3-5 May 2018
Filter Results
-
Steering Committee
Publication Year: 2018, Page(s):1 - 2|
PDF (37 KB)
-
Homepage
Publication Year: 2018, Page(s): 1|
PDF (42 KB)
-
Toward Full Enterprise Software Support on nDPI
Publication Year: 2018, Page(s):1 - 6Next Generation Firewall (NGFW) adds new capabilities of a standard firewall with an ability to inspect packets' contents, thus increasing precision. Three main usages of NGFW are to improve the Quality of Service (QoS) of a business, as an application-based filtering firewall, and to protect the network from known security threats. A complete NGFW system has three main components: Deep Packet Ins... View full abstract»
-
A Multi-Label Classification on Topics of Quranic Verses in English Translation Using Tree Augmented Naïve Bayes
Publication Year: 2018, Page(s):103 - 106Quran is an eternal miracle for depicting its linguistic perfection, truth, and validating of the latest scientific research. Every Muslims must conceive and implement the commandments, also avoid the prohibitions mentioned in the Quran. Each verse of the Quran has a different meaning, and one verse in the Quran can depict one or more topics of class that can be studied. To ease learning and to un... View full abstract»
-
Travel Route Optimization Using Dynamic Programming
Publication Year: 2018, Page(s):107 - 112This paper provides research result in determining the optimal route sequence of destination and travel time on tourism buses with the same start-end point to improve tourism services and operational cost savings. The tourism bus service that will be discussed in this research is the tourism bus belonging to the Department of Culture and Tourism (Disbudpar) Surabaya, namely Surabaya Shopping and C... View full abstract»
-
Route Recommendation Using Community Detection Algorithm (Case: Kota Bandung)
Publication Year: 2018, Page(s):113 - 118Bandung public transport route, known as Angkutan Kota (Angkot), has 39 routes to serve intra city transportation. These routes connect more than 40 bus stations in star topology. The centrality analysis of this routes shows that many of them are overlapped into each other in certain location, thus may potentially cause congestion and increased competition for passengers among routes. To achieve o... View full abstract»
-
Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks
Publication Year: 2018, Page(s):119 - 124Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry messages to the destinations. Routing algorithms in these networks typically favour the most popular individuals (nodes) as optimal carriers for message transfers to achieve high delivery performance. The state-of-the-art routing protocol BubbleRap uses a cumulative moving average technique (called C-Window) to... View full abstract»
-
Collision-Aware Rate Adaptation Algorithm for High-Throughput IEEE 802.11n WLANs
Publication Year: 2018, Page(s):12 - 17IEEE 802.11n Wireless Local Area Network (WLAN) is the default standard that is used on modern smartphones and modern PCs/laptops. Medium Access Control (MAC) 802.11n has the capability of transmitting multiple MAC Protocol Data Units (MPDUs) into an Aggregate-MPDU (A-MPDU). Physical (PHY) 802.11n transmits MPDU or A-MPDU using a PHY rate of 6.5 to 600 Mbps determined by the rate adaptation algori... View full abstract»
-
Increasing Students Interaction in Distance Education Using Gamification
Publication Year: 2018, Page(s):125 - 129Distance education helps students interacting with course materials, teachers, and their peers without time and place barriers. IDEA is distance education implemented in Telkom University with various of functionalities like course materials, discussion, quiz, and assignment. Meanwhile, the users of IDEA were decreased because the functionalities are not well-supported by a good interaction design... View full abstract»
-
The Effectiveness of Low-Level Structure-Based Approach Toward Source Code Plagiarism Level Taxonomy
Publication Year: 2018, Page(s):130 - 134Low-level approach is a novel way to detect source code plagiarism. Such approach is proven to be effective when compared to baseline approach (i.e., an approach which relies on source code token subsequence matching) in controlled environment. We evaluate the effectiveness of state of the art in low-level approach based on Faidhi & Robinson's plagiarism level taxonomy; real plagiarism cases a... View full abstract»
-
Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology)
Publication Year: 2018, Page(s):135 - 140In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined... View full abstract»
-
Finding Pattern in Dynamic Network Analysis
Publication Year: 2018, Page(s):141 - 146Internet and social media changes the way human act and make social interaction daily. The accumulated of human social interaction form large scale unstructured data that possibly store timely knowledge. Social Network Analysis (SNA) methodology can be used to perform knowledge extraction from those unstructured data. SNA also provide the way to model user interaction pattern in social media. The ... View full abstract»
-
A Lightweight Semantic-Based Medical Document Retrieval
Publication Year: 2018, Page(s):147 - 151Medical information is valuable for a health care professional to empower diagnosis and clinical decision process. In addition, it can also support communities with health knowledge to support healthy living. Ontology-based information retrieval supports the retrieval of such information with the semantically better result. In this paper, we propose a framework of lightweight semantic-based medica... View full abstract»
-
Context-Aware Ontological Hybrid Recommender System For IPTV
Publication Year: 2018, Page(s):152 - 157With the huge growing amount of information continuously produced, shared and available online, finding relevant and beneficial contents or services at a single or few clicks have become almost impossible. Most of the time, we will be returned with thousands of irrelevant web links. As such, a recommender system which recommends contents or services that likely meet the user's needs is crucial, es... View full abstract»
-
Tokenization and N-Gram for Indexing Indonesian Translation of the Quran
Publication Year: 2018, Page(s):158 - 161Tokenization is an important process used to break the text into parts of a word. N-gram model now is widely used in computational linguistics for predicting the next item in such a contiguous sequence of n items from a particular sample of text. This paper focuses on the implementation of tokenization and n-gram model using RapidMiner to produce unigram and bigram word for indexing Indonesian Tra... View full abstract»
-
News Topic Classification Using Mutual Information and Bayesian Network
Publication Year: 2018, Page(s):162 - 166News topic classification in this research is categorizing or distinguishing news, in textual data format, into a particular category based on information contained in the news. One of methods that can be used for this task is Bayesian Network that is one of uncertainty reasoning methods that uses probabilistic and directed acyclic graph to model conditional dependencies among variables. However, ... View full abstract»
-
Analyzing Factors Influencing Continuance Intention of E-Payment Adoption Using Modified UTAUT 2 Model
Publication Year: 2018, Page(s):167 - 173Online business of Indonesia continuous to grow rapidly. This rapid growth encourages developments for electronic payment systems. Moreover, Bank Indonesia is running a program to increase the awareness of society to become cash-less. One of the e-payment that emerging in Indonesia is Go-Pay, a Go-Jek payment system. Go-Pay successfully becomes one of the fifth largest e-money in Indonesia less th... View full abstract»
-
High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP)
Publication Year: 2018, Page(s):174 - 177This paper proposes a framework of video communication in smartphone with android-based operating system technology. The technology that used for encoding and decoding is compression standard H264 with data transmission protocol of Real Time Messaging Protocol (RTMP) and media server Red5. This framework is proposed as improvement of the used H263-based system with Real Time Streaming Protocol (RT... View full abstract»
-
An Android Application for Predicting Traffic Congestion Using Polling Method
Publication Year: 2018, Page(s):178 - 183Traffic congestion is often a problem in major cities causing economic and social harm, air and sound pollution, as well as delays in daily activities. Existing traffic assistant applications usually provide traffic prediction based on real-time traffic condition and typical traffic record during weekdays. Such a traffic prediction is not applicable to predict traffic for special moments, e.g. lon... View full abstract»
-
An Architecture for M2M Communications Over Cellular Networks Using Clustering and Hybrid TDMA-NOMA
Publication Year: 2018, Page(s):18 - 23Machine-to-Machine (M2M) communications have now become a highly promising affiliate of the future fifth generation (5G) cellular networks. This paper proposes a novel architecture for M2M communications over cellular networks. k-mean clustering for machines as well as cluster head (CH) reselection method is applied in order to balance the power consumption within the machines to increase their ba... View full abstract»
-
Design and Implementation of Smart Bath Water Heater Using Arduino
Publication Year: 2018, Page(s):184 - 188The use of hot water used for bathing is one type of utilization of technology that has been developed. By using a Water Heater tool, one can get water with a higher temperature. However, to achieve the desired temperature and fill the tub for ready use, water heater takes a long time. In this system has been designed an automatic faucet that can be active in accordance with the temperature of wat... View full abstract»
-
2.4 GHz Wireless Data Acquisition System for FIToplankton ROV
Publication Year: 2018, Page(s):189 - 193Research activity in underwater wireless sensor and video transmission for marine and aquatic environment monitoring has increased rapidly. Data acquisition system is essential component for Remotely Operated Vehicle (ROV) especially for marine or other aquatic environment surveillance. ROV's data acquisition is typically transmitted using tether cable connected to ground control station. The use ... View full abstract»
-
Person Locator Using GPS Module and GSM Shield Applied for Children Protection
Publication Year: 2018, Page(s):194 - 198Children safety is very important for parents. Currently, more and more crimes occur against children, one that often happened is kidnapping. From year to year, the number of child abductions continues to increase. Parents should be aware of the safety and their children. In this study, we proposed a system to monitor the presence of children to anticipate the occurrence of crime against children.... View full abstract»
-
Android Application for Controlling Air Conditioner Using Fuzzy Logic
Publication Year: 2018, Page(s):199 - 204There are many kind of electronic appliances around us such as microwave, lamp, television, and air conditioner around us. Sometimes many people are confuse and do not know how to manage those electronic appliances. It is hard to manage whenever they aren't at home or go to another places. By using electronic appliance in our daily life, it always need our electrical resources and some electronic ... View full abstract»
-
Connectivity Control Algorithm for Autonomous Wireless Agents
Publication Year: 2018, Page(s):205 - 210In the power-limited sensor network, it is important to optimize the power allocation while maintaining connectivity for each sensor node to guarantee reliable localization. In order to prolong lifetime of sensors, optimizing the power is very crucial while maintaining a proper number of connectivity to ensure a good localizability. In this paper, we propose a connectivity control algorithm, which... View full abstract»