cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
PROCEEDING IC-ITECHS 2014
ISSN : -     EISSN : -     DOI : -
Core Subject : Science, Education,
Arjuna Subject : -
Articles 235 Documents
Developing Computer-based Educational Game to support Cooperative Learning Strategy Eva Handriyantini
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1727.656 KB)

Abstract

Game is one of learning media which can be used as a part of learning strategy in school nowadays. Learning strategy using game can be more effective for students especially for developing mathematical skills of primary school students. Educational game development can use Waterfalls model, where development phases can be adjusted to be in accordance with the development needs of educational games. Educational games have teaching material therefore they can be used to support learning strategy in classroom.
The Use of Smartphone To Process Personal Medical Record By Using Geographical Information System Technology Subari Subari; Go Frendi Gunawan
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1669.678 KB)

Abstract

In this era medical record is focussed on how to arrange medical record document. The status of manual medical record will be kept on the storage, the media like paper is very easy to be broken and lost. Therefore the information of medical record data will be difficult to be gotten completely, moreover the file of medical record especially for using personal is not easy to be kept. How the people face the improvement in using the gadget and also smartphone. it should be cope with how to optimalize smartphone technology used by people by using correct information media in the implementing electronic medical record for each person. This research design also includes the technology of geographical information system for the spatial data of private doctor, hospital, medical laboratorium and related object for every using smartphone. This research will result the running application on the smartphone that can operate and manage individual medical record. It can be integrated online on the center of health and give recommendation and retrieval information about medical note for the hospital, private doctor or other health service. The invention of this application can process the medical record data from some deseases fast, more detail and easy, also the geographical visualization for the related health service
Implementasi Metode Integer Programming Untuk Penjadualan Tenaga Medis Pada Situasi Darurat Berbasis Aplikasi Mobile Ahmad Saikhu; Laili Rochmah
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1926.19 KB)

Abstract

Unexpected events, including natural disasters and disasters caused by human negligence often results in the occurrence of an emergency condition. For a disaster event, disaster mitigation is not only necessary, but an emergency response plan for handling the health / safety of life of the victims, are very important. Proper medical treatment by a professional will save many lives. Such event can occur at any location and any time, and in the same time can occur a few emergency events that require some physician team with qualified doctors / particular specialization for handling a number of victims. On the other hand, physicians have a high mobility in performing his professional duties. Due to the limited number of physicians with certain qualifications as required in an emergency and demands should arrive quickly, we need a reliable system in order to coordinate the assignment of an emergency event can be handled properly. Coordination and scheduling can be done by those who have an authority. Scheduling optimization model with special characteristics, among others the existence of a number of emergency events at several locations at the same time, the limited number of physician, needs special skills for handling emergencies, and the presence of medical personnel who are mobile can be done by developing one assignment optimization model, namely integer linear programming (ILP). As for fast communication for coordination between the management authority with a number of doctors, a mobile application can be applied. In this research, Bipartite Graph (BG) model, Ford-Fulkerson Algorithm (FFA) and IPL model as the main part of the decision making structure are implemented into a program. The first model (BG) present concordance between physicians with their expertises. The second model (FFA) helps the authority to determine physician who meet the condition. The third model (ILP) helps the authority to determine the best combination of assignment physician. Input, process, output, and feedback from the implementation is represent decision making system for the assignment physician in to the emergency events. So that the physicians can quickly find out the assignment, the schedule can be accessed through mobile applications.
News Sentiment Analysis Using Naive Bayes And Adaboost Erna Daniati
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1719.41 KB)

Abstract

Most of the data that exists today is in the form of digital data. If we sell shares or write a book even sell products online, it always involves an electronic devices. Since the paper transactions is occurred in digital form, a lot of data are available to be analyzed. One of data or information in digital form is information about the news. Information provided by the news provider's website contains a variety of things such as economics, politics, sports, and the others. The news has a variety of interesting patterns to be analyzed. The pattern can be used to predict the sentiment which contained in a few words, phrases, or sentences from a paragraph of news. This research discusses about sentiment analysis to the word or phrase which is used as test data to produce several classes such as positive, negative, and neutral sentiment. The method that used to weighting is using TFIDF word, then labeling of sentences is using sign numbers multiplication. Next, training and testing are using Naive Bayes method with a combination of AdaBoost.
Penerapan Sistem Informasi Akutansi Pada Toko Panca Jaya Menggunakan Integrated System Michael Androanto T; Rinabi Tanamal
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1619.87 KB)

Abstract

Accounting information system is a very important part for Panca Jaya store. Panca Jaya store is a retail store, which using a manual system, so they may fine difficulties in stock checking, purchases, sales, and accounting. Currently there are many Accounting Information System which can facilitate the process of store operations with a computer system. Integrated system is one accounting information system software that has been used in a variety of stores. This software provides some basic modules needed for the store implementation. Because of that Integrated System, Panca Jaya performed in order to answer the needs of the store and assist in conducting stock checking, purchases , sales and accounting also in store.
Conceptual Methodology For Requirement Engineering Based on GORE and BPM Ahmad Nurul Fajar; Imam Shofi
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1709.37 KB)

Abstract

The main measure of the success of a software system is the degree to which it meets its purpose. Requirement Engineering (RE) is a process for discovering the purpose. Nowdays, the complexity of e-governemnt applications is grown significantly in the government environment.E-government applications should be developed based on regulations in order to achieve the goal model of government entitties. However, the goal model could not used directly to identify the features of applications.In order to solve this problem,this paper presents and proposed conceptual methodology for requirement engineering based on GORE and BPM Alignment.It can support the phase for identify features of applications. In order to support this phase, we align goal model and business process model.This conceptual methodology consists of four methods, there are (1)Method for convert document regulations to goal model, (2).Method for convert goal model into business process model, (3).Method for convert business process model into feature model,and (4).Method for convert feature model to orthogonal variability model
Perangkat Lunak Keamanan Informasi Pada Mobile Menggunakan Metode Stream Dan Generator Cipher Asep Budiman Kusdinar; Mohamad Ridwan
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1760.473 KB)

Abstract

Integration method of stream and generator cipher can used to randomizing message information. Delivery of message information through email or mobile is required a good security and safety system. So can protect message information that be acceptable by receiver carefully and precise. In this article methodologies which will be applied for randomize message information is processing encryption and descryption to apply stream and generator cipher. The software of this can be used to send message information applicable to information in character secret by using key stream and generator cipher as introduction lock of message information. So with existence of this stream and generator cipher is locking authentication message information become safe and is well ensured.
Analisys Design Intrusion Prevention System (IPS) Based Suricata Dwi Kuswanto
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1681.754 KB)

Abstract

Network security is a very important thing. Technological developments have an impact on the security of the computer network with the rise of attackers. It is very threatening the existence of data on storage media from the actions of people who are not responsible. To maintain confidentiality, originality and availability of these data, we need a system to detect the presence of intruders in computer networks that can run in real time. Intrusion Prevention System (IPS) is a method that can monitor the network and can provide a particular action on a computer network. IPS is the development of IDS, which is using Suricata IPS as intruderdetection is connected with IPTables as a deterrent to intruders. IPS is equipped with a display guide user interfaces for easy admin to monitor the network from intrusion action to the server using open source (Linux Ubuntu 12.04 Precise Pangolin) at a operating system. Suricata create alerts when intrusions are detected on the network and stored in log files Suricata. At the same time WebAdmin can display the alert dialog that is accompanied by an alarm signal to instruct IPTables block IP addresses identified as an intruder, so the attacker access to the server is lost. Hopefully design is done optimally capable of detecting attacks
Sistem Monitoring Dan Pengendalian Kinerja Dosen Pada Proses Perkuliahan Berbasis Radio Frequency Identification (RFID) Di Lingkungan Universitas Kanjuruhan Malang Mohamad Sulhan
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1125.53 KB)

Abstract

Radio Frequency Identification application (RFID) has been developed to date. One application RFID. One of RFID applications developed here is a system of monitoring and controlling the lecturers performance in the lecture. In the recording system lecturers are present at each college requires a signature on the list of attendance or presence at every lecture. This situation allows and the chance of fraud in attendance lecturers where lecturers not teaching, but still have the attendance of teaching. Thus it is important to establish a monitoring system that automatically controlled and computerized by RFID-based, so it can provide accurate information, especially in Kanjuruhan University of Malang. From research conducted found that the RFID reader can detect and read the RFID ID card, and assisted with the software as an interface can read the records in the database and display monitor in accordance with the lecturer's name stored in the database. And any data that is detected will be stored in a database so easy to be viewed / monitored by the authorities
Multiple And Single Haar Classifier For Face Recognition Go Frendi Gunawan; Subari Subari
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1706.007 KB)

Abstract

Haar-Classifier is a well-known tool for face detection in an image. Open-CV library already provide a class for Haar-Classifier implementation. However, one significant problem in face detection is tilt-face-pose recognition. In this paper, we will discuss about two different solutions to overcome the problem. The solutions are written in Python which has a very simple syntax. The first solution is using multiple classifier. Each of them is trained to recognize face with different rotation-degrees. The second solution is using single classifier to recognize many face image which have been rotated by different angles.

Page 6 of 24 | Total Record : 235