Articles
33 Documents
Search results for
, issue
"Vol 1 (2014): Prosiding IC-ITECHS 2014"
:
33 Documents
clear
3D Interaction in Augmented Reality Environment with Reprojection Improvement on Active and Passive Stereo
Eko Budi Cahyono;
Ilyas Nuryasin;
Aminudin Aminudin
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1431.301 KB)
This research proposes the three dimensional (3D) interaction on the augmented reality (AR) environment based on interposition. Interposition is captured from the intersection of reconstruction points. That points should be increased to generate accurate interposition. The optimal triangulation is used to increase the performance for reconstructing 3D. This method is applied to Logitech camera (passive stereo) and Kinect camera (active stereo) to analyze the result of reconstruction. Based on the calibration testing, optimal triangulation gives a significant deference accuration on both of Logitech and Kinect cameras. On the passive stereo, accurate interaction is generated by combining subpixel detection and the optimal triangulation algorithm, while on the active stereo, the accuration of depth image can be improved by just applying the optimal triangulation algorithm.
Traditional Exercises As a Practical Solution In Health Problems For Computer Users
Laurentius Noer Andoyo;
Jozua Ferjanus Palandi;
Zusana Pudyastuti
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1415.527 KB)
Of the total of 7.2 billion of world population, three billion of them are internet users. During 2013, the numbers of internet users in Indonesia have reached 74.75 million, including 31.7 million ‘Netizens’. The numbers of computer users are more than the number of internet users. These computer users are very susceptible to RSI (Repetitive Strain Injuries) which may be in the form of physical disorder, such as MSD (Musculoskeletal Disorders) or CVS (Computer Vision Syndromes), and various mental disorders. These disruptions are mainly due to people’s ignorance to ergonomic positions and incorrect attitude in using the computer for years. The biggest enemy of modern people is called ‘Disease of Civilization’, a disease caused by the changes in civilization due to the advancement of technology and bad life-style. Overcome the impact of modernization, people find the solution by “think backward” to old concept of the ancestors. Traditional exercise, which at first used for defense mechanism against the nature and enemies (animal and human), is now applied in the work life. Computer users can stay healthy by doing traditional exercises and self-massages. These two prevention efforts are cheap, practical, effective, and no big space required, yet they are very effective and powerful to maintain the health of computer users. In particular, the authors intend to invite computer users to cultivate “Safe and Healthy Computing’’ (‘‘Aman dan Sehat berKomputer’’ = ASK) by integrating exercises as a their life-style
Baum-Welch Algorithm Implementation For Knowing Data Characteristics Related Attacks on Web Server Log
Triawan Adi Cahyanto
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1633.697 KB)
A web server log on the web server which contains all the activities of a web-based application. Activity stored in the log contains request and response from a web server to a web-based application that user accessed. This activity is an important data and can be used to search for occurrence of attack if there are problems on a web-based application. This paper uses a dataset of web server logs to analyze data using dataset which is taken from the event forensics contest because the web server log dataset has a record of activity form attack on a web-based application. Baum-Welch algorithm is used to search a web server log data so that the characteristics of the data are considered as attacks can be classified according to the level of success based on the records stored in the log. The results of the analysis based on dataset used calculated that the amount of data related to the attack were identified as many as 1.120 incidents of a total 202.145 records of data in web server log file.
Lighting System With Hybird Energy Supply For Energy Efficiency and Security Feature of the Building
Renny Rakhmawati;
Safira Nur Hanifah
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1483.508 KB)
Recently, many buildings’ outside corridors have less lighting system at night, because their lamps mostly depend upon electrical energy from PLN (State Electrical Company). It affects the whole electrical power used. Due to this condition, we need to arrange the lamps’ light to reduce electrical power. This research is going to create an automatic lighting efficiency system which is located outside of the building’s corridor; and it uses time setting with the application of RTC (Real Time Clock) to detect human motion with motion-sensor detector (PIR). The primary aim of this research is to manage electrical energy more efficiently and to make a safety measure for the building itself. When PIR sensor detects any motion in safety-time-range that has been set before, it will send a short message to the central security system. It is supplied by hybrid system between solar cell and PLN electrical power. Though the use of the solar cell, an output voltage of 17-19 volt will be reduced through the buck converter to stabilize enough while filling 12-volt the accumulator. The output electrical voltage derived from accumulator will be converted from 12 Vdc to 12 Vac by an inverter; and then it will be increased to 220 Vac by step up voltage regulator to supply its lighting load. Otherwise, if the accumulator is not able to fulfill the supply, a microcontroller will force swith circuit to gain the lighting load another supply from PLN electrical power source. By implementing this management system, total energy within 10 hours (17.00-03.00 WIB) is 420 Wh; and it reduces the energy for 105 Wh with 25% efficiency.
Interviewer BOT Design to Help Student Learning English for Job Interview
Muhammad Junus;
Muhammad Sarosa;
Martin Fatnuriyah;
Mariana Ulfah Hoesny;
Zamah Sari
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1555.549 KB)
To improve skills in English conversation when seeking job in employment interview session is a must to increase competitiveness among other employment seekers. Because of limited resources in our institutions that can help students learning and practice English for interview and achieve their dream work, we design a bot that has personality as an interviewer who asked the questions and then concludes the conversation and make summary of the interview result. This bot interviewer design is using a modern chatter bot named ALICE, and to replicate human intelligent to machine we use AIML. Meanwhile Naive Bayes Algorithm is used to classify the interview result into areas of potentials, talents, and interests of student, and then made a summary in the end of the interview session using a modified phrase reinforcement algorithm where we change the term frequency – inverse document frequency algorithm with Booleanterm frequency using selected keywords. This interviewerbot help student to practice their listening, speaking, know how to answer interviewer questions, and also know their potentials, talents, and area of interests.
Design and Development of Sight-Reading Application for Kids
Christina Theodora Loman;
Trianggoro Wiradinata
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1590.241 KB)
The most common problem faced by kids is the difficulty to sight-read a music score. On the other side, nowadays kids love to learn by playing games in the form of mobile applications. Unfortunately, currently available mobile-based music games tend to target adults, hence not so appealing and therefore more difficult to learn. Considering the difference between every children’s ability, this application is using Fisher-Yates Shuffle algorithm for problem shuffling in each level and also the principal of decision tree for problem choosing based on the problem’s weight and children’s ability. As a solution to the problem stated above, this study is conducted by the design of “Adventure in Music Land”, an Android-based music theory education app specifically designed for kids aged 9 – 13. This application is being used to help kids improve their sight-reading ability.
Pembuatan Sistem E-Commerce Produk Meubel Berbasis Komponen
Sandy Kosasi
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1834.118 KB)
The purpose of the research resulted in E-Commerce system that provides easiness of commercial transactions across the boundaries of cultures and countries with relatively more effective cost and serves personal interaction among users. The marketing digitization provides a number of operational advantages such as an easier tracing of data processing of ordering, inventory system and a more accurate payment that can create a good relationship between companies and customers. Methods used to analyze the market expansion are market opportunity analysis, business model design, customer interface, market communications and prototype design. The production of E-Commerce system uses a component-based extreme programming method. E-Commerce system has front-end and back-end. The management system of content specifically negates intermediaries, reduces manufacturing and shipping costs, and stores information. E-Commerce architecture focuses on the component use of CSS (Cascading Style Sheets), PHP (Personal Home Page), Javascript Framework, jQuery, CI (CodeIgniter), and empowers the MVC (Model View Controller). The functional testing was used. The software used to do a functional test is Lime. Lime technique is integrated with the Symphony framework for PHP programming language so it is an easy testing process. The web-based sales information system can significantly expand the market share through a more dynamic and interactive business process and have a clear differentiation pattern for all segments of society.
Crowdsourcing Web Model of Product Review and Rating Based on Consumer Behaviour Model Using Mixed Service-Oriented System Design
Yuli Adam Prasetyo
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1453.524 KB)
The existence of internet drives many consumer behavior changes. Purchase online (e-commerce) is growing rapidly led to the assumption of behavioral changes prior to making a purchase. Consumer behavior models are 5 phases from needs identification, information search, alternative evaluation, purchase decision, and post-behavior. This model is phases of before and after purchase including online purchasing behavior. Product information has spread on the internet in the form of blogs, web commerce, or other. Buyer candidate need a lot of time to search product information from previous users. Therefore, we need web as a bridge that can bring together the information from experienced users and the need of product from buyer candidate. The concept of crowdsourcing is the right solution to be that bridge web.This study aimed to find the crowd sourcing model of product review and rating based on consumer behavior model. Research methods include surveys, interviews and literature studies. Results of the research is a crowd sourcing model of web of product review and rating using the concept of a mixed service oriented system.This concept is a blend of Software-Based Services (SBS) and Human-Provided Services (HPS). The design of this model can be applied in the development of web-based crowdsourcing
Predict of Lost Time at Traffict Lights Intersection Road Using Image Processing
Yoyok Heru Prasetyo Isnomo
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1503.027 KB)
There are three lamps in traffic lights, green, red, and amber. The amber lamp is a sign for driver as preparing to move when they are stopping because the red lamp turn on, and as emptying vehicles when the phase of traffic lights turn on green, and the moment is called as lost time. Generally, the amber time is regulated manualyl and constant, but the fact that lost time is not constant. By using CCTV IP IR we can determine speed of vehicle, so we can calculate lost time in real time. The sequence of method is used in this paper to predict and determine speed of vehicle : formulation determination to convert distance on image into actual distance in unit meter; pattern recognition of vehicles, in this research using previous research; time depth determination of the first capturing traffic until the second capturing; speed calculation of each vehicles types, and average of vehicles speed; calculation of lost time. The result of the algorithm aplying show that system can predict the speed of the vehicle, by using velocity formulation the system can determine lost time in automatically.
Questions Classification Software based on Bloom’s Cognitive Levels using Naive Bayes Classifier Method
Muhammad Fachrurrozi;
Lidya Irfiyani Silaban;
Novi Yusliani
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1452.813 KB)
Questions Classification is one way to know how the student understanding some lessons. Those questions can be collected and classified based on cognitive Bloom level. Bloom Cognitive Level organized question in groups that represents contents of those questions. Words contained in every question have certain meaning and can be used as base to determine category of question. This study aims to classify amounts of questions based on cognitive Bloom level with Naive Bayes Classifier method. According to Bloom's taxonomy of cognitive level divided into six levels of the Knowledge (C1), Comprehension (C2), Application (C3), Analysis (C4), Synthesis (C5), and Evaluation (C6). In this study, questions classified into 3 classes based on cognitive Bloom level, Knowledge (C1), Comprehension (C2), Application (C3). The amount of collective data used for training process is 240 questions. Result of this study generates accuracy of 75 % from 60 question samples tested. Susceptibility often occured because of same vocabularies from each categories, thus cause mistakes in classification.