Brought to you by:

Table of contents

Volume 978

2018

Previous issue Next issue

2nd International Conference on Computing and Applied Informatics 2017 28–30 November 2017, Medan, Indonesia

Accepted papers received: 20 February 2018
Published online: 16 March 2018

Preface

011001
The following article is Open access

Introduction from the Chair

The 2nd International Conference on Computing and Applied Informatics organized by Faculty of Computer Science and Information Technology, Universitas Sumatera Utara (USU) Medan, Indonesia is published by IOPPin the UK and indexed by Scopus. This international forum provides an opportunity for the community of computer science, information technology and engineering to share and discuss their current area of research.

Area of research in this conference includes: (1) Artificial Intelligence, Machine Learning, Big Data, Data Mining, (2) Smart City, E-government, E-commerce, E-health (3) Bio Informatics, Socio Informatics, GIS, Information Security, (4) Human Computer Interaction, Augmented Reality, Image Vision, Natural Language Processing, Natural Language Generation, and (5) Software Engineering, Computer Graphics and Networking.

There are 248 papers submitted to this conference and have reviewed by reviewers according to their respective field of interest. The acceptance rate of the paper is 123 (49.5%). Accepted papers come from Indonesia, Malaysia, Japan, Germany, Saudi Arabia, Iran and Egypt.

We would like to express our sincere thanks to our keynote speakers: Prof Dr. Graham Kendall and Prof. Dr. Masafumi Nishimura. Moreover, our sincere gratitude Prof. Dr. Runtung Sitepu, Rector of Universitas Sumatera Utara, Mahyudin Nasution, M.IT, Phd, Vice Rector for Research, Community Service and Cooperation, Universitas Sumatera Utara, Prof. Dr. Opim Salim Sitompul, MSc, Dean of Faculty of Computer Science and Information Technology Universitas Sumatera Utara, all presenters, all participants, all reviewers, all the committee members, faculty staff and students for their effort and supports in this conference.

Lastly, on behalf of the organizing committee, I would like to welcome you to our second international conference on computing and applied informatics, ICCAI 2017. Our hope is that you have an enjoyable and inspiring as well as a successful moment during our conference. Thank you for your participation on ICCAI 2017.

Dr. Erna Budhiarti Nababan, M.IT

Chair, ICCAI 2017

011002
The following article is Open access

List of Committees, Maps, Plans and Speakers are available in this PDF.

011004
The following article is Open access

All papers published in this volume of Journal of Physics: Conference Series have been peer reviewed through processes administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a proceedings journal published by IOP Publishing.

Papers

012001
The following article is Open access

, and

Line segmentation can be a useful process for further text segmentation. There are some certain line segmentation framework that use binarization method as an initial step. But binarization process is still facing a major challenge, especially on old document palm-leaf manuscripts. As the quality of the image has varying degrees of noises in the non-text region. Seam Carving method, one of line segmentation methods that uses binarization-free approach, can be an alternative solution. However, this method can separate the incorrect text line on small element text located at the bottom or at the top of a main character contour. Therefore, an improvement on line segmentation framework is proposed by using hybrid binarization and its implemented on the smallest energy function to separate out the text-lines. The proposed framework have been evaluated on 44 Sundanese old manuscript images that consist of true color and binary images. The evaluation matrix shows that this framework can improve Niblack binarization process up to 50%. In addition, our framework does not only generate the number of text-lines to come near to the number of target lines, but it also can separate the text-lines well on small element text. Overall, the expected result can in the end be produced from the proposed line segmentation framework.

012002
The following article is Open access

, and

The development of the android mobile operating system and the presence of Play Store services poses challenges for developers to produce exciting mobile games. Although publishing games in Play Store is not difficult, in fact developers have to face tough competition to make homemade games can become popular. This study analyzes the gameplay of three popular paid-free games in Play Store that can survive for a period of one year from the top 10 positions in October 2015- November 2016. Analysis performed on 8 elements of the game based on the definition of Fullerton and emotional expression analysis of respondents who appeared while playing the three choosen games. The analysis shows that scarce resources are the main attraction of all three games because they create conflicts, giving constraints and challenges to players. The multiplayer game has a pattern of results and the result makes the opponent become more negative than the player to win. While the single player game is analyzed has a pattern to make the player get positive to win. There are 3 basic emotions that most often appear that is joy, disgust and surprise. Multiplayer games tend to emphasize the emotions of joy players, while single player games tend to bring disgust emotions.

012003
The following article is Open access

, and

Vitiligo is a skin disorder in which white patches of depigmentation appear on different parts of the body. Usually, patients come to hospitals or clinics to have their vitiligo conditions assessed. This can be very tiring to the patients, as vitiligo treatments usually take a relatively long period of time, which can range from months to years. To address this challenge, we present in this paper a prototype of an Android-based mobile application called Vi-DA, which stands for Vitiligo Diagnostic Assistance. Vi-DA consists of three subsystems, which are user sign-up subsystem, camera and image analysis subsystem, and progress report subsystem. The mobile application was developed in Java programming language and uses MySQL as the database system. Vi-DA adopts a vitiligo segmentation algorithm to segment input image into normal skin area, vitiligo skin area, and non-skin area. Results showed that Vi-DA gave comparable results to the previous system implemented in Matlab. User acceptance testing results also showed that all respondents agreed on the usefulness of the system and agreed to use Vi-DA again in the future. Vi-DA benefits both dermatologists and patients as not only a computer-aided diagnosis (CAD) tool but also as a smart application that can be used for self-assessment at home.

012004
The following article is Open access

, , , , , , and

The gaming industry has become one of the fastest growing industries in the world. In recent years there have been several studies that have used games, especially computer-based ones to improve the executive function of children with Attention Deficit Hyperactivity Disorder (ADHD) especially in working memory improvements. There are still several obstacles in using computer-based games that have been circulating today in Indonesia. The aim of this research is to develop and create a prototype game that can be used to improve working memory of children with ADHD using Bahasa Indonesia. The prototype game application is a race game with matching colors and memory work tasks; developed using Construct2. Players will play as a driver, delivering certain fruits to specific homes with different colors. The game also included visuospatial tasks such as remembering the objects. For performance test, CPU utilization, average FPS and image memory usage has been tested in several browsers. In conclusion, the performance tests results show that the first type of the prototype game is good enough to be played in desktop or laptop.

012005
The following article is Open access

, , , and

Teachers who have a good level of engagement will be able to produce students who engage and excel. Level of national teachers' engagement needs to be a reference to the level of educational success and equity of national education. The spread of geographically inaccessible Indonesian teachers is a barrier to these measurements. ITEI Android application developed by analysing the geographical problem, so that each teacher can participate wherever they are. The ITEI app is designed by implementing Android on the client side and load balancer on the server side. Android ITEI will feature a number of questions questionnaire to teachers. Meanwhile, the load balancer will distribute the answers to each server for processing. Load Balancer ensures fast data processing and minimize server failure. The results of the processing on the server will be sent back to Android in the form of profiling themselves ITEI teachers. While the data obtained and stored in the server can be used to measure the level of national teachers' engagement. The result of this research is the design of ITEI application ready to be implemented in order to support the data collection process of teacher national engagement level.

012006
The following article is Open access

and

This paper describes implementation of Unified Theory of Acceptance and User of Technology (UTAUT) model to assess the use of virtual classroom in support of teaching and learning in higher education. The purpose of this research is how virtual classroom that has fulfilled the basic principle can be accepted and used by students positively. This research methodology uses the quantitative and descriptive approach with a questionnaire as a tool for measuring the height of virtual classroom principle acception. This research uses a sample of 105 students in D3 Informatics Management at Telkom University. The result of this research is that the use of classroom virtual principle are positive and relevant to the students in higher education.

012007
The following article is Open access

, , and

Indonesian tourism has been viewed as one of the source of foreign exchange, therefore visit Indonesia campaign through Wonderful Indonesia should be given attention. This research aims to test the usability of web http://www.indonesia.travel/en, at the end can give input to the Tourism Ministry of the Republic of Indonesia. The concept used based on usabilitygeek.com which mentions the three main categories for usability testing, i. e. explorative, assessment and comparative with the users are three classes of Communication Department students of Bina Nusantara University with a total of 120 students, however finally only 22 students were elected because of the criteria are the students should be like travelling and access to the tourism website more than 12 times. The methodology used is qualitative descriptive and experiments, with data collection techniques through observation and interviews after participants' access to the web: Due to their one-on-one nature, interviews enable the observer to ask direct questions to the user and the participants posted their opinion in online discussion forum. The results mentioned that the elements web of Wonderful Indonesia has a high learning ability and memorability but less efficiency and satisfaction, as well as several times errors when used. In conclusion, to maximize about the visit of tourism to Indonesia, this web is only able to learn and impress the visitor, but do not give satisfaction to users.

012008
The following article is Open access

, , , , , and

Urine examination using urine dipstick has long been used to determine the health status of a person. The economical and convenient use of urine dipstick is one of the reasons urine dipstick is still used to check people health status. The real-life implementation of urine dipstick is done manually, in general, that is by comparing it with the reference color visually. This resulted perception differences in the color reading of the examination results. In this research, authors used a scanner to obtain the urine dipstick color image. The use of scanner can be one of the solutions in reading the result of urine dipstick because the light produced is consistent. A method is required to overcome the problems of urine dipstick color matching and the test reference color that have been conducted manually. The method proposed by authors is Euclidean Distance, Otsu along with RGB color feature extraction method to match the colors on the urine dipstick with the standard reference color of urine examination. The result shows that the proposed approach was able to classify the colors on a urine dipstick with an accuracy of 95.45%. The accuracy of color classification on urine dipstick against the standard reference color is influenced by the level of scanner resolution used, the higher the scanner resolution level, the higher the accuracy.

012009
The following article is Open access

, , and

Bekel is one of traditional Indonesian game that is rarely played nowadays. Bekel is a game to test dexterity level using a bekel ball and 6 to10 seeds. The game is played by throwing the ball up in the air, spreading the seeds randomly on the floor then picking the seeds up until the ground is clear. This game application is an adaptation of Bekel game focusing on the movements of the ball and the randomization of the seed positions. This game application has three levels of difficulty based on the basic rules of the actual Bekel game. The focus of the study is the free fall method of the ball and the random function of the seeds in the Android environment. The result show the Bekel application has sensitivity level of 71% for the ball movements and the probability rate of the random event occurrence is at 23%.

012010
The following article is Open access

, and

Presentation of programs with user interface that can be accessed online through the website of course greatly provide user benefits. User can easily access the program they need. There are usability values that serve as a benchmark for the success of a user accessible program, ie efficiency, effectiveness, and convenience. These usability values also determine the development of the program for the better use. Therefore, on the review title thesis program that will be implemented in STT Dumai was measured usability evaluation. It aims to see which sides are not yet perfect and need to be improved to improve the performance and utilization of the program. Usability evaluation was measured by using smartPLS software. Database used was the result of respondent questionnaires that include questions about the experience when they used program. The result of a review of thesis title program implemented in STT Dumai has an efficiency value of 22.615, the effectiveness of 20.612, and satisfaction of 33.177.

012011
The following article is Open access

, , and

Transportation accident rate are still being a major challenge in many countries. There are many factors that could be cause transportation accident, especially in vehicle's internal system problem. To overcome this problem, OBD-II technology has been created to diagnostics vehicle's condition. OBD-II scanner plugged to OBD-II port or usually called Data Link Connector (DLC), and after that it sends the diagnostics to Raspberry Pi. Compared from another microcontrollers, Arduino, Raspberry Pi are chosen because it sustains the application to receive real-time diagnostics, process the diagnostics and send command to automobiles at the same time, rather than Arduino that must wait for another process finished to run another process. Outcome from this application is to enable automobile's user to diagnostics their own vehicles. If there is found something unusual or a problem, the application can told the problem to user, so they could know what to fix before they use their vehicle safely.

012012
The following article is Open access

The educational progress of a country or educational institution is measured through the implementation of knowledge dissemination. Evidence of knowledge dissemination has carried out be in form of the type of published document, which is based on the databases of the index of scientific publications: Scopus. This paper expresses a simple form of knowledge dissemination based on document type. Although the growth of knowledge dissemination does not have the same pattern based on the appearance of document types, the general implementation is almost the same. However, maximum effort needs to be done by PTN-bh to support Indonesia knowledge dissemination.

012013
The following article is Open access

, , and

The consistent growth of Indonesian SMEs has received attention of global IT vendors. One of major ERP player in Indonesian market such as SAP, has introduced ERP solutions for SMEs through SAP Business One. Due to its fast growth, unfortunately, there are still very few articles can be found to understand the ERP implementation in Indonesian SMEs. The article addressed the common factors that affect the successful of the ERP implementation at SMEs. They are: identifying vendor quality, opening balance data migration, and A-SAP methodology. The article applied case study method to examine the fast growth companies owned by same owners, such as: GRK, MMM, and KM25; with the objectives to identify the practical pattern of ERP implementation in SMEs that will be useful for SAP project manager and consultants.

012014
The following article is Open access

, , and

Technological developments today make the combination of science is very common, including in Computer Science and Agriculture to make both of science need each other. This paper aims to develop a control tool for the flow of nutrients of hydroponic plants automatically using Arduino microcontroller and controlled by smartphone. We use an Arduino Uno microcontroller to automatically control the flow of nutrient solution with logic if else. The microcontroller can also send data of fluid level (solution) and temperature around the plant to smartphone android of the owner of the hydroponics plant. The height of the nutrient solution (water) is detected by the Ultrasonic sensor HC-SR04 and the temperature is detected by the temperature sensor LM35. Data from the sensor will forward into Arduino Uno and displayed in liquid crystal display (LCD) then via wireless fidelity (WIFI) ESP8266 module will transmit the height of the nutrient solution and the temperature around of the plants to Android smartphone.

012015
The following article is Open access

, and

Most of the research has used algorithm AdaBoost-SVM for face detection. However, to our knowledge so far there is no research has been facing detection on real-time data with various orientations using the combination of AdaBoost and Support Vector Machine (SVM). Characteristics of complex and diverse face variations and real-time data in various orientations, and with a very complex application will slow down the performance of the face detection system this becomes a challenge in this research. Face orientation performed on the detection system, that is 900, 450, 00, -450, and -900. This combination method is expected to be an effective and efficient solution in various face orientations. The results showed that the highest average detection rate is on the face detection oriented 00 and the lowest detection rate is in the face orientation 900.

012016
The following article is Open access

and

Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

012017
The following article is Open access

, and

When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

012018
The following article is Open access

, , and

Distribution of drugs evenly in accordance with the needs of Public Health Center (Puskesmas) become one of the responsibilities by the Health Office in Indonesia. This study aims to provide recommendations for distribution of drugs from the Department of Health according to the needs of each Puskesmas. Because often the distribution of drugs is not in accordance with the needs of medicines stock of each Puskesmas. This causes the possibility of drug stock void in Puskesmas in need, while there is excess stock of drugs in Puskesmas that do not need. Supply Chain Management (SCM) is applied as a controlling drug stock at Puskesmas in order to avoid drug vacuum or excess drug that eventually unused. In addition, the Frequent Pattern Growth (FP-Growth) algorithm that generates frequent item sets is used to provide drug distribution recommendations by looking at the highest frequency of drug occurrences and frequent drug frequencies. Based on testing black box system conducted in Health Office Purwakarta regency of Indonesia which oversees 20 Puskesmas with 100 data of drug distribution transactions, it can be concluded that system functionality is running well and SCM successfully implemented to arrange distribution process of medicine well. Furthermore FP-Growth algorithm was able to provide recommendations for distribution of drugs with a high success rate. This is evidenced by the test results with various combinations of input parameters, FP-Growth is able to produce the right frequent item sets.

012019
The following article is Open access

, , , and

Medication planning aim to get types, amount of medicine according to needs, and avoid the emptiness medicine based on patterns of disease. In making the medicine planning is still rely on ability and leadership experience, this is due to take a long time, skill, difficult to obtain a definite disease data, need a good record keeping and reporting, and the dependence of the budget resulted in planning is not going well, and lead to frequent lack and excess of medicines. In this research, we propose Adaptive Neuro Fuzzy Inference System (ANFIS) method to predict medication needs in 2016 and 2017 based on medical data in 2015 and 2016 from two source of hospital. The framework of analysis using two approaches. The first phase is implementing ANFIS to a data source, while the second approach we keep using ANFIS, but after the process of clustering from K-Means algorithm, both approaches are calculated values of Root Mean Square Error (RMSE) for training and testing. From the testing result, the proposed method with better prediction rates based on the evaluation analysis of quantitative and qualitative compared with existing systems, however the implementation of K-Means Algorithm against ANFIS have an effect on the timing of the training process and provide a classification accuracy significantly better without clustering.

012020
The following article is Open access

, , and

Capturing and recording motion in human is mostly done with the aim for sports, health, animation films, criminality, and robotic applications. In this study combined background subtraction and back propagation neural network. This purpose to produce, find similarity movement. The acquisition process using 8 MP resolution camera MP4 format, duration 48 seconds, 30frame/rate. video extracted produced 1444 pieces and results hand motion identification process. Phase of image processing performed is segmentation process, feature extraction, identification. Segmentation using bakground subtraction, extracted feature basically used to distinguish between one object to another object. Feature extraction performed by using motion based morfology analysis based on 7 invariant moment producing four different classes motion: no object, hand down, hand-to-side and hands-up. Identification process used to recognize of hand movement using seven inputs. Testing and training with a variety of parameters tested, it appears that architecture provides the highest accuracy in one hundred hidden neural network. The architecture is used propagate the input value of the system implementation process into the user interface. The result of the identification of the type of the human movement has been clone to produce the highest acuracy of 98.5447%. The training process is done to get the best results.

012021
The following article is Open access

and

This research resulted in the development of e-SCM application, in small-scale group of fish farmers based on Open Source technology in Ulekan Market Bandung, by collaborating the implementation of e-SCM and Data Management. Then proceed with the application of supply chain business through collaboration Business Model Canvas and Waterfall Framework. For the design of business process reengineering in this activity, it produces a context diagram called e-SCM SME Fish consisting of five entities directly involved with the system, namely: fish shop supervisor, fish shop retailer, employees, fish farmers, and customers. Referring to the Context Diagram, decomposition process of Level 0 e-SCM SMEs Fish. The decomposition results in Data Flow Diagram Level 1 for four sub processes, namely: business partners, transactions, retailer stock, and documentation. Result of nine blocks on Business Model Canvas on e-SCM activity, its category consist of Priority 1, Priority 2, Direct, Indirect, Purchase/e-SCM, Transactional, Community, Asset Sale, Physical Asset, Human, Production, Strategic Alliance -competitors, Coopetition, Buyer supplier relationship, Fixed Cost, Variable Cost. For integration of data management on Localhost Server media on e-SCM using http://whyphi: 8080 address, as prototype which will soon be adopted by farmer fish farmer.

012022
The following article is Open access

, and

Facial expressions recognition is one of interesting research. This research contains human feeling to computer application Such as the interaction between human and computer, data compression, facial animation and facial detection from the video. The purpose of this research is to create facial expression system that captures image from the video camera. The system in this research uses Widrow-Hoff learning method in training and testing image with Adaptive Linear Neuron (ADALINE) approach. The system performance is evaluated by two parameters, detection rate and false positive rate. The system accuracy depends on good technique and face position that trained and tested.

012023
The following article is Open access

, , , and

This research is a continuation of previous research that is corruption early prevention is expanded by using expert system to analyze data and produce information to build decision. The research method used is neuroresearch method through three stages of research, namely exploratory stage, explanatory stage and confirmatory stages. The exploratory research finds W.aW's Principles and W.a.W's Units of Assessment as the basis for the preparation of the application. Stages of explanatory research in the form of W.a.W's design of IT and confirmatory research stages are the design of expert system W.a.W. Expert System uses this formulation to generate dynamic standard value for each category and current social perception.

012024
The following article is Open access

and

The development of mobile technology is now increasing rapidly, demanding all activities including learning should be done on mobile devices. It shows that the implementation of mobile application as a learning medium needs to be done. This study describes the process of developing and evaluating the Moodle-based mobile Learning Management System (LMS) application called Student Centered e-Learning Environment (SCeLE). This study discusses the process of defining features, implementing features into the application, and evaluating the application. We define the features using user research and literature study, then we implement the application with user-centered design basis, at the last phase we evaluated the application using usability testing and system usability score (SUS). The purpose of this study is to determine the extent to which this application can help the users doing their tasks and provide recommendation for the next research and development.

012025
The following article is Open access

, and

Metacognitive ability in digital-based learning process helps students in achieving learning goals. So that digital-based learning environment should make the metacognitive component as a facility that must be equipped. Smart Learning Environment is the concept of a learning environment that certainly has more advanced components than just a digital learning environment. This study examines the metacognitive component of the smart learning environment to support the learning process. A review of the metacognitive literature was conducted to examine the components involved in metacognitive learning strategies. Review is also conducted on the results of study smart learning environment, ranging from design to context in building smart learning. Metacognitive learning strategies certainly require the support of adaptable, responsive and personalize learning environments in accordance with the principles of smart learning. The current study proposed the role of metacognitive component in smart learning environment, which is useful as the basis of research in building environment in smart learning.

012026
The following article is Open access

The Linked Open Data (LOD) is "web of data", a different paradigm from "web of document" commonly used today. However, the huge LOD still suffers from data quality problems such as completeness, consistency, and accuracy. Data quality problems relate to designing effective methods both to manage and to retrieve information at various data quality levels. Based on review from papers and journals, addressing data quality requires some standards functioning to (1) identification of data quality problems, (2) assessment of data quality for a given context, and (3) correction of data quality problems. However, mostly the methods and strategies dealing with the LOD data quality were not as an integrative approach. Hence, based on those standards and an integrative approach, there are opportunities to improve the LOD data quality in the term of incompleteness, inaccuracy and inconsistency, considering to its schema and ontology, namely ontology refinement. Moreover, the term of the ontology refinement means that it copes not only to improve data quality but also to enrich the LOD. Therefore, it needs (1) a standard for data quality assessment and evaluation which is more appropriate to the LOD; (2) a framework of methods based on statistical relational learning that can improve the correction of data quality problems as well as enrich the LOD.

012027
The following article is Open access

, and

Medicine is one of the items needed by sick society, the high influence of medicine on service and the economy in hospitals, requires mapping and planning the optimal need for medicines according to the conditions, because 50% -60% of hospital income is sourced from medicine sales. The purpose of this study was to find patterns of doctor's prescription medicine association with sales data using an apriori algorithm based on data grouping using a k-means algorithm. The results of the experiments show that medicine prescription data with medicine sales have significant differences so that the data can not be used as materials for medicine planning, this is due to some indication of one of the unavailability of medicine caused by mapping inaccuracy so that the planning of medicine requirements is not optimal. The results of this analysis can be used as input materials in decision making, so the planning needs of medicines can be in accordance with the development of patient disease patterns.

012028
The following article is Open access

, and

ICT advancement is a sure thing with the impact influencing many domains, including learning in both formal and informal situations. It leads to a new mindset that we should not only utilize the given ICT to support the learning process, but also improve it gradually involving a lot of factors. These phenomenon is called e-learning process evolution. Accordingly, this study attempts to explore maturity level concept to provide the improvement direction gradually and progression monitoring for the individual e-learning process. Extensive literature review, observation, and forming constructs are conducted to develop a conceptual framework for e-learning process maturity level. The conceptual framework consists of learner, e-learning process, continuous improvement, evolution of e-learning process, technology, and learning objectives. Whilst, evolution of e-learning process depicted as current versus expected conditions of e-learning process maturity level. The study concludes that from the e-learning process maturity level conceptual framework, it may guide the evolution roadmap for e-learning process, accelerate the evolution, and decrease the negative impact of ICT. The conceptual framework will be verified and tested in the future study.

012029
The following article is Open access

, , , and

Physical and psychological condition of teachers is very important because it helped determine the realization of a positive school climate and productive so that they can run their profession optimally. This research is an advanced research on the design of ITEI application that able to see the profile of teacher's engagement in Indonesia and to optimize the condition is needed an application that can detect the health of teachers both physically and psychologically. The research method used is the neuroresearch method combined with the development of IT system design for TECH which includes server design, database and android TECH application display. The study yielded 1) mental health benchmarks, 2) physical health benchmarks, and 3) the design of Android Application for Teacher Engagement Control of Health (TECH).

012030
The following article is Open access

, , , , and

The insertion of messages in an image is performed by inserting per character message in some pixels. One way of inserting a message into an image is by inserting the ASCII decimal value of a character to the decimal value of the primary color of the image. Messages that use characters in letters, numbers or symbols, where the use of letters of each word is different in number and frequency of use, as well as the use of letters in various messages within each language. In Indonesian language, the use of the letter A to be the most widely used, and the use of other letters greatly affect the clarity of a message or text presented in the language. This study aims to determine the capacity to absorb the message in Indonesian language from an image and what are the things that affect the difference. The data used in this study consists of several images in JPG or JPEG format can be obtained from the image drawing software or hardware of the image makers at different image sizes. The results of testing on four samples of a color image have been obtained by using an image size of 1200 X 1920.

012031
The following article is Open access

, , and

In the cultivation of Oyster Mushrooms need special treatment because oyster mushrooms are susceptible to disease. Mushroom growth will be inhibited if the temperature and humidity are not well controlled because temperature and inertia can affect mold growth. Oyster mushroom growth usually will be optimal at temperatures around 22-28°C and humidity around 70-90%. This problem is often encountered in the cultivation of oyster mushrooms. Therefore it is very important to control the temperature and humidity of the room of oyster mushroom cultivation. In this paper, we developed an automatic temperature monitoring tool in the cultivation of oyster mushroom-based Arduino Uno microcontroller. We have designed a tool that will control the temperature and humidity automatically by Android Smartphone. If the temperature increased more than 28°C in the room of mushroom plants, then this tool will turn on the pump automatically to run water in order to lower the room temperature. And if the room temperature of mushroom plants below of 22°C, then the light will be turned on in order to heat the room. Thus the temperature in the room oyster mushrooms will remain stable so that the growth of oyster mushrooms can grow with good quality.

012032
The following article is Open access

, , and

This paper discusses and proposes a method of feature weighting in classification assignments on competitive learning artificial neural network LVQ. The weighting feature method is the search for the weight of an attribute using the PSO so as to give effect to the resulting output. This method is then applied to the LVQ-Classifier and tested on the 3 datasets obtained from the UCI Machine Learning repository. Then an accuracy analysis will be generated by two approaches. The first approach using LVQ1, referred to as LVQ-Classifier and the second approach referred to as PSOFW-LVQ, is a proposed model. The result shows that the PSO algorithm is capable of finding attribute weights that increase LVQ-classifier accuracy.

012033
The following article is Open access

, and

The Web as a source of information has become part of the social behavior information. Although, by involving only the limitation of information disclosed by search engines in the form of: hit counts, snippets, and URL addresses of web pages, the integrated extraction method produces a social network not only trusted but enriched. Unintegrated extraction methods may produce social networks without explanation, resulting in poor supplemental information, or resulting in a social network of durmise laden, consequently unrepresentative social structures. The integrated superficial method in addition to generating the core social network, also generates an expanded network so as to reach the scope of relation clues, or number of edges computationally almost similar to n(n − 1)/2 for n social actors.

012034
The following article is Open access

, , and

Excavator is a heavy machinery that is used for many industries purposes. Controlling the excavator is not easy. Its operator has to be trained well in many skills to make sure it is safe, effective, and efficient while using the excavator. In this research, we proposed a virtual reality excavator simulator supported by a device called Leap Motion Controller that supports finger and hand motions as an input. This prototype will be developed than in the virtual reality environment to give a more real sensing to the user.

012035
The following article is Open access

, , , and

In today's highly competitive business environment, modern enterprises are dealing difficulties to cut unnecessary costs, eliminate wastes and delivery huge benefits for the organization. Companies are increasingly turning to a more flexible IT environment to help them realize this goal. For this reason, the article applies cloud based Business Process Management (BPM) that enables to focus on modeling, monitoring and process management. Cloud based BPM consists of business processes, business information and IT resources, which help build real-time intelligence systems, based on business management and cloud technology. Cloud computing is a paradigm that involves procuring dynamically measurable resources over the internet as an IT resource service. Cloud based BPM service enables to address common problems faced by traditional BPM, especially in promoting flexibility, event-driven business process to exploit opportunities in the marketplace.

012036
The following article is Open access

and

Based on the National Disaster Management Agency of Indonesia, the distribution of disasters and victims died until the year 2016 is the largest flood disaster. Deli River is a river that has the greatest flood potential through Medan City. In Deli Watershed, flow discharge affected by the discharge from its tributaries, the high rainfall intensity and human activity. We should anticipate reducing and preventing the occurrence of losses due to flood damage. One of the ways to anticipate flood disaster is to predict which part of urban area is would flood. The objective of this study is to analyze the flood inundation areas due to overflow of Deli River through Medan city. Two-dimensional modeling by HEC-RAS 5.0.3 is a widely used hydraulic software tool developed by the U.S Army Corps of Engineers, which combined with the HEC-HMS for hydrological modeling. The result shows flood vulnerability in Medan by a map to present the spot that vulnerable about flood. The flooded area due to the overflowing of Deli River consists of seven sub districts, namely Medan Johor, Medan Selayang, Medan Kota, Medan Petisah, Medan Maimun, Medan Perjuangan and Medan Barat.

012037
The following article is Open access

, , and

This study examines how legal expert interpret UU ITE to protect personal data based on privacy principle by using content analysis. This act has importance in order to govern the process of collection, use, transfer, disclose and store personal data for profit or other commercial purposes. By recognizing both the right of individual for privacy and the need of organization to utilize the customer data, the Act, which was amended by Parliament at October, 27th 2016 have critical role for protection guideline in Indonesia. Increasingly, with the use of advanced technology, data protection became one of the main issues on various sectors, especially in the educational sector. Educational institutions require large amount of personal data to run their business process to support learning, teaching, research and administration process. It involves wide range of personal data from institution, agencies, colleges, lecturers, students and parents, which might consist of several sensitive and confidential data such as historical, health, financial, academic and experience background. Underestimating and ignoring these issues can lead to disaster such as blackmailing, stalking, bullying or improper use of personal data. In aggregation, they might deliver huge loss to institution either financially or trust. Thus, this study analyse the privacy principle of UU ITE through 21 coders from legal expert to obtain more understanding of appropriate approach to implement privacy policy in the educational sector.

012038
The following article is Open access

, , , , and

Face Recognition is a field research in Computer Vision that study about learning face and determine the identity of the face from a picture sent to the system. By utilizing this face recognition technology, learning process about people's identity between students in a university will become simpler. With this technology, student won't need to browse student directory in university's server site and look for the person with certain face trait. To obtain this goal, face recognition application use image processing methods consist of two phase, pre-processing phase and recognition phase. In pre-processing phase, system will process input image into the best image for recognition phase. Purpose of this pre-processing phase is to reduce noise and increase signal in image. Next, to recognize face phase, we use Fisherface Methods. This methods is chosen because of its advantage that would help system of its limited data. Therefore from experiment the accuracy of face recognition using fisherface is 90%.

012039
The following article is Open access

, , and

The purpose of this research is to determine multi factors that inhibiting the implementation of the ISMS based on ISO 2700. It is also to propose a follow-up recommendation on the factors that inhibit the implementation of the ISMS. Data collection is derived from questionnaires to 182 respondents from users in data center operation (DCO) at bca, Indonesian telecommunication international (telin), and data centre division at Indonesian Ministry of Health. We analysing data collection with multiple linear regression analysis and paired t-test. The results are multiple factors which inhibiting the implementation of the ISMS from the three organizations which has implement and operate the ISMS, ISMS documentation management, and continual improvement. From this research, we concluded that the processes of implementation in ISMS is the necessity of the role of all parties in succeeding the implementation of the ISMS continuously.

012040
The following article is Open access

, , , , and

Augmented Reality is a technique that can bring social story therapy into virtual world to increase intrinsic motivation of children with Autism Spectrum Disorder(ASD). By looking at the behaviour of ASD who will be difficult to get the focus, the lack of sensory and motor nerves in the use of loads on the hands or other organs will be very distressing children with ASD in doing the right activities, and interpret and understand the social situation in determining a response appropriately. Required method to be able to apply social story on therapy of children with ASD that is implemented with Augmented Reality. The output resulting from this method is 3D animation (three-dimensional animation) of social story by detecting marker located in special book and some simple game which done by using leap motion controller which is useful in reading hand movement in real-time.

012041
The following article is Open access

, and

Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys. In this paper we propose hybrid cryptosystem that combine symmetric algorithms VMPC and asymmetric algorithms RSA – CRT optimization. RSA – CRT optimization speeds up the decryption process by obtaining plaintext with dp and p key only, so there is no need to perform CRT processes. The VMPC algorithm is more efficient in software implementation and reduces known weaknesses in RC4 key generation. The results show hybrid cryptosystem RSA – CRT optimization and VMPC is faster than hybrid cryptosystem RSA – VMPC and hybrid cryptosystem RSA – CRT – VMPC. Keyword : Cryptography, RSA, RSA – CRT, VMPC, Hybrid Cryptosystem.

012042
The following article is Open access

, , and

Nowadays, the increased utilization of shared application in the network needs not only dictate to have enhanced security but also emphasize the need to balance its privacy protection and ease of use. Meanwhile, its accessibility and availability as the demand from organization service put privacy obligations become more complex process to be handled and controlled. Nonetheless, the underlying principles for privacy policy exist in Indonesian current laws, even though they spread across various article regulations. Religions, constitutions, statutes, regulations, custom and culture requirements still become the reference model to control the activity process for data collection and information sharing accordingly. Moreover, as the customer and organization often misinterpret their responsibilities and rights in the business function, process and level, the essential thing to be considered for professionals on how to articulate clearly the rules that manage their information gathering and distribution in a manner that translates into information system specification and requirements for developers and managers. This study focus on providing suggestion and recommendation to develop privacy policy based on descriptive analysis of 791 respondents on personal data protection in accordance with political and economic factor in Indonesia.

012043
The following article is Open access

, , , , , , , , , et al

Fracture is a condition that there is a damage in the continuity of the bone, usually caused by stress, trauma or weak bones. The tibia and fibula are two separated-long bones in the lower leg, closely linked at the knee and ankle. Tibia/fibula fracture often happen when there is too much force applied to the bone that it can withstand. One of the way to identify the location of tibia/fibula fracture is to read X-ray image manually. Visual examination requires more time and allows for errors in identification due to the noise in image. In addition, reading X-ray needs highlighting background to make the objects in X-ray image appear more clearly. Therefore, a method is required to help radiologist to identify the location of tibia/fibula fracture. We propose some image-processing techniques for processing cruris image and Scan line algorithm for the identification of fracture location. The result shows that our proposed method is able to identify it and reach up to 87.5% of accuracy.

012044
The following article is Open access

, , , and

This present study describesthe bioinformatics approach to analyze three partial polyprenol reductase genes from mangrove plant, Kandeliaobovataas well aspredictedphysical and chemical properties, potential peptide, subcellular localization, and phylogenetic. The diversity was noted in the physical and chemical properties of three partial polyprenol reductase genes. The values of chloroplast were relatively high, showed that chloroplast transit peptide occurred in mangrove polyprenol reductase. The target peptide value of mitochondria varied from 0.088 to 0.198 indicated it was possible to be present. These results suggested the importance of understanding the diversity of physicochemical properties of the different amino acids in polyprenol reductase. The subcellular localization of two partial genes located in the plasma membrane. To confirm the homology among the polyprenol reductase in the database, a dendrogram was drawn. The phylogenetic tree depicts that there are three clusters, the partial genes of K. obovata joined the largest one: C23157 was close to Ricinus communis polyprenol reductase. Whereas, C23901 and C24171 were grouped with Ipomoea nil polyprenol reductase, suggested that these polyprenol reductase genes form distinct separation into tropical habitat plants.

012045
The following article is Open access

, and

Optimization is a process for finding parameter (parameters) that is (are) able to deliver an optimal value for an objective function. Seeking an optimal generic model for optimizing is a computer science study that has been being practically conducted by numerous researchers. Generic model is a model that can be technically operated to solve any varieties of optimization problem. By using an object-oriented method, the generic model for optimizing was constructed. Moreover, two types of optimization method, simulated-annealing and hill-climbing, were functioned in constructing the model and compared to find the most optimal one then. The result said that both methods gave the same result for a value of objective function and the hill-climbing based model consumed the shortest running time.

012046
The following article is Open access

, , , and

The implementation of information system strategic planning (ISSP) in higher education institutions is to improve work efficiency, management effectiveness in order to improve organizational competitive advantage. However, the question of whether all universities are ready to implement ISSP as a way to achieve organizational goals has not been answered. This study aims to investigate the readiness phenomena through literature study. The method used is by using the Systematic Literature Review (SLR) instrument to identify readiness factors on the implementation of ISSP, especially among the institutions of higher education in developing countries. This study has identified 10 readiness measurement. There are three categories of measurement, namely people, processes and technologies that represent 11 factors of ISSP readiness measurement in universities.

012047
The following article is Open access

, and

In k-nearest neighbor (kNN), the determination of classes for new data is normally performed by a simple majority vote system, which may ignore the similarities among data, as well as allowing the occurrence of a double majority class that can lead to misclassification. In this research, we propose an approach to resolve the majority vote issues by calculating the distance weight using a combination of local mean based k-nearest neighbor (LMKNN) and distance weight k-nearest neighbor (DWKNN). The accuracy of results is compared to the accuracy acquired from the original k-NN method using several datasets from the UCI Machine Learning repository, Kaggle and Keel, such as ionosphare, iris, voice genre, lower back pain, and thyroid. In addition, the proposed method is also tested using real data from a public senior high school in city of Tualang, Indonesia. Results shows that the combination of LMKNN and DWKNN was able to increase the classification accuracy of kNN, whereby the average accuracy on test data is 2.45% with the highest increase in accuracy of 3.71% occurring on the lower back pain symptoms dataset. For the real data, the increase in accuracy is obtained as high as 5.16%.

012048
The following article is Open access

, , , and

In automatic ECG signal processing, one of the main topics of research is QRS complex detection. Detecting correct QRS complex or R peak is important since it is used to measure several other ECG metrics. One of the robust methods for QRS detection is Zero Cross method. This method uses an addition of high-frequency signal and zero crossing count to detect QRS complex which has a low-frequency oscillation. This paper presents an application of QRS detection using Zero Cross algorithm in the Android-based system. The performance of the algorithm in the mobile environment is measured. The result shows that this method is suitable for real-time QRS detection in a mobile application.

012049
The following article is Open access

and

There is a tremendous learning gap between formal education and non-formal education. E-Learning can facilitate non-formal education learners in improving the learning process. In this study, we present the main factors behind the E-learning for the Equivalency Education Program (E-LEEP) initiative in Indonesia. There are four main factors proposed, namely: standardization, learning materials, learning process, and learners' characteristics. Each factor supports each other to achieve the learning process of E-LEEP in Indonesia. Although not yet proven, the E-learning should be developed followed the main factors for the non-formal education. This is because those factors can improve the quality of E-Learning for the Equivalency Education Program.

012050
The following article is Open access

and

The present study evaluates the bioinformatics methods to analyze twenty-four predicted polyprenol reductase genes from higher plants on GenBank as well as predicted the structure, composition, similarity, subcellular localization, and phylogenetic. The physicochemical properties of plant polyprenol showed diversity among the observed genes. The percentage of the secondary structure of plant polyprenol genes followed the ratio order of α helix > random coil > extended chain structure. The values of chloroplast but not signal peptide were too low, indicated that few chloroplast transit peptide in plant polyprenol reductase genes. The possibility of the potential transit peptide showed variation among the plant polyprenol reductase, suggested the importance of understanding the variety of peptide components of plant polyprenol genes. To clarify this finding, a phylogenetic tree was drawn. The phylogenetic tree shows several branches in the tree, suggested that plant polyprenol reductase genes grouped into divergent clusters in the tree.

012051
The following article is Open access

, , , and

A singer doesn't just recite the lyrics of a song, but also with the use of particular sound techniques to make it more beautiful. In the singing technique, more female have a diverse sound registers than male. There are so many registers of the human voice, but the voice registers used while singing, among others, Chest Voice, Head Voice, Falsetto, and Vocal fry. Research of speech recognition based on the female's voice registers in singing technique is built using Borland Delphi 7.0. Speech recognition process performed by the input recorded voice samples and also in real time. Voice input will result in weight energy values based on calculations using Hankel Transformation method and Macdonald Functions. The results showed that the accuracy of the system depends on the accuracy of sound engineering that trained and tested, and obtained an average percentage of the successful introduction of the voice registers record reached 48.75 percent, while the average percentage of the successful introduction of the voice registers in real time to reach 57 percent.

012052
The following article is Open access

and

The information society, especially library users, expects an easier and faster way to get information and share knowledge. The library also implements the best way to provide the best service and the easiest way to disseminate and share information with its users. One technology that allows libraries more closely with their users is mobile technology. This paper aims to determine the basic conditions of mobile technology services and mobile services most needed library users, as well as constraints faced by libraries and users in the application of mobile technology. This paper will help libraries to develop better M-Library services in expanding the reach of library services. Methods of data collection were conducted through surveys through questionnaires, interviews, and direct observation. The results of the use of mobile technology applications in libraries bring great advantages to provide better library services and to improve accessibility of library resources in the easiest way, but due to lack of funds, lack of skills and lack of staff, many libraries are unable to provide this service with very successful.

012053
The following article is Open access

, and

The Open Educational Resources (OER) is a portal of teaching, learning and research resources that is available in public domain and freely accessible. Learning contents or Learning Objects (LO) are granular and can be reused for constructing new learning materials. LO ontology-based searching techniques can be used to search for LO in the Indonesia OER. In this research, LO from search results are used as an ingredient to create new learning materials according to the topic searched by users. Summarizing-based grouping of LO use Hierarchical Agglomerative Clustering (HAC) with the dependency context to the user's query which has an average value F-Measure of 0.487, while summarizing by K-Means F-Measure only has an average value of 0.336.

012054
The following article is Open access

, and

Initial population in job-shop scheduling problem (JSSP) is an essential step to obtain near optimal solution. Techniques used to solve JSSP are computationally demanding. Skipping strategy (SS) is employed to acquire initial population after sequence of job on machine and sequence of operations (expressed in Plates-jobs and mPlates-jobs) are determined. The proposed technique is applied to benchmark datasets and the results are compared to that of other initialization techniques. It is shown that the initial population obtained from the SS approach could generate optimal solution.

012055
The following article is Open access

, and

Important information in scientific papers can be composed of rhetorical sentences that is structured from certain categories. To get this information, text categorization should be conducted. Actually, some works in this task have been completed by employing word frequency, semantic similarity words, hierarchical classification, and the others. Therefore, this paper aims to present the rhetorical sentence categorization from scientific paper by employing TF-IDF and Word2Vec to capture word frequency and semantic similarity words and employing hierarchical classification. Every experiment is tested in two classifiers, namely Naïve Bayes and SVM Linear. This paper shows that hierarchical classifier is better than flat classifier employing either TF-IDF or Word2Vec, although it increases only almost 2% from 27.82% when using flat classifier until 29.61% when using hierarchical classifier. It shows also different learning model for child-category can be built by hierarchical classifier.

012056
The following article is Open access

Some scholarships have been routinely offered by Ministry of Research, Technology and Higher Education of the Republic of Indonesia for students at Syiah Kuala University. In reality, the scholarship selection process is becoming subjective and highly complex problem. Multi-Attribute Decision Making (MADM) techniques can be a solution in order to solve scholarship selection problem. In this study, we demonstrated the application of a fuzzy TOPSIS as an MADM technique by using a numerical example in order to calculate a triangular fuzzy number for the fuzzy data onto a normalized weight. We then use this normalized value to construct the normalized fuzzy decision matrix. We finally use the fuzzy TOPSIS to rank alternatives in descending order based on the relative closeness to the ideal solution. The result in terms of final ranking shows slightly different from the previous work.

012057
The following article is Open access

, , , , and

Mosque, for Muslim, is not only a place for daily worshipping, however as a center of culture as well. It is an important and valuable building to be well managed. For a responsible department or institution (such as Religion or Plan Department in Indonesia), to practically manage a lot of mosques is not simple task to handle. The challenge is in relation to data number and characteristic problems tackled. Specifically for renovating and rehabilitating the damaged mosques, a decision to determine the first damaged mosque priority to be renovated and rehabilitated is problematic. Through two types of optimization method, simulated-annealing and hill-climbing, a decision support model for mosque renovation and rehabilitation was systematically constructed. The method fuzzy-logic was also operated to establish the priority of eleven selected parameters. The constructed model is able to simulate an efficiency comparison between two optimization methods used and suggest the most objective decision coming from 196 generated alternatives.

012058
The following article is Open access

, and

Splitting attribute is a major process in Decision Tree C4.5 classification. However, this process does not give a significant impact on the establishment of the decision tree in terms of removing irrelevant features. It is a major problem in decision tree classification process called over-fitting resulting from noisy data and irrelevant features. In turns, over-fitting creates misclassification and data imbalance. Many algorithms have been proposed to overcome misclassification and overfitting on classifications Decision Tree C4.5. Feature reduction is one of important issues in classification model which is intended to remove irrelevant data in order to improve accuracy. The feature reduction framework is used to simplify high dimensional data to low dimensional data with non-correlated attributes. In this research, we proposed a framework for selecting relevant and non-correlated feature subsets. We consider principal component analysis (PCA) for feature reduction to perform non-correlated feature selection and Decision Tree C4.5 algorithm for the classification. From the experiments conducted using available data sets from UCI Cervical cancer data set repository with 858 instances and 36 attributes, we evaluated the performance of our framework based on accuracy, specificity and precision. Experimental results show that our proposed framework is robust to enhance classification accuracy with 90.70% accuracy rates.

012059
The following article is Open access

, , and

The performance of an automatic speech recognition system is affected by differences in speech style between the data the model is originally trained upon and incoming speech to be recognized. In this paper, the usage of GMM-HMM acoustic models for specific speech styles is investigated. We develop two systems for the experiments; the first employs a speech style classifier to predict the speech style of incoming speech, either spontaneous or dictated, then decodes this speech using an acoustic model specifically trained for that speech style. The second system uses both acoustic models to recognise incoming speech and decides upon a final result by calculating a confidence score of decoding. Results show that training specific acoustic models for spontaneous and dictated speech styles confers a slight recognition advantage as compared to a baseline model trained on a mixture of spontaneous and dictated training data. In addition, the speech style classifier approach of the first system produced slightly more accurate results than the confidence scoring employed in the second system.

012060
The following article is Open access

, , and

Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

012061
The following article is Open access

, and

In this research, the determination of the appropriate values of Gap for the assessment of promotion criteria of position in an institution / company. In this study the authors use Fuzzy Sugeno logic on the determination of Gap values used in Profile Matching method. Test results of 5 employees obtained the eligibility of promotion with the position of Z* values between in 3.20 to 4.11.

012062
The following article is Open access

, , and

DC current supply to power the electrolysis process in producing aluminium at PT Indonesia Asahan Aluminium (Persero) is about 193 kA. At this condition, the load voltage regulator (LVR) transformer generates 0.89 lagging power factor. By adding the capacitor bank to reduce the harmonic distortion, it is expected that the supply current will increase. This paper evaluates capacitor bank installation impact on the system by using ETAP 12.0 simulation. It has been obtained that by installing 90 MVAR capacitor bank in the secondary part of LVR, the power factor is corrected about 8% and DC current increases about 13.5%.

012063
The following article is Open access

In every college in Indonesia, Tridharma with three pillars: education, research and community service is the task of institutions and individuals within the educational institution. In this paper, we want to prove the implementation of research either by the institution or personally lecturers in Indonesia. Based on the data of scientific publications as research evidence derived from the indexing database, Scopus, it is found that less than 11% of colleges are proven to conduct research, not until of 17.08% lecturers who proved to conduct research.

012064
The following article is Open access

, , and

Unmanned Aerial Vehicle (UAV) is one of the tools that can be used to monitor palm oil plantation remotely. With the geospatial orthophotos, it is possible to identify which part of the plantation land is fertile for planted crops, means to grow perfectly. It is also possible furthermore to identify less fertile in terms of growth but not perfect, and also part of plantation field that is not growing at all. This information can be easily known quickly with the use of UAV photos. In this study, we utilized image processing algorithm to process the orthophotos for more accurate and faster analysis. The resulting orthophotos image were processed using Matlab including classification of fertile, infertile, and dead palm oil plants by using Gray Level Co-Occurrence Matrix (GLCM) method. The GLCM method was developed based on four direction parameters with specific degrees 0°, 45°, 90°, and 135°. From the results of research conducted with 30 image samples, it was found that the accuracy of the system can be reached by using the features extracted from the matrix as parameters Contras, Correlation, Energy, and Homogeneity.

012065
The following article is Open access

, , and

In modern 3D application, interaction between user and the virtual world is one of an important factor to increase the realism. This interaction can be visualized in many forms; one of them is object deformation. There are many ways to simulate object deformation in virtual 3D world; each comes with different level of realism and performance. Our objective is to present a new method to simulate object deformation by using a graph-connected polygon. In this solution, each object contains multiple level of polygons in different level of volume. The proposed solution focusses on performance rather while maintaining the acceptable level of realism. In this paper, we present the design and implementation of our solution and show that this solution is usable in performance sensitive 3D application such as games and virtual reality.

012066
The following article is Open access

, and

Setting of motion and balance line tracer robot two wheels is actually a combination of a two-wheeled robot balance concept and the concept of line follower robot. The main objective of this research is to maintain the robot in an upright and can move to follow the line of the Wizard while maintaining balance. In this study the motion balance system on line tracer robot by considering the presence of a noise, so that it takes the estimator is used to mengestimasi the line tracer robot motion. The estimation is done by the method of Kalman Filter and the combination of Fuzzy logic-Fuzzy Kalman Filter called Kalman Filter, as well as optimal smooting. Based on the results of the study, the value of the output of the fuzzy results obtained from the sensor input value has been filtered before entering the calculation of the fuzzy. The results of the output of the fuzzy logic hasn't been able to control dc motors are well balanced at the moment to be able to run. The results of the fuzzy logic by using membership function of triangular membership function or yet can control with good dc motor movement in order to be balanced

012067
The following article is Open access

, , and

Indonesia is the country number 4 as the largest smartphone user. In addition to functioning as a social media, the use of smartphones for other purposes has begun to develop in order to facilitate the work. Similarly in the field of maternal and child health. Most of the public, pregnant mothers and checking the development of children under five, were conducted to the Public Health Center. As a service center, Public Health Center need to improve its services. Among other things, it needs to be supported with technology. The high number of queues, the length of queue time and the traffic jam, prompted the need for the development of health applications, based on mobile. The role of the user is crucial to the successful implementation of a technology. This study aims to measure whether the application of M-Health Care application, as a prototype of the application developed to meet the needs of users. M-Health Care Application was developed with a prototyping approach. While for the measurement of M-Health Care Application done by using approach of USE Questionnaire. From result of data processing got result, usability measurement value equal to 88,3%. This indicates the M-Health Care application prototype is considered satisfactory for the user.The results of this measurement can be used as a reference for the next M-Health Care application development model based on user experience.

012068
The following article is Open access

, and

In this paper, we present an implementation of an image file encryption using hybrid cryptography. We chose ElGamal algorithm to perform asymmetric encryption and Double Playfair for the symmetric encryption. Our objective is to show that these algorithms are capable to encrypt an image file with an acceptable running time and encrypted file size while maintaining the level of security. The application was built using C# programming language and ran as a stand alone desktop application under Windows Operating System. Our test shows that the system is capable to encrypt an image with a resolution of 500×500 to a size of 976 kilobytes with an acceptable running time.

012069
The following article is Open access

, , and

Online Multiplayer is one of the most essential feature in modern games. However, while developing a multiplayer feature can be done with a simple computer networking programming, creating a balanced multiplayer session requires more player management components such as game lobby and matchmaking system. Our objective is to develop OpenLobby, a server that available to be used by other developers to support their multiplayer application. The proposed system acts as a lobby and matchmaker where queueing players will be matched to other player according to a certain criteria defined by developer. The solution provides an application programing interface that can be used by developer to interact with the server. For testing purpose, we developed a game that uses the server as their multiplayer server.

012070
The following article is Open access

, , and

Over the last few years, the preference on shopping over internet application, usually called online shopping or e-shopping, has increased significantly. One of the major advantage of online shopping is the capability to use digital content to support the marketing process. Prospective buyers can conveniently browse and look to a certain object and find the information needed with a few clicks. Moreover, the use of multimedia (such as images, sound, and movies) may help prospective buyers to make a decision faster than conventional shopping at retailers. However, shoppers still consider that conventional shopping is the best way to perform shopping due to the ability to make a physical contact to the object. Our objective is to merge these experiences by enabling user to find digital content that relate to nearby retailers. In this research, we built a mobile application that collects data from nearby retailers and shows it to its user. By using this application, it will be easier to users to find the location of the object and to find nearby promotion.

012071
The following article is Open access

, and

The ripeness of the oil palm Fresh Fruit Bunches (FFB) determines the yield of the oil produced. Traditionally there are two ways to determine FFB ripeness which are the number of loose fruits and the color changes. Nevertheless, one drawback of visual determination is subjective and qualitative judgment. In this study, the FFB ripeness was investigated using laser based image processing technique. The advantages of using this technique are non-destructive, simple and quantitative. The working principle of the investigation is that a FFB is inserted into a light tight box which contains a laser diode and a CMOS camera, the FFB is illuminated, and then an image is recorded. The FFB image recorder was performed on four FFB fractions i.e. F0, F3, F4 and F5 on the front and rear surfaces at three sections. The recorded images are speckled granules that have light intensity variation (bio-speckle imaging). The feature extracted from the specked image is the contrast value obtained from the average gray value intensity and the standard deviation. Based on the contrast values, the four fractions of FFB can be grouped into three levels of ripeness of unripe (F0), ripe (F3) and overripe (F4 and F5) on the front surface of base section of FFB by 75%.

012072
The following article is Open access

, and

SAMOP (Subcritical Assembly for Molybdenum-99 Production) has the potential to use thorium as fuel to produce 99Mo after modifying the design, but the production performance has not been discovered yet. A study needs to be done to obtain the correlation between 99Mo production with the mixed fuel composition of uranium and with SAMOP power on the modified SAMOP design. The study aims to obtain the production of 99Mo based thorium nitrate fuel on SAMOP's modified designs. Monte Carlo N-Particle eXtended (MCNPX) is required to simulate the operation of the assembly by varying the composition of the uranium-thorium nitrate mixed fuel, geometry and power fraction on the SAMOP modified designs. The burnup command on the MCNPX is used to confirm the 99Mo production result. The assembly is simulated to operate for 6 days with subcritical neutron multiplication factor (keff = 0.97-0.99). The neutron multiplication factor of the modified design (keff) is 0.97, the activity obtained from 99Mo is 18.58 Ci at 1 kW power operation.

012073
The following article is Open access

, and

Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) and has been adopted by the U.S. government and is now used worldwide. This paper reports the impact of transpose matrix integration to AES. Transpose matrix implementation on AES is aimed at first stage of chypertext modifications for text based database security so that the confidentiality improves. The matrix is also able to increase the avalanche effect of the cryptography algorithm 4% in average.

012074
The following article is Open access

, and

AC-DC converter is widely used in the commercial industry even for daily purposes. The AC-DC converter is used to convert AC voltage into DC. In order to obtain the desired output voltage, the converter usually has a controllable regulator. This paper discusses buck boost regulator with a power MOSFET as switching component which is adjusted based on the duty cycle of pulse width modulation (PWM). The main problems of the buck boost converter at start up are the high overshoot, the long peak time and rise time. This paper compares the effectiveness of two control techniques: proportional integral derivative (PID) and fuzzy logic control in controlling the buck boost converter through simulations. The results show that the PID is more sensitive to voltage change than fuzzy logic. However, PID generates higher overshoot, long peak time and rise time. On the other hand, fuzzy logic generates no overshoot and shorter rise time.

012075
The following article is Open access

, and

Defected Ground Structure (DGS) is a method reducing etching area on antenna ground to form desirable antenna's ground field. This paper reports the method impact on microstrip antennas working on 1800 and 2400 MHz. These frequencies are important as many radio network applications such mobile phones and wireless devices working on these channels. The assessments were performed by simulating and fabricating the evaluated antennas. Both simulation data and implementation measurements show that DGS successfully improves antenna performances by increasing bandwidth up to 19%, reducing return loss up to 109% and increasing gain up to 33%.

012076
The following article is Open access

, and

In this research, the improvement of hybridization algorithm of Fuzzy Analytic Hierarchy Process (FAHP) with Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS) in selecting the best bank chief inspector based on several qualitative and quantitative criteria with various priorities. To improve the performance of the above research, FAHP algorithm hybridization with Fuzzy Multiple Attribute Decision Making - Simple Additive Weighting (FMADM-SAW) algorithm was adopted, which applied FAHP algorithm to the weighting process and SAW for the ranking process to determine the promotion of employee at a government institution. The result of improvement of the average value of Efficiency Rate (ER) is 85.24%, which means that this research has succeeded in improving the previous research that is equal to 77.82%. Keywords: Ranking and Selection, Fuzzy AHP, Fuzzy TOPSIS, FMADM-SAW.

012077
The following article is Open access

, , , , , and

Cloning of Kandelia obovata KcCAS gene (previously known as Kandelia candel) and Rhizophora stylosa RsCAS have already have been reported and encoded cycloartenol synthases. In this study, the predicted KcCAS and RsCAS protein were analyzed using online software of Phyre2 and Swiss-model. The protein modelling for KcCAS and RsCAS cycloartenol synthases was determined using Pyre2 had similar results with slightly different in sequence identity. By contrast, the Swiss-model for KcCAS slightly had higher sequence identity (47.31%) and Qmean (0.70) compared to RsCAS. No difference of ligands binding site which is considered as modulators for both cycloartenol synthases. The range of predicted protein derived from 91-757 amino acid residues with coverage sequence similarities 0.86, respectively from template model of lanosterol synthase from the human. Homology modelling revealed that 706 residues (93% of the amino acid sequence) had been modelled with 100.0% confidence by the single highest scoring template for both KcCAS and RsCAS using Phyre2. This coverage was more elevated than swiss-model predicted (86%). The present study suggested that both genes are responsible for the genesis of cycloartenol in these mangrove plants.

012078
The following article is Open access

and

In this work, information about who, did what, when, where, why, and how on Indonesian news articles were extracted by combining Convolutional Neural Network and Bidirectional Long Short-Term Memory. Convolutional Neural Network can learn semantically meaningful representations of sentences. Bidirectional LSTM can analyze the relations among words in the sequence. We also use word embedding word2vec for word representation. By combining these algorithms, we obtained F-measure 0.808. Our experiments show that CNN-BLSTM outperforms other shallow methods, namely IBk, C4.5, and Naïve Bayes with the F-measure 0.655, 0.645, and 0.595, respectively.

012079
The following article is Open access

, and

Finding the existence of software defect as early as possible is the purpose of research about software defect prediction. Software defect prediction activity is required to not only state the existence of defects, but also to be able to give a list of priorities which modules require a more intensive test. Therefore, the allocation of test resources can be managed efficiently. Learning to rank is one of the approach that can provide defect module ranking data for the purposes of software testing. In this study, we propose a meta-heuristic chaotic Gaussian particle swarm optimization to improve the accuracy of learning to rank software defect prediction approach. We have used 11 public benchmark data sets as experimental data. Our overall results has demonstrated that the prediction models construct using Chaotic Gaussian Particle Swarm Optimization gets better accuracy on 5 data sets, ties in 5 data sets and gets worse in 1 data sets. Thus, we conclude that the application of Chaotic Gaussian Particle Swarm Optimization in Learning-to-Rank approach can improve the accuracy of the defect module ranking in data sets that have high-dimensional features.

012080
The following article is Open access

, , , and

Sedimentation process occurs in container of water reservoir. In the sedimentation process will be observed how the fluid flow occurs and how sedimentation occurs in water. The sedimentation is influenced by the density of the water type and the speed of water in the container of water reservoir. This study aims to find out how to model the mixture of solid and liquid particles (suspension) on the container of water by way of modeling it into a mathematical form that is by using differential equations. In this case, the factors affecting the distribution of the sludge concentration will be used as a reference for modeling the mathematical equations will then be solved using differential equations. The results of this study will show that the equation model of mixed solid and liquid particles (suspension), which then is called the momentum transport equation.

012081
The following article is Open access

, , , and

The development of internet technology in education is still not maximized, especially in the process of thesis guidance between students and lecturers. Difficulties met the lecturers to help students during thesis guidance is the limited communication time and the compatibility of schedule between students and lecturer. To solve this problem, we designed an online thesis guidance management information system that helps students and lecturers to do thesis tutoring process anytime, anywhere. The system consists of a web-based admin app for usage management and an android-based app for students and lecturers.

012082
The following article is Open access

, , and

The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There are many previous research that related with plagiarism detection in Indonesian Language with different method. But there are still some part that still has opportunity to improve. This research proposed the solution that can improve the plagiarism detection technique that can detect not only copy paste form but more advance than that. The proposed solution is using Winnowing with some addition process in pre-processing stage. With stemming processing in Indonesian Language and generate fingerprint in parallel processing that can saving time processing and produce the plagiarism result on the suspected document.

012083
The following article is Open access

, and

Unsealed roadside and problems with the road surface are common causes of road crashes, particularly when those are combined with curves. Curve traffic sign is an important component for giving early warning to driver on traffic, especially on high-speed traffic like on the highway. Traffic sign detection has became a very interesting research now, and in this paper will be discussed about the detection of curve traffic sign. There are two types of curve signs are discussed, namely the curve turn to the left and the curve turn to the right and the all data sample used are the curves taken / recorded from some signs on the Bandung - Jakarta Highway. Feature detection of the curve signs use Speed Up Robust Feature (SURF) method, where the detected scene image is 800x450. From 45 curve turn to the right images, the system can detect the feature well to 35 images, where the success rate is 77,78%, while from the 45 curve turn to the left images, the system can detect the feature well to 34 images and the success rate is 75,56%, so the average accuracy in the detection process is 76,67%. While the average time for the detection process is 0.411 seconds.

012084
The following article is Open access

, , , and

Indekos or rented room is a temporary residence for months or years. Society of academicians who come from out of town need a temporary residence, such as Indekos or rented room during their education, teaching, or duties. They are often found difficulty in finding a Indekos because lack of information about the Indekos. Besides, new society of academicians don't recognize the areas around the campus and desire the shortest path from Indekos to get to the campus. The problem can be solved by implementing A Star (A*) algorithm. This algorithm is one of the shortest path algorithm to a finding shortest path from campus to the Indekos application, where the faculties in the campus as the starting point of the finding. Determination of the starting point used in this study aims to allow students to determine the starting point in finding the Indekos. The mobile based application facilitates the finding anytime and anywhere. Based on the experimental results, A* algorithm can find the shortest path with 86,67% accuracy.

012085
The following article is Open access

, , and

A good age in optimizing aspects of development is at the age of 4-6 years, namely with psychomotor development. Psychomotor is broader, more difficult to monitor but has a meaningful value for the child's life because it directly affects his behavior and deeds. Therefore, there is a problem to predict the child's ability level based on psychomotor. This analysis uses backpropagation method analysis with artificial neural network to predict the ability of the child on the psychomotor aspect by generating predictions of the child's ability on psychomotor and testing there is a mean squared error (MSE) value at the end of the training of 0.001. There are 30% of children aged 4-6 years have a good level of psychomotor ability, excellent, less good, and good enough.

012086
The following article is Open access

, and

Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2) and θ(n), respectively.

012087
The following article is Open access

, , and

This paper discusses the problem of feature selection using genetic algorithms on a dataset for classification problems. The classification model used is the decicion tree (DT), and Naive Bayes. In this paper we will discuss how the Naive Bayes and Decision Tree models to overcome the classification problem in the dataset, where the dataset feature is selectively selected using GA. Then both models compared their performance, whether there is an increase in accuracy or not. From the results obtained shows an increase in accuracy if the feature selection using GA. The proposed model is referred to as GADT (GA-Decision Tree) and GANB (GA-Naive Bayes). The data sets tested in this paper are taken from the UCI Machine Learning repository.

012088
The following article is Open access

, and

This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

012089
The following article is Open access

, , , and

The heart is an important organ in our metabolism in which it controls circulatory and oxygen. The heart exercise is needed one of them using the treadmill to prevent health. To analysis, it using electrocardiograph (ECG) to investigating and diagnosing anomalies of the heart. In this paper, we would like to analysis ECG signals during running on the treadmill with kinds of speeds. There are two analysis ECG signals i.e. QRS detection and power spectrum density (PSD). The result of PSD showed that subject 3 has highly for all subject and the result of QRS detection using pan Tomkins algorithm that a percentage of failed detection is an approaching to 0 % for all subject.

012090
The following article is Open access

, and

MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

012091
The following article is Open access

, , , , and

Hydroponic farming system is an agricultural system that uses direct water as a nutrient without using soil as a planting medium. This system allows smallholder farmers to have the opportunity to develop their crop production with less capital. In addition, hydroponic planting has also been widely adapted by individuals as a personal hobby. Application of technology has penetrated various fields including agricultural fields. One of the technologies that can be applied in a hydroponic farming system is the sensor. Sensors are devices that used to convert a physical quantity into a quantity of electricity so that it can be analyse with a certain electrical circuit. In this study, the technology to be applied is wireless sensor technology applied in human life to help get information quickly and accurately. Sensors to be used in this study are pH sensors, conductivity sensors, temperature sensors and humidity. In addition to sensors, the study also involved Arduino technology. Arduino is a microcontroller board that is used to interact with the environment based on programs that have been made. The final results of the application testing show that the system success to display diagram in real-time in an environment from Arduino board to database and web server.

012092
The following article is Open access

, and

Stroke is a condition that occurs when the blood supply stop flowing to the brain because of a blockage or a broken blood vessel. A symptoms that happen when experiencing stroke, some of them is a dropped consciousness, disrupted vision and paralyzed body. The general examination is being done to get a picture of the brain part that have stroke using Computerized Tomography (CT) Scan. The image produced from CT will be manually checked and need a proper lighting by doctor to get a type of stroke. That is why it needs a method to classify stroke from CT image automatically. A method proposed in this research is Convolutional Neural Network. CT image of the brain is used as the input for image processing. The stage before classification are image processing (Grayscaling, Scaling, Contrast Limited Adaptive Histogram Equalization, then the image being classified with Convolutional Neural Network. The result then showed that the method significantly conducted was able to be used as a tool to classify stroke disease in order to distinguish the type of stroke from CT image.

012093
The following article is Open access

Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.

012094
The following article is Open access

, , and

The high demand of Multimedia services on in Long Term Evolution (LTE) and beyond networks forces the networks operators to find a solution that can handle the huge traffic. Along with this, subgroup formation techniques are introduced to overcome the limitations of the Conventional Multicast Scheme (CMS) by splitting the multicast users into several subgroups based on the users' channels quality signal. However, finding the best subgroup configuration with low complexity is need more investigations. In this paper, an efficient and simple subgroup formation mechanisms are proposed. The proposed mechanisms take the transmitter MAC queue in account. The effectiveness of the proposed mechanisms is evaluated and compared with CMS in terms of throughput, fairness, delay, Block Error Rate (BLER).

012095
The following article is Open access

, , , , , , and

Molecular cloning of five oxidosqualene cyclases (OSC) genes from Bruguiera gymnorrhiza, Kandelia candel, and Rhizophora stylosa had previously been cloned, characterized, and encoded mono and -multi triterpene synthases. The present study analyzed protein modelling of triterpene synthase genes from mangrove using Phyre2 and Swiss-model. The diversity was noted within protein modelling of triterpene synthases using Phyre2 from sequence identity (38-43%) and residue (696-703). RsM2 was distinguishable from others for template structure; it used lanosterol synthase as a template (PDB ID: w6j.1.A). By contrast, other genes used human lanosterol synthase (1w6k.1.A). The predicted bind sites were correlated with the product of triterpene synthase, the product of BgbAS was β-amyrin, while RsM1 contained a significant amount of β-amyrin. Similarly BgLUS and KcMS, both main products was lupeol, on the other hand, RsM2 with the outcome of taraxerol. Homology modelling revealed that 696 residues of BgbAS, BgLUS, RsM1, and RsM2 (91-92% of the amino acid sequence) had been modelled with 100% confidence by the single highest scoring template using Phyre2. This coverage was higher than Swiss-model (85-90%). The present study suggested that molecular cloning of triterpene genes provides useful tools for studying the protein modelling related regulation of isoprenoids biosynthesis in mangrove forests.

012096
The following article is Open access

, , and

To reduce heat loses in a flat plate solar collector, double glasses cover is employed. Several studies show that the heat loss from the glass cover is still very significant in comparison with other losses. Here, double glasses cover with attached fins is proposed. In the present work, the fluid flow and heat transfer characteristics of the enclosure between the double glass cover are investigated numerically. The objective is to examine the effect of the fin to the heat transfer rate of the cover. Two-dimensional governing equations are developed. The governing equations and the boundary conditions are solved using commercial Computational Fluid Dynamics code. The fluid flow and heat transfer characteristics are plotted, and numerical results are compared with empirical correlation. The results show that the presence of the fin strongly affects the fluid flow and heat transfer characteristics. The fin can reduce the heat transfer rate up to 22.42% in comparison with double glasses cover without fins.

012097
The following article is Open access

, , and

Double glasses cover is typically used in a flat plate solar collector to decrease heat losses to ambient. The working principal of the cover is to allow the solar irradiation hit the plate absorber and blocks it using natural convection mechanism in the enclosure between the glasses. The performance of the enclosure to block the heat loss to the surrounding affected by the inclination angle of the collector. The objective of this study is to explore the effect of the inclination angle to the performance of the solar collector. Numerical simulation using commercial code Computational Fluid Dynamic (CFD) has been carried out to explore the fluid flow and heat transfer characteristics in the enclosure. In the result, streamline, vector velocity, and contour temperature are plotted. It was shown that the inclination angle strongly affects the performance of the collector. The average heat transfer coefficient decreases with increasing inclination angle. This fact suggests that too high inclination angle is not recommended for solar collector.

012098
The following article is Open access

and

Vapor compression cycle is mainly employed as a refrigeration cycle in the Air-Conditioning (AC) unit. In order to save energy, the Coefficient of Performance (COP) of the need to be improved. One of the potential solutions is to modify the system into multi-stages vapor compression cycle. The suitable intermediate pressure between the high and low pressures is one of the design issues. The present work deals with the investigation of an optimum intermediate pressure of two-stages vapor compression refrigeration cycle. Typical vapor compression cycle that is used in AC unit is taken into consideration. The used refrigerants are R134a. The governing equations have been developed for the systems. An inhouse program has been developed to solve the problem. COP, mass flow rate of the refrigerant and compressor power as a function of intermediate pressure are plotted. It was shown that there exists an optimum intermediate pressure for maximum COP. For refrigerant R134a, the proposed correlations need to be revised.

012099
The following article is Open access

, , , and

The characteristics of absorber plate of a flat plate solar collector play an important role in the improvement of the performance. In this work, a numerical analysis is carried out to explore the effect of absorptivity and emissivity of absorber plate to the performance of the solar collector of a solar water heater. For a results comparison, a simple a simple solar box cooker with absorber area of 0.835 m × 0.835 m is designed and fabricated. It is employed to heat water in a container by exposing to the solar radiation in Medan city of Indonesia. The transient governing equations are developed. The governing equations are discretized and solved using the forward time step marching technique. The results reveal that the experimental and numerical results show good agreement. The absorptivity of the plate absorber and emissivity of the glass cover strongly affect the performance of the solar collector.

012100
The following article is Open access

Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo's system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user's behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.

012101
The following article is Open access

, , , and

Universitas Sumatera Utara is one of the public universities that have over 100 buildings with total area of more than 133.141 square meters. Information delivery on the location of the institutional buildings becomes challenging since the university land reaches 93.4 Ha. The information usually delivers orally, in video presentation and in the form of two-dimensional such as maps, posters, and brochures. These three techniques of information delivery have their advantages and disadvantages. Thus, we know that virtual reality has come to existence, touching every domain of knowledge. In this paper we study and implement virtual reality as a new approach to distribute the information to cover all of the deficiencies. The utilization of virtual reality technology combined with 3D modeling is aims to introduce and inform the location of USU institutional buildings in interactive and innovative ways. With the application existence, the campus introduction is expected to be more convenient so that all the USU students will be able to find the exact location of the building they are headed for.

012102
The following article is Open access

, , , and

Hijaiyah alphabet is letters used in the Qur'an. An attractive and exciting learning process of Hijaiyah alphabet is necessary for the children. One of the alternatives to create attractive and interesting learning process of Hijaiyah alphabet is to develop it into a mobile application using augmented reality technology. Augmented reality is a technology that combines two-dimensional or three-dimensional virtual objects into actual three-dimensional circles and projects them in real time. The purpose of application aims to foster the children interest in learning Hijaiyah alphabet. This application is using Smartphone and marker as the medium. It was built using Unity and augmented reality library, namely Vuforia, then using Blender as the 3D object modeling software. The output generated from this research is the learning application of Hijaiyah letters using augmented reality. How to use it is as follows: first, place marker that has been registered and printed; second, the smartphone camera will track the marker. If the marker is invalid, the user should repeat the tracking process. If the marker is valid and identified, the marker will have projected the objects of Hijaiyah alphabet in three-dimensional form. Lastly, the user can learn and understand the shape and pronunciation of Hijaiyah alphabet by touching the virtual button on the marker

012103
The following article is Open access

, , , and

Rangku Alu is a traditional Indonesian game originated from Manggarai, East Nusa Tenggara, which is played using two pairs of bamboos or sticks in motion until the opponent's foot is wedged by the bamboos. However, nowadays the game is rarely played, as the rapid development of technology, the game can be played individually by anyone through an online game using media devices such as mobile or PC. Rangku Alu is a game where the moves of a dancer or player varied in each dance. In this research, Fisher-Yates Shuffle algorithm was used as a randomization method to determine the next moves to prevent the tap areas to appear at the same place more than once in a row. From the results, it shows that the tap areas have never been appeared at the same place in succession twice or more.

012104
The following article is Open access

, , and

As fully connected social media applications become popular and require all time connection, the power consumption on mobile device battery increases significantly. As power supplied by a battery is limited, social media application should be designed to be less power consuming. This paper reports the power consumption measurement of social media running on a mobile device. Experimental circuit was developed by using a microcontroller measuring an android smartphone on a 802.11 controlled network. The experiment results show that whatsapp consumes the power less than others in stand by and chat. While other states are dominated by line. The blackberry consumes the power the worst.

012105
The following article is Open access

, , , and

Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner's smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.

012106
The following article is Open access

, , , , , , , and

Hypertension or high blood pressure can cause damage of blood vessels in the retina of eye called hypertensive retinopathy (HR). In the event Hypertension, it will cause swelling blood vessels and a decrese in retina performance. To detect HR in patients body, it is usually performed through physical examination of opthalmoscope which is still conducted manually by an ophthalmologist. Certainly, in such a manual manner, takes a ong time for a doctor to detetct HR on aa patient based on retina fundus iamge. To overcome ths problem, a method is needed to identify the image of retinal fundus automatically. In this research, backpropagation neural network was used as a method for retinal fundus identification. The steps performed prior to identification were pre-processing (green channel, contrast limited adapative histogram qualization (CLAHE), morphological close, background exclusion, thresholding and connected component analysis), feature extraction using zoning. The results show that the proposed method is able to identify retinal fundus with an accuracy of 95% with maximum epoch of 1500.

012107
The following article is Open access

, , , , , , , , and

Sperm morphology is still a standard laboratory analysis in diagnosing infertility in men. Manually identification of sperm form is still not accurate, the difficulty in seeing the form of the invisible sperm from the digital microscope image is often a weakness in the process of identification and takes a long time. Therefore, male fertility identification application system is needed Through sperm abnormalities based on sperm morphology (teratospermia). The method used is invariant moment method. This study uses 15 data testing and 20 data training sperm image. That the process of male fertility identification through sperm abnormalities based on sperm morphology (teratospermia) has an accuracy rate of 80.77%. Use of time to process Identification of male fertility through sperm abnormalities Based on sperm morphology (teratospermia) during 0.4369 seconds.

012108
The following article is Open access

, , , and

Augmented reality is a technology that can provide visualization in the form of 3D virtual model. With the utilization of augmented reality technology hence image-based modeling to produce 3D model of Sultan Deli Istana Maimun can be applied to restore photo of Sultan of Deli into three dimension model. This is due to the Sultan of Deli which is one of the important figures in the history of the development of the city of Medan is less known by the public because the image of the Sultanate of Deli is less clear and has been very long. To achieve this goal, augmented reality applications are used with image processing methodologies into 3D models through several toolkits. The output generated from this method is the visitor's photos Maimun Palace with 3D model of Sultan Deli with the detection of markers 20-60 cm apart so as to provide convenience for the public to recognize the Sultan Deli who had ruled in Maimun Palace.

012109
The following article is Open access

, , , , , , , and

Differences possessed by children with special needs such as differences in mental traits, sensory abilities, social and emotional behavior etc. of normal children causing learning and developmental barriers on children, so that requiring more specific services. Autism is one category of children with special needs who experience delays in responding to the things around him that caused by chaos in the brain work system. The tendency of autistic children who only focus on themselves makes it difficult to concentrate on one thing and easily switch when being talked. Training focus of the child can be done by giving them basic commands presented with visually appealing from the utilization of augmented reality and leap motion controller.

012110
The following article is Open access

, , , and

Most of the elderly people is experiencing a decrease in physical quality, especially the weakness in the legs. This will cause elderly easy to fall and can have a serious impact on their health if not getting help very quickly. It is, therefore, necessary to take immediate action against the falling cases experienced by the elderly. One such action is by developing supervision and detecting of falling movements in real-time, which is then the connection to a member of the family. In this research, we used Arduino Uno as a microcontroller, sensor accelerometer, and gyroscope that serves to measure falling movement of the elderly person and supported by GPS technology Ublox Neo 6M to provide information about coordinates. The result was the high accuracy of delivering notification data to server and accuracy of data delivery to family notification equal to 93,75%. The system successfully detects the direction of falling: forward, backward, left or right and able to distinguish between unintentional falling and conscious falling like a bow or prostrate position.

012111
The following article is Open access

, , , and

Public clean water company (PDAM) as a public service is designed and organized to meet the needs of the community. Currently, the number of PDAM subscribers is very big and will continue to grow, but the service and facilities to customers are still done conventionally by visiting the customer's home to record the last position of the meter. One of the problems of PDAM is the lack of disclosure of PDAM customers' invoice because it is only done monthly. This, of course, makes PDAM customers difficult to remember the date of payment of water account. Therefore it is difficult to maintain the efficiency. The purpose of this research is to facilitate customers of PDAM water users to know the details of water usage and the time of payment of water bills easily. It also facilitates customers in knowing information related to the form of water discharge data used, payment rates, and time grace payments using SMS Gateway. In this study, Flow Liquid Meter Sensor was used for data retrieval of water flowing in the piping system. Sensors used to require the help of Hall Effect sensor that serves to measure the speed of water discharge and placed on the pipe that has the same diameter size with the sensor diameter. The sensor will take the data from the rate of water discharge it passes; this data is the number of turns of the mill on the sensor. The results of the tests show that the built system works well in helping customers know in detail the amount of water usage in a month and the bill to be paid

012112
The following article is Open access

, , , and

Currently, popularity of Korean culture attracts many people to learn everything about Korea, particularly its language. To acquire Korean Language, every single learner needs to be able to understand Korean non-Latin character. A digital approach needs to be carried out in order to make Korean learning process easier. This study is done by using Deep Convolutional Neural Network (DCNN). DCNN performs the recognition process on the image based on the model that has been trained such as Inception-v3 Model. Subsequently, re-training process using transfer learning technique with the trained and re-trained value of model is carried though in order to develop a new model with a better performance without any specific systemic errors. The testing accuracy of this research results in 86,9%.

012113
The following article is Open access

, , , and

On the commercial radio station, the advertising schedule is done manually, which resulted in ineffectiveness of ads schedule. Playback time consists of two types such as prime time and regular time. Radio Ads scheduling will be discussed in this research is based on ad playback schedule between 5am until 12am which rules every 15 minutes. It provides 3 slots ads with playback duration per ads maximum is 1 minute. If the radio broadcast time per day is 12 hours, then the maximum number of ads per day which can be aired is 76 ads. The other is the enactment of rules of prime time, namely the hours where the common people (listeners) have the greatest opportunity to listen to the radio, namely between the hours and hours of 4 am – 8 am, 6 pm – 10 pm. The number of screenings of the same ads on one day are limited to prime time ie 5 times, while for regular time is 8 times. Radio scheduling process is done using genetic algorithms which are composed of processes initialization chromosomes, selection, crossover and mutation. Study on chromosome 3 genes, each chromosome will be evaluated based on the value of fitness calculated based on the number of infractions that occurred on each individual chromosome. Where rule 1 is the number of screenings per ads must not be more than 5 times per day and rule 2 is there should never be two or more scheduling ads delivered on the same day and time. After fitness value of each chromosome is acquired, then the do the selection, crossover and mutation. From this research result, the optimal advertising schedule with schedule a whole day and ads data playback time ads with this level of accuracy: the average percentage was 83.79%.

012114
The following article is Open access

, and

Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, Many studies had been done by previous researchers to generate a more robust cryptographic algorithm to provide high security for data communication. To strengthen data security, one of the methods is hybrid cryptosystem method that combined symmetric and asymmetric algorithm. In this study, we observed a hybrid cryptosystem method contain Modification Playfair Cipher 16x16 algorithm as a symmetric algorithm and Knapsack Naccache-Stern as an asymmetric algorithm. We observe a running time of this hybrid algorithm with some of the various experiments. We tried different amount of characters to be tested which are 10, 100, 1000, 10000 and 100000 characters and we also examined the algorithm with various key's length which are 10, 20, 30, 40 of key length. The result of our study shows that the processing time for encryption and decryption process each algorithm is linearly proportional, it means the longer messages character then, the more significant times needed to encrypt and decrypt the messages. The encryption running time of Knapsack Naccache-Stern algorithm takes a longer time than its decryption, while the encryption running time of modification Playfair Cipher 16x16 algorithm takes less time than its decryption.

012115
The following article is Open access

, and

Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.

012116
The following article is Open access

, and

The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept. Because of the nature of an open document means the document contents can be read and modified by many parties so that the integrity of the information as a content of the document is not preserved. To maintain the integrity of the data, it needs to create a mechanism which is called a digital signature. A digital signature is a specific code which is generated from the function of producing a digital signature. One of the algorithms that used to create the digital signature is a hash function. There are many hash functions. Two of them are message digest 5 (MD5) and SHA256. Those both algorithms certainly have its advantages and disadvantages of each. The purpose of this research is to determine the algorithm which is better. The parameters which used to compare that two algorithms are the running time and complexity. The research results obtained from the complexity of the Algorithms MD5 and SHA256 is the same, i.e., ⊖ (N), but regarding the speed is obtained that MD5 is better compared to SHA256.

012117
The following article is Open access

, , and

Public sentiment from social media like Twitter can be used as one of the indicators to determine the quality of TV Programmes. In this study, we implemented information extraction on Twitter by using sentiment analysis method to assess the quality of TV Programmes. The first stage of this study is pre-processing which consists of cleansing, case folding, tokenizing, stop-word removal, stemming, and redundancy filtering. The next stage is weighting process for every single word by using TF-IDF method. The last step of this study is the sentiment classification process which is divided into three sentiment category which is positive, negative and neutral. We classify the TV programmes into several categories such as news, children, or films/soap operas. We implemented an improved k-nearest neighbor method in classification 4000 twitter status, for four biggest TV stations in Indonesia, with ratio 70% data for training and 30% of data for the testing process. The result obtained from this research generated the highest accuracy with k=10 as big as 90%.

012118
The following article is Open access

, , and

As public agencies, the Badan Pelayanan Perizinan Terpadu (BPPT) and the Badan Lingkungan Hidup (BLH) of Medan city manage process to obtain a business license from the public. However, each agency might have a different corporate data because of a separate data input process, even though the data may refer to the same company's data. Therefore, it is required to identify and correlate data that refer to the same company which lie in different data sources. This research focuses on data pre-processing such as data cleaning, text pre-processing, indexing and record comparison. In addition, this research implements data matching using support vector machine algorithm. The result of this algorithm will be used to record linkage of data that can be used to identify and connect the company's data based on the degree of similarity of each data. Previous data will be standardized in accordance with the format and structure appropriate to the stage of preprocessing data. After analyzing data pre-processing, we found that both database structures are not designed to support data integration. We decide that the data matching can be done with blocking criteria such as company name and the name of the owner (or applicant). In addition to data pre-processing, the result of data classification with a high level of similarity as many as 90 pairs of records.

012119
The following article is Open access

, , and

Twitter has become a media to provide communication between a company with its customers. The average number of Twitter active users monthly is 330 million. A lot of companies realize the potential of Twitter to establish good relationship with their customers. Therefore, they usually have one official Twitter account to act as customer care division. In Indonesia, one of the company that utilizes the potential of Twitter to reach their customers is PT Telkom. PT Telkom has an official customer service account (called @TelkomCare) to receive customers' problem. However, because of this account is open for public, Twitter users might post all kind of messages (not only complaints) to Telkom Care account. This leads to a problem that the Telkom Care account contains not only the customer complaints but also compliment and ordinary message. Furthermore, the complaints should be distributed to relevant division such as "Indihome", "Telkomsel", "UseeTV", and "Telepon" based on the content of the message. This research built the application that automatically filter twitter post messages into several pre-defined categories (based on existing divisions) using Naïve Bayes algorithm. This research is done by collecting Twitter message, data cleaning, data pre-processing, training and testing data, and evaluate the classification result. This research yields 97% accuracy to classify Twitter message into the categories mentioned earlier.

012120
The following article is Open access

, and

Rapidly increasing number of web pages or documents leads to topic specific filtering in order to find web pages or documents efficiently. This is a preliminary research that uses cosine similarity to implement text relevance in order to find topic specific document. This research is divided into three parts. The first part is text-preprocessing. In this part, the punctuation in a document will be removed, then convert the document to lower case, implement stop word removal and then extracting the root word by using Porter Stemming algorithm. The second part is keywords weighting. Keyword weighting will be used by the next part, the text relevance calculation. Text relevance calculation will result the value between 0 and 1. The closer value to 1, then both documents are more related, vice versa.

012121
The following article is Open access

, , and

Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.

012122
The following article is Open access

, and

Geographic Information Systems (GIS) plays an essential role in shipping service related application. By utilizing GIS, the courier can find the route to deliver goods for its customer. This research proposes a standalone mobile application to provide the shortest route to the destinations by utilizing geographic information systems with A-Star algorithm. This application is intended to be used although the area has no Internet network available. The developed application can handle several drop off points then calculates the shortest route that passes through all the drop off points. According to the conducted testing, the number of drop off points that can be calculated is influenced by the specification of the smartphone. More destinations require more smartphone resources and time to process.

012123
The following article is Open access

, , , , and

Prime numbers are numbers that have their appeal to researchers due to the complexity of these numbers, many algorithms that can be used to generate prime numbers ranging from simple to complex computations, Sieve of Eratosthenes and Sieve of Sundaram are two algorithm that can be used to generate Prime numbers of randomly generated or sequential numbered random numbers, testing in this study to find out which algorithm is better used for large primes in terms of time complexity, the test also assisted with applications designed using Java language with code optimization and Maximum memory usage so that the testing process can be simultaneously and the results obtained can be objective