-7 sensor and measures the air's carbon dioxide level with the CCS811 sensor and MH-Z19 sensor. All three sensors are connected to the NodeMCU ESPS266, and we call it a NodeMCU module. Tests are carried out in three rooms in the house, and then three NodeMCU modules are used so that the three modules will send data alternately. Raspberry Pi3 (RPi3) functions as a server that collects data and acquires information data from sensors. Data from the CCS811 (TCOV) sensor, MH-Z19 (co2), will be processed first with fuzzy logic rules to make decisions about CO2, which are right, moderate, nasty conditions. The process is carried out on the Raspberry Pi 3 server with MQTT using publication, customer, fuzzy logic, and broker services. The value of the sensor's measurement results can be accessed via a smartphone and provides good air control values.
良好的空气质量对人体健康非常重要。然而,空气污染已经无处不在,无论是在家里,在城市。这是由于不断增长的工业造成的空气污染。室内空气污染和各个城市都会造成空气污染,这将对人体健康造成问题。这项工作使用MQ-7传感器测量一氧化碳水平,并使用CCS811传感器和MH-Z19传感器测量空气中的二氧化碳水平。所有三个传感器都连接到NodeMCU ESPS266,我们称之为NodeMCU模块。在房子的三个房间进行测试,然后使用三个NodeMCU模块,以便三个模块交替发送数据。RPi3 (Raspberry Pi3)作为服务器,负责采集数据,从传感器获取信息数据。来自CCS811 (TCOV)传感器MH-Z19 (co2)的数据将首先用模糊逻辑规则进行处理,以做出关于co2的决策,这是正确的,适度的,恶劣的条件。该过程在带有MQTT的Raspberry Pi 3服务器上执行,使用发布、客户、模糊逻辑和代理服务。传感器的测量结果值可以通过智能手机访问,并提供良好的空气控制值。
{"title":"Smartphone Application As An Air Quality Monitor Using Raspberry Pi For Reducing Air Pollution","authors":"Pandapotan Siagian, Erick Fernando","doi":"10.1109/ICITech50181.2021.9590187","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590187","url":null,"abstract":"Good air quality is very important in human health. However, air pollution has been polluted everywhere, whether in the house, in cities. This is caused by a growing industry that produces air pollution. Room air pollution and various cities will contribute to air pollution, which will cause problems for human health. This work measures the carbon monoxide level using the MQ-7 sensor and measures the air's carbon dioxide level with the CCS811 sensor and MH-Z19 sensor. All three sensors are connected to the NodeMCU ESPS266, and we call it a NodeMCU module. Tests are carried out in three rooms in the house, and then three NodeMCU modules are used so that the three modules will send data alternately. Raspberry Pi3 (RPi3) functions as a server that collects data and acquires information data from sensors. Data from the CCS811 (TCOV) sensor, MH-Z19 (co2), will be processed first with fuzzy logic rules to make decisions about CO2, which are right, moderate, nasty conditions. The process is carried out on the Raspberry Pi 3 server with MQTT using publication, customer, fuzzy logic, and broker services. The value of the sensor's measurement results can be accessed via a smartphone and provides good air control values.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132704070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asset management is one of the most significant concerns in companies for controlling their moveable assets. However, most companies still deal with this in an inefficient way, such as manual recording or on-the-spot inspection, which is prone to human errors. This study proposes an assets surveillance system which is able to identify the assets movement statuses using a Wi-Fi network. A Wemos transmitter is mounted on each asset to be monitored and connected to the receiver through Wi-Fi signal. These tools are also connected to the internet via website to do real-time monitoring in client-side. The received signal strength indicator (RSSI) of Wi-Fi signal is measured and translated to distance information. Whenever the transmitter is out of the Wi-Fi range, a notification will pop up with ringing sound on website as it indicates that the asset is moved to another place. All activities are recorded automatically in the history. The results show that the website and notification system run properly. The maximum distances for the Wemos to detect is 12 meters, and the detection is performed at the average of 8.09 seconds. This system can be applied in companies to provide a secure, effective, and accurate way, comparing to the past manual asset management.
{"title":"Wi-Fi Enabled Asset Surveillance System using Internet of Things","authors":"Achmad Kathri Sansyah, Stephany Octaviani Ngesthi, Bernadus Sandy Pratama Putra Ardany, Gunawan Dewantoro","doi":"10.1109/ICITech50181.2021.9590129","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590129","url":null,"abstract":"Asset management is one of the most significant concerns in companies for controlling their moveable assets. However, most companies still deal with this in an inefficient way, such as manual recording or on-the-spot inspection, which is prone to human errors. This study proposes an assets surveillance system which is able to identify the assets movement statuses using a Wi-Fi network. A Wemos transmitter is mounted on each asset to be monitored and connected to the receiver through Wi-Fi signal. These tools are also connected to the internet via website to do real-time monitoring in client-side. The received signal strength indicator (RSSI) of Wi-Fi signal is measured and translated to distance information. Whenever the transmitter is out of the Wi-Fi range, a notification will pop up with ringing sound on website as it indicates that the asset is moved to another place. All activities are recorded automatically in the history. The results show that the website and notification system run properly. The maximum distances for the Wemos to detect is 12 meters, and the detection is performed at the average of 8.09 seconds. This system can be applied in companies to provide a secure, effective, and accurate way, comparing to the past manual asset management.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590176
K. Hartomo, M. R. Ramadhan
This study aimed to measure the quality of the Disaster Mitigation Information System (Sikabi) belonging to the Regional Disaster Management Authority of Boyolali Regency. Quality tests are carried out to determine the quality and functionality of the system that functions optimally and can display accurate, easily accessible, and useful information for disaster mitigation in the region. The results of the study are useful for providing feedback to information system developers regarding the quality of the website usability aspect, the quality of the information presented, and the quality of the interactions provided as well as the user satisfaction at accessing the Disaster Information System website. This study uses the Webqual 4.0 method which has 4 assessment variables, namely in terms of usability (information quality), interaction service (interaction quality), and user satisfaction while accessing the website (overall impression). From the research results, the information quality variable has a sig value. 0, 000 <0, 05 which indicates that there is an influence of information quality on user satisfaction in using the Sikabi website. Therefore, we recommend improving the quality of the information displayed on the Sikabi website page.
{"title":"Quality Evaluation in Disaster Mitigation Information System using Webqual 4.0 Method","authors":"K. Hartomo, M. R. Ramadhan","doi":"10.1109/ICITech50181.2021.9590176","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590176","url":null,"abstract":"This study aimed to measure the quality of the Disaster Mitigation Information System (Sikabi) belonging to the Regional Disaster Management Authority of Boyolali Regency. Quality tests are carried out to determine the quality and functionality of the system that functions optimally and can display accurate, easily accessible, and useful information for disaster mitigation in the region. The results of the study are useful for providing feedback to information system developers regarding the quality of the website usability aspect, the quality of the information presented, and the quality of the interactions provided as well as the user satisfaction at accessing the Disaster Information System website. This study uses the Webqual 4.0 method which has 4 assessment variables, namely in terms of usability (information quality), interaction service (interaction quality), and user satisfaction while accessing the website (overall impression). From the research results, the information quality variable has a sig value. 0, 000 <0, 05 which indicates that there is an influence of information quality on user satisfaction in using the Sikabi website. Therefore, we recommend improving the quality of the information displayed on the Sikabi website page.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/icitech50181.2021.9590152
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icitech50181.2021.9590152","DOIUrl":"https://doi.org/10.1109/icitech50181.2021.9590152","url":null,"abstract":"","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590122
Claudia Audia Trianti, Budhi Kristianto, Hendry
Back-end is a complex system that involves various of technologies while front-end much simpler that presents back-end's processed data. Generally., front-end system uses web technology that enables user to access using web browser any where and any time as long as connected to the server. This research integrates back-end system using Python-based artificial intelligence and web based front-end as an integrated student's attendance system using face recognition technology. Since Python doesn't natively run on the web., then an integration of PHP and Flask is used to run the system and make them available on the web. In addition to present detailed integration of front-end and back-end of the developed system., performance test also be presented as well. It found 3.92 second of response time., 46.8% of CPU Usage., and 3.4 Byte of RAM Usage to process the given job.
{"title":"Integration of Flask and Python on The Face Recognition Based Attendance System","authors":"Claudia Audia Trianti, Budhi Kristianto, Hendry","doi":"10.1109/ICITech50181.2021.9590122","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590122","url":null,"abstract":"Back-end is a complex system that involves various of technologies while front-end much simpler that presents back-end's processed data. Generally., front-end system uses web technology that enables user to access using web browser any where and any time as long as connected to the server. This research integrates back-end system using Python-based artificial intelligence and web based front-end as an integrated student's attendance system using face recognition technology. Since Python doesn't natively run on the web., then an integration of PHP and Flask is used to run the system and make them available on the web. In addition to present detailed integration of front-end and back-end of the developed system., performance test also be presented as well. It found 3.92 second of response time., 46.8% of CPU Usage., and 3.4 Byte of RAM Usage to process the given job.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130978754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590162
Meyliana, Erick Fernando, Surjandy, H. A. Widjaja, Arifa Tan
This research focuses exclusively on analyzing articles related to innovation in blockchain technology with IoT in vehicles and automotive. This study has the main objective of identifying and analyzing the literature on this topic scientifically in the past, present, and future. Bibliometric analysis approach using publish and perish software and VOS viewer. The bibliometric analysis used in this study to visualize topic areas, The number of keywords that appear frequently, the number of publications per year between 2016 – 2020, the most published papers on the topic of blockchain with IoT in automotive, the most frequent trends, and words topics. In conclusion, Blockchain with IoT in vehicles and automotive makes a recently developed topic and currently has great relevance for practitioners and academics. However, the interpretation of the results presented and discussed above has several limitations to address. First, this research is based on samples of articles published in journals and conferences indexed by Scopus. Second, the resulting keywords include blockchain, Internet of things, Internet of vehicle, smart contract, security, privacy. Third, the publication of scientific articles related to this research topic from 2016 has 20 articles, 2017 does not exist, 2018 has 6 articles, 2019 has 34 articles, 2020 has 36 articles, and 2021 has 1 article. Therefore, the topics used to allow us to have an evident view of the trends in the discussion can generate ideas and knowledge for future research.
{"title":"Bibliometric Analysis of Technology Blockchain with IoT in Vehicle","authors":"Meyliana, Erick Fernando, Surjandy, H. A. Widjaja, Arifa Tan","doi":"10.1109/ICITech50181.2021.9590162","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590162","url":null,"abstract":"This research focuses exclusively on analyzing articles related to innovation in blockchain technology with IoT in vehicles and automotive. This study has the main objective of identifying and analyzing the literature on this topic scientifically in the past, present, and future. Bibliometric analysis approach using publish and perish software and VOS viewer. The bibliometric analysis used in this study to visualize topic areas, The number of keywords that appear frequently, the number of publications per year between 2016 – 2020, the most published papers on the topic of blockchain with IoT in automotive, the most frequent trends, and words topics. In conclusion, Blockchain with IoT in vehicles and automotive makes a recently developed topic and currently has great relevance for practitioners and academics. However, the interpretation of the results presented and discussed above has several limitations to address. First, this research is based on samples of articles published in journals and conferences indexed by Scopus. Second, the resulting keywords include blockchain, Internet of things, Internet of vehicle, smart contract, security, privacy. Third, the publication of scientific articles related to this research topic from 2016 has 20 articles, 2017 does not exist, 2018 has 6 articles, 2019 has 34 articles, 2020 has 36 articles, and 2021 has 1 article. Therefore, the topics used to allow us to have an evident view of the trends in the discussion can generate ideas and knowledge for future research.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590159
Widodo, Murien Nugraheni, Irma Permata Sari
In anonymizing data, k-anonymity is a pioneer model and become popular. However, it still a drawback in information loss when the sensitive values are not distributed evenly. This study aims to distribute evenly sensitive values in microdata with multiple sensitive attributes by extending simple distribution of sensitive values (SDSV) method to anatomy. Previously, this method works well when it is conducted in k-anonymity. This method is used with a little modification in last step by exchange randomly record if privacy level is not satisfied and this method is run in anatomy. The result shows that in anatomy SDSV has better performance than systematic clustering as a base line. SDSV has diversity value 1.02 and systematic clustering has 0.33. From information loss aspect in anatomy model the result also shows that SDSV outperforms systematic clustering.
{"title":"Simple Distribution of Sensitive Values for Multiple Sensitive Attributes in Privacy Preserving Data Publishing to Achieve Anatomy","authors":"Widodo, Murien Nugraheni, Irma Permata Sari","doi":"10.1109/ICITech50181.2021.9590159","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590159","url":null,"abstract":"In anonymizing data, k-anonymity is a pioneer model and become popular. However, it still a drawback in information loss when the sensitive values are not distributed evenly. This study aims to distribute evenly sensitive values in microdata with multiple sensitive attributes by extending simple distribution of sensitive values (SDSV) method to anatomy. Previously, this method works well when it is conducted in k-anonymity. This method is used with a little modification in last step by exchange randomly record if privacy level is not satisfied and this method is run in anatomy. The result shows that in anatomy SDSV has better performance than systematic clustering as a base line. SDSV has diversity value 1.02 and systematic clustering has 0.33. From information loss aspect in anatomy model the result also shows that SDSV outperforms systematic clustering.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590181
D. Kurniadi, Asri Mulvani, Rizky Safta Maolani
Sunda has a long history recorded in ancient manuscripts containing Carita Parahyangan written about the kingdom's story in java. Development of technology, made delivery of cultural and historical values can be conveyed through Games. Artificial Intelligence makes Non- Playable Character (NPC) move from one position to the target position in the Games application by applying the Pathfinding Algorithm. The application of Artificial Intelligence is to provide a realistic playing experience for users. This study aims to Apply the Pathfinding A * algorithm to games application History of Sundanese Land. With the construction of this game, it is hoped that it can become a medium for Sundanese history education for people. This game was built using the Digital Games Based Learning - Instructional Design methodology and tested using Black Box Testing and scenario testing against the Pathfinding A* Algorithm applied. The application of the A* pathfinding algorithm was successfully carried out on enemy NPCs indicated by the NPC can move to the player's character position through the fastest path. The game that was built gave a positive effect with a value of 9.08 through Game Experience Questionnaire.
{"title":"Implementation of Pathfinding Algorithm in Sundanese Land History Educational Game","authors":"D. Kurniadi, Asri Mulvani, Rizky Safta Maolani","doi":"10.1109/ICITech50181.2021.9590181","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590181","url":null,"abstract":"Sunda has a long history recorded in ancient manuscripts containing Carita Parahyangan written about the kingdom's story in java. Development of technology, made delivery of cultural and historical values can be conveyed through Games. Artificial Intelligence makes Non- Playable Character (NPC) move from one position to the target position in the Games application by applying the Pathfinding Algorithm. The application of Artificial Intelligence is to provide a realistic playing experience for users. This study aims to Apply the Pathfinding A * algorithm to games application History of Sundanese Land. With the construction of this game, it is hoped that it can become a medium for Sundanese history education for people. This game was built using the Digital Games Based Learning - Instructional Design methodology and tested using Black Box Testing and scenario testing against the Pathfinding A* Algorithm applied. The application of the A* pathfinding algorithm was successfully carried out on enemy NPCs indicated by the NPC can move to the player's character position through the fastest path. The game that was built gave a positive effect with a value of 9.08 through Game Experience Questionnaire.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/ICITech50181.2021.9590142
Evangs Mailoa, Widya Damayanti, Nelfrits Christopher
This study investigated the clusters of research topics written by undergraduate students of Informatics Dept., Satya Wacana Christian University (SWCU) from 2015 to 2019 using text mining techniques. Eight hundred and twenty-seven (827) final year project (FYP) reports' abstracts were retrieved from the University Library database. Text-mining techniques were used for identifying topics of these reports, and developed a hierarchal connection among these topics. Student reports were grouped into two domains with four groups containing nine clusters based on abstracts analysis. The clusters obtained are web & mobile applications, desktop applications, network security, network infrastructure, random generators, implementation of web service-based cryptography, cryptography in institutions, general block chippers, and block chipper with pattern. Distributions of the research topics were discussed in relation to Friedman's tower of achievement, and its implications on the curriculum.
{"title":"The Use of Text Mining to Investigate Undergraduate Research Topic Clusters from 2015 to 2019","authors":"Evangs Mailoa, Widya Damayanti, Nelfrits Christopher","doi":"10.1109/ICITech50181.2021.9590142","DOIUrl":"https://doi.org/10.1109/ICITech50181.2021.9590142","url":null,"abstract":"This study investigated the clusters of research topics written by undergraduate students of Informatics Dept., Satya Wacana Christian University (SWCU) from 2015 to 2019 using text mining techniques. Eight hundred and twenty-seven (827) final year project (FYP) reports' abstracts were retrieved from the University Library database. Text-mining techniques were used for identifying topics of these reports, and developed a hierarchal connection among these topics. Student reports were grouped into two domains with four groups containing nine clusters based on abstracts analysis. The clusters obtained are web & mobile applications, desktop applications, network security, network infrastructure, random generators, implementation of web service-based cryptography, cryptography in institutions, general block chippers, and block chipper with pattern. Distributions of the research topics were discussed in relation to Friedman's tower of achievement, and its implications on the curriculum.","PeriodicalId":429669,"journal":{"name":"2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}