Search Results - "2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)"
-
1
Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Websites are now widely used by many public and private sectors known to be the most popular system that is able to reach many users in many platforms through…”
Get full text
Conference Proceeding -
2
Early detection of type II Diabetes Mellitus with random forest and classification and regression tree (CART)
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Diabetes Mellitus (DM) is the third deadliest disease in Indonesia, and type II DM is more dangerous because it is caused by the combination between genetic…”
Get full text
Conference Proceeding -
3
The readiness self-assessment model for green IT implementation in organizations
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Green IT is becoming an important concept for the organization, but unfortunately, not every organization is ready to apply green IT. Therefore, it is…”
Get full text
Conference Proceeding -
4
E-readiness framework for cloud computing adoption in higher education
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The Higher Education (HE) is recognized as one of the pillars of community development. In the spirit of Tri Dharma, HE is required to give maximum…”
Get full text
Conference Proceeding -
5
Comparison of bidirectional associative memory, counterpropagation and evolutionary neural network for Java characters recognition
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Javanese language is the language used by the people on the island of Java and it has its own form of letters called Java characters. Recognition of Java…”
Get full text
Conference Proceeding -
6
Solving the time fractional diffusion equations by the Half-Sweep SOR iterative method
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…This paper examines the effectiveness of the combination between Successive Over-Relaxation (SOR) iterative method with the Half-Sweep (HS) iteration namely…”
Get full text
Conference Proceeding -
7
Fuzzy traffic congestion model based on speed and density of vehicle
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The purpose of this paper is to describe a new approach of detecting traffic jam in the city. Unlike prior works that demonstrate traffic jam through vehicle…”
Get full text
Conference Proceeding -
8
Stock trend prediction using simple moving average supported by news classification
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The ability to predict stock trend is crucial for stock investors. Using daily time series data, one is able to predict the trend with the help of simple…”
Get full text
Conference Proceeding -
9
Comparison of syllable-based and phoneme-based DNN-HMM in Japanese speech recognition
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Japanese is syllabic language. Additionally we have studied syllable-based GMM-HMM for Japanese speech recognition. In this paper, we investigate the…”
Get full text
Conference Proceeding -
10
Automatic multilabel categorization using learning to rank framework for complaint text on Bandung government
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Learning to rank is a technique in machine learning for ranking problem. This paper aims to investigate this technique to classify the responsible agencies of…”
Get full text
Conference Proceeding -
11
Improved generalizations of the Karatsuba algorithm in GF(2n)
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The process of multiplications in Finite Fields required huge resources. If those implemented in the Elliptic Curve Cryptography (ECC), the need of resources…”
Get full text
Conference Proceeding -
12
Melody generation system based on a theory of melody sequence
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…We propose a melody generation system based on the Implication-Realization Model (IRM) of music theory. The IRM is a music theory, which was proposed by Eugene…”
Get full text
Conference Proceeding -
13
Risk management framework with COBIT 5 and risk management framework for cloud computing integration
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Cloud computing is one of the growing inclination in the field of information technology which brings many advantages. There have been many companies or…”
Get full text
Conference Proceeding -
14
Prediction of interest for dynamic profile of Twitter user
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Numerous studies have been conducted to explore the social network of Twitter; some have been conducted to predict the interest or the topic of the user's…”
Get full text
Conference Proceeding -
15
ANN, ARIMA and MA timeseries model for forecasting in cement manufacturing industry: Case study at lafarge cement Indonesia - Aceh
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The accurate demand forecast method is one of the main important to industry to minimize error. In this study tried to propose the Artificial Neural Network…”
Get full text
Conference Proceeding -
16
Expert systems for self-diagnosing of eye diseases using Naïve Bayes
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…The best defense against eye diseases is to have regular checkups. However, in reality, poverty stops people outside the developing world from seeing an eye…”
Get full text
Conference Proceeding -
17
Heart disease diagnosis using extreme learning based neural networks
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Heart disease is the leading cause of death in Indonesia based on 2010 Hospital Information System (SIRS) Report. Early detection and treatment of heart…”
Get full text
Conference Proceeding -
18
Indonesian Twitter text authority classification for government in Bandung
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…Nowadays, social media based complaint management systems have been deployed in several countries and cities including Bandung. We proposed an automatic…”
Get full text
Conference Proceeding -
19
INET Framework modifications in OMNeT++ simulator for MPLS traffic engineering
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…In this research, numbers of modifications have been made in INET Framework on OMNeT++ in order to fully support the traffic engineering simulation…”
Get full text
Conference Proceeding -
20
A comparison for handling imbalanced datasets
Published in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) (01-08-2014)“…In various real case, imbalanced datasets problems are inevitable, such as in metal detecting security or diagnosis of disease. With the limitations of…”
Get full text
Conference Proceeding