00.guide Book Iccsci 2015
00.guide Book Iccsci 2015
This year, ICCSCI conference received 102submissions from 7 countries; about 69 were
accepted for presentations for oral sessions. We are very grateful for the extensive efforts
of many individuals who worked diligently to ensure a successful, high quality
conference. We would like to thank to Elsevier and BINUS University for supporting this
event. We would like to thank to Rector of BINUS University, Prof. Dr. Ir. Harjanto
Prabowo, MM, and Dean of School of Computer Science, Mr. Fredy Purnomo, S.Kom.,
M.Kom, Reviewers and Program Committee.
We invite all attendees to actively participate in the conference activities and the city
tours, and to enjoy the opportunity to learn from one another. We hope to have your
cordial supports and participations in future ICCSCI conferences.
General Chair
Dr. Widodo Budiharto, S.Si., M.Kom.
School of Computer Science
BINUS University, Jakarta-Indonesia
Email: [email protected]
1
Welcome Message from the Dean of
School of Computer Science
Welcome to ICCSCI conference, as the Dean of the School of Computer Science and host
of ICCSCI 2015, I would like to warmly welcome you in Jakarta, Indonesia and in
BINUSUniversity. It is an honor for us to have experts such as you to participate in this
conference.
As an academician, it is our notable duty to keep updating and creating new knowledge
and then sharing this knowledge to our society. Focusing on this honorable duty, we
organize this conference as a sharing venue for experts of various topics in the Computer
Science, informatics, Computational Intelligence and Applied mathematics and statistics
and related fields.
We hope by attending this conference not only you will have an opportunity to showcase
your significant research results but also to gain knowledge updates from the keynote
speakers, fruitful discussions, networks and collaboration possibilities for your future
endeavors in the area of your expertise. Through the presentations in this conference, we
hope that we can depict an epitome portrait of the current trends in the computing area
and from the lively discussions we are putting a high hope to set the course to be
embarked by our future research journeys.
Once again I would like to thank you all for coming. Your experience, expertise and
readiness to share your knowledge and ideas are highly valuable and needed. I wish to all
of us exciting and fruitful conference days ahead.
Thank you.
2
Welcome Message from the Rector of
BINUS University
I am extremely proud and happy to welcome you to BINUS University and to the 1 st
International Conference on Computer Science and Computational Intelligence. This
conference is one of the most important events in BINUS University this year since
BINUS University as one of the leading university in computer science, computational
intelligence, information and technology feels the need to have a forum for the
researchers, engineers and scientists to share knowledge. The development of computer
science, computational intelligence, information and technology knowledge needs a
media for researchers, engineers and scientists to share and expand the networking. We
create this conference to serve the purpose as the media. It is also our hope that this
conference will act as a motivation for researchers, engineers and scientists to publish
their ideas and researches in an international forum.
To the distinguished delegates from near and afar: I wish you a fruitful conference and an
enjoyable stay. Again, welcome to BINUS University.
Thank you.
3
About Procedia Computer Science
Editor-in-Chief
J. Liebowitz
Harrisburg University of Science and Technology, Harrisburg, Pennsylvania, USA
ISSN: 1877-0509
Conference proceedings are accepted for publication in Procedia Computer Science based
on quality and are therefore required to meet certain criteria, including quality of the
conference, relevance to an international audience and covering highly cited or timely
topics. Procedia Computer Science will cover proceedings in all topics of Computer
Science with the exception of certain workshops in Theoretical Computer Science, as our
Electronic Notes in Theoretical Computer Science http://www.elsevier.com/locate/entcs
are the primary outlet for these papers. The journal is indexed in Scopus, the largest
abstract and citation database.
Source: http://www.journals.elsevier.com/procedia-computer-science/
4
Contents
Welcome Message from the General Chair ......................................................................... 1
Welcome Message from the Dean of School of Computer Science .................................... 2
Welcome Message from the Rector of BINUS University .................................................. 3
About Procedia Computer Science ...................................................................................... 4
Contents ............................................................................................................................... 5
ICCSCI 2015 Organizing Committee .................................................................................. 6
ICCSCI 2015 Honorary Committee..................................................................................... 7
ICCSCI 2015 Steering Committee....................................................................................... 7
ICCSCI 2015 Program Committee ...................................................................................... 7
Reviewers ............................................................................................................................. 8
Keynote Speakers................................................................................................................. 9
Technical Program Schedule ............................................................................................. 14
ICCSCI 2015 Technical Program ...................................................................................... 16
Map of Anggrek Campus ................................................................................................... 44
Venue ................................................................................................................................. 45
Excursion Tourism ............................................................................................................. 48
Tourism .............................................................................................................................. 49
ICCSCI 2015 Program Summary ...................................................................................... 51
5
ICCSCI 2015 Organizing Committee
General Chair Publication Committee
Widodo Budiharto Novita Hanafiah
Alexander Agung Santoso Gunawan
Organizing Chair
Aditya Kurniawan
Bayu Kanigoro
Equipment Committee
Secretary
Afan Galih Salman
Lili Ayu Wulandhari
Lowis
Syarifah Diana Permai
Hendra
Treasury HIMTI
Margaretha Ohyver
Sponsorship Committee
Rini Wongso
Jurike V. Moniaga
Program Committee Michael Yoseph Ricky
Edy Irwansyah Santy
Derwin Suhartono
Food and Beverage Committee
Alvina Aulia
Wirda
Irma Kartika
Yulyani Arifin
Jeklin Harefa
Dian Felita Tanoto
David
Transportation Committee
Documentation Committee
Rojali
Meiliana
Ricky Aditya
Jonathan Samuel Lumentut
Design Committee
Registration Committee
Rhio Sutoyo
Sonya Rapinta Manalu
Albertus Agung
Violitta Yesmaya
Natalia Chandra
6
ICCSCI 2015 Honorary Committee
Harjanto Prabowo, Rector of BINUS University, Indonesia
Bahtiar Saleh Abbas, Vice Rector of BINUS University, Indonesia
Iman Herwidiana Kartowisastro, Vice Rector of BINUS University, Indonesia
Boto Simatupang, Vice Rector of BINUS University, Indonesia
Nelly, Vice Rector of BINUS University, Indonesia
Andreas Chang, Vice Rector of BINUS University, Indonesia
7
Reviewers
8
Keynote Speakers
Prof. Dr. Eng. Chiharu Ishii
Faculty of Science and Engineering, Hosei University, Japan
Biography:
Prof. Chiharu Ishii received Bachelor of Engineering degree in Mechanical Engineering
from Sophia University in 1992, Master of Engineering degree in Mechanical
Engineering from Sophia University in 1994 and Doctor of Engineering degree in
Mechanical Engineering from Sophia University in 1997. He worked at Ashikaga
Institute of Technology between 1997 and 2002, at Kogakuin University between 2002
and 2009, and at Shibaura Institute of Technology between 2009 and 2010. Since 2010,
He has been working at Hosei University, and currently he is a Professor with the
9
Department of Mechanical Engineering, Faculty of Science and Engineering at Hosei
University. Prof. Chiharu Ishii has received several awards such as The Best Paper Award
in the area of Tactile and Haptic Interfaces at the 4th International Conference on Human
System Interaction (HSI2011); Best Paper Award at the 1st International Conference on
Computer Science, Electronics and Instrumentation (ICCSE2012); Best Presentation
Award at the International Conference on Intelligent Mechatronics and Automation
(ICIMA2013). He is currently a member of IEEE, SICE, JSME, RSJ, IEEJ and JSCAS.
His research interests are in medical robotics, assistive technology and robust control.
10
Prof. Dr. Habibollah Haron
Faculty of Computing, University of Teknologi Malaysia,
Malaysia
Biography:
Prof. Habibollah Haron is one of Professor in Faculty of Computing, University of
Teknologi Malaysia. He received Bachelor of Computer Science from University of
Teknologi Malaysia in 1989, Master of Science in Computer Technology in Manufacture,
from University of Sussex & University of Brighton United Kingdom in 1995 and Doctor
of Philosophy in Computer Science especially in Computer Aided Geometric Design
(CAGD) area from University of Teknologi Malaysia in 2004. He has research
experience in image processing, artificial intelligence, computer vision and Computer
Aided Geometric Design. Currently, he is a senior member of IEEE, Information
Visualization Society, United Kingdom and Persatuan Sains Matematik Malaysia
(Malaysian Society of Sciences and Mathematics) (PERSAMA). He has received some
11
awards such as Most Active Reviewers of International Arab Journal of Information
Technology (IAJIT) During the Year 2007, 2008, 2009, 2010, 2011 and 2012, ODA
Shared Scholarship Scheme for one year of M.Sc. course at the University of Sussex, UK
by Association of Commonwealth Universities, in October 1994 and IDB Training
Scheme Award under Development and Industrial Technology Program (Asian)
Development Bank (PPTP/ADB) in May – July 1994 (3 months) at Dept. of Electronic
Engineering, University of Hull, UK. He is also the organizing chair of the 5th Asian
Conference on Intelligent Information and Database Systems Conference (ACIIDS 2013)
and the 13th International Conference Intelligent Software Methodologies, Tools and
Techniques (SOMET 2014). From 2004 until 2014 he served as Head of Computer
Science Department and currently as Deputy Dean (Academic) in Faculty of Computing,
University of Teknologi Malaysia.
12
Hisar Maruli Manurung, Ph.D.
Faculty of Computer Studies, University of Indonesia, Indonesia
Biography:
Ruli Manurung is a full-time faculty member at the Faculty of Computer Science,
Universitas Indonesia, where he currently serves as the Coordinator for the various
computer science study programs. His research interests vary between natural language
processing, computational creativity, artificial intelligence, evolutionary computation, and
machine learning. He has co-authored more than 80 peer-reviewed journal papers, book
chapters, and conference papers, winning Best Paper awards at several international
conferences. He has also held 11 research grants, both international and national in scope.
He obtained his Ph.D from the University of Edinburgh in 2004 for his work on the
automatic generation of poetry. From 2003 to 2006 he was a Research Fellow at the
University of Edinburgh on an EPSRC research project that concerned the development
of an innovative system that provided language-impaired children with the ability to tell
novel jokes.
13
Technical Program Schedule
14
Day 2: August 25th, 2015
Activity Time Place
Keynote Speech 3 - Hisar Maruli Manurung, Ph.D
Auditorium
“Building Smarter Monkeys: Challenges and Lessons Learned in Constructing an Automatic 08:30 – 09:30
Anggrek Campus 4th FL
Poetry Generator”
Coffee Break 1 09:30 – 09:45 Room 801 & 803
Parallel Session 3 09:45 – 11:45 Room 821, 823, 825& 827
Lunch Break 11:45 – 12:45 Room 801 & 803
Parallel Session 4 12:45 – 14:45 Room 821, 823& 825
Coffee Break 2 14:45 – 15:00 Room 801 & 803
Parallel Session 5 15:00 – 17:00 Room 821, 823& 825
Closing Ceremony: Auditorium
17:00 – 18:00
Including Best Papers Award and Best Presentation Award Anggrek Campus, 4th FL
End of Day 2
15
ICCSCI 2015 Technical Program
16
parameters of citizen document service, business monitor the electricity consumption using web
permission service, planning transparency, and based application using laravel php framework
finance transparency. Each of these parameters and MySQL database. It also provides a
will be evaluated with the score 0,1,2,3, or diagnostic feedback in case of electrical
4.Index of Reform (IR) is also calculated with appliance’s failure. It aims to lower the energy
the range 0 to 4. About 32 Websites samples are usage of the electrical appliances by cutting off
taken from the capital of provinces in Indonesia the power completely during standby. Many
and non capital cities in Java. The result shows kinds of approaches like literature studies,
that only 15,6 % websites having IR between research and experiments were conducted to
2.75 to 4.00 and city of Surabaya has the highest develop the prototype of the system.
rank. Nationally, by combining the percentage of RaspberryPi, Arduino, relay board and CT
value 3 and 4 for each parameter, we obtain the current sensors are the hardware that used to
percentage 18.75% for citizen service, 37.50% control the use of electrical devices’ energy and
for business service, 25% for planning monitor how much it consume the energy. The
transparency, and 40.6% for finance application is mainly built using Laravel PHP
transparency. Meanwhile, West Indonesia with framework and JavaScript with MySQL
35.30%, 52.94%, 35%, and 42% ishigher than database. The result is a system prototype that
East Indonesia with 0%, 19.97%, 13.34%, and capable to control, monitor and diagnose
40%. Based on corridor, for the citizen service electrical appliances power, and lowering the
and business permission., Corridor Java and total energy usage of the appliances by up to
Sumatera had the percentage of 45.45% & 17% , 59%.
and 54.55%& 50% which are higher than other
corridors. On the planning transparency, Sumatra Implementation of Data
corridor had the highest score of 50%, then Synchronization Based On Data
follow by Java with 27%. But corridor Marker Using Web Service
Bali&Nusatenggara with 100% is the best on the
finance transparency, follow by Java (46%) and Muhsin Shodiq, Rini Wongso, Rendy
Sumatera (34%). As a conclusion, PAR using e- Setya Pratama, Eko Rhenardo, Kevin
Gov in Indonesia is still running slowly. West Bina Nusantara University, Jakarta, Indonesia
Indonesia, with Java and Sumatera corridors, is
better than East Indonesia in e-Gov Keywords:data synchronization; database; web
implementation. But for the finance service; mobile
transparency,corridorBali&NusaTenggara of
Abstract:With the increasing number of people
East Indonesia is the best. It is recommended that
who have more than one device or smartphone,
each city government enhance the static content
every user feel inconvenience if they have to
and gradually move to the transaction content,
enter the same data over and over again if they
such as for ID card which the order progress can
use a different device. The research objective is
be known online since the order submission.
to implement a synchronization algorithm which
Design and Implementation of Web- is able to maintain consistency of data owned by
different databases through web service, so that
Based Home Electrical Appliance data is always up to date. In this study, the
Monitoring, Diagnosing, and implementation will describe the difference of
Controlling System data synchronization algorithm between
unidirectional synchronization with bidirectional
Leonard Putra, Michael, Yudishtira, synchronization in different device through Web
Bayu Kanigoro Service so users can still use the same data
Bina Nusantara University, Jakarta, Indonesia although using a different device. The
implementation also adding additional
Keywords:web; monitoring; diagnosing;
information called as a marker to decide whether
controlling; electrical appliances.
the data is need to ignore or synchronized to
Abstract:The purpose of this research is to another database.
control home electrical appliances while also
17
Session Title Computational Intelligence 1
Location R.823
Time 13.00 – 15.00 WIB
Visual Tracking for Abrupt Motions Overlapping Cells in Medical
of Human Sperm using Smoothing Microscopic Images
Stochastic Approximate Monte Carlo
Siti Nurul Aqmariah Mohd Kanafiah,
Alexander A S Gunawan, Aniati Murni Yessi Jusman, Nor Ashidi Mat Isa,
Arymurthy Zeehaida Mohamed
Bina Nusantara University, Jakarta, Indonesia School of Microelectronic Engineering, Universiti
Malaysia Perlis, Pauh Putra Campus, 02600 Arau,
Keywords:human sperm; CASA; abrupt motion Perlis, Malaysia
tracking; CSH; SSAMC; Search Window
Keywords:medical microscopic image; image
Abstract:Characteristic of sperm movement or segmentation; overlapping cells separation; Pap
sperm motility is one of important quality of smear image; thin blood smear image
sperm. Computer-aided Sperm Analysis (CASA)
systems have attempted to give more accurate Abstract:Overlapping cells in a medical image
information about sperm motility. For collecting can affect the extraction process of cells’
a single good sperm in Intracytoplasmic Sperm characteristics as they are visually
Injection (ICSI) procedures, achieving correct indistinguishable from each other. This paper
sperm trajectory is necessary. On the other hand, proposes a new separation process algorithm
visual tracking of a sperm is a challenging issue called the radial-based cell formation (RCF) for
because: (i) sperms have similar size and shape, overlapping cells. The algorithm has been tested
(ii) a good sperm moves fast and has on 160 overlapping red blood cells taken from
unpredictable motions. Furthermore, our sperm thin blood smear images, and 26 overlapping
videos were taken by regular cameras which cervical cells taken from Pap smear images. On
have low frame rate (about 20 fps), which cause all tested medical images, the cells of interest are
the sperm-motion more abrupt. To address this successfully detected and distinguishable from
problem, we propose searching driven stochastic those overlapping cells, with size and shape well-
sampling framework for visual tracking of abrupt preserved. The separated cells have been
motions. In here, searching algorithm will give analyzed with both qualitative and quantitative
promising regions of the target, and thus can analyses, resulting in much better results
replace the role of transition model in tracking compared to other conventional algorithms. The
system. For searching, we employ Coherency correlation test approach was then used to
Sensitive Hashing (CSH) in a window to determine the performance of the proposed RCF
constrain search space in each frame, called as algorithm compared to the manual visual
Search Window. And then for stochastic interpretation by the pathologists. The results
sampling framework, we adopt Smoothing obtained prove that this study has successfully
Stochastic Approximate Monte Carlo (SSAMC) developed a new separation process algorithm
to specifically finding the target. The (i.e. RCF) for overlapping cells in medical
experimental results on human-sperm sequences microscopic images, with well-preserved size
show that: (i) comparing to our previous tracker and shape of the individual cell.
which use geometric transition dynamic model,
the proposed tracker can handle abrupt motions
robustly, (ii) by using appropriate Search
Window, the tracker can localize the sperm
target and restrict observation of other similar
sperms.
18
Mammograms Classification using mammography classification, accuracy is
Gray-level Co-occurrence Matrix and determined by feature extraction methods and
classifier. In this study, we propose a
Radial Basis Function Neural mammogram classification using Law's Texture
Network Energy Measure (LAWS) as texture feature
extraction method. Artificial Neural Network
Mellisa Pratiwi, Alexander, Jeklin (ANN) is used as classifier for normal-abnormal
Harefa, Sakka Nanda and benign-malignant images. Training data for
Bina Nusantara University, Jakarta, Indonesia the mammogram classification model is retrieved
Keywords:Mammogram; GLCM; Radial Basis from MIAS database. Result shows that LAWS
Function Neural Network provides better accuracy than other similar
method such as GLCM. LAWS provide93.90%
Abstract:Computer Aided Diagnosis (CAD) is accuracy for normal-abnormal and 83.30% for
used to assist radiologist in classifying various benign-malignant classification, while GLCM
type of breast cancers. It already proved its only provides 72.20% accuracy for normal-
success not only in reducing human error in abnormal and 53.06% for benign-malignant
reading the mammograms but also shows better classification.
and reliable classification into benign and
malignant abnormalities.This paper will report The Notation Scanner Systems using
and attempt on using Radial Basis Function Resilient Backpropagation Method
Neural Network (RBFNN) for mammograms
classification based on Gray-level Co-occurrence Ariel Christofer, Chandrasurya Kusuma,
Matrix (GLCM) texture based features.In this Vincent Pribadi, Widodo Budiharto
study, normal and abnormal breast image used as Bina Nusantara University, Jakarta, Indonesia
the standard input are taken from
Keywords:resilient backpropagation, OpenCV,
Mammographic Image Analysis Society (MIAS)
digital mammogram database. The computational pattern recognition
experiments show that RBFNN is better than Abstract:This research proposes anotation
Back-propagation Neural Network (BPNN) in scanner system for numerical notation. This
performing breast cancer classification. For research was supported by using resilient
normal and abnormal classification, the result backpropagation algorithm and uses the music
shows that RBFNN’s accuracy is93.98%, which application to get a melody of musical
is 14% higher than BPNN, while the accuracy of instruments. Objects used are designed to be
benign and malignant classification is 94.29% focused on the numerical notation symbols. To
which is 2% higher than BPNN. be implemented, the input image from camera
will be pre-processing, image segmentation,
Mammogram Classification using number and symbol recognition, output sound,
Law’s Texture Energy Measure and and to read numerical notation symbols before
Neural Networks entering resilient backpropagation algorithm
resize the image will be 21x21 pixels. By using
Arden Sagiterry Setiawan, Elysia, Julian colour filtering can reduce errors in handwriting
Wesley, Yudy Purnama recognition. Success rate by using 15 new
Bina Nusantara University, Jakarta, Indonesia sample data with 100 sample data training, the
test to get a successful outcome as much as
Keywords:Mammography; LAWS; GLCM;
87.9% and 12.1% error while success rate by
Texture;
using 15 new sample data with 50 sample data
Abstract:Mammography is the best approach in training, the test to get a successful outcome as
early detection of breast cancer. In much as 74.4% and 25.6% error.
19
Session Title Computational Intelligence 2
Location R.821
Time 15.15 – 17.15 WIB
Architecture and Implementation of static the needs can be addressed easily. There
Instant Messaging in Educational are high-speed transmission or broadband
services offered by a large number of operators
Institution through both conventional and fiber optic cables.
Budi Yulianto, Eileen Heriyanni, If the users are moving nomadically or are
mobile, then obtaining large-capacity
Lusiana Citra Dewi, Timothy Yudi transmission systems is not simple. For some
Adinugroho purposes, especially for small and medium-sized
Bina Nusantara University, Jakarta, Indonesia companies, they need to have alternative
Keywords:instant messaging, real-time chat, solutions that are economic and technically
xmpp, personal chat, broadcast message, feasible. Cellular service providers offer 3G
scheduled message. Internet services with wide coverage. This study
develops an application using 3G services to
Abstract:Development of communication provide broadband access that is economic and
technology on smartphones can be used to meet relatively simple. This solution uses multiple 3G
the needs of actual mass communication (real connection to transmit information at high speed
time chat), concise, and efficient in educational as if there is broadband channel capacity.
institutions, especially for students and lecturers. Information on a Web Server can be downloaded
This research aims to produce architectural by the parties concerned. The information
design and implementation of web and Android retrieval can obtain the necessary capacity using
based instant messaging (IM) which can be multiple 3G connections. The technique of
applied to educational institutions as a fast, bundling multiple lower speed channels to obtain
provident, and effective communication means. high-speed channel is called inverse
This study was conducted by collecting data multiplexing. In this research, the technique is
through questionnaires distributed among the simplified by using a router that has the ability to
students and the lecturers. The IM application is provide load balancing. This research was carried
developed based on Rational Unified Process out by conducting laboratory experiments and
(RUP) software development method. The field measurements. The experimental results
architecture and IM application are XMPP show that the concept of inverse multiplexing
protocol based that can be implemented on web through a number of channels with 3G services
and Android platform with personal chat, group can run well for downloading files.
chat, broadcast messages, scheduled messages,
and file attachments features. The application can Analysis and Design for Food
facilitate the communication from an educational Planning Mobile Application
institution to or between students and lecturers,
and gather students and lecturers’ phone number Afan Galih Salman, Sonya Rapinta
and email. Manalu,Natalia Chandra, Anggi Putra
Gomis
A Novel Broadband Line Bina Nusantara University, Jakarta, Indonesia
Construction Using 3G Service
Keywords:food planning mobile applications,
Lukas Tanutama, Rico Wijaya, Kevin manage, tracking, choosing, iOS.
Alexander, Agung Wiratama, Raphael Abstract:This study builds the system that allow
Indraswara users to plan their food consumption via their
Bina Nusantara University, Jakarta, Indonesia mobile phones.The system help user to manage
Keywords:Inverse Multiplexing, NHT, Mangler, and tracking history of their food consumption,
3G choosing food that suitable for their health, and
help user to select their favorite restaurant.
Abstract:Quite often, it is necessary to upload or Methodology is used in this research are analysis
download large files in a relatively short time method, design method, and literature study. The
and from or to locations that do not necessarily result is a food planning mobile application
have adequate infrastructure. If the location is based on iOS platform that help user to manage
20
and track their food consumption, to calculate & Reversible Data Hiding Technique on
choose balanced food that suitable for their body Jpeg Image by Quad-Tree
Review of Multi-Platform Mobile Segmentation and Histogram Shifting
Application Development Using Method Based On Android
WebView: Learning Management Rojali, Afan Galih Salman
System on Mobile Platform Bina Nusantara University, Jakarta, Indonesia
21
Session Title Computer Science 2
Location R.823
Time 15.15 – 17.15 WIB
Quadratic of Half Ellipse smoothing were tested using two-hidden layers of BPNN
technique for cervical cells FTIR architectures with three different epochs which
were [2-50-10-1, epoch 500]; [2-50-20-1, with
spectra in a screening system epochs 1000 and 1500]. The mean square error
Yessi Jusman, Nor Ashidi Mat Isa, Siew (MSE) is employed to measure the performance
of the classification task. The experimental
Cheok Ng, Siti Nurul Aqmariah Mohd results showed thatthe architecture [2-50-20-1,
Kanafiah, Noor Azuan Abu Osman epoch 1000] produced a good result with the
Department of Biomedical Engineering, Faculty of value of MSE was 0.00096341. Furthermore,
Engineering Building, University of Malaya, 50603 BPNN algorithm has provided a good model to
Kuala Lumpur, Malaysia
predict rainfall in Tenggarong, East Kalimantan -
Keywords:Cervical precancerous; smoothing Indonesia.
filter; feature extraction; and intelligent
classification Intelligent Kernel K-Means for
Clustering Gene Expression
Abstract:Fourier Transform Infrared (FTIR)
spectroscopy technology has been currently used Teny Handhayani, Lely Hiryanto
to study the structural changes of cells at the Computer Science Department, Tarumanagara
molecular level in a cervical cancer. However, in University, Indonesia
the FTIR data acquisition process, it has
Keywords:Kernel K-Means; Human Colorectal
undergone twice noise degradations. In this
Carcinomal; Unsupervised Clustering Algorithm;
study, to apply the FTIR spectra for input data
Tumor Classifier List
into classification tools, the FTIR spectra need to
be smoothed before feature extraction process. A Abstract:Intelligent Kernel K-Means is a fully
smoothing technique namely Quadratic of Half unsupervised clustering algorithm based on
Ellipse (QHE) filter was proposed for smoothing kernel. It is able to cluster kernel matrix without
the cervical cells FTIR spectra. The QHE filter any information regarding to the number of
was tested using 850 cervical cells FTIR spectra. required clusters. Our experiment using gene
The cervical cells FTIR spectra were corrupted expression of human colorectal carcinoma had
by 20, 25, 30, 25, 40, 45 dB of S/N. The shown that the genes were grouped into three
proposed filter achieved good performance for clusters. Global silhouette value and davies-
smoothing the corrupted cervical cells FTIR bouldin index of the resulted clusters indicated
spectra. that they are trustworthy and compact. To
analyze the relationship between the clustered
Rainfall Monthly Prediction Based on genes and phenotypes of clinical data, we
Artificial Neural Network: A Case performed correlation (CR) between each of
Study Tenggarong Station, East three phenotypes (distant metastasis, cancer and
Kalimantan - Indonesia normal tissues, and lymph node) with genes in
each cluster of original dataset and permuted
Mislan, Haviluddin , Sigit Hardwinarto, dataset. The result of the correlation had shown
Sumaryono, Marlon Aipassa that Cluster 1 and Cluster 2 of original dataset
Faculty of Mathematics and Natural Science, UNMUL had significantly higher CR than that of the
Indonesia permuted dataset. Among the three clusters,
Cluster 3 contained smallest number of genes,
Keywords:ANN, BPNN, rainfall, MSE but 16 out of 21 genes in that cluster were genes
listed in Tumor Classifier List (TCL).
Abstract:The accuracy of forecasting rainfall is
very important due to the current world climate
change. Afterwards, to get an accurate
forecasting of rainfall, this paper applied an
Artificial Neural Network (ANN) with the
Backpropagation Neural Network (BPNN)
algorithm. In this experiment, the rainfall data
22
Integrating Data Selection and comparison with some learning algorithms and
Extreme Learning Machine for the result showcases that average perform of our
proposed learning method is compete and even
Imbalanced Data Umi Mahdiyah, M. outperform of some algorithm in some cases.
Isa Irawan, Elly Matul Imah
Sepuluh Nopember Institute of Technology, Keputih,
Surabaya, 60111, Indonesia
23
Tuesday, 25th of August, 2015
Session Title Computer Science 3
Location R.821
Time 09.45 – 11.45 WIB
End-to-End Secure Protocol Design on Keywords:Low Stage Interconnection Network;
Live Messenger Application GreedyZero Algorithm; Conflict.
24
terms of fairness index and system throughput, increase data center. The large amount of costs
which is evaluated using simulation results. required to increase the number of server units.
Virtualization technology can be the perfect
Reliability Evaluation for Shuffle solution to resolve these problems. However, due
Exchange Interconnection Network to the high cost of a license,causing an open
source-based virtualization used as the main
Nur Arzilawati Md Yunus, Mohamed option, namely Proxmox. The application of
Othman virtualization based Proxmox, can maximize the
Faculty of Computer Science and Information use of resources, because the function of 3 units
Technology, Universiti Putra Malaysia, 43400 of physical servers can be enabled
Selangor, Malaysia simultaneously on 1 physical server unit.
Keywords:reliability; shuffle exchange; Fall Detection Algorithm to Generate
interconnection network; switching; multistage
Security Alert
Abstract:Shuffle-exchange networks (SENs)
have been generally considered as a convenient Benfano Soewito, Irwan, Anna
interconnection systems due to the size of their Antonyová, Fergyanto E. Gunawan
switching elements (SEs) and simple Bina Nusantara University, Jakarta, Indonesia
configuration. Evaluation of reliability
Keywords:accelerometer; android; smart phone;
performance has been attempted by researchers
security allert system
in the past. This paper is a depth study of
reliability evaluation in shuffle exchange Abstract:Sometime we experience events that
network. We propose a SEN with minus one we do not want, such as getting traffic accidents,
stage (SEN-) and compared with three other work accidents, falls while doing the activity and
types of SEN. The measurement includes three so on. At the moment we have an accident that
parameters; terminal, broadcast and network we may be di_cult, even we cannot contact
reliability. police or rescue ambulance. In addition we do
not know their phone number or perhaps
Optimizing Server Resource by Using circumstances we were so severe that we cannot
Virtualization Technology dial the rescue or police phone number. In this
paper, we introduce a system that can generate
Edwar Ali, Susandri, Rahmaddeni alerts or contact rescuers and police
STMIK Amik Riau, Jalan Purwodadi Indah km. 10
automatically when we are faced with a situation
Panam, Pekanbaru 28294, Indonesia
that is undesirable. The system will utilize the
Keywords:virtualization; resource; server; accelerometer sensor in the mobile devices
Proxmox (smart phone). We proposed fall detection
algorithm which use accelerometer to generate a
Abstract:Data and information needs for large signal. Our result shows that the false positive is
organizations, rely heavily on information about 30% if someone fall down with the smart
technology infrastructure support. One of the phone in the pocket, and about 1.5% if we drop
necessary supporting components is the the smart phone.
availability of a sufficient number of servers to
25
Session Title Computer Science 4
Location R.823
Time 09.45 – 11.45 WIB
Data Visualization Application for BCM2835 system on a chip (SoC). This device is
Analyzing Public Company Financial powered by 5v micro USB and will be running
Raspbian as its main operating system alongside
Statement with Python as the main programming language
Aulia-Absari Khalil, Ali Reza, Putu Aan used in this system. We are using Facebook
Graph API to access status updates from the user
Junaedi, Bayu Kanigoro to display it to the LCD screen.
Bina Nusantara University, Jakarta, Indonesia
26
A Literature Review: Readiness education. Understand the role of this factor
Factors to measuring e-Learning could help university management to implement
effective and efficient E-learning project. The
Readiness in Higher Education Purpose of the study is to discuss the theory of E-
Hetty Rohayani.AH, Kurniabudi, learning Readiness Factors and investigate the
readiness factors that have been found by
Sharipuddin previous researchers for measure e-readiness at
STIKOM Dinamika Bangsa, Jambi 36138, Indonesia
higher education. This study applies literature
Keywords: e-learning; readiness factors; higher review and meta-analysis as research
education methodology. Literature review conducts by
review the relevant articles with topic “e-learning
Abstract: E-Readiness is recognizing as one the readiness”. The study found that skills and
most critical aspect for achieving successfully attitudes are the most significant factors
implementation of E-learning programs in higher influences E-learning readiness.
27
Session Title Computational Intelligence 3
Location R.825
Time 09.45 – 11.45 WIB
The Application of Fuzzy Association adapted to promotion tweet. The results of this
Rule in Co-Movement Analyze of research, Naïve Bayes Classification accuracy
reached 90.31% used data testing from tweet
Indonesian Stock Price product and 80.91% from data testing tweet
Andi Asrafiani Arafah, Imam Mukhlash services, and increased engagement followers
Department of Mathematics, Faculty of Mathematics
reached 69%.
and Natural Sciences, Institut Teknologi Sepuluh
Nopember, Surabaya, Indonesia The Early Detection of Diabetes
Mellitus (DM) Using Fuzzy
Keywords: Co-Movement, Stock Price, Data
Hierarchical Model
Mining, Fuzzy, Association Rule;
Abstract: One type of investments in securities Rian Budi Lukmanto and Irwansyah. E
Bina Nusantara University, Jakarta, Indonesia
is stock as a sign of ownership for individual or
corporation within a company. For making Keywords: Early Detection; Diabetes Mellitus;
investment strategy and portfolio, investors Fuzzy Hierarchical Model
should pay more attention to the co-movement of
the stock price. Several methods can be used to Abstract: In 2013 the number of patients with
see moving of the stock price, one of them is data Diabetes Mellitus (DM) in the world has reached
mining. In this paper, association rule mining 382 million. It is estimated that the prevalence
algorithm is used to find the stock movement will increase 55% in 20351. As a form of our
relationship of inter-company in Indonesia. e↵orts to contribute to the prevention of this
Fuzzy approach is used as tools to categorize phenomenon we propose an application of
data based on the time and transactions sequence. computational intelligence by using fuzzy
Experimental results show that association rule hierarchical model that has the ability to perform
method can solve the problems. By using some early detection against DM. In order to achieve
values of minimum support, some strong the success of our propose method, we cooperate
association rules among companies can be with one of the eastern Jakarta hospital
obtained. laboratory in Indonesia as a facilitator of the data
that we need during research and conducting
Data mining of automatically interviews with two medical doctors at the same
promotion tweet for products and hospital as a form of knowledge acquisition
services using Naïve Bayes algorithm process. The architecture of our proposed method
is designed based on how a medical doctor
to increase twitter engagement concluded related to indication that someone has
followers PT. Bobobobo the potential against DM, which is the model has
been adjusted with the data we have obtained
James Immanuel Luke, Suharjito from the authorities in the laboratory. As a form
Bina Nusantara University, Jakarta, Indonesia
of evaluation that we do, we did a comparison of
Keywords: Data mining, tweet promotion, the data we have obtained from our method with
engagement followers, Naïve Bayes, witter the medical doctor decision which is equipped
with the data from laboratory, and the result is
Abstract: The number of user social media 87.46% of the 311 relevant data is equal to
Twitter in Indonesia giving benefits for medical doctor’s statement. In interpreting the
companies to promote products and services via conclusions that we get with the hospitals that
Twitter. In Twitter, to maximize the promotion cooperate with us, the results showed that the
it’s needed more followers. Through this method we propose has meet the needs of the
research data mining used to discovered e↵ectiveness and efficiency in performing early
follower’s trend information of products or detection against DM and can help people in
services to increase the engagement followers knowing the potential of DM since early.
through automatically tweet promotion.
Algorithm Naïve Bayes used to classified tweet Implementing DEWA Framework for
followers based on products or services, then Early Diagnosis of Melanoma
analyzed to get trend words and afterwards
28
Setiawan Hadi, Bernard Y Tumbelaka, Fuzzy Measure in Multiple Attribute
Budi Irawan, Rudi Rosadi Analysis
Mathematics Department Universitas Padjadjaran,
Jalan Raya Bandung Sumedang KM 21 Jatinangor, Anath Rau Krishnan, Maznah Mat
Sumedang 45363, Indonesia Kasim, Engku Muhammad Nazri Engku
Keywords: melanoma diagnostic; image Abu Bakar
processing; lightweight algorithm; computer Labuan Faculty of International Finance, Universiti
vision Malaysia Sabah, 87000 Labuan, Malaysia
Abstract: This paper proposes a simple yet Keywords:Choquet integral; fuzzy measure;
effective and integrated computer vision multiple attribute analysis
algorithm used for detecting and diagnosing the Abstract:Choquet integral operator is currently
earlier stage of melanoma. The framework is making inroads into many real multiple attribute
built based on three steps of integrated multi analysis due to its ability on modeling the usual
aspect approach: segmentation, filtering and interactions held by the attributes during the
localization steps. In the first step, user can select aggregation process. Unfortunately, the process
several color spaces and apply leaning and non- of identifying 2^n values of fuzzy measure prior
learning methods to segment the object. In the to employing Choquet integral normally turns
filtering step, morphological filter has been into a very complex one with the increasing
applied for image noise removal. In the number of attributes, n. On that note, this paper
localization step, connected component labelling mainly reviews on some of the methods that have
and K-means technique are used for objects been proposed in reducing the complexity of
classification. Type of cancer malignancy is identifying fuzzy measure values together with
determined based on a score calculated from their pros and cons. The paper begins with a
ABCD characteristics. Experiment has been discussion on the aggregation process in multiple
conducted successfully using skin cancer images attribute analysis which then focuses on the
taken from internet. This result proved that the usage of Choquet integral and its associated
developed framework can be used for supporting fuzzy measure before investigating some of the
the early diagnosing of cancer. In general, this fuzzy measure identification methods. A simple
research can contribute to the computer science numerical example to demonstrate the merit of
knowledge especially in field of computer vision. using Choquet integral and the indications for
future research are provided as well. The paper to
some extent would be helpful in stimulating new
A Short Survey on the Usage of ideas for developing simpler or enhanced
versions of fuzzy measure identification methods
Choquet Integral and Its Associated
29
Session Title Computational Intelligence 4
Location R.827
Time 09.45 – 11.45 WIB
Face Expression Detection on Kinect character recognition in structural approach. The
using Active Appearance Model and task of character segmentation and normalisation
is quite costly when processing large data,
Fuzzy Logic especially on off-line handwriting recognition
Sujono, Alexander A S Gunawan with structural approach. The main idea of this
Bina Nusantara University, Jakarta, Indonesia
paper is to model a handwritten character into
string graph representation. The purpose of those
Keywords:face expression, Fuzzy Logic, AAM, model is to provide ability in improving
FACS recognition accuracy without relying in
normalisation technique. The graph consists of
Abstract:One of interpersonal human several edges that indicate the connected
communication is facial expression which is used vertices. The vertices are the curves that make
to manifest emotions. If computers could the character. The curve is extracted by
recognize these emotional inputs, the interaction analyzing the character’s chain code, and it’s
between human and computers will be more string feature is created using certain rules. In
natural. Currently, video game is one of the this paper, the similarity distance between graph
applications that use facial expression detection is measured using approximate subgraph
to increase natural interaction. Kinect is motion matching and string edit distance method. The
sensor for game controller that can track the recognition experiment conducted by comparing
detected face using Active Appearance Model both methods on alphabet and number character
(AAM). AAM is the method that adjusts shape images taken from ETL-1 AIST Database. We
and texture model in a new face, when there is also did recognition accuracy comparison with
variation of shape and texture comparing to the another related works in number and alphabet
training result. The aim of this research is to handwritten character recognition. The
detect facial expression by observing the change recognition accuracy of levenshtein distance is
of key features in AAM using Fuzzy Logic. better than approximate subgraph matching. It
Fuzzy Logic is used to determine the current also has competitive performance with another
emotions based on prior knowledge derived from method in same class.
Facial Action Coding System (FACS). The
experimental results on user-generated dataset Uniform Traffic Patterns using
show that: (i) FACS does not provide any Virtual Cut-Through Flow Control on
information about the degree of muscle
activation, thus the degree of the key features
VMMN
have to infer from specific dataset, (ii) detection
Ala Ahmed Yahya Hag, M.M. Hafizur
accuracy of emotions depend on the kind of
emotion itself. Rahman, Rizal Mohd Nor, Tengku
Mohd Tengku Sembok, Yasuyuki Miura,
Structural off-line handwriting Yasushi Inoguch
character recognition using Dept. of Computer Science, KICT, IIUM, Kuala
approximate subgraph matching and Lumpur 50728, Malaysia
30
VMMN with virtual cut-through flow control An Examination of Character
under uniform traffic pattern. We found that the Recognition on ID card using
VMMN dynamic communication performance is
better than that of the hierarchical TESH network
Template Matching Approach
and its counter rival MMN. Michael Ryan, Novita Hanafiah
Bina Nusantara University, Jakarta, Indonesia
Evaluation of Recursive Background
Subtraction Algorithms for Real-Time Keywords:ID card; character; recognition; OCR;
Passenger Counting at Bus Rapid template; matching
Transit System Abstract:Identification card (ID cards) becomes
the main reference in obtaining information of a
Jonathan Samuel Lumentut, Fergyanto citizen. Some business sectors require the
E. Gunawan, Diana information contained in the ID card to perform
School of Computer Science, Bina Nusantara the registration process. In general, the
University, Jl. K. H. Syahdan 9, Jakarta 11480, registration process is still using a form to be
Indonesia
filled in accordance with the data on the ID card,
Keywords:Computer vision, Passenger counting which will then be converted into digital data by
system, Background subtraction, Bus rapid means of retyping the information. The purpose
transit of this research is to create a character
recognition system on the ID card where the
Abstract:This work discusses a method to count character recognition process included into four
the number of passengers waiting in Bus Rapid stages: pre-processing, text-area extraction,
Transit station. The proposed system relies on segmentation and recognition. The experiment
computer vision technique to monitor the includes some tests of greyscale, binarization and
movement of passengers crossing doors on the segmentation algorithm, as well as the
station. In this work, three background combination of those algorithms. Text area
subtraction techniques, namely, Running extractor showed satisfactory results of
Gaussian Average, Gaussian Mixture Model, and identifying text-area on the ID card, which can
Adaptive Gaussian Mixture Model, were used to scope all the entire area that consist of text. In the
count the passengers crossing an entrance on a segmentation stage, approximately 93% of
BRT station from a pre-recorded motion picture. character can be cut off correctly. The actual
The results indicates that the tree algorithms are character will be mapped to the template
able to identify the passenger crossing with a character using two algorithms where the
reasonable high level of recall and but low level division grid of each of them is different.
of precision. This result indicates that many false Nevertheless, the recognition process of applying
positives are identified by the three algorithms. the template method matching still needs to be
In addition, the empirical data indicate that the improved back.
three algorithms tend to have better performance
with higher value of the learning rate.
31
Session Title Computer Science5
Location R.821
Time 12.45 – 14.45 WIB
A Study Literature of Critical Success influence acceptance of e-payment technology.
Factors of Cloud Computing in Through this model, researchers can have a more
accurate explanation of the consumer behavior
Organizations not only in terms of acceptance of the
Lola Yorita Astri technology, but other factors considered
STIKOM Dinamika Bangsa, Jl. Jend Sudirma Thehok,
influential on consumers such as culture and
Jambi 36133, Indonesia perceived security in the origin country. This
model will be used to examine consumer’s
Keywords:Critical Success Factors, Cloud behaviour in Indonesia.
Computing, Organizations
Aspect Extraction in Customer
Abstract:The aim of this study is to identify the
Reviews Using Syntactic Pattern
critical success factors that impact the
organization to use cloud computing in their Warih Maharani, Dwi H. Widyantoro,
business processes. The author conduct a
Masayu Leylia Khodra
literature review study to identify the factors by
Bandung Institute of Technology, Bandung, Indonesia
collecting thirty papers from reputable database
journal such as emerald, science direct, IEEE and Keywords:aspect extraction; opinion mining;
Google Scholar. The author was using “cloud syntactic pattern.
computing” as a keyword. After the author
reviewed and analyzed the abstract of each Abstract:Aspect extraction is an important step
paper, the author selected nineteen papers that in opinion mining, to generate list of object,
related to this topic. The author found that cost aspect and its opinions. Therefore, previous
reducing, flexible, redundancy and reliability, studies still give an opportunity to find the
scalability, collaboration, efficiency, virtually pattern of an aspect and opportunities in terms of
and availability as critical success factors as the aspect extraction performance. This paper
impact of the use of cloud computing for proposes syntactic pattern based on features
organizations. Further research can be conducted observation to extract aspects from unstructured
to validate this finding by developing an review, accompanied with a comprehensive
instrument and take a survey of organizations. analysis of varied pattern. This paper also
provides some technical issues that arise based
A Model of Factors Influencing on performance evaluation and analysis using
Consumer’s Intention to Use E- syntactic pattern extraction. The experimental
results showed that the syntactic pattern
Payment System in Indonesia
approach had several weaknesses that need to be
Junadi, Sfenrianto improved.
Bina Nusantara University, Jakarta, Indonesia
Improvement of Demand Forecasting
Keywords:E-Business, E-Commerce, E- Models with Special Days
Payment, Consumer’s Intention
Cagatay CATAL, Ayse FENERCI,
Abstract:In the recent years, electronic
Burcak OZDEMIR, Onur GULMEZ
commerce (e-commerce) in Indonesia has
Istanbul Kültür University, Department of Computer
growing rapidly. E-commerce became an Engineering, Istanbul, 34156, TURKEY
opportunity for company to increase their selling.
Electronic payment (e-payment) was developed Keywords:Time series forecasting; exponential
to facilitate e-commerce transactions beetwen smoothing; ATM cash withdrawal forecasting;
consumer and seller. In this study, we will NN5 competition.
investigate consumer’s intention to use e-
payment. The proposed research model was Abstract:Forecasting ATM cash demands is a
developed by extending the unified theory of challenging research task. When the forecasting
acceptance and use of technology (UTAUT) with results are too high compared to the real demand,
culture and perceived security into the model, in this will cause excessive cash at bank’s ATMs
order to determine the significance factors that and the cost of lost interest. On the other hand, if
32
the forecast is too low, this will result in Strengthening of Innovation Network
dissatisfaction of bank customers because of to Improve the Regional
cash-outs. Although recent studies focused on
new computational intelligence techniques for
Competitiveness towards Social
cash demand forecasting, this paper advocates Transformation (Case Study in
the enhancement of the dataset to improve the Cimahi)
prediction performance of forecasting models. In
this study, 19 special days in the UK have been Jarot S. Suroso
considered and NN5 competition dataset, which Bina Nusantara University, Jakarta, Indonesia
includes 735 daily withdrawal amounts from 111 Abstract:Development of innovation, diffusion
ATMs in UK, was updated with these calendar can be used to increase the productivity or
days. After preprocessing step and application of competitiveness of the institution or nation. So,
exponential smoothing method, we achieved strengthening the innovation system becomes a
21.57 % average SMAPE for 56 days forecasting very important thing to do in many countries,
horizon. This study shows that good forecasting including Indonesia. In the era of globalization,
results can be reached by improving the data where the development of science and
even if we do not apply complex computational technology is so dynamic, the development of
intelligence techniques. innovation system in a country is no longer
possible. To succeed in the innovation system
Library System Development
development, development system stakeholders
Implementing Integrated Book must hold and promote the improvement of five
Circulation for Interlibrary Loan factors: linkages, partnership, network, positive
interaction and synergy as a key success factor.
Cinthya Dwi Lindy, Elisabeth Oktaviani, In the innovation network shows the success of
Willy, Yen Lina Prasetio innovation depends on the effective interaction.
Bina Nusantara University, Jakarta, Indonesia The interaction showed linkages for
strengthening regional innovation system needs
Keywords:Integrated Book Circulation; Inter-
to be cultivated in supporting innovation and
Library Loan; Library.
business activity and then become an innovation
Abstract:The purpose of this research is to network. Interactions and relationships can be
develop a library system by implementing made by advances in information and
integrated procurement flow, return and communications technology, where it is also one
borrowing books, so that the inter-library loan important factor to establish science and
can be done in an integrated manner, with the technology. Advances in information and
hope to facilitate members to borrow varied communications technology contribute to
books thereby increasing library transactions. promoting and realizing the potential of the
The methods used include the method of analysis region in facing and overcoming obstacles and
in the form of literature and field studies to challenges of region. Based on the observations
observe the activities of the running system, of the importance of an innovation network in
interviews with stakeholders, user surveys and the region will need to be an analysis of inter-
design method using the Unified Modeling actor network conditions that support the
Language, and design the system architecture strengthening of the Regional Innovation
and features. The result of this research is the System. For the pilot area is the town of Cimahi
development of the library system by (West Java).
implementing an integrated flow of circulation of
books between libraries. The conclusions of this
research are to implement an integrated book
circulation between libraries, and then the inter-
library loan can be done in an integrated manner.
33
Session Title Computer Science6
Location R.823
Time 12.45 – 14.45 WIB
A New Modified Caesar Cipher Jovita, Linda, Andrei Hartawan, Derwin
Cryptography Method with Legible Suhartono
Ciphertext from a Message to Be Bina Nusantara University, Jakarta, Indonesia
Encrypted Keywords:Question Answering System; Vector
Space Model; Information Retrieval
Benni Purnama, Hetty Rohayani.AH
STIKOM Dinamika Bangsa, Jl. Jend Sudirman Abstract:Question answering system is an
Thehok, Jambi 36133, Indonesia information retrieval system in which the
expected response gives directly the answer as
Keywords:substitution, Caesar cipher,
requested rather than set of references which
Cryptography, plaintext, ciphertext
have possibilities as the answer. The objective of
Abstract:In a secret message, cryptography is this research is to represent knowledge and
more directed to the encrypted message while retrieve the answer for a given question by
steganography is more directed at the hidden utilizing Vector Space Model. While some
message. However, both methods have the same mechanisms have been developed in question
goal, namely the attempt to conceal the message. answering system such as N-gram, template-
On the other side, it turns out the use of driven response, reversible transformation, etc.,
cryptography can often be solved / translated by an attempt to use Vector Space Model is
another person or cryptanalyst. This is possible conducted. The query will be compared to the
because usually a text message unreadable gives knowledge based by measuring their similarity.
someone suspicion that the text message contains Data sample to test the model comes from 2
a certain meaning for the owner of the message. Ministers of Indonesia; they are The Minister of
Thus, the cryptanalyst attempts to break the Education and Culture and The Minister of
encrypted message. While the use of Tourism and Creative Economy Culture. In the
steganography owner of the information is experiment, 150 questions are given to the
difficult to determine the method or pattern to be system. Each question words are given 25
formed in composing the message that will be questions. The experiment gives 0.662 of recall,
hidden. In this paper, the authors modify the 0.548 of precision, and 0.580 of F-measure. But
Caesar cipher method that produces ciphertext unfortunately it needs around 29 seconds in
that can be read. With the ciphertext that can be average to give the answer to the users.
read, then cryptanalysis not suspicious of the
ciphertext. Caesar cipher modification is done by Logistic Models for Classifying Online
replacing the alphabet into two parts, the vocals Grooming Conversation
were replaced with the alphabet vocal too, and
the consonant alphabet was replaced with a Hady Pranoto, Fergyanto E. Gunawan,
consonantal alphabet. However, there are some Benfano Soewito
alphabet consonants are not replaced, this is Bina Nusantara University, Jakarta, Indonesia
because the frequency of the alphabet is rarely
Keywords:binary logistic model, grooming
used in an Indonesian text. From the test results
conversation,Sexual offender, Automatic
obtained ciphertext that can be read. With the
Classification
ciphertext that can be read, then the cryptanalyst
not suspicious of the message so that the Abstract:This work intends to establish a
cryptanalyst does not attempt to solve the logistic mathematical model to classify whether
ciphertext. an online conversation is or is not a grooming
conversation. This work is important for a
number of reasons: the increasing number of the
Internet users across the globe, the increasing
number of social media, increasing in the number
Using Vector Space Model in Question and types of crime on the Internet, and the crime
of sexual abuse in children impacts both
Answering System physically and physiologically. Online grooming
is the most reported suspected Internet activities
34
in 2009–2010 according to Child Exploitation Stavin Deeswe and Raymond Kosala
and Online Protection, which is a part of the Bina Nusantara University, Jakarta, Indonesia
UK’s Home O_ce Serious Organized Crime
agency. Around 160 online script conversations Keywords:visualization, web search results, user
are analyzed to determine characteristics of a interface, web graphics library.
grooming conversation. Those scripts are Abstract:There are some problems with the
obtained randomly from http://www.perverted- current popular search engines, namely filter
justice.com and www.literotika.com. The bubble and the lack of visual representation. The
characteristics are divided into 20 types. The result of a survey that we conducted shows that
scripts are divided into two sets: 100 scripts for users were longing for a higher performing
the training set and 59 scripts for the testing set. search engine with a holistic view of the search
As the results, five most relevant grooming results. This work is aimed to elevate the
characteristics are identified from the paired t- effectiveness of web searching results by
test, and a logistic model is established on this incorporating visual and social representation
basis. The model is evaluated using the testing into the results. We have designed and
data set, and the results show that the model has developed a social and integrated search
relatively good performance with 95% accuracy, interface that utilizes three-dimensional image
96% true positive, 4% false positive, 93% true renderer to deal with the above issues. Social
negative, and 7% false negative. search results are incorporated with the basic
search engine results, while giving users the
capability of navigating and visualize through the
search results using the three-dimensional image
renderer. We tested the system by administering
a survey to measure users’ experience and
satisfaction. It can be concluded from the result
of the survey that in general the users were happy
with how the search interface works, including
the social media search results and the three-
dimensional visualization. The system was able
An Integrated Search Interface with to enhance the users’ experience when searching
3D visualization for some general topics by having a better
visualization.
35
Session Title Computational Intelligence5
Location R.825
Time 12.45 – 14.45 WIB
HMM as an Inference Technique for distinguishing features than the original image.
Context Awareness In addition, our method does not require any
prior segmentation process. In this paper, we also
Ahmad Faridi, M.M. Hafizur Rahman address the reduction of computation overhead
Department of Computer Science, IIUM, Kuala using saliency maps.
Lumpur and 50728, Malaysia
Reversible Data Hiding Technique on
Keywords: context awareness; HMM JPEG Image by Quad-Tree
Abstract: Context awareness is an important Segmentation and Histogram Shifting
element in the pervasive and ubiquitous Method Based On Android
computing. It involves the ability of the
computing system to be aware of the context in Rojali, Afan Galih Salman
which a particular target user is experiencing. Bina Nusantara University, Jakarta, Indonesia
This involves the location in which the target is,
Keywords:histogram shifting, quad-tree
the activity that the target is doing, the identity of
segmentation, android.
that target and the time in which the activity
occur. Once these two elements are known we Abstract: This research apply data hiding
propose the use of HMM to predict and infer the technique in reversible manner into Android
context of the user. application by means of Histogram Shifting with
addition maximum and minimum point so that it
Cattle Race Classification Using Gray expected to be capable of hiding high capacity
Level Co-occurence Matrix data. The extracted image can use again
Convolutional Neural Networks Histogram Shifting reversibel Algorithm. After
process of embedding secret data the resultant
Mayanda Mega Santoni, Dana Indra distorsion is relative low. Combining is carried
Sensuse, Aniati Murni Arymurthy, on by scheme of hierarchically segmentation
Mohamad Ivan Fanany (Quad-tree Segmentation) which able to
Faculty of Computer Science, University of Indonesia, hierarchically partition input of the main image
Depok, West Java 16424, Indonesia into several size of block based on various pixel
under value of maximal capacity criterion for
Keywords: Convolutional Neural Networks every block that is partitioned. These blocks is
(CNN); Gray Level Co-occurrence Matrix organized to be a tree structure for every block
(GLCM); e-Livestock Indonesia; Cattle; that is represented. Moreover the secret data and
the partition tree information is embeded in
Abstract: In e-Livestock management system,
blocks of the image where everey blocks are not
practical and accurate cattle race identification is
squeezed. Using the methods which will be
paramount. This paper presents a cattle race
implemented to the coloured image it is expected
identification system from their images. We
the capacity of data insertion will increase
propose a deep learning architecture, which is
significantly.
called as Gray Level Co-occurrence Matrix
Convolutional Neural Networks (GLCM-CNN),
to semi-unsupervisedly identify a cattles race
given thousands of its images with complex
background settings. We introduce and evaluate
GLCM features, i.e., contrast, energy, and
homogeneity into CNN learning for GLCMs
capability to recognize pattern with diverse
variations, robustness to geometric distortion,
and simple transformation. Our experiments
show that GLCM-CNN is gives higher
classification accuracy and requires less number
of learning iterations than the original CNN. In
our approach, the data input layer has better
36
The Implementation of Hand extraction method. The challenging issues that
Detection and Recognition to Help arise are due to the highly symmetrical and
repetitive properties of batik patterns. The Hough
Presentation Processes transform, as an evidence-based method of object
Rhio Sutoyo, Bellinda Prayoga, Fifilia, detection, is applied to handle mismatched
keypoints resulting from symmetrical and
Dewi Suryani, Muhsin Shodiq repetitive patterns of batik. On a collection of
Bina Nusantara University, Jakarta, Indonesia
120 batik images generated from 20 basic batik
Keywords: Presentation, Hand Detection, Hand patterns, the proposed method shows an
Recognition, Computer Vision. improvement over the original SIFT matching
method with an equal error rate of 8.47%.
Abstract: This research was conducted with the
aim of utilizing the human hands as an object to Batik Image Classification Using
operate computers. It is intended to support and Treeval and Treefit as Decision Tree
use technologies especially in the field of Function in Optimizing Content Based
education for helping teachers to do presentation
with ease. The program is developed by using a
Batik Image Retrieval
science field of computer vision, as well as
Abdul Haris Rangkuti, Zulfany Erlisa
additional libraries which are: FLTK, OpenGL,
and OpenCV. In order to use this program, the Rasjid, Djunaidy Santoso
Bina Nusantara University, Jakarta, Indonesia
presenters need to have a webcam and a
projector. The webcam will be used to recognize Keywords:Batik, treeval, treefit, approximation
the shape and the pattern of the presenters’ coefficient, Wavelet Transform, Invariant
hands. Furthermore, the program will send moment.
signals to the computers based on the recognized
pattern. The result of this research is a program Abstract:This research is to increase the
that can improve the teaching process of percentage of similarity and to increase the speed
teaching/presentation. of the retrieval of characteristic of batik image
which is the texture and shape. In order to obtain
Automatic Indonesian’s Batik Pattern an optimal result, the classification process is
Recognition using SIFT Approach performed using a decision tree with treeval and
treefit function, where the value used is the result
Ida Nurhaida, Ary Noviyanto, Maruli of the image feature extraction. For this image
Manurung, Aniati M. Arymurthi extraction, the values that originate from the
Mercu Buana University, Jalan Raya Meruya Selatan, approximation coefficient that uses the wavelet
West Jakarta, 16550 transform method deubecheuss level 2 and
invariant movement. The research is performed
Keywords:Batik; motif; SIFT; voting; Hough on 7 types of pattern and 225 images. The result
transform using 5 types of batik patterns namely lereng,
Abstract:Batik is a traditional cloth with unique parang, kawung, nitik and truntum using 20 test
patterns applied to fabric using a wax-resist data on each pattern, has a similarity percentage
dyeing technique. Aside from preserving this rich above 80 - 85 percent. For 2 other patterns which
cultural heritage, the automated recognition of is mega mendung and ceplok using 10 data on
Batik patterns would enable many interesting each pattern, has a similarity percentage above
applications. This paper introduces an approach 30 – 40 percent only. Based on the result, further
to batik pattern recognition using the Scale research is required to using other methods and
Invariant Feature Transform (SIFT) as a feature functions.
37
Session Title Computer Science7
Location R.821
Time 15.00 – 17.00 WIB
Customer Service Information System language in windows form application. Several
for a Call Center softwares are used to check the validity of the
multiple linear regression computational output
Sartika Kurniali, Titan in the DSS. The multiple linear regression
Bina Nusantara University, Jakarta, Indonesia computation is done using Ordinary Least Square
(OLS) method and its computation comes from
Keywords: call center; web; customer the discretization of two most known growth
relationship management; customer service models, namely logistic growth model and
Gompertz growth model. We discretize the
Abstract: As one of the customer relationship
models in terms of yield effort variables and used
management tools, a call center acts as an
the resulting equations as the bases for
interface between the customers and the
computing the intrinsic growth rate r and the
company. The aim of this case study is to design
carrying capacity K parameters which are the
a web based customer service information
main ingredients in the MSY formula. Those
system to improve service quality and efficiency
models are also used as two selection toolsplaced
in a call center. The results are based on a single
in the main menu of the software. We use an
case studying a certain manufacturer of ceramic
existing published data as an example to estimate
sanitary wares and plumbing hardwarecompany
the growth parameters.We also compute the
in one of the countries it operates. Considering
Maximum Sustainable Yield (MSY) for each
there were several significant issues which
model which represents the maximum amount of
directly affect the level of customer satisfaction.
allowable biomass extracted from the fish
The objectives of the system are to manage the
population without harming the sustainability of
technician schedule to do a visit based on the
the fisheries. Technically it suggests the value of
customer preference, to facilitate better
the maximum sustainable yield as a decision to
escalation of unclosed processed problems after
the harvester in managing the population and is
certain duration of time and to generate various
often represented in a function of the growth
types of reports for the use of the management.
parameters of the harvested population. Knowing
Furthermore the ability to enable the system to
the right growth parameters of the population is
be used by new call center planned to be opened
critical in determining the MSY, since the MSY
in different location was added. The proposed
is not stable. Hence, using an inaccurate values
solution also facilitated mobile usage for more
of growth parameters is likely detrimental in
significant process improvements.
applying the MSY to the real fisheries. Our DSS
A Decision Support System for has a contribution as a tool in reducing the error
in calculating the growth parameters and the
Estimating Growth Parameters of
MSY. We found that the results are in agreement
Commercial Fish Stock in Fisheries with the known literatures.
Industries
Asep K. Supriatna, Agung Pre
Ramadhan, Hennie Husniah
Department of Mathematics, Faculty of Mathematics
and Natural Sciences, Universitas Padjadjaran,Jalan
Raya Bandung Sumedang Km. 21, Jatinangor-45363,
Indonesia
38
Collaborative Social Network Analysis and uses tuning parameters. The weight relations
and Content-based Approach to are obtained from the number of relations as
following/follower, mention and reply. Tuning
Improve the Marketing Strategy of parameters are parameters which are used to set
SMEs in Indonesia the influence of both degree and strength to the
degree centrality measurement results. Based on
Warih Maharani, Alfian Akbar Gozali test results, the node who has a high strength
School of Computing, Telkom University Bandung
value is derived from weight relations which are
40257, Indonesia
obtained from mentions and replies.
Keywords: Social Network Analysis (SNA);
centrality measurement; content-based; user- Using Social Networks: Facebook
based Usage at the Riau College Students
Abstract: Social Network Analysis (SNA) has Erlin, Triyani Arita Fitri, Susandri
been applied in several case studies. SNA is Department of Informatics Engineering, STMIK Amik
applied to enhance the company's marketing Riau, Pekanbaru, 28294, Indonesia
strategy as well as small and medium businesses.
This research proposes a collaborative model Keywords: social networks; facebook usage;
using content-based and user-based approach, students
with the centrality measurement methods. Abstract: According to the official report release
Content-based approach tends to focus on tweet by facebook through the site
content analysis of the existing nodes in a http://www.checkfacebook.com/, as of March 1,
network, while the user-based approach focuses 2013, the number of facebook users in Indonesia
on the connections between users in the network is 47.165.080 million. In terms of the age, the
twitter. The model will combine the advantages composition of the majority of facebook users is
of collaborative content-based and user-based dominated by age 18-24 years with the number
approach, to find the most influential people in a of users is 20.197.820 million (42,82%) of total
twitter network to make the dissemination of users, where this age is the age of the students in
information more effectively and efficiently. the college. With the number of users is
increasing from year to year and it is dominated
Degree Centrality for Social Network by age students, encourage the researchers to
with Opsahl Method conduct an empirical study on the use of
facebook among students. The purposes of this
Yoga Yustiawan, Warih Maharani, study is to analyze and explore the use of
Alfian Akbar Gozali facebook among students; why, how much, and
Bina Nusantara University, Jakarta, Indonesia how students use facebook and the potential
Keywords: social network; degree centrality; educational value of facebook. Researchers
opsahl method; tuning parameter release online survey that consists of 30
questions in a questionnaire. A total of 329
Abstract: In this paper we study how to respondents from 2 colleges in Riau has given
determine the nodes that most influential to a feedback. Finding shows that most of the
node in the network. Social Network Analysis students have a facebook account before entering
(SNA) can measure the centrality of a node in the college (95.14%) and spend time less than 1
order to obtain an influential nodes in the hours per day (45.59%) and logged onto the
dissemination of information. One of the facebook site several times per day. Furthermore,
centrality measurement that can be applied is facebook provides positive benefits in an
degree centrality. In this research, the method educational environment, particularly, simplify
used is Opsahl method, combines two indicators, in information sharing as well as file sharing
the number of neighborhood (degree) and the within the group.
amount of weight relations (strength) of a node
39
Session Title Computer Science8
Location R.823
Time 15.00 – 17.00 WIB
Using Augmented Reality to Enhance book, battle (PVE), crafting, mamochi evolution,
Aetherpet, a Prototype of Social Game farm, cooking and quest. In conclusion, "Tales of
Mamochi" is a game application which is
Febndy Kwik, Raymond Bahana entertainable. It has an explosive story, gameplay
Bina Nusantara University, Jakarta, Indonesia and vivid interface which becomes the main lure
of selecting this game.
Keywords: social games; augmented reality;
virtual pet; aetherpet Dynamic Difficulty Adjustment in
Abstract: The objective of this research is to
Tower Defence
create a social game that can be shared not only
Rhio Sutoyo, Davies Winata, Katherine
by digital means but also by non-digital means
while at the same time providing updated Oliviani, Dedy Martadinata Supriyadi
Bina Nusantara University, Jakarta, Indonesia
information. The same utilizes augmented reality
(AR) technology and a cloud marker recognition Keywords: dynamic game balancing, tower
system and allows creations of unique marker for defence, dynamic difficulty adjustment,
each player without the need to do an update computational intelligence
every time. Aetherpet is a virtual pet game
designed to become a prototype in implementing Abstract: When we play tower defence game,
augmented reality technology in mobile gaming. generally we repeat the same stages several times
This application is developed for the Android with the same enemies. Moreover, when the
platform and Vuforia library. The marker image players play a stage that is ridiculously hard or
generated from the application is converted into way too easy, they would probably quit the game
features; that can be detected on a gray scale because it is moderately frustrating or boring.
marker image. The prototype result shows that The purpose of this research is to create a game
augmented reality is possible to be implemented. that can adapt to the players’ ability so the
There are only small restrictions on the difficulty of the game becomes dynamic. In other
implementation such as incompatibility of some words, the game will have different difficulties
features and requirement for a reliable server to of levels according to the players’ ability. High
handle the game information processing. difficulty levels will be set if the players use
good strategy and low difficulty levels will be set
Game Development “Tales of if the players use bad strategy. In this work, we
Mamochi” With Role Playing Game determine the difficulties based on players’ lives,
Concept Based on Android enemies’ health, and passive skills (skill points)
that are chosen by the player. With three of these
Agnes Kurniati, Nadia, Fidelson Tanzil, factors, players will have varies experience of
Fredy Purnomo playing tower defence because different
Bina Nusantara University, Jakarta, Indonesia
combination will give different results to the
system and difficulties of the games will be
Keywords: Game, RPG, Android different for each gameplay. The result of this
research is a dynamic difficulty tower defence
Abstract: The research objective is to create, game, dynamic difficulty adjustment (DDA)
design and develop game “Tales of Mamochi” document, and gameplay outputs for best,
with RPG genre which is expected to be average, and worst strategy cases.
entertaining and highly enjoyable to play in
leisure time. This game has a partner (Mamochi)
which assists the player to fight the ghost
monster. Research methods used include method
of analysis (literature review, questionnaire and
analysis of similar type application), and method
of design is scrum method. The result is a game
which is named “Tales of Mamochi" with 2D
graphic. "Tales of Mamochi" game has several
feature, such as character selection, collection
40
A Personal Agents in Ubiquitous computing, and artificial intelligence.There are
Environment: A Survey different methods and framework are proposed in
previous research to obtain and enhance agent’s
Michael Yoseph Ricky, Robin Solala performance for better recommendations. This
Gulo research aims to present comparison previous
Bina Nusantara University, Jakarta, Indonesia
research based on personal agent in different
areas for understanding of proposed framework
Keywords: Personal Agent;Collaborative design, architecture and its implementations.
System; Intelligence Agent; Adaptive Agent. Personal agent can be applied to analyse and
assisting in completing task especially for
Abstract: A personal agents can be implements solving one purpose, and multi agents system can
in various areas. The previous work has been be applied at education, industrial, commercial,
conducted in website and mobile in governmental, military, and entertainment
corresponding to information retrieval, mobile applications for solving multi purposes
41
Session Title Computer Science9
Location R.825
Time 15.00 – 17.00 WIB
A Perception Model of Spam Risk From the result of the experimentation, the
Assessment Inspired by Danger ANPR is able to detect and translate the license
plates into a form of text in less than one second
Theory of Artificial Immune System with 100% accuracy for high quality image,
Kamahazira Zainal, Mohd Zalisham Jali 82.6% for medium quality and 44.5% for low
Universiti Sains Islam Malaysia (USIM), Nilai, Negeri
quality image. Series of analysis that the ANPR
Sembilan, Malaysia program situates involves; analysis on the ratio
of the license plate, experimentation on the
Keywords: SMS Spam; Danger Theory; Risk distance of license plate detection process,
Assessment; Severity Determination, Spam comparison between binary calculation methods
Prioritization using Adaptive Threshold and Global Threshold,
and overall system examination. The result
Abstract: This present paper relates Danger
retrieved from the conducted analysis can be
Theory of Artificial Immune Systems, which has
considered as a part of the ANPR system
been introduced by Polly Matzinger in 1994 with
the application in risk assessment. As to relate Design of Mobile Robot with
the concept of Danger Theory in risk assessment,
Navigation Based on Embedded Linux
a situation of determination severity level for
detected Short Messaging Service (SMS) spam is Khafizuddin Azazi, Rendy Andrean,
applied. However, further testing is needed as to
Wiedjaja Atmadja, Handi M, and
demonstrate the explained concept. Danger
Model that based on the idea of the immune Jonathan Lukas
system is appear to be suitable as the Bina Nusantara University, Jakarta, Indonesia
fundamental principles and the most generic Keywords: Mobile Robot; Navigation;
available solution as to assimilate its theory into Embedded Linux
the risk assessment environment especially that
involve severe or hazardous impacts. Abstract: The purpose of this research is to
build and design a mobile robot that use a
Designing License Plate Identification navigation system based on embedded Linux.
through Digital Images with OpenCV The method of this research is by literature
review method, experiment method and
Abdillah Komarudin, Ahmad Teguh designing method. Analysis of the research will
Satria, Wiedjaja Atmadja be done by collecting data and information from
Bina Nusantara University, Jakarta, Indonesia the reading of sensors that is used and compare
the information that we get with the actual
Keywords: Digital images; ANPR; Adaptive condition. The sensors are distance sensor IR
Threshold; Global Threshold Range, direction sensor digital compass module,
Abstract: The aim of this research is to design camera and comparing latency of different Linux
and analyze the License Plate Identification kernel. The result that we get are like the best
program mediated through Digital Images or reading distance of the distance sensor which is
Automatic Number Plate Recognition (ANPR), the IR Ranger are ±3-30 cm, digital compass
especially by using desktop peripheral. In doing module can read the value of a direction and
so, license plates attached, especially, on cars produce the value well if there is not any material
will be the test subject of this research. The that contains magnetism that can disturb the
ANPR is already implemented within the barrier reading of digital compass module, camera can
gate parking system. It is able to record the data detect object well by their color and by using the
of the vehicles that come in yet it doesn’t result of IR Ranger reading and digital compass
necessarily recognize or identify the license module, robot can work and move independently
plates installed on the vehicles. The fundamental in tracing the way and keep distance with the
goal of the ANPR program itself is actually to object.
utilize digital image identification system in
order to identify every single vehicle that goes in
and out through the barrier gate parking system.
42
CodeR: Real-time Code Editor shoreline protection through the Bragg scattering
Application for Collaborative mechanism. As well known, a relatively small
amplitude of sinusoidal beds can reduce the
Programming amplitude of incident waves effectivelly, due to
Aditya Kurniawan, Aditya Kurniawan, Bragg resonance. Bragg resonance will occur if
the wavelength of the monochromatic wave is
Christine Soetanto, Joe Erik Carla twice the wavelength of sinusoidal beds. We
Wijaya apply the multiple scale asymptotic expansion
Bina Nusantara University, Jakarta, Indonesia method to the linear Shallow initial value
Keywords: Code Editor, Real-time, Web Socket, problem for sinusoidal beds. The effect of Bragg
Application, Collaborative Programming resonance pass through sinusoidal beds has been
studied for surface displacement of water waves.
Abstract: The world of Internet is growing We found that a larger amplitude disturbance
rapidly, many applications that previously leads to larger reflected wave amplitude. This
created on the desktop start moving to the web. result explains that the long shore sandbar indeed
Many applications could be accessed anytime can reduce the amplitude of incident wave.
and anywhere easily using Internet. Developers Actually, wave’s propagation not only derives
need tools to create their applications; one of from surface displacement, but also from
them named code editor. The purpose of this potential velocity. At the end, we show that the
research is to design and develop a real-time sinusoidal beds can reduce the potential velocity
code editor application using web socket of incident wave.
technology to help users collaborate while
working on the project. This application provides Testing Division Rings and Fields
a feature where users can collaborate on a project Using a Computer Program
in real-time. The authors using analysis
methodology which conducting on a study of the Ricky Aditya, Muhammad Taufiq
current code editor applications, distributing Zulfikar, Ngarap Imanuel Manik
questionnaires and conducting on literature Bina Nusantara University, Jakarta, Indonesia
study. CodeR is a web application that provides
workspace to writing, perform, display the Keywords:Abstract Algebra; Division Rings;
results of the code through the terminal, and Fields; Computational Algebra
collaborate with other users in real-time. The Abstract:Abstract algebra is a branch of
application main features are providing mathematics which is studying algebraic
workspace to make, execute and build the source structures of sets with respect to some operations
code, real-time collaboration, chat, and build the on them. Each structure has its own axioms and
terminal. This application supports C, C++, and properties. In some cases, to test what kind of
Java programming languages. structure is a given set and an operation is
difficult to be done manually. To help this, an
Potential Velocity of Water Waves application program to test algebraic structures is
Propagation with Small Bottom developed. In this article, we focus on two
Undulation structures: division ring and fields, and an
application program to test them is created by
Viska Noviantri, Wikaria Gazali using Java, an open-source based programming
Bina Nusantara University, Jakarta, Indonesia language. This application program provides
Keywords:Bragg Resonance, potential velocity, testing of various input of finite set such as
sinusoidal beds integers, matrices and alphabets. By this
application, testing of algebraic structures can be
Abstract:Basically, when a wave meets a done faster than the manual one and its results
different depth, it will scatter into a transmitted are accurate. In this article, we focus on testing
wave and a reflected wave. In this paper, we division rings and fields, together with some
study the relevance of sinusoidal beds as examples.
43
Map of Anggrek Campus
44
Venue
Place Anggrek Campus, BINUS University
Address Jl. Kebon Jeruk Raya No. 27, Kebon Jeruk, Jakarta Barat 11530, Indonesia
Telp. : (62 - 21) 534 5830
Nearest Bus and Train Station
Train Station to Using KRL Jabodetabek - Commuter Line, make a stop at
Anggrek Campus Palmerahstation (Green Line). From there, use a public car transportation
(Mikrolet) number M11 to Kemanggisan. Then, stop at BINUS
University Anggrek Campus.
TransJakarta (Bus)Station
Using TransJakarta (Bus) from Corridor 9 (Pluit – Pinang Ranti), make a
stop at Petamburanstop.From there, use a public car transportation
(Mikrolet) number M11 to Kemanggisan. Then, stop at BINUS
University Anggrek Campus.
*the map of train and transjakarta (bus) are printed in the following pages
45
Train Station Map
46
Busway Station Map
47
Excursion Tourism
Schedule:
06:30 – 07:00 Preparation at BINUS Anggrek
07:00 – 08:00 Heading to Monas
08:00 – 10:00 Tour at Monas
10:00 – 10:30 Heading to Museum Nasional
10:30 – 12:00 Tour at Museum Nasional
12:00 – 13:00 Lunch
13:00 – 14:00 Back to BINUS Anggrek
Scenery:
48
Tourism
Jakarta, as known as Special Capital Region of Jakarta, is the capital, the largest and the
most populous city of Indonesia. It is located on the northwest coast of Java, Jakarta is the
country’s economic, cultural, and political centre. The official metropolitan area, known
as Jabodetabek (a name formed by combining the initial syllables of Jakarta, Bogor,
Depok, Tangerang and Bekasi), is the second largest in the world, yet the metropolis's
suburbs still continue beyond it.
In the outer yard surrounding Monas there are reliefs of Indonesian history. The
story begins in the northeastern corner and describes events during eras such as
the Singhasari and Majapahit empires. The reliefs extend along the four walls
showing the European colonialization of the Indonesian archipelago, various
popular local uprisings, modern Indonesian organizations in the early 20th
49
century, the Japanese occupation in World War II, the Proclamation of
Independence, and post-independence developments. The reliefs were made from
molded cement although several of the statues are damaged and have decayed due
to weathering.
The museum has a collection of 61,600 prehistoric and anthropological artifacts, and 5,000
archeological artifacts from all over Indonesia and Asia. The museum collections is among the
richest, the most complete, and the best of its kind in Indonesia and one of the finest in
Southeast Asia.
50
ICCSCI 2015 Program Summary
51
52