MSCEIS 2018
Submission Management System
Main Site
Submission Guide
Register
Login
Participant List
Abstract List
Access Mode
Contact
:: Abstract List ::

Page 3 (data 61 to 90 of 375) | Displayed ini 30 data/page
<< PREV 1 2 3 4 5 6 7 8 9 10 11 12 13 NEXT >>

61 ABS-287 Computer Science

Comparison of Naive Bayes Classifier and C4.5 Algorithms in Predicting Student Study Period
Y A Gerhana*, I Fallah, W B Zulfikar, D S Maylawati, M A Ramdhani

Department of Informatics, UIN Sunan Gunung Djati Bandung
*yanagerhana[at]uinsgd.ac.id


Abstract

This study aims to compare Naive Bayes Classifier algorithm with C4.5 in predicting the study period of student. The data for this study is collected from Department of Informatics UIN Sunan Gunung Djati Bandung. Software development method that used is Rational Unified Process (RUP). Comparison of both algorithms is the accuracy of predicting student study period and the speed of data processing. The attributes that used are student id, name, gender, GPA, entry point, tahfidz (cited the holy Quran as a special attribute on the case study), previous school, and extra activities during lecture. The result of this study shows that Naive Bayes Classifier and C4.5 algorithm can be applied to predict the study period of students well and accurate enough. The accuracy of Naive Bayes Classifier algorithm is around 88% better slightly than the C4.5 algorithm that has accuracy around 87%. However, the processing time of algorithm C4.5 is better than the algorithm Naive Bayes Classifier, C4.5 has processing time 0.003 nanosecond and N Naive Bayes Classifier has 12.7 nanosecond.

Keywords: C4.5 , Naive Bayes Classifier, Prediction, Student Study Period

PermaLink | Plain Format | Corresponding Author (Pusat Penelitian dan Penerbitan UIN Sunan Gunung Djati Bandung)


62 ABS-288 Computer Science

Creditworthiness System with K-Means Model Based Z-Score
Y A Gerhana*, S C Kusuma, W B Zulfikar, D S Maylawati, M A Ramdhani

Department of Informatics, UIN Sunan Gunung Djati Bandung
yanagerhana[at]uinsgd.ac.id


Abstract

Evaluation of the creditors ability needs to be done before the debtor provides the loan. The purpose of system design in this study is to establish a creditworthiness system by implementing K-Mean based Z-Score. The method of system design that used in this research is Rational Unified Process (RUP). The case study of thos research is in the Savings and Loans Cooperative (KSP) at Senior High School 1st Cileunyi, Bandung. K-Means method based Z-Score is used by the author as a model for solving problems, wherein the author uses three clusters with four parameters that applied to the method. Based on the results of the experiments, the application can classify prospective credits into three groups based on the four parameters. Those three groups among others: "OK" as many as 37 members, "Warning" as many as 28 members and "Bad" as many as 5 members. The results of those groups are used as a credit recommendation to the KSP.

Keywords: Clustering, K-Means, Loan, Save, Z-Score

PermaLink | Plain Format | Corresponding Author (Pusat Penelitian dan Penerbitan UIN Sunan Gunung Djati Bandung)


63 ABS-289 Computer Science

Designing Futsal Match Finder Application with Floyd-Warshall Algorithm
W Uriawan*, W Agustian, Y A Gerhana, J Jumadi, M A Ramdhani, K Manaf

Department of Informatics, UIN Sunan Gunung Djati Bandung
*wisnu_u[at]uinsgd.ac.id


Abstract

Information about the locations where futsal competition is taking place is needed for the futsal team to meet each other and compete. The purpose of designing Futsal Match Finder is to determine the position of futsal field location and help the shortest path to the field by implementing Floyd-Warshall algorithm. Application system design methodology that used in this research is prototype model. System test results show that the Floyd-Warshall algorithm can help find the shortest path to the location of the opposite futsal team. The futsal opponent search system based on the shortest distance can provide a solution to improve the ability of futsal players who have less relationship with other futsal team.

Keywords: Floyd-Warshall, Futsal, Location

PermaLink | Plain Format | Corresponding Author (Pusat Penelitian dan Penerbitan UIN Sunan Gunung Djati Bandung)


64 ABS-290 Computer Science

Eligibility Determination of Qurban Animals using K-Nearest Neighbor
W Uriawan*, F Fathurrahman, A Kodir, A R Atmadja, M A Ramdhani

Department of Informatics, UIN Sunan Gunung Djati Bandung
*wisnu_u[at]uinsgd.ac.id


Abstract

The Qurban is one of the most important worship services for Muslims. Choosing an eligible Qurban animals according to the shariah (law) of Islam and health is the main thing. This study aims to utilize technology in determining the eligibility of Qurban animals both based on the Islamic law and health. This research uses Prototype approach as software development life cycle method. The K-Nearest Neighbor (KNN) algorithm is used to determine the eligibility of Qurban animals based on several input parameters, including animal type, weight, age, gender, sight, health, body condition, and mental. The experimental results show that KNN is successfully implemented and is able to help determine the eligibility of animals for Qurban well, so that the people who perform Qurban worship are not harmed and the reward of the Qurban can be achieved perfectly.

Keywords: Eligibility, K-Nearest Neighbor, Qurban

PermaLink | Plain Format | Corresponding Author (Pusat Penelitian dan Penerbitan UIN Sunan Gunung Djati Bandung)


65 ABS-291 Computer Science

Comparison of K-Nearest Neighbor and Support Vector Machine for Choosing Senior High School
M Irfan*, A R Nurhidayat, A Wahana, D S Maylawati, Muhammad Ali Ramdhani

Department of Informatics, UIN Sunan Gunung Djati Bandung
*irfan.bahaf[at]uinsgd.ac.id


Abstract

Aim of this research is to compare K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) algorithm which are used for choosing senior high school recommendation. As we know that education is an important aspect in the development of a nation. The methodology that used in this research is data mining through Knowledge Discovery in Database (KDD) stages, which consist of: cleaning, data integration, data selection, data transformation, data mining, pattern evaluation, and knowledge presentation. KNN and SVM are the most common algorithms used in data mining and decision support system. Either KNN or SVM in this research is used for classifying type of senior high school in accordance with input parameters, among others national examination score, student interest, and counselor suggestion. Based on the experiment with several training and testing data, the result shows that SVM is better than KNN. SVM has an accuracy value around 97,1%, while KNN has an accuracy value around 88,5%. And also SVM has processing time faster than KNN.

Keywords: Comparison, Data Mining, K-Nearst Neighbor, Support Vector Machine

PermaLink | Plain Format | Corresponding Author (Pusat Penelitian dan Penerbitan UIN Sunan Gunung Djati Bandung)


66 ABS-37 Computer Science

THE DATA MINING ANALYSIS TO DETERMINE THE PRIORITIES OF FAMILIES WHO RECEIVING ASSISTANCE
Cahyo Prianto,Nisa Hanum Harani

Department of Informatics Engineering Politeknik Pos


Abstract

Government has made efforts to improve the level of social life as an object of national development either by providing direct cash assistance or a program to create jobs. Fund distributed to the community is not small. In order to realize its effectiveness, the distribution of fund will have to meet the community needs in the right target.
The data mining is a method of extracting data to find the hidden patterns of the data. The data are processed by using K-Means and C4.5 algorithm. The algorithm is used to quarry, cluster and classify the data on the community economy; so the results of this study, as expected, are data on families being included into pre-prosperous family, prosperous family 1, and prosperous family 2 categories, thereby making the data on the priorities of families who receiving assistance available. Of the three categories, the pre-prosperous families are necessary to receive attention, as they have not been able to meet the minimum basic needs such as food, clothing, shelter, health, and worship. It is related to the background of several variables such as age, education, occupation, and the number of dependents.

Keywords: Assistance, K-Means, C4.5, Pre-Prosperous Family

PermaLink | Plain Format | Corresponding Author (Cahyo Prianto)


67 ABS-313 Computer Science

Model for Assessing Islamic Banking Readiness based on Systems Approach
Khaerul Manaf (a*) , Aedah Binti Abd Rahman (b) , Syopiansyah Jaya Putra (b), Beki Subaeki (b), FaizM Kaffah (b)

Universitas Sangga Buana YPKP , Asia e-University , UIN Syarif Hidayatullah Jakarta, Universitas Sangga Buana YPKP, Universitas Informatika dan Bisnis


Abstract

Based Indonesias economy is driven by micro and community-based community segments. To support the development of the sharia economy very rapidly, Islamic banking needs to be equipped with an integrated system before the latest information technology. Through e-banking banks and clients can be mutually beneficial, this has become a necessity in the banking industry today. Utilization of Information Systems is still problematic with problems between organizations of the organizations business processes. The main objective of this research is to propose a financial model for Islamic banking, a model that supports several levels, which aims to achieve factors and customers, with possible values. Through a truly systematic viewpoint, e-readiness is a concept that encompasses the environment, processes and output phases of the Islamic banking system facilitated by internet users. An assessment model that includes all information and information about e-readiness is one of the benefits of the proposed model, including features at the national and regional levels in providing better opportunities for banks in e-banking development

Keywords: e-banking, e-readiness, information systems, information technology

PermaLink | Plain Format | Corresponding Author (Khaerul Manaf)


68 ABS-61 Computer Science

An Implementation of the PROMETHEE Method for the Recruitment Process
Radian Pradhana, Rani Megasari, Lala Septem Riza

Department of Computer Science Education, Universitas Pendidikan Indonesia


Abstract

At this time recruitment of outsourced employees is commonly done by companies. The company must hire the right and professional employees because otherwise the employee has the potential to harm the company. To minimize the incident, companies usually set many criteria in the process of hiring outsourcing employees. Some companies do the recruitment process by calculating the average value of the candidates test. However, calculating the average value is not enough because it is not representative since it should consider many aspects. Therefore, this research was aimed to provide a solution by using Decision Support System (DSS), namely the Multiple Criteria Decision Making (MCDM) method (i.e., the PROMETHEE method). There are some stages involved in this research, as follow: data collection, parameter determination, implementation, and testing. Data used in this research is data recruitment process conducted by PT.PPI. According to the comparison with classical method, it obtained the percentage of conformity value of 88%. So, it can be concluded that the PROMETHEE method is able to solve the problem of recruitment of outsourcing employees in PT. PPI.

Keywords: Decision Support System, Multiple Criteria Decision Making, Recreuitment, PROMETHEE

PermaLink | Plain Format | Corresponding Author (Lala Septem Riza)


69 ABS-317 Computer Science

A Study Of TCP6: Reveals The Effect Of Ipv6 Multicast Transmission For End-to-End Interconnection
Muhammad Yusril Helmi Setyawan (a*) Parman Sukarno (b) Cahyo Prianto (b)

a) Applied Bachelor of Informatics Engineering, Politeknik Pos Indonesia
Jl. Sariasih No.54, Sarijadi, Bandung 40151, Indonesia
*yusrilhelmi[at]poltekpos.ac.id
b) School of Computing, Faculty of Informatics, Telkom University
Jl. Telekomunikasi No. 01, Terusan Buah Batu, Dayeuhkolot, Bandung 40257, Indonesia
b) Applied Bachelor of Informatics Engineering, Politeknik Pos Indonesia
Jl. Sariasih No.54, Sarijadi, Bandung 40151, Indonesia


Abstract

This paper studies and analyses the effect of Ipv6 multicast transmission for end-to-end interconnection. At the end-to-end interconnection addressing system, two types of protocols have been introduced: IPv4 and IPv6. There is a fundamental difference in transmission characteristics between both broadcasting properties in IPv4 and multicast on IPv6 even though both works on the transport layer using TCP protocol. However, the emergence of the term TCP6 used to mark the IPv6 transmission performance domain raises questions about whether the transmission characteristics contribute to the mention of TCP6. This paper provides an explanation of the results of the analysis in an effort to answer the question through end-to-end interconnection experiments by comparing the timeout performance as a result of the broadcast properties of IPv4 and multicast on IPv6 using Karn Algorithm with throughput test parameters. The experimental results show that the throughput value through RTT analysis is relatively similar, not more than 0.1% difference. The conclusion is that TCP and TCP6 are talking about the domain of activity and technical performance. They need correspondence that identifies characteristics in understanding the context of interconnection requirements between devices, broadcasts or multicast.

Keywords: Ipv6, Multicast, RTT, Trouhgput, TCP

PermaLink | Plain Format | Corresponding Author (Muhammad Yusril Helmi Setyawan)


70 ABS-62 Computer Science

Implementation and Experimental Analysis of Random Forrest in R Parallel Computing
Nur Azizah, Yaya Wihardi, Lala Septem Riza

Department of Computer Science Education, Universitas Pendidikan Indonesia


Abstract

Random forest is a method for building models by combining decision trees or decision trees generated from bootstrap samples and random features. A common problem that often occurs when implementing random forest in a single core is the long processing time because it uses a lot of data training and builds a lot of tree as the model as well. Therefore, this study proposes the random forest method with parallel computing implemented in the R programming language. Several datasets are used in the experiments, such as the Iris dataset, the quality of the wine, and the diagnostic data of female diabetes Pima Indians. Results obtained from the experimentation show that the computational time used when running random forest with parallel computing is shorter than when running a random forest using only a single processor. It means that the implementation has been successful.

Keywords: Decision Tree, Random Forest, R High Performance Computing, Parallel Computing, R Programming Language

PermaLink | Plain Format | Corresponding Author (Lala Septem Riza)


71 ABS-320 Computer Science

Measuring the Online Tax Service System With the Development of Success Models
Prof. Dr. Aedah Binti Abd Rahman1, Dr. Syopiansyah Jaya Putra2,Beki Subaeki13, Khaerul Manaf4, Faiz M Kaffah5

Department of Information Communication Technologhy Asia E University Malaysia


Abstract

Based on the regulations of the Directorate General of Taxation 243/PMK.03/2014 related to the modernization and simplification of tax administration, the reporting of the tax format can no longer be submitted to the tax office. In other words, the taxpayer must do tax reporting online. Thus must understand how the use of online reporting system. Because not a few users of the system feel difficult in its use.
The purpose of this study is to build models in the measurement of online tax services. The model developed is the model of Delone and Mclean where this model is very suitable to measure the success of the system.
There are 8 variables and 44 Indicators used to measure the system. The indicator is divided into three parts, the input consists of culture, tax content. The process consists of information quality, system quality, service quality, trust, user satisfaction. The output consists of tax system success. Then from each indicator is made a question with the aim to assess the success of the system used.

Keywords: Model development, Success model, Tax online, Variable, Indicator.

PermaLink | Plain Format | Corresponding Author (Beki Subaeki)


72 ABS-65 Computer Science

Terrain Model and Gridding Method Variations for Making Topographic Maps
Rina Marina Masri

Universitas Pendidikan Indonesia
Associate Professor of Civil Engineerinng
rinamasri[at]upi.edu


Abstract

The aim of research were (1) exploring gridding method for making topographic maps, (2) inventing terrain model that producing from 3 d data, (3) structuring standard operational procedure for making topographic maps, (4) producing topographic maps from terrestrial surveying data, digital terrain model, computer aided mapping and satellite imagery, (5) evaluating topographic maps which produced. The research is using descriptive method. Universitas Pendidikan Indonesia was study location. The research was conducted on September 2017 to December 2017. Geometric calcuation is used to calculate absisca, ordinate and height information, using spread sheet. Topographic map which was producing contour line from digital terrain model software, satellite imagery from internet, line map from computer aided mapping software could be more accurate and effective than conventional and analog method..
Keywords : terrain model, gridding method, topographic map

Keywords: terrain model, gridding method, topographic map

PermaLink | Plain Format | Corresponding Author (Rina Marina Masri)


73 ABS-66 Computer Science

Railway Geometric Design Based on Satellite Imagery and Digital Terrain Model
Iskandar Muda Purwaamijaya

Universitas Pendidikan Indonesia
Associate Professor of Civil Engineering
ais_imp[at]upi.edu


Abstract

The purpose of research were (1) a conceptual, functional model designed and implementation for railway geometric design, (2) standard operational procedure made for railway geometric design using satellite imagery and digital terrain model, (3) calculated geometric information on the railway route so that fulfilling geometric national and international standard, (4) horizontal alignment drawing presented on the railway route, (5) vertical alignment drawing presented on the railway route. Descriptive method is used for the research. South Sumatra Province, Indonesia was study location. The research was conducted on July 2016 to January 2017. A spatial analysis is used to calculate horizontal and vertical geometric information. Horizontal and vertical geometric calculated on railway route based on satellite image and digital terrain model could be faster, easier and cheaper than terrestrial and analog method.

Keywords: railway, geometric, satellite imagery, digital terrain model

PermaLink | Plain Format | Corresponding Author (Iskandar Muda Purwaamijaya)


74 ABS-324 Computer Science

Development of Human Machine Interface for Supporting the Disaster Mitigation System in the City using Wireless Sensor Network
Asep Najmurrokhman(a*), Kusnandar(a), Ady Syaripudin(a), Achmad Munir(b)

(a) Dept. of Electrical Engineering, Universitas Jenderal Achmad Yani, Jl. Terusan Jend. Sudirman PO Box 148 Cimahi 40533, Indonesia
*asep.najmurrokhman[at]lecture.unjani.ac.id
(b) School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Jalan Ganesha 10 Bandung 40132, Indonesia


Abstract

Disasters that include building fires, earthquakes, floods, and so on are the inevitable things in city life. Disaster mitigation should be undertaken to mitigate the adverse impacts of the disaster. Its activities span for an early warning system until the evacuation of the victim to a safer place. With the advancement of information technology, an integrated system can be built to support the disaster mitigation system in the city. This paper describes a development of a prototype of human machine interface for supporting the disaster mitigation system in the city. This prototype comprises sensors, microcontroller, communication module, and information system to capture and display the disaster location. Three parameters including smoke concentration, temperature, and vibration are sent to the monitoring room at any time using the wireless sensor network framework. Disaster indication which can cover in this system includes the building fire and earthquake. The building fire indicators are rendered by raising a smoke concentration and temperature up to the certain level, while earthquake indicators are provided by vibrations sent by vibration sensors. The location of the disaster site is displayed in the monitoring room and delivered to the city authority who handling the disaster via mobile phone.

Keywords: arduino microcontroller; disaster mitigation; human machine interface; wireless sensor network;

PermaLink | Plain Format | Corresponding Author (Asep Najmurrokhman)


75 ABS-346 Computer Science

Development of Motif Design and Process of Integrating Batik Jambi Pattern from the Digital Photo
Wawan Kurniawan(1*), Alrizal(2), Febri Berthalita P(3)

Physics Education, Universitas Jambi


Abstract

Batik Jambi is one of the coastal batiks of Sumatra that continues to grow. This type of batik motif reflects the culture and biodiversity of the Jambi area which is continuously preserved. Development of batik motif design experienced many obstacles, especially on the process of making patterns and tools of batik printing. Patterns and motifs need to be developed in an easy and efficient way. The goal is to design batik motifs using digital photo objects. The development of the motif comes from the image object that is processed into a motif using digital image processing methods. Batik motif is produced by detecting the shape, border, and extent of objects from some digital photo objects. The results of the design of digital motifs will facilitate batik craftsmen develop new motifs by integrating traditional motifs Jambi area so that it can compete with other batik motifs in Indonesia.

Keywords: Batik Motif design, Batik Jambi Pattern, Image edge detection

PermaLink | Plain Format | Corresponding Author (Wawan Kurniawan)


76 ABS-357 Computer Science

PENETRATION TESTING FOR VULNERABILITY ASSESSMENT OF ACADEMIC INFORMATION SYSTEM ON HIGH SCHOOL OF TECHNOLOGY XYZ
Dayan Singasatia (a*); Joko Saputro (b); M. Hafid Totohendarto (c)

Department of Informatics
STT Wastukancana
Purwakarta


Abstract

Computer security system is increasingly needed along with the increase in computer users connected to the internet network, this can lead to threats of cyber crime by irresponsible people. In this case High School of Technology XYZ is currently growing bigger and has various kinds of information systems in carrying out its operational activities, one of which is a server that stores various data such as student grades, lecturer data and other important data. Often the security problems of application systems and web servers are ignored and the importance of new security is realized after a disaster occurs. Without good security, the application of technology as great as any will seriously endanger the institution or organization itself.
Based on this background, assessment is needed to measure the level of vulnerability in the security of existing computer systems and networks. The vulnerability assessment using penetration testing methods with the blackbox pentest and the greybox pentest technique. In this case, this study uses guidelines from CEH (Certified Ethical Hacker), Acunetix, and CISSP (Certified Information System Security Professional) modules.
The results of penetration testing for the evaluation of security vulnerabilities to websites and database servers in this school are at the medium level because they have implemented a security system is quite good so that only a few vulnerabilities found that do not have a bad impact to the system.

Keywords: Computer Security, Penetration Testing, Vulnerability Asessment

PermaLink | Plain Format | Corresponding Author (Dayan Singsatia)


77 ABS-358 Computer Science

Implementation of Fuzzy Tsukamoto Method In Decision Support System Of Journal Acceptance
Eki Nugraha (a), Aji Prasetya Wibawa (b), M. Luqman Hakim (b), Umi Kholifah (b), Roshina Hila Dini (b), M. Rizki Irwanto (b)

a) Universitas Pendidikan Indonesia, Jl.Dr. Setiabudhi 229, Bandung 40154, Indonesia

b) Universitas Negeri Malang, Jl.Semarang 5, Malang 65145, Indonesia


Abstract

Journal acceptance is a difficult problem to solve since in the practice it involves some reviewers who can produce different decisions from various perspectives. Therefore, a decision support system is needed to assist the reviewers to decide the acceptance of the paper. This study was purposed to develop the decision support system using the Fuzzy Tsukamoto method for journal acceptance. The Fuzzy Tsukamoto method described the relationship between input and output of the system by using a set of fuzzy if-then rules. From the comparison results, it was obtained that an accuracy was 100%. The accuracy of such calculation indicated that the decision support system of the journal acceptance was accurate. It was found that the percentages of errors were 3% between the results of system comparison and experts and 0% between the system and manual calculation. The low errors of the calculation indicated that DSS of journal acceptance had high precision.

Keywords: Decision Support System; Fuzzy Tsukamoto; Paper Acceptance

PermaLink | Plain Format | Corresponding Author (EKI NUGRAHA)


78 ABS-1 Computer Science Education

Correction Intelligence Test Based On Log Sheet Computer Processing
I Ketut Dharsana*, Ni Ketut Suarni, Nyoman Dantes, Kadek Suranata, I Ketut Gading, I Wayan Tirka, Gede Nugraha Sudharsana, Wayan Eka Paramartha, Kadek Satya Gita Rismawan

Universitas Pendidikan Ganesha
Jl. Udayana, Singaraja, Bali, Indonesia
*iketut.dharsana[at]undiksha.ac.id


Abstract

The purpose of this research is to produce Log Sheet correction method of Raven Progressive Matrices manual intelligence test to be computer based to help counselor to ease in giving specialization service to students in school. The research design used is the development model of Borg and Gall. The sample used in this study amounted to 85 students. Data collection is done by two stages, namely the initial field test stage and the main field test stage. Initial field trials were conducted for student groups, counseling experts, information technology experts, and counselors. While the main field test conducted on the group of high school students class X. This result is evidenced by the validity value of the initial field test and the main field test. The results of this study are recommended for counselors to utilize Log Sheet correction results of Raven Progressive Matrices computer-based intelligence tests for the provision of student specialization services in schools.

Keywords: Computer based correction test, Psychological test, Education, Assessment

PermaLink | Plain Format | Corresponding Author (I Ketut Dharsana)


79 ABS-264 Computer Science Education

Developing Art Geometric App Based on Flash Player for Student in Elementary School
A Irawan (a), Syamsiah (b), IB Rangka (c), Z Niswati (d), FA Mustika (e), Y Wibawanti (f), N Alamsyah (g), D Marlina (h), W Rahayu (i), EAR Pinahayu (j)

(a,b,c,d,e,f,g,h,i,j) Universitas Indraprasta PGRI, Jakarta.
Jl. Raya Tengah No. 80 Kel. Gedong Pasar Rebo Jakarta Timur


Abstract

The purpose of research is develop learning mathematics to the matter wake up Three dimensions based e-learning use macromedia flash. A method of this research is research and development ( rnd ). The phase that carried out is to identify matter by means of a analyze needs that is in research locations. Next design products which adjusted with needs of material geometric three dimensions. Math teacher and the design do validation to judge feasibility products have been made , repair based on input from validator and to pilot a small scale / limited products. The research was done at student in Elementary School . The results of the study of applications that can help teachers in conducting the process of learning and the teaching material to receive help students geometric about three dimensions. Next undergone a try to use the widely, revision of the material further and mass production math as the basis for elementary school.

Keywords: macromedia flash , e-learning , three dimensions

PermaLink | Plain Format | Corresponding Author (Ari Irawan)


80 ABS-269 Computer Science Education

Implementation of an automated grading system with a subtractive clustering method
Nisa Hanum Harani (a*), Putri Suciani Hafid (b), Cahyo Prianto(a)

a) Politeknik Pos Indonesia
Jalan Sariasih No.54, Sarijadi, Sukasari, Kota Bandung, Jawa Barat 40151
*nisahanum[at]poltekpos.ac.id
b)Politeknik Pos Indonesia
Jalan Sariasih No.54, Sarijadi, Sukasari, Kota Bandung, Jawa Barat 40151
putrisuciani03[at]gmail.com


Abstract

The Trainee participants exam process has been conducted conventionally during the examination process, the scoring/test scores, and the division of high and low scores of participants. The Exam tends to be risky because it spends a long time and high accuracy. In this study built an online exam system that implements auto grading that facilitates the Learning Center and the participants Management Trainee. Regarding the exam process, giving and receiving scores/grades quickly. This research using fuzzy subtractive clustering method, because of fuzzy subtractive clustering able to generate rules without initializing the number of clusters at the beginning of the process. The formation of the number of rules/clusters is influenced by the radius and reject, ratio, while the accept ratio does not affect the cluster results. Fuzzy subtractive clustering is used to define high and low scores of participants. Following the calculation to determine the group value of Management Trainee participants that is by using two parameters of the data used is the value of Written Comprehensive Examination and Oral Comprehensive Examination. The test results showed the cluster that formed as much as 2 groups by using samples of 10 data with the value of each, the test using the value of accept ratio 0.6, rejects ratio 0.2, radius 0.8, and squash factor 1.25.

Keywords: Auto grading, CBT, Fuzzy subtractive clustering, Data Mining

PermaLink | Plain Format | Corresponding Author (Nisa Hanum Harani)


81 ABS-18 Computer Science Education

GENERATING MIND MAP FROM AN ARTICLE USING MACHINE LEARNING
Maulana Firdaus Nurrokhim, Lala Septem Riza, Rasim

Universitas Pendidikan Indonesia


Abstract

Sequence teaching materials is very important in learning because it will improve the effectiveness of learning. But not all teachers can make the sequences in detail and accurate. The purpose of this research generates sequences of teaching materials automatically by using the concept map. The approach used is the Information Retrieval Approach and the use of the CoreNLP library. Mind map is generated from articles or other teaching materials. Testing is done by comparing the mind map of automatic generation with mind map made by experts. The results showed 52.5% accuracy.

Keywords: Sequence Teaching Material, Mind Map, CoreNLP, Information Retrieval Approach

PermaLink | Plain Format | Corresponding Author (Rasim Rasim)


82 ABS-295 Computer Science Education

Implementation of Python Source Code Comparison Results with Java Using Bubble Sort Method
Entik Insanudin

a) School of Applied Science, Telkom University
Jl. Telekomunikasi No. 1 Terusan Buah Batu,
Bandung 40257, Indonesia
*insanudin[at]telkomuniversity.ac.id


Abstract

Abstract- In the implementation of Python and Java source code comparison results are more focused on the scale of the ratio of the number of lines of code, file capacity, and access speed. As for the background of this writing because there are so many programming languages that can be used with the same results but overall we do not know which programming language is more optimal and efficient in terms of the number of lines of code better known in the programming language is LOC (Line of Code) capacity of file access speed.
In this study, the authors focus only on Java programming language and python course as a first step to know the ratio of the number of lines of code, file capacity, and access density. To determine the comparison there is a method used is bubble short. For the results of the implementation is shown in the form of comparison table in accordance with the results of testing programming by making the same application that is the application of calculator both programming language Java and Python programming language.
The results of the implementation of the comparison of these programming languages for Python programming language to produce the number of LOC (line of code) or the number of lines of code as much as 10, the capacity of the file extension .py by 506 bytes and txt extension of 397 bytes and access speed approximately for less more 4 seconds. While Java produces the number of LOC (line of code) or the number of lines of code as much as 11, the capacity of the file extension. Java of 86.2 Kbytes and extension txt of 477 bytes and access speed for 7 seconds. So do not close the possibility to make other applications python programming language will be more optimal and efficient.

Keywords: Java, Python, Loc, Bubble Sort

PermaLink | Plain Format | Corresponding Author (Entik Insanudin)


83 ABS-48 Computer Science Education

Application of Problem Based Learning Assisted Intelligent Learning Media to Improve the Cognitive Aspects
Wahyudin, Lala Septem Riza, Ridwan Efendi, Ilham

Universitas Pendidikan Indonesia


Abstract

Problem Solving is one of the capabilities that must be possessed by students in the department of Software Engineering, this ability is directly proportional to the cognitive abilities possessed by learners. Problem Based Learning Method (PBL) is a proven learning method in improving problem solving ability of learners. To determine the effect of PBL on students majoring in Software Engineering, conducted research on students, using the PBL method that is assisted with learning media. Learners are divided into groups to be given a problem to be solved by each group. Educators can provide educators questions that lead to the solution of problems given to learners in the form of materials, scripts or in other forms of learning media. Learning media made with Intelligent Tutoring System (ITS) where this media can guide learners in depth of certain material that has not been mastered. This can be seen from giving media suggestions to learners after doing pretest or posttest. The results of this study can be quite successful with an increase in the gain index of 0.36 that can be categorized as a moderate increase.

Keywords: Problem Based Learning (PBL), Software Engineering, Intelligent Tutoring System (ITS).

PermaLink | Plain Format | Corresponding Author (wahyudin sanusi)


84 ABS-59 Computer Science Education

The Development of Computer Adaptive Test and Item Response Theory with 4 Parameters based the Logistics Model
Lala Septem Riza, Nurul Siti Nurjanah, Yaya Wihardi

Department of Computer Science Education, Universitas Pendidikan Indonesia


Abstract

The ability of students can be measured by making a test whose the number and content of questions have been determined for each student. However, it is less effective because the distribution of abilities can be different. By using Computer Adaptive Test (CAT) and Item Response Theory (IRT), the test can be done more quickly even though each student might solve different number and content questions. Therefore, in this research we develop CAT and IRT with 4 parameters based logistics model to evaluate the ability of students. Some experiments conducted on 27 students with 50 number of questions were analyzed and compared with Classical Test Theory (CTT). The results indicate the system can be used as an alternative tool for evaluating/assessing the ability of students.

Keywords: Computer Adaptive Test, Item Response Theory, Logistics Model, Educational Assessment, Classical Test Theory

PermaLink | Plain Format | Corresponding Author (Lala Septem Riza)


85 ABS-319 Computer Science Education

Students Acceptance towards Blended Learning Implementation
Winarto, Maludin Panjaitan, Anggiat Parluhutan Tambunan

Universitas Methodist Indonesia, Medan, Sumatra Utara


Abstract

The purpose of the study is to investigate students acceptance towards blended learning implementation. It focuses on students perceptions and attitudes towards using easyclass.com as a learning management tool and face-to-face learning. The case study has been conducted among business students in a private university in Medan, North Sumatera. The research employed a quantitative approach based on Technological Acceptance Model (TAM), and asked the students to fulfill a questionnaire. They also were interviewed to acquire insights about the blended learning implementation. The study concludes that the students perceptions and attitudes were positive towards the learning management tools in term of the usefulness and the ease of use. However, negative impressions also were underlined during the interview with the students. The research implications and suggestions for future research are explained at the end of the paper.

Keywords: blended learning; perceive usefulness; perceive ease of use; TAM; acceptance

PermaLink | Plain Format | Corresponding Author (Winarto Winarto)


86 ABS-69 Computer Science Education

Education Service System Engineering for Quality Equalization of High School Education in West Java
Rizky Rachman Judhieputra, M.Kom, Budi Laksono Putro S.Si, M.T.

UNIVERSITAS PENDIDIKAN INDONESIA


Abstract

The problem of unequal quality of high school education in West Java with the viewpoint of Senior High School (SMA) due to the assessment of the quality of education in Indonesia is still focused on Students, Teachers, Principals, and Parents separately. Supposedly the assessors of high school quality are assessed based on an education service system. Research studies related to high school as an educational service are well suited to a service science approach, and the term educational service system. The "educational service system" study discusses educational sector issues in the perspective of a service system consisting of components, functions, interfaces, component linkages, inputs, processes, and outputs. The purpose of this research is to create educational service system model to improve the quality of high school education services in West Java. Creation of Educational Service Model System with service engineering method with stages: service innovation, service engineering, and service measurement. Output of Educational Service model model System in the form of learning management system (LMS) based on moodle. The prototype measurement result "Educational Service System" model shows the efficiency of high school education service system. The research output is expected to solve the problem of equalization of high school education quality in West Java.

Keywords: Service System, Service Engineering, Learning Management System (LMS), Educational Service System

PermaLink | Plain Format | Corresponding Author (Rizky Rachman Judhieputra)


87 ABS-86 Computer Science Education

Creative Learning Model As Implementation of Curriculum 2013 to Achieve 21st Century Skills
Budi Laksono Putro, Waslaluddin, Rizky Rachman Judhie Putra, Eka Fitrajaya Rahman

Computer Science Education Department
Faculty of Mathematics and Science Indonesia University of Education


Abstract

The 21st century learning is an effort to facilitate learners in the 21st century to experience the best learning experience so that they can achieve the learning objectives effectively. The significance of the 21st century adheres to the condition of learners in this century. Many important phenomena related to education in the 21st Century, including: globalization and education, culture and character of the nation, and Internet culture and Cyber Society. The 2013 curriculum is a shift in the 21st century education paradigm in Indonesia. The curriculum of 2013 is different from the previous curriculum, but its formal juridical foundation remains based on the National Education System Act (SISDIKNAS) no. 20 of 2003.
The 21st century learning model is a way / technique used by teachers to facilitate the best child learning safeguard according to childs condition, childs learning environment, and carrying capacity. The characteristics of learner of the 21st century are important for teachers and parents to know how to facilitate their learning. Mitchel Resnick developed a Creative Learning Cycle method that promises to improve 21st century skills. Creative Learning Cycle method is suitable for elementary school. Creative Learning Cycle consists of 5 stages: Imagine, Create, Play, Share and Reflect. The purpose of this research is to create creative learning model as implementation of curriculum 2013 at elementary school in Bandung to reach 21st century skill. Creative Learning Model As a Learning Implementation of Curriculum 2013 has a positive effect on the achievement of 21st Century Skills students though not all of them have a significant influence.

Keywords: 21st Century Learning, Curriculum 2013, Creative Learning, 21st Century Skills

PermaLink | Plain Format | Corresponding Author (Budi Laksono Putro)


88 ABS-344 Computer Science Education

Education-based augmented reality applications for heat learning media content lesson in physics
A Ismail1,2,*, G Rahayu3 ,A Suryadi3 And D Nurdiana3

1Science education program, Prosgraduate School, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudhi No 229, Bandung 40154, Indonesia
2Department of physics education, Institut Pendidikan Indonesia, Jl. Pahlawan No.32, Garut 44151, Indonesia
3 Department of Information Technology Education, Institut Pendidikan Indonesia, Jl. Pahlawan No.32, Garut 44151, Indonesia


Abstract

This study aims to create applications that can be used as a medium of physics learning with sub-material heat. Application-shaped learning media created using Augmented Reality-based technology Android. The application created is named Mecalor. Mecalor application process using the Waterfall method. This Waterfall method provides a sequential approach to software lifecycle.Testing the feasibility of the application is done through four characteristics of the ISO 25010 standard which Suitability Functional, Performance Efficiency, Portability, and Usability. The test was conducted in Garut - Indonesia Vocational High School with a total of 30 students and two software experts. Data analysis techniques use a Likert scale and Guttman scale. The test results on the characteristics of Functional Suitability applications, Performance Efficiency, and Portability is valid with a percentage of 100% so it can be said that the application is good to use. Likewise, characteristics Usability test results also suggested a value of 3.9 so that applications can Mecalor declared fit for use.

Keywords: Augmented Reality, Education

PermaLink | Plain Format | Corresponding Author (Ali Ismail)


89 ABS-89 Computer Science Education

e-Portofolia Assessment Model on Collaborative Problem Solving (CPS) Learning Based on Digital Learning Environment
Heri Sutarno, Budi Laksono Putro, Rizky Rachman Judhie Putra, Erna Piantari

Computer Science Education Department
Faculty of Mathematics and Science Indonesia University of Education


Abstract

The 21st Century Skill is the knowledge and skills needed to deal with the problems of the 21st century. There are a number of views on 21st century skills proposed based on the research of various research institutes (P21, EnGauge, ATC21S, NETS / ISTE, EU, and OECD), on what competencies and skills humans must have in the globalization era. This study uses the concept of 21st century skills published by The University of Melbourne in the KSAVE framework (Knowledge, Skills, Attitudes, Values, Ethics). The KSAVE framework illustrates that collaborative problem-solving (CPS) lessons, and learning through a digital network are the glue of 21st century skills (Griffin and Care, 2015). Learning CPS is a glue for the achievement of critical thinking skills, problem solving, decision-making and collaboration. While learning through a digital network is a combination of information literacy skills, ICT literacy, personal responsibility, and social responsibility. This study aims to create an e-Portfolio assessment model on CPS learning based on learning through a digital network in the form of moodle learning management system (LMS). e-Portfolio is a digital portfolio to record students learning process and performance in proof of electronic data collection process using LMS. e-Portfolio aims to show students learning outcomes in terms of Knowledge, Skills, Attitudes, Values, Ethics based on the KSAVE framework. The results of the implementation of ePortofolio model in Database class - Computer Science Program - Universitas Pendidikan Indonesia can represent the result of student learning process in terms of Knowledge, Skills, Attitudes, Values, Ethics well.

Keywords: 21st Century Skill, Collaborative Problem Solving (CPS), e-Portfolio, Learning Management System (LMS)

PermaLink | Plain Format | Corresponding Author (Heri Sutarno)


90 ABS-347 Computer Science Education

STRATEGY SECURITY INFORMATION TECHNOLOGY MODEL FOR DECISION TOOL IN E-GOVERNMENT MANAGEMENT
Faiz M Kaffah (a*),Aedah Binti Abd Rahman (b),Syopiansyah jaya putra (b),Beki Subeki(b),Khaerul Manaf(b)

(a) Universitas Informatika & Bisnis Indonesia
(b) Asia E University
(b) UIN Syarif Hidayatullah Jakarta
(b)Universitas Sangga Buana YPKP
(b) Universitas Sangga Buana YPKP


Abstract

Handling information security management is an absolute thing done in organizations that have information systems to support organizational operations. An information system consisting of software and hardware assets that manages data and information spread across the network and the internet, making it vulnerable to threats. Therefore it takes investment and cost to secure it. The costs incurred for this purpose are not small, but investment spending and information security costs require serious handling to be more effective and targeted. Model This security strategy is used to evaluate alternative strategies to demonstrate the effectiveness of investment and cost of managing information security through simulation of policy changes. This model is a method to describe dynamic and complex manganalian model and systems consisting of interrelated variables in the form causal relationships and feedback between the good variables that reinforce or provide balance. Simulations using dynamic system models in this study illustrate that risk assessment management followed by efforts to reduce vulnerability has a major impact on information security management. By making a difference in the variable value of the probability of reducing the vulnerability, it provides an alternative choice in risk management of information security investment to achieve the overall cost effectiveness of information security management.

Keywords: Information Security Management, System Dynamic, Simulation, Models, Information Security Management, System Dynamic, Simulation

PermaLink | Plain Format | Corresponding Author (Faiz Muqorrir Kaffah)


Page 3 (data 61 to 90 of 375) | Displayed ini 30 data/page
<< PREV 1 2 3 4 5 6 7 8 9 10 11 12 13 NEXT >>

MSCEIS 2018 - Submission Management System

Powered By Konfrenzi 1.832J-Build3 © 2025 All Rights Reserved