the i - usu conference systems(iccai) faculty of computer science and information technology...

46

Upload: others

Post on 29-Jul-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The
Page 2: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

THE 5th INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS

(ICCAI)

Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan,

Indonesia December 1, 2020

Page 3: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 i

INTRODUCTION FROM THE CHAIR On behalf of the Organizing Committee, I am pleased to welcome you to the 5th International Conference on Computing and Applied Informatics (ICCAI). The Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, is proud to have the privilege to once again hold an event of this magnitude. Over the past few months, the current situation requires society to change its behavior and adapt quickly. The interaction between individuals in the digital world is increasing rapidly and modern society tends to be more dynamic. Industries and organizations are also forced to optimize their information technology in most of their business processes to survive. As result, the need to perform digital transformation is accelerating at an immense speed. In order to meet these changes, researchers are on the front line to develop innovations and drive the transformation. These transformations must be performed respectfully and responsibly. Every innovation will eventually come at a cost. Thus, it is important to maintain a certain set of rules in performing research and applying innovation. Communication and collaboration amongst researchers are the key factors to enhance the research process while maintaining the sustainability of the environment. Hence, as one of the best higher-education institutions in Indonesia, we are obligated to accommodate the need to communicate amongst scientists. In today’s conference, we are honored to accept 51 outstanding works of authors from 6 different countries that have been through a challenging review process. With the acceptance rate of 59 %, it is unfortunate for us to see that some high-quality manuscripts did not manage to go through the review process. Thus, allow me to give my appreciation to every author that has participated in this event and to congratulate all the invited authors who have their manuscript passed the process. I would like to welcome our keynote speakers. Prof. Dr.-Ing Hendro Wicaksono from Jacobs University Bremen gGmbH, Germany; Prof. Matthew N. Dailey from Asian Institute of Technology, Thailand; and Prof. Gyun Woo from Pusan National University, South Korea. It is our honor to welcome you to our event and thank you very much for your willingness to become the keynote speaker of this event. We believe that your contribution may become a valuable insight for us in our future endeavors to perform research. Lastly, I would like to give my highest gratitude to all the international committee, the steering committee, and the organizing committee, who have spent countless times to support this conference. It is my privilege to work alongside the current committees that have repeatedly shown an outstanding effort to make this event possible. Let me conclude by welcoming all of you to the 5th International Conference on Computing and Applied Informatics. I am confident that this event will be an excellent opportunity for us to share innovation and knowledge. I wish you have a rewarding exchange at this event. Thank you Dr. Eng Ade Candra S.T., M.Kom. General Chair of The 5th ICCAI 2020

Page 4: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 1

TABLE OF CONTENTS

INTRODUCTION FROM THE CHAIR ..................................................................................................................................i

TABLE OF CONTENTS ........................................................................................................................................................... 1

CONFERENCE INFORMATION ........................................................................................................................................... 4

COMMITTEE ............................................................................................................................................................................. 5

VENUE .......................................................................................................................................................................................... 7

KEYNOTE SPEAKERS ............................................................................................................................................................. 8

Prof. Dr. -Ing Hendro Wicaksono ......................................................................................................................8

Prof. Matthew N. Dailey ....................................................................................................................................... 10

Prof. Gyun Woo ....................................................................................................................................................... 12

PROGRAM SCHEDULE ........................................................................................................................................................ 14

PARALLEL SESSION SCHEDULE .................................................................................................................................... 15

SESSION ZOOM ROOM ......................................................................................................................................... 15

ABSTRACTS ............................................................................................................................................................................ 19

Delay Distributions on Encrypted Real-Time Traffics ............................................................................ 19

Analysis of C4.5 Algorithm of Water Quality Dataset .............................................................................. 19

Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion ......................................... 20

Expert System in Periodontal Diseases Diagnosis Using the Certainty Factor Method ............ 20

Recognition of Hand Movement For Training Motor Skill of Children With Autism Spectrum Disorder (ASD) Using Myo Gestures Control Armband and Artificial Neural Network ............ 21

Data science : A Review towards the Big Data Problems ...................................................................... 21

Performance Analysis Similarity Matrix, Responsibility Matrix, Availability Matrix, Criterion Matrix of Affinity Propagation .......................................................................................................................... 22

Bahasa Indonesia Pre-Trained Word Vector Generation Using Word2vec for Computer and Information Technology Field .......................................................................................................................... 22

An A Relevant Document Search System Model Using Word2vec Approaches ........................... 23

Evaluation of the Factors Influencing the Trust of Millennial Citizens in E-Government ........ 23

Face Recognition using Self Organizing Map Based on Multi-Level Thresholding and Features Extraction ............................................................................................................................................... 24

Designing Online Healthcare Using DDD in Microservices Architecture ........................................ 24

Re-programming Electronic Control Unit for Increase Torque and Power a Motorcycle ........ 25

Usability Testing for Student Academic Information System in State Polytechnic of Creative Media ........................................................................................................................................................................... 25

Augmented Reality Peripheral Performance: Light Intensity, Distance, Occlusion and Marker Testing ........................................................................................................................................................................ 25

Page 5: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 2

Web-Based Application Design based on Usability Atrributes for Sport Reservation Places: FUTSALKUY Apps................................................................................................................................................... 26

Implementation of Image Security using Elliptic Curve Cryptography RSA Algorithm and Least Significant Bit Algorithm ......................................................................................................................... 26

Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS) ........................................................................................................................................................................... 27

Web-based E-Commerce Products Grouping ............................................................................................. 27

Comparison SAW, TOPSIS, and MOORA of Evaluation Socioeconomic Welfare .......................... 28

Prognosis of Diabetes Mellitus with Transfer Learning-Based Naïve Bayes Method ................ 28

Usability evaluation of a Gamification-based programming learning platform: Grasshopper ....................................................................................................................................................................................... 29

Design a Potential Analysis using Fingerprint PC Base .......................................................................... 29

Diagnosis of Facial Skin Disease in Expert System Using Fuzzy Sugeno Method ....................... 30

Optimization and Computing Model of Fish Resource Supply Chain Distribution Network .. 30

Identification of Lung Cancer on Chest X-Ray (CXR) Medical Images Using the Probabilistic Neural Network Method...................................................................................................................................... 31

Face Recognition for a Student Violation Point System in Schools Using the Fisherfaces Algorithm ................................................................................................................................................................... 31

Heart Disease Simulation with Mixed Reality Technology ................................................................... 32

Human Detection and Identification for Home Monitoring System .................................................. 32

Neural Network Enhancement Forecast of Dengue Fever Outbreaks in Coastal Region ......... 33

Discovering Right Congregation For Preachers Using Clustering Approach ................................. 33

Implementation of Not So Naive and Burkhard-Keller Tree algorithms in Indonesian-Hokkien dictionary application ........................................................................................................................ 34

Implementation of hybrid cryptosystem using Rabin-p algorithm and One Time Pad to secure images .......................................................................................................................................................... 35

Robot Arm Inverse Kinematics Wrist Tilt Repair Using PID Control System (Proportional, Integrative, Derivative) ....................................................................................................................................... 35

SNPE-SRGAN: Lightweight Generative Adversarial Networks for Single-Image Super-Resolution on Mobile Using SNPE Framework .......................................................................................... 35

A neural cryptography approach for digital image security using Vigenère cipher and tree parity machine ........................................................................................................................................................ 36

A cryptocompression system with Multi-Factor RSA algorithm and Levenstein code algorithm ................................................................................................................................................................... 37

IoT Based Automated Tomato Watering System Using ESP8266 ...................................................... 37

An implementation of Rabin-p cryptosystem and affine cipher in a hybrid scheme to secure text ............................................................................................................................................................................... 38

Application of A-Star Algorithm on Pathfinding Game ........................................................................... 38

Research Review on Big Data Usage for Learning Analytics and Educational Data Mining: A Way Forward to Develop an Intelligent Automation System .............................................................. 38

Page 6: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 3

Contribution Principal Component Analysis to Optimizing Data by Reducing Product Data on Transaction ............................................................................................................................................................... 39

Social network extraction based on Web: A Review about Supervised Methods ........................ 40

Experimental study of seawater evaporation using natural convection principles .................. 40

Thermal Analysis on Heat Pump Chili Drying Chamber with variations in the direction of air flow using Computational Fluid Dynamics .................................................................................................. 40

Maple as a tool to understand marketing game for up to four companies ..................................... 41

Securing IoT Network against DDoS Attacks using Multi-agent IDS ................................................ 42

Effect of airflow on Heat Pump in drying mode ........................................................................................ 42

Page 7: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 4

CONFERENCE INFORMATION

Tittle : The 5th International Conference on Computing and Applied Informatics

Dates : December 1st , 2020

Organizer : Faculty of Computer Science and Information Technology

Universitas Sumatera Utara (USU)

Venue : Medan, Sumatera Utara, Indonesia

Phone : +62 61 42081234

Fax : +62 61 42081234

E-mail : [email protected]

Website : http://iccai.usu.ac.id

Official Language : English

Secretariat : Faculty of Computer Science and Information Technology

Universitas Sumatera Utara (USU)

Jalan Universitas No. 9A, Kampus USU, Medan, 20155

Sumatera Utara, Indonesia

Page 8: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 5

COMMITTEE Honorary Chair

Prof. Dr. Runtung Sitepu, S.H., M.Hum (Rector of Universitas Sumatera Utara)

International Committee

Prof. Piet Kommers (UNESCO Learning Technologies)

Prof. Hiromi Homma (Toyohashi University of Technology, Japan)

Prof. Anton Satria Prabuwono (King Abdulaziz University, Saudi Arabia)

Prof. Dr. Rahmita Wirza 0.K. Rahmat (Universiti Putra Malaysia, Malaysia)

Prof. Dr. Rahmat Budiarto (Al Baha University, Sauda Arabia)

Assoc. Prof. Dr. Kardi Teknomo (Ateneo de Manila University, Philippines)

Assoc. Prof. Thumrongrat Amornraksa (King Mongkut's University og Technology Thonburi,

Thailand)

Assoc. Prof. Dr. Hazura Zulzalil (Universiti Putra Malaysia, Malaysia)

Dr. Avan Suinesiaputra (University of Auckland, New Zealand)

Dr. Edward Halawa (University of South Australia, Australia)

Steering Committee

Prof. Dr. rer.nat. Dedi Rosadi (Universitas Gajah Mada, Indonesia)

Prof. Dr. Taufik Fuadi Abidin, S.Si., M.Tech (Universitas Syiah Kuala, Indonesia)

Prof. Dra. Sri Hartati, M.Sc., Ph.D (Universitas Gajah Mada, Indonesia)

Prof. Dr. Opim Salim Sitompul (Universitas Sumatera Utara, Indonesia)

Prof. Dr. Muhammad Zarlis (Universitas Sumatera Utara, Indonesia)

Prof. Drs. Mahyuddin K. M. Nasution, Ph.D (Universitas Sumatera Utara, Indonesia)

Prof. Dr. Eng. Himsar Ambarita (Universitas Sumatera Utara, Indonesia)

Dr. Kurnianingsih (Politeknik Negeri Semarang)

Dana Sulistyo Kusuma, Ph.D (Telkom University)

Benny B. Nasution, Ph.D (Politeknik Negeri Medan, Indonesia)

Dr. Erna Budhiarti Nababan, M.IT (Universitas Sumatera Utara, Indonesia)

Dr. Maya Silvia Lydia, B.Sc., M.Sc (Universitas Sumatera Utara, Indonesia)

Dr. Elviawaty Muisa Zamzami, ST., MT., MM (Universitas Sumatera Utara, Indonesia)

Dr. Poltak Sihombing, M.Kom (Universitas Sumatera Utara, Indonesia)

Dr. Syahril Efendi, S.Si., M.IT (Universitas Sumatera Utara, Indonesia)

Organizing Committee

General Chair

Dr. Eng Ade Candra, S.T., M.Kom.

General Co-Chair

1. Jos Timanta Tarigan, S.Kom., M.Sc.

2. Indra Aulia, S. TI., M.Kom.

Page 9: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 6

Program Chair-Technical Chair

Dr. Maya Silvia Lydia, B.Sc., M.Sc

Dr. Erna Budhiarti Nababan, M.IT

Romi Fadillah Rahmat, B.Comp.Sc., M.Sc.

Dr. Elviawaty Muisa Zamzami, ST., MT., MM

Muhammad Fadly Syahputra, B.Sc., M.Sc.IT.

Baihaqi Siregar, S.Si, M.T.

Hayatunnufus, S.Kom. M.Cs.

Agnes Irene Silitonga, S.Kom. M.Kom.

Niskarto Zendrato, S.Kom., M.Kom.

Fanindia Purnamasari, S.TI., M.IT.

T. Henny Febriana Harumy, S.Kom., M.Kom.

Fuzy Yustika Manik, S.Kom., M.Kom. Dewi Sartika Br Ginting, S.Kom., M.Kom. Liaison Chairs

Sri Melvani Hardi, S.Kom., M.Kom.

Marischa Elveny, S.TI., M.Kom.

Rossy Nurhasanah, S.Kom., M.Kom.

Ainul Hizriadi, S.Kom., M.Kom.

Desilia Selvida, S.Kom., M.Kom.

Pauzi Ibrahim Nainggolan, S.Kom., M.Sc.

Annisa Fadhillah Pulungan, S.Kom., M.Kom.

Fadly Idris, S.E.

Halida Happy, S.H.

Dibya Wicitra, S.Kom.

Segar Surya, S.E.

Yudha Nugraha Pratama Samosir

Page 10: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 7

VENUE

Medan, Sumatera Utara, Indonesia Zoom Webinar

Page 11: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 8

KEYNOTE SPEAKERS

Prof. Dr. -Ing Hendro Wicaksono

(Jacobs University Bremen gGmbH, Germany) Affiliation Jacobs University, Bremen, Germany Publication Topics Wind Turbines, PI Control, Building Management Systems, Electric Current Control, Energy Management Systems, Knowledge Based Systems, Optimisation, Variable Structure Systems, Water Pumps, Global Positioning System, Internet of Things, Active Filters, Blades, Cameras, Closed Loop Systems, Cloud Computing, Computer Vision, Data Mining, Energy Conservation, Frequency Control, Fuzzy Neural Nets, Fuzzy Reasoning, Harmonic Distortion, Home Automation, Inductive Power Transmission. Biography Hendro Wicaksono received the Dr.-Ing. degree from the Karlsruhe Institute of Technology, Karlsruhe, Germany, in 2016., He is currently a Professor of industrial engineering with the Jacobs University Bremen, Bremen, Germany. He was a Researcher with the Institute of Information Management in Engineering, Karlsruhe Institute of Technology. He is also a Visiting Professor with the Faculty of Economics and Business, Airlangga University, Surabaya, Indonesia. He has been researching and managing teens of international research projects in energy-management systems in buildings, production, and cities using semantic technologies and data mining. He has published 29 papers (two nominations for Best Papers).(Based on document published on July 2020).

Page 12: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 9

Achieving Sustainable Development Goals in Industry 4.0 Context through

Collaborative Innovation

The sustainable development goals are a set of 17 interlinked objectives set by United Nations General Assembly to achieve a better and sustainable future by 2030. The goals include Affordable and Clean Energy, Industry Innovation and Infrastructure, Sustainable Cities and Communities, and Responsible Consumption and Production. Currently, the industry sector is also transforming to a new paradigm called industry 4.0, which emphasizes the digitalization, interconnection, and intelligence in the frame of internet of things, services, and people. Technological innovation, which requires interdisciplinary collaborations, is the key for industry and society to play active roles in both contributing to sustainable development goals and industry 4.0 context. The talk will discuss collaborative innovation involving universities, research organization, large enterprises, SMEs and the government on both strategical and operative levels. It will present the strategy of triple helix innovation model and some collaboration research innovation projects that implement the model. The projects concentrate on the applications of data management and engineering methodologies such as knowledge graphs and machine learning in manufacturing, construction, and smart cities.

Page 13: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 10

Prof. Matthew N. Dailey

(Asian Institute of Technology, Thailand)

Affiliation Asian Institute of Technology Khlong Luang AI Center Pathum Thani,Thailand,12120 Publication Topics Learning (Artificial Intelligence), Object Detection, Traffic Engineering Computing, Computer Vision, Motorcycles, Road Accidents, Road Safety, Client-Server Systems, Customer Satisfaction, Data Dissemination, Face Recognition, Feedforward Neural Nets, Graphics Processing Units, Image Classification, Injuries, Intelligent Transportation Systems, Meta Data, Object Recognition, Object Tracking, Retailing, Road Traffic, Road Vehicles, Telecommunication Computing, Teleconferencing, Vehicular ad hoc Networks Biography Matthew Dailey is a Professor and Head of the Information and Communication Technologies Department at the Asian Institute of Technology and the Director of the AIT AI Center. He obtained the Ph.D. in Computer Science and Cognitive Science from the University of California, San Diego and the B.S. and M.S. in Computer Science from North Carolina State University. Before entering academia, he worked in several U.S. technology companies involved in practical applications of machine learning, including Vision Robotics Corp., Burning Glass Technologies, and HNC Software. He has published more than 100 papers.(Based on document published on March2020).

Page 14: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 11

Getting Something for Nothing: Filling Data Gaps with Generative Adversarial Networks

In the last 10 years, modern machine learning models, especially deep neural networks, have solved an amazing array of difficult problems, from image classification to machine translation to natural language understanding. However, the main barrier to problem solving with deep neural networks is the availability of appropriate datasets for the learning task. In this talk, I will use a simple example of change detection in images to demonstrate this difficulty. I will introduce Goodfellow's et al.'s (2014) Generative Adversarial Networks (GANs) as a remarkably flexible solution to the problem of dataset generation in cases where some data are available but there is a "gap" between what we have and what we need. I will show how a partial data set, GANs, and a few other tools can be pieced together to create a robust vehicle change detection system that can be applied to enable new solutions for the insurance industry, car rental industry, and so on. More generally, GANs are poised to help solve a plethora of real-world problems amenable to analysis by deep learning at a fraction of the cost of collecting and hand-labeling large data sets.

Page 15: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 12

Prof. Gyun Woo

(Pusan National University South Korea) Affiliation Smart Control Center of LG Electronics Pusan National University Busan,Korea Publication Topics Functional Languages, Parallel Programming, Android (operating system), Big Data, Internet, Behavioural Sciences, Computer Aided Instruction, Computer Science Education, Data Visualisation, Functional Programming, Human Computer Interaction, Investment, Mobile Computing, Multiprocessing Programs, Multiprocessing Systems, Pattern Classification, Pattern Matching, Programming, Software Maintenance, Stock Markets,Weibull Distribution, Control Engineering Computing, Program Diagnostics, Robot Programming, Websites. Biography Gyun Woo is an associate Professor of the School of Computer Science and Engineering at Pusan National University in Busan, Republic of Korea. He received BS, MS, and PhD degrees in computer science from KAIST, in 1991, in 1993, and in 2000, respectively. He worked at Dong-A University as an assistant professor. He joined Pusan National University in September 2004. During the year of 2009, he was a visiting scholar in the School of Electrical Engineering and Computer Science of Washington State University. He is the co-author of Playing with C and Playing with Java (Kyobo Book Company). His area of interest includes implementation of programming languages, program analyses, functional languages, functional programming, software testing, swarm intelligence, controlling robots, and visualization of software. He has published 63 papers (Based on document published on Juny 2020).

Page 16: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 13

How to promote student activities in the COVID pandemic?

The most important loss of the COVID-19 Pandemic is that of direct communications among people. The impact of this also affects the classrooms in Universities, resulting in unsatisfactory feedback from students for their lectures. This can be an opportunity, however, since all have two sides. Even though it is virtual, we can still promote student activities in a classroom if we are willing to take some additional effort. In this keynote, we will take a brief review of how to promote student activities with practical tools to achieve that.

Page 17: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 14

PROGRAM SCHEDULE

1st of December 2020

Page 18: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 15

PARALLEL SESSION SCHEDULE

SESSION ZOOM ROOM

(13.15 - 15.15)

No Time Paper ID Author Title of Paper

ROOM 1

1 1.15-1.30 PM

13002 Dirja Nur Ilham, Suherman Suherman, G Sihombing, Yulianta Siregar

Delay distributions on encrypted real-time traffics

2 1.30-1.45 PM

13412 Rossy Nurhasanah, Lira Savina, Zul Mahadi Nata, Ilham Zulkhair

Design and Implementation of IoT Based Automated Tomato Watering System Using ESP8266

3 1.45-2.00 PM

13543 Bedine Kerim Securing IoT Network against DDoS Attacks using Multi-agent IDS

4 2.00-2.15 PM

13230 Idham Kamil, Soeharwinto, Ferry Fachrizal

Re-programming Electronic Control Unit for Increase Torque and Power a Motorcycle

5 2.15-2.30 PM

13372 Davy Ronald Hermanus, Sasmoko Sasmoko, Yasinta Indrianti

Design a Potential Analysis using Fingerprint PC Base

6 2.30-2.45 PM

13394 Budi Hasian Daulay, Maya Silvi Lydia, Rahmat W. Sembiring

Robot Arm Inverse Kinematics Wrist Tilt Repair Using PID Control System (Proportional, Integrative, Derivative)

ROOM 2 1 1.15-1.30

PM 13306 Handrizal Implementation of Image Security using

Elliptic Curve Cryptography RSA Algorithm and Least Significant Bit Algorithm

2 1.30-1.45

PM

13092 Doni Irwansyah Putra, Handrizal, Jos Timanta Tarigan

Implementation of Modified Least Significant Bit Steganography Using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion

3 1.45-2.00

PM

13308 Ofelius Laia, Elviawaty Muisa Zamzami, Sutarman

Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS)

4 2.00-2.15 PM

13404 Mohammad Andri Budiman, Handrizal, William

A Neural Cryptography Approach for Digital Image Security using Vigenère Cipher and Tree Parity Machine

Page 19: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 16

5 2.15-2.30 PM

13408 Mohammad Andri Budiman, Poltak Sihombing, Ihya Ainun Fikri

A Cryptocompression System with Multi-Factor RSA Algorithm and Levenstein Code Algorithm

6 2.30-2.45 PM

13413 Mohammad Andri Budiman, Handrizal, Sasmita Azzahra

An implementation of Rabin-p cryptosystem and affine cipher in a hybrid scheme to secure text

7 2.45-3.00 PM

13393 Mohammad Andri Budiman, Muhammad Zarlis, Hafrizah Hafrizah

Implementation of Hybrid Cryptosystem Using Rabin-p Algorithm and One Time Pad to Secure Images

ROOM 3 1 1.15-1.30

PM 13201 Setiawan Assegaff, Ari

Andrianti, Lola Yorita Astri

Evaluation of the Factors Influencing the Trust of Millennial Citizens in E-Government Adoption

2 1.30-1.45

PM

13272 Sari Setyaning Tyas, Yuyun Khairunisa

Usability Testing For Student Academic Information System In State Polytechnic of Creative Media

3 1.45-2.00

PM

13299 Rahmat Fauzi, Muharman Lubis, Edi Sutoyo

Web-Based Application Design based on Usability Atrributes for Sport Reservation Places: FUTSALKUY Apps

4 2.00-2.15

PM

13304 Viany Utami Tjhin, Setiani Putri Hendratno

Factors Affecting Players to Pay Online Games

5 2.15-2.30

PM

13226 Muhammad Rizki, Ahmad Nurul Fajar, Astari Retno Wardhani

Designing Online Healthcare Using DDD in Microservices Architecture

6 2.30-2.45

PM

13371 Rena Nuravianty, H B Santoso, Kasiyah

Evaluation of the usability of Grasshopper in programming language learning

7 2.45-3.00

PM

13379 Nurdin, M. Zarlis, Tulus, Syahril Efendi

Optimization and Computing Model of Fish Resource Supply Chain Distribution Network

ROOM 4 1 1.15-1.30

PM 13070 Heru Mardiansyah,

Muhammad Zarlis, Opim Salim Sitompul

Analysis of C4.5 Algorithm (Water Quality Data)

2 1.30-1.45

PM

13093 Handrizal Expert System in Periodontal Diseases Diagnosis Using the Certainty Factor Method

3 1.45-2.00

PM

13329 Masna Wati, Sri Uswatun Hasanah

Comparison SAW, TOPSIS and MOORA to evaluation socio-economic welfare

4 2.00-2.15

PM

13358 Anik Andriani, Sri Hartati Prognosis of Diabetes Mellitus with Transfer Learning-Based Naive Bayes Method

5 2.15-2.30

PM

13373 Sri Melvani Hardi, D P D Siregar, Elviwani

Diagnosis of Facial Skin Disease in Expert System Using Fuzzy Sugeno Method

Page 20: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 17

6 2.30-2.45

PM

13203 Amir Saleh, Fadhillah Azmi, N Priya Dharshinni

Face Recognition using Self Organizing Map Based on Multi-Level Thresholding and Features Extraction

7 2.45-3.00

PM

13383 D Arisandi, M F Syahputra, S Purnamawati, A Hizriadi, M H Azra

Face Recognition for a Student Violation Point System in Schools Using the Fisherfaces Algorithm

ROOM 5 1 1.15-1.30

PM 13096 M F Syahputra , S M

Hardi , A Prasetyo Recognition of Hand Movement For Training Motor Skill of Children With Autism Spectrum Disorder (ASD) Using Myo Gestures Control Armband and Artificial Neural Network

2 1.30-1.45

PM

13288 Edy Budiman, Muhammad Bambang Firdaus, Ummul Hairah

Augmented Reality Peripheral Performance: Light Intensity, Distance, Occlusion and Marker Testing

3 1.45-2.00

PM

13384 Mohammad Fadly Syahputra, Rizka Zanury, Ulfi Andayani, Sri Melvani Hardi

Heart Disease Simulation with Mixed Reality Technology

4 2.00-2.15

PM

13385 D Arisandi, M Elveny, R Rahayu

Human Detection and Identification for Home Monitoring System

5 2.15-2.30

PM

13402 Hendrik Tampubolon, Aji Setyoko, Fanindia Purnamasari

SNPE-SRGAN: Lightweight Generative Adversarial Networks for Single-Image Super-Resolution on Mobile Using SNPE Framework

6 2.30-2.45

PM

13474 Divan Apryanto Sibarani Sibarani, Horas Siagian, Himsar Ambarita

Experimental study of seawater evaporation using natural convection principles

7 2.45-3.00

PM

13475 A.H. Siburian1, P.G. Silalahi, N. D. M. Romauli, H. Ambarita

Thermal Analysis on Heat Pump Chili Drying Chamber with variations in the direction of air flow using Computational Fluid Dynamics

8 3.00-3.15

PM

13544 H V Sihombing, N D M Romauli, K N Sinamo, H Ambarita

Effect of airflow on Heat Pump in drying mode

ROOM 6 1 1.15-1.30

PM 13098 Mahyuddin K. M.

Nasution Data science: A Review towards the Big Data Problems

2 1.30-1.45

PM

13392 Mohammad Andri Budiman, Dian Rachmawati, Charity

Implementation of Not So Naive and Burkhard-Keller Tree Algorithms in Indonesian-Hokkien Dictionary Application

3 1.45-2.00

PM

13192 Selina Amelia Savittri, Amalia Amalia, Mohammad Andri Budiman

A relevant document search system model using word2vec approaches

4 2.00-2.15

PM

13419 A Yunita, H B Santoso, Z A Hasibuan

Research Review on Big Data Usage for Learning Analytics and Educational

Page 21: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 18

Data Mining: A Way Forward to Develop an Intelligent Automation System

5 2.15-2.30

PM

13420 Dewi Sartika Br Ginting, Fuzy Yustika Manik, Fanindia Purnamasari

Contribution Principal Component Analysis to Optimizing Data by Reducing Product Data on Transaction

6 2.30-2.45

PM

13190 Syarifah Keumala, Amalia Amalia, Erna Budhiarti Nababan, Opim Salim Sitompul

Bahasa Indonesia Pre-Trained Word Vector Generation Using Word2vec For Computer And Information

7 2.45-3.00

PM

13473 Mahyuddin K. M. Nasution, Shahrul Azman Noah

Social network extraction based on Web: A Review about Supervised Methods

8 3.00-3.15

PM

13310 M Elveny, S M Hardi, I Jaya, P Gundari

Web-based E-Commerce Products Grouping

ROOM 7 1 1.15-1.30

PM

13387 THF Harumy ., Dewi Sartika Br. Ginting

Neural Network Enhancement Forecast of Dengue Fever Outbreaks in Coastal Region

2 1.30-1.45

PM

13382 M F Syahputra , R F Rahmat, R Rambe

Identification of Lung Cancer on Chest X-Ray (CXR) Medical Images Using the Probabilistic Neural Network Method

3 1.45-2.00

PM

13101 Hanna Willa Dhany Performance Analysis Similarity Matrix, Responsibility Matrix, Availability Matrix, Criterion Matrix of Affinity Propagation

4 2.00-2.15

PM

13389 Afrizal Nur, Rahmad Kurniawan, Mohd Zakree Ahmad Nazri, Abdul Somad Batubara, Elin Haerani, Imansyah Putra

Discovering Right Congregation for Preachers Using Clustering Approach

5 2.15-2.30

PM

13416 Ade Candra, Mohammad Andri Budiman, Rahmat Irfan Pohan

Application of A-Star Algorithm on Pathfinding Game

6 2.30-2.45

PM

13476 Zahedi Zahedi, Marwan Affandi, Suparni Suparni, Yenny Suzana, Fachrur Razi

Maple as a tool to understand marketing game for up to four companies

Page 22: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 19

ABSTRACTS Paper ID : 13002

Delay Distributions on Encrypted Real-Time Traffics

Dirja Nur Ilham1, S Suherman2*, G Sihombing2, Yulianta Siregar2 1Politeknik Aceh Selatan, Indonesia

2Electrical Engineering Department, Universitas Sumatera Utara, Medan-Indonesia

Email: *[email protected]

Real-time streams are common for nowadays communication for both data and video. Real-time data communication such as chat application and telemetry, as well as real-time video communication such as video call, video conference or monitoring video are prone to third party attacked. End to end encryption has been considered as the most realistic solution such as applied by whatsapp, so that the transmitted data is difficult to be revealed by attacker. Since encryption and decryption processes injected additional delay, the algorithm should be fast enough to avoid inconvenience to users. This paper examines delay distribution for encrypted real-time traffics. Simulation shows that the decryption contributed the most on the end to end delay. Decryption delay is about 4.58 times higher than encryption and transmission delay. Although assessment involves only two links, complex network has relatively lower than the obtained decryption delay. Meanwhile encryption contributed only about 0.2% to overall end to end delay. Paper ID : 13070

Analysis of C4.5 Algorithm of Water Quality Dataset

Heru Mardiansyah1, Muhammad Zarlis2, Opim Salim Sitompul3 1,2,3Faculty of Computer Science and Information Technology,

Universitas Sumatera Utara, Medan- Indonesia

Email : [email protected], [email protected], [email protected]

The C4.5 algorithm still has weaknesses in predicting or classifying data if a large number of classes are used which can lead to increased decision-making time. So an approach is needed to improve the performance of the C4.5 algorithm with the selected split attributes that use the application of the average gain value to help predictions. The C4.5 algorithm is one of the Decision Tree methods in the classification process using the information entropy concept. The C4.5 algorithm uses the split criteria from ID3, the Gain Ratio is a modification of the method. The ID3 algorithm uses Information Gain (IG) for the split attribute criteria, while the C4.5 algorithm with Gain Ratio (GR), where the root value comes from high gain. The conclusion of the tests that have been carried out using the Water Quality dataset in the C4.5 method has an accuracy rate of 91.30%, with a classification error rate of 8.70%. Successful implementation using the C4.5 method in predicting the Water Quality dataset.

Page 23: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 20

Paper ID : 13092

Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image

Insertion

Handrizal1*, Jos Timanta Tarigan1, Doni Irwansyah Putra1 1Department of Computer Science, Faculty of Computer Science and Information Technology, Universitas

Sumatra Utara, Jl. University No. 9-A, Medan 20155, Indonesia

Email: *[email protected]

Steganography technique is a technique to hide data or information into other media such as digital images, text, sound, or video. One of the simplest methods of Steganography in the concept of Steganography is the Least Significant Bit. The Least Significant Bit (LSB) method hides the message by inserting the message at the lower or rightmost bits in the cover work file as a medium to hide the message. Caesar Cipher is one method that replaces each letter in the plaintext with letters that are at odds with certain numbers in the alphabet. Columnar transposition Cipher is one method in which messages are written in rows of a specified length, then are read column by column in the order of reading based on a keyword. The message is inserted into the cover image with the target pixel determination to be inserted based on the results of the Caesar Cipher process of the Columnar Transposition Cipher index to the random value of the Multiply With Carry Generator algorithm. The system implementation uses the C# programming language. The results of this study indicate that the implementation of a combination of Caesar Cipher, Columnar Transposition Cipher, and Multiply With Carry Generator can maintain the confidentiality, integrity, and security of data Paper ID : 13093

Expert System in Periodontal Diseases Diagnosis Using the Certainty Factor Method

Handrizal1*, Elviawaty Muisa Zamzami1, Maulana Arif1

1Department of Computer Science, Faculty of Computer Science and Information Technology, Universitas Sumatra Utara, Jl. University No. 9-A, Medan 20155, Indonesia

Email: * [email protected]

Dental and oral health is sometimes not a priority for some people, even though dental and oral diseases have a serious impact on health in general, because teeth and mouth are a place for germs and bacteria to enter, so they are likely to interfere with the health of other body organs. Periodontal disease is a gum disease caused by bacteria that damage the tissue supporting the teeth and cause tooth loss. Periodontal disease is divided into 2, namely gingivitis and periodontitis. An expert system is a system that tries to implement human knowledge on a computer so that computers can solve problems as experts do. The certainty factor method is used for calculations because the certainty factor method can solve the uncertainty of a problem by measuring a person's belief. The result of this research is an expert system that can produce the name of periodontal disease and the level of certainty for the user's disease. This application

Page 24: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 21

has 100% accuracy based on test results on 20 medical record data, it is obtained that the 20 data match with the results of the system diagnosis. Paper ID : 13096

Recognition of Hand Movement For Training Motor Skill of Children With Autism Spectrum Disorder (ASD) Using Myo Gestures Control Armband

and Artificial Neural Network

M F Syahputra1* , S M Hardi2 , A Prasetyo3 1,2,3 Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Jl. Universitas

No. 9-A, Medan 20155, Indonesia

Email: [email protected]*|[email protected] |[email protected]

Autism disorder causes children with Autism Spectrum Disorder (ASD) tend to left compared with other children in understanding and receiving stimulation or materials provided by teachers in school, caused from inability of children with ASD disorder to focus attention and focus concentration on stimulation provided. One of the therapies used for training motor skill’s of children with autism can be used technology. One of technology tool is Myo Gestures Control Armband which is equipped with several sensors that can recognize hand movements and arm movements and uses Artificial Neural Network method, which is perfect for introduction and classification of hand movements and e Artificial Neural Network itself adopts a thought-through mechanism that affects the human brain, both for processing various signals of accepted elements, tolerance to errors, and also parallel processing. In this study, there were five movements used Ok, Fist, Like, Rock, and Spock to train motor movement of children with autism. With this system, it can be one of therapy’s method which is carried out at home by monitoring and controlling from a therapist so it can improve development of motor skill hands in children with autism. Paper ID : 13098

Data science : A Review towards the Big Data Problems

Mahyuddin K. M. Nasution, Opim Salim Sitompul, Marischa Elveny, Rahmad Syah Fakultas Ilmu Komputer dan Teknologi Informasi,

Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

E-mail: [email protected]

Data science is the naming of science that can change when dealing with its subject, big data, into big data science. Extraction as the main task of and based on the definition of data science requires an interpretive way of big data. This interpretation follows the characteristics of big data, namely a review of several problems that arise concerning the characters of big data is as an approach. The goal is that data and information, in information extraction or knowledge extraction from the information space, can well organize as is the case in social networks. This paper aims to provide a brief description of it.

Page 25: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 22

Paper ID : 13101

Performance Analysis Similarity Matrix, Responsibility Matrix, Availability Matrix, Criterion Matrix of Affinity Propagation

Hanna Willa Dhany

Faculty of Science and Technology Universitas Pembangunan Pancabudi Medan, Indonesia

Email: [email protected]

Each process in classifying data into several clusters or grouping so that the data in one cluster has a maximum similarity level and between clusters has a minimum similarity is called clustering. Clustering is divided into 2 approaches in its development, namely the partitioning and hierarchical approach to clustering[1]. The Water Quality Status dataset has 8 attributes, 4 classes and 120 instances, Class distribution is good condition (30 instances), lightly polluted (30 instances), medium polluted (30 instances) and heavily polluted (30 instances). 70% of the data will be used as training data and 30% of the data will be used as randomized test data. The simplify the process of completing the performance calculation of the clustering model, the research implementation was carried out using the MATLAB function. That iteration is carried out with the number of clusters generated from 100 to 2,500 iterations with the results of the number of clusters as many as 10 clusters. In the experiment, iteration amounted to 5000 and there was a change in the results of the number of clusters by 9 clusters. After re-testing using the number of iterations of 10,000-50,000 iterations, but the number of clusters produced did not change anything at all. So that the conclusion in testing the AP method produces the most optimal number of clusters of 10 clusters. Paper ID : 13190

Bahasa Indonesia Pre-Trained Word Vector Generation Using Word2vec for Computer and Information Technology Field

Syarifah Kemala Putri1, Amalia Amalia1*, Erna Budhiarti Nababan2, Opim Salim Sitompul2

1Departemen Ilmu Komputer, 2Departemen Teknologi Informasi, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

Email: [email protected]

Words embedding or distributed representations is a popular method for representing words. In this method, the resulting vector value is a set of real values with specific dimensions that are more effective than the Bag of Word (BoW) method. Also, the advantages of distributed representations can produce word vectors that contain semantic and syntactic information, so that word vectors with close meanings will have close word vectors. However, distributed representation requires a huge corpus with a long training time. For this reason, many researchers have created trained word vectors that can be used repeatedly. The problem is that the available trained word vectors are usually general domain word vectors. This study aims to form pre-trained word vectors for specific domains, namely computers and information technology. Researchers used a dataset of student scientific papers from the Universitas Sumatera Utara (USU) repository. Researchers used the word2vec model, where the model has

Page 26: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 23

two architectures, namely the Continuous Bag-of-Words (CBOW) and Skip-gram. This research's result is word2vec model with the CBOW method is more effective than the Skip-gram method.

Paper ID : 13192

An A Relevant Document Search System Model Using Word2vec Approaches

Selina Amelia Savittri, Amalia Amalia*, Mohammad Andri Budiman

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

Email: [email protected]

USU Repository is an institutional digital information system provided by Universitas Sumatera Utara (USU) that preserves and distributes academic papers, such as thesis and dissertation, from all faculties at USU. A search box is provided to help to search relevant topic from this repository. However, sometimes the search results are irrelevant and not satisfy user expectations. One of the reasons is that the search engine cannot perform optimally, mainly if the query is too long and complicated. One approach that can be used to solve the problem is using semantic search. Semantic search is an information retrieval process from a sentence that involves natural language processing understanding. According to this problem, this paper aims to propose a semantic search to seeks the relevance between the user's input query and academic papers. This study implemented the word2vec method in converting sentences into vectors. This study's results obtained average precision score with a small dataset is 52.5% and 85% for larger datasets.

Paper ID : 13201

Evaluation of the Factors Influencing the Trust of Millennial Citizens in E-Government

S Assegaff 1*, A Andrianti 2 and L Y Astri 3

1 Master Program in Information Systems, Dinamika Bangsa University, Jambi, Indonesia 2,3 Faculty of Computer Science, Dinamika Bangsa University, Jambi, Indonesia

Email: [email protected]

This study aims at identifying the effect of the millennial generation’s perceptions regarding risks, security, and trust in the Internet when utilizing e-government services. A total of 291 data items were collected through online surveys and this information was analysed quantitatively with the SEM method by employing the Smart PLS application. The confidence of this generation in applications is observed to be influenced by software quality and trust in the internet, but not information quality and faith in the government. Furthermore, trust in the internet is unaffected by internal risk, while the intention to use this medium is influenced by reliance on applications and also affected user behaviour.

Page 27: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 24

Paper ID : 13203

Face Recognition using Self Organizing Map Based on Multi-Level Thresholding and Features Extraction

A Saleh1*, NP Darsini1, F Azmi1

1,2,3 Faculty of Technology and Computer Science, Prima Indonesia University, North Sumatra, Indonesia

Email: *[email protected]

Facial recognition has played a very important role in security systems in recent decades. Various studies have been conducted to find a good method for this recognition to be effective. The facial recognition process in this study uses the self-organizing maps (SOM) method which is based on Multi-Level Thresholding segmentation and extraction of image features. The obtained face image will be segmented using Multi-Level Thresholding and the face will be generated without involving the background. The image that has been segmented will be calculated the values of texture feature extraction using GLCM and colour feature extraction using HSV. The resulting image will be carried out by a training and testing process for facial recognition using the self-organizing map (SOM) method. The test results in the proposed study showed good results with an introduction rate of 78.44%. This percentage is higher than face recognition without a segmentation process with a recognition rate of 65.78%. This shows that the proposed method has better performance for the face recognition process without involving the segmentation process.

Paper ID : 13226

Designing Online Healthcare Using DDD in Microservices Architecture

Muhammad Rizki 1, Ahmad Nurul Fajar2,*, Astari Retnowardhani3 1,2,3 Information Systems Management Department, BINUS Graduate Program - Master of Information Systems

Management, Bina Nusantara University Jakarta, Indonesia 11480

Email: *[email protected]

Today, the system development had been transformed to service oriented architecture. It more specific in microservices architecture to responds the agility and flexibility in software maintenance. This transformation is an important part that promoting independence, speed and security, while still kept balanced with the company's condition through comprehensive and effective steps. Culture of the development cycle of a company highly affected by the adaptation of microservices architecture. Thus, in order to achieve flexibility, speed and security, which are the main goal of adapting microservices, changes must be deliver well and sustainably. This study focused on designing of microservices architecture for health system using domain driven design (DDD) approach.

Page 28: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 25

Paper ID : 13230

Re-programming Electronic Control Unit for Increase Torque and Power a Motorcycle

Idham Kamil1, Soeharwinto2 and Ferry Fachrizal1

1Politeknik Negeri Medan, jalan Almamater No.1 Medan 20155, Indonesia 2Electrical Engineering Department, Universitas Sumatera Utara, Medan, Indonesia

Email : [email protected]

This research aims to determine the performance difference of using standard electronic control unit (ECU) compared to re-programming ECU of motorcycle. The experiment was carried out on a Honda CRF 150cc motorcycle manufactured in 2018. The research methods are experimental research and uses descriptive statistic method. Research findings informs that the maximum torque of the standard ECU is 13.7 Nm at 4700 rpm, and the maximum power is 9.2 KW at 7000 rpm. The re-programming ECU have a maximum torque of 17.1 Nm at 5700 rpm, and maximum power of 12.1 kW at 7200 rpm. The apparent increase in torque is around 80.11 % and in power is around 76 %. It can be concluded that the re-programming ECU provide a more optimized engine performance on an CRF150L motorcycle. Paper ID : 13272

Usability Testing for Student Academic Information System in State Polytechnic of Creative Media

S Setyaning Tyas1 and Y Khairunisa2

1 Department of Design, State Polytechnic of Creative Media, Jakarta, Indonesia 2 Department of Design, State Polytechnic of Creative Media, Jakarta, Indonesia

Email: [email protected]

SIAM (Student Academic Information System) is an academic services information system that has been implemented at the State Polytechnic of Creative Media (Polimedia). It’s been two months SIAM has been integrated using Single Sign On (SSO). After we implemented SIAM new version we received a lot of complaints every day. In this research, the authors conducted a usability test on the SIAM new version in order to determine the effectiveness and performance of the application. Usability test components include effectiveness, efficiency, and satisfaction. The average usability 70% indicates that the SIAM new version has a good usability performance. Paper ID : 13288

Augmented Reality Peripheral Performance: Light Intensity, Distance, Occlusion and Marker Testing

Edy Budiman, Muhammad Bambang Firdaus, and Ummul Hairah

Universitas Mulawarman, Jl. Kuaro, Samarinda 75119, East Kalimantan, Indonesia Email: [email protected]

Page 29: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 26

Augmented Reality peripherals (ARP) that use marker detection objects have developed rapidly and are implemented in various forms to support the activities of everyday human life. The challenge that is currently being faced is the increasingly widespread application of ARP technology to the reliability of software product performance in detecting objects. This research has developed and implemented ARP in the academic space. The application development method uses the Multimedia Development Life Cycle (MDLC) approach, developed based on the Android operating system, using the Unity 3D Engine and Vuforia SDK. 3D object modelling with Sweet Home 3D. Whereas for testing the reliability of ARP performance in object detection using testing of light intensity, distance, occlusion and marker with each scenario. The research produces augmented reality technology products that are able to offer visualization in the form of interactive 2D and 3D objects in academic rooms that provide information to users about the peripheral layout and division of academic spatial layouts and the good reliability performance. Paper ID : 13299

Web-Based Application Design based on Usability Atrributes for Sport Reservation Places: FUTSALKUY Apps

Rahmat Fauzi, *Muharman Lubis and Edi Sutoyo

Information System, Faculty of Industrial Engineering, Telkom University, Indonesia

E-mail: *[email protected]

Along with the growing world of information technology, website application become extremely popular as medium and channel that offers variety of ways in presenting information. It offer high interoperability and accessibility, which provide ease of use and learn despite different of user demographic. Therefore, the web development often faces several problems such as requirement are unclear and less defined, frequent changes in each phases, hard to launch due to budget or time, not ready to scale incomplete input validation and so on. Thus, this study utilize design thinking in the pre-development to offer complementary approach to the problem-solving through encouraging active participation from users and iterative cycle of phases. Paper ID : 13306

Implementation of Image Security using Elliptic Curve Cryptography RSA Algorithm and Least Significant Bit Algorithm

Handrizal1*, Herriyance1, Joshua Hanayong1 Muhammad Zarlis1, Poltak Sihombing1

1Department of Computer Science, Faculty of Computer Science and Information Technology, Universitas Sumatra Utara, Jl. University No. 9-A, Medan 20155, Indonesia

Email: [email protected]

Data exchange is a very important thing in today's technological development. Two important factors must be considered in the process of data exchange, namely speed and security. Rapid technological development can result in insecure data because it can be stolen or manipulated by people who are not privileged. Thus, we need a way or method to be able to overcome these problems, such as cryptography and steganography. The Rivest-Shamir-Adleman or RSA

Page 30: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 27

algorithm is an asymmetric cryptographic algorithm that uses 2 prime numbers to generate a public key and a private key that is used in the encryption process for the data. The ECC concept is used to determine the seed or initial value in the generation of prime numbers in the RSA Algorithm by using point addition and multiplication in an elliptic curve. The Least Significant Bit Algorithm is a Steganography Algorithm that inserts bits from the message at the last bit in a cover, replacing the last bit. The parameter used is Running Time in steganography. The results of the research show that image files can be hidden in another image file and returned to normal with a combination of cryptography and steganography with an average Running Time for the insertion process of 3090.167 ms and the extraction process of 2917.167 ms. Paper ID : 13308

Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS)

Ofelius Laia1, Elviawaty Muisa Zamzami2, Sutarman3

1,2Student Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, 2Lecturer in Faculty of Computer Science and Information Technology, Universitas Sumatera Utara,

3Lecturer in Faculty of Math and Science, Universitas Sumatera Utara, Medan, Indonesia

E-mail : [email protected], 2 [email protected], [email protected]

Data Encryption Standard (DES) has a weakness in the key that is vulnerable to security threats, but it is quite popular to use because of the fast encryption and decryption process. Combining the DES algorithm with the Pseudo-random number generator Blum-Blum-Shub (BBS) in generating external keys in the encryption and decryption process of messages, produces a unique key and a good level of security. The longer the selected key and seed, the higher the security level of the DES encryption and decryption key. The use of BBS as an external key generator in the DES algorithm does not significantly affect the encryption (key and seed generated is around 0,001 – 0,003 seconds for the 2 – 4 digits experiment) processing time, meanwhile, the time in the decryption process has no effect because the BBS key and seed are no longer subject to feasibility testing or number requirements. The combination of DES and BBS algorithms can increase security in terms of encryption and decryption keys because the random number of DES keys generated by the BBS algorithm is unique and does not burden the user in determining the keys used in the DES algorithm because the keys are generated from the programming language. Paper ID : 13310

Web-based E-Commerce Products Grouping

M Elveny, S M Hardi, I Jaya and P Gundari Faculty of Computer Science and Information Technology, Universitas Sumatera Utara

*Email: [email protected]

E-Commerce is a group of technologies, applications, and businesses that connect companies or individuals as consumers to conduct electronic transactions, exchange of goods or information through the internet or television, www, or other computer networks. The rapid growth of E-

Page 31: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 28

Commerce is caused by the many conveniences for buyers and sellers. This can be seen by the increasing number of E-Commerce sites such as Bukalapak.com, Tokopedia.com, and so on. The buyers want to get products with the lowest prices, the best quality, and from trusted sellers. This encourages them to search for and compare the same products from one store to another, even between different sites. Variables that they compare vary. Some are based on price, number of reviews, and so on. But it is troublesome when they have to look for the same product from another site. This study used the product name as a reference in grouping the same product from 5 different sites. The algorithm used to group online shop products was Jaro-Winkler Distance. The study was to create a system that can group products from 5 different sites with the highest level of similarity product as the output. From the 20 times of the search tests, the accuracy of the online shop product grouping with Jaro-Winkler Distance was 81.27%.

Paper ID : 13329

Comparison SAW, TOPSIS, and MOORA of Evaluation Socioeconomic Welfare

Masna Wati 1, Sri Uswatun Hasanah 2, Muh Jamil 3, Andi Tejawati 4

1,2,3,4 Department of Informatics, Universitas Mulawarman, Samarinda City, East Kalimantan 75117, Indonesia

Email [email protected]

Indonesia is a developing country with the main problems, namely poverty, and one of the problems faced by each province. The government continues to strive to overcome this poverty problem and create a prosperous community condition by providing assistance programs for poverty alleviation. MADM methods that are used to evaluate the socio-economic condition of the family are Simple Additive Weighting (SAW), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), and Multi-Objective Optimization Method by Ratio Analysis (MOORA) by involving 15 socio-economic indicators. The result showed that the evaluation of alternatives using the SAW, TOPSIS, and MOORA methods, the recommended alternative sequences are not significantly different. Paper ID : 13358

Prognosis of Diabetes Mellitus with Transfer Learning-Based Naïve Bayes Method

A Andriani12 and S Hartati1

1Universitas Gadjah Mada, Sekip Utara Bulaksumur, Yogyakarta 55281, Indonesia 2Universitas Bina Sarana Informatika, Jl.Kramat Raya No.98, Jakarta 10450, Indonesia

Email: [email protected]

The heart sound is commonly used to measure the activities of the heart. It is also an essential bio-signal to be used and analyzed to understand the human affective state, such as emotion or feeling. However, the effort in analyzing heart sound to recognize human emotions remain scarce. Therefore, our aims is to investigate the potential use of PCG signals combined with MFCC

Page 32: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 29

features extraction and Multilayer perceptron (MLP) classifier to recognize four specific emotions (calm, fear, happy and sad) on each individual, Moreover, contrasting to existing approaches, we proposed a framework to perform the emotion recognition based on PCG Signal without using any location information in the heart sound signal, such as segmentation. The experimental results show that the phonocardiography (PCG) signals can be used effectively for individual emotion recognition. The overall accuracy, average precision and average recall for four emotions recognitions are 88.8%, 89.3%, and 89.25%, respectively. Paper ID : 13371

Usability evaluation of a Gamification-based programming learning

platform: Grasshopper

R Nuravianty, H B Santoso, K Junus Faculty of Computer Science Universitas Indonesia

Depok, Indonesia

Email: [email protected], [email protected]

Online learning allows the learning process to be carried out anywhere and anytime. However, empirical studies report several obstacles that occur in the online learning process; one of which is the lack of student involvement. The learning materials of programming lessons generally have a low level of participation. Therefore, it requires a learning approach that is more attractive, easily understood by students, and promote engagement. Gamification-based programming learning platforms are widely available today. Research on determining the effectiveness of their use, investigating the system usability scale (SUS), perceived benefits, level of satisfaction, and user experience when using it is still limited. This study aims to evaluate a Grasshopper as one of the gamification-based programming learning platform. Thirty one respondents who had studied various programming languages at both the high school and university levels were involved in usability testingsessions. The results of the usability evaluation using SUS showed that the score was above average. The assessment of benefits and satisfaction also showed an average value of 8.6 which indicates that most respondents were satisfied with this application. Paper ID : 13372

Design a Potential Analysis using Fingerprint PC Base

Davy Ronald Hermanus1,4, Sasmoko2,4* , Yasinta Indrianti3,4 1Computer Science Department, Bina Nusantara University Bandung, Bandung, Indonesia 40181

2Primary Teacher Education Department, Faculty of Humanities, Bina Nusantara University, Jakarta, Indonesia 11480

3Entrepreneurship Department, Podomoro University, Jakarta, Indonesia 11470 4Research Interest Group in Education Technology, Bina Nusantara University, I Jakarta, Indonesia 11480

Email:

Online learning allows the learning process to be carried out anywhere and anytime. However, empirical studies report several obstacles that occur in the online learning process; one of which

Page 33: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 30

is the lack of student involvement. The learning materials of programming lessons generally have a low level of participation. Therefore, it requires a learning approach that is more attractive, easily understood by students, and promote engagement. Gamification-based programming learning platforms are widely available today. Research on determining the effectiveness of their use, investigating the system usability scale (SUS), perceived benefits, level of satisfaction, and user experience when using it is still limited. This study aims to evaluate a Grasshopper as one of the gamification-based programming learning platform. Thirty one respondents who had studied various programming languages at both the high school and university levels were involved in usability testingsessions. The results of the usability evaluation using SUS showed that the score was above average. The assessment of benefits and satisfaction also showed an average value of 8.6 which indicates that most respondents were satisfied with this application.

Paper ID : 13373

Diagnosis of Facial Skin Disease in Expert System Using Fuzzy Sugeno

Method

S M Hardi1*, D P D Siregar2, Elviwani3 1,2,3,Faculty of Computer Science and Information Technology, Universitas Sumatera Utara Padang Bulan

20155 USU, Medan, Indonesia.

* Email : [email protected]|

Structure of human skin is the largest structure in the human body. Skin has many function for human body. The importance of skin care is done to provide beauty to the skin, especially facial skin care, how important facial care can be seen by number of beauty clinics that are used to help treat skin beauty. Various kinds of facial skin problems, one of problem were facial acne which can interfere with beauty of facial skin. Most people oftenly uneducated how to treat acne which is often inappropriate. Usually sufferers will go directly to the doctor or beauty clinic. Problem often occurs is high cost of consulting with experts and long distance between user's location and nearest doctor's clinic, so needed an application that can help users to be able to consult about skin diseases on the face. In these research, researchers focused on problem of acne on facial skin by implementing an expert system using Sugeno fuzzy method. Results obtained from these research is kind of acne and severity based on the symptoms inputed by user. This application expert system implemented with mobile app and having an accuracy rate of 75% from 100% by testing results of experts and results by system.

Paper ID : 13379

Optimization and Computing Model of Fish Resource Supply Chain

Distribution Network

Nurdin1, M. Zarlis2, Tulus3, Syahril Efendi2 1,1Faculty of Computer Science and Information Technology, Universitas Sumatera Utara

3Department of Mathematics Universitas Sumatera Utara, Medan, Indonesia.

Email: [email protected], [email protected], [email protected], [email protected]

Page 34: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 31

Structure of human skin is the largest structure in the human body. Skin has many function for human body. The importance of skin care is done to provide beauty to the skin, especially facial skin care, how important facial care can be seen by number of beauty clinics that are used to help treat skin beauty. Various kinds of facial skin problems, one of problem were facial acne which can interfere with beauty of facial skin. Most people oftenly uneducated how to treat acne which is often inappropriate. Usually sufferers will go directly to the doctor or beauty clinic. Problem often occurs is high cost of consulting with experts and long distance between user's location and nearest doctor's clinic, so needed an application that can help users to be able to consult about skin diseases on the face. In these research, researchers focused on problem of acne on facial skin by implementing an expert system using Sugeno fuzzy method. Results obtained from these research is kind of acne and severity based on the symptoms inputed by user. This application expert system implemented with mobile app and having an accuracy rate of 75% from 100% by testing results of experts and results by system.

Paper ID : 13382

Identification of Lung Cancer on Chest X-Ray (CXR) Medical Images Using

the Probabilistic Neural Network Method

M F Syahputra1 , R F Rahmat1 , and R Rambe1 1Department of Information Technology, Faculty of Computer Science and Information Technology,

Universitas Sumatera Utara, Medan,Indonesia

Email: [email protected] | [email protected] | [email protected]

The high death rate from lung cancer is caused by the late detection or detection of cancer in the body so that treatment is carried out after the cancer has entered a high stage of severity. Meanwhile, lung cancer is a disease that requires fast and targeted treatment. One of the diagnoses of lung cancer can be done through a chest X-ray (CXR) and the results can only be read by an expert such as a doctor. In many cases, the doctor's diagnosis takes time and is still possible for errors. With increasingly sophisticated knowledge, several diseases can be identified by image analysis, including lung cancer. Digital image processing and methods and neural networks can help identify cancer. The method proposed in this study is a probabilistic neural network to identify normal and cancer images from lung images in lung cancer detection. The identification stage consists of several stages, namely preprocessing, segmentation with canny edge detection, feature extraction with the Gray Level Co-Ocorrence Matrix (GLCM) and identification with a Probabilistic Neural Network (PNN). With the method used, the accuracy of the lung cancer identification results was 93.33%. Paper ID : 13383

Face Recognition for a Student Violation Point System in Schools Using the

Fisherfaces Algorithm

D Arisandi1, M F Syahputra1, S Purnamawati1, A Hizriadi1 and M H Azra1

Page 35: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 32

1Department of Information Technology, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia

Email: [email protected] | [email protected] | [email protected] |

[email protected] | [email protected]

The violation point system is one of the policies to increase discipline in schools. If a student commits a violation, then the student will be processed by the teacher and record the violation into the violation note held by each teacher. If a student's violation record is contained in the notebooks of several teachers, it will be difficult to recapitulate the violations committed by students. This study makes a system approach and development that can centrally record student violations that run on the Android platform. To facilitate student recognition, the system is made using face recognition. Face recognition is implemented into this research because data retrieval can be done in real time with an Android smartphone camera so there is no need for additional devices. Face recognition uses the Fisherfaces method, which is a facial recognition method that uses Linear Discriminant Analytics for its feature extraction process. The accuracy obtained from the research is 90%. Paper ID : 13384

Heart Disease Simulation with Mixed Reality Technology

M F Syahputra1, R Zanury1, U Andayani1 , and S M Hardi1 1Department of Information Technology, Faculty of Computer Science and Information Technology,

Universitas Sumatera Utara, Medan,Indonesia

Email: [email protected] | [email protected] | [email protected] | [email protected] |

Heart disease is one of the leading causes of death in the world. Various types of heart disease include Coronary Heart Disease, Arrhythmias, Heart Failure, Heart Valves and Heart Muscle. The Ministry of Health of the Republic of Indonesia calls on the public to be smarter in responding to the terror of heart disease. One of them through the introduction and early prevention of heart disease. As time has evolved, technology has become part of society. One of the things that can be done to prevent and recognize heart disease is to utilize the use of Mixed Reality technology as a medium for learning and learning. The use of Mixed Reality technology used is a device from Microsoft, Hololens, with this tool the developer can build applications to display 3D objects and their interactions. To interact, hololens use a targetting mechanism based on the view from the user's side, a circular viewfinder as a cursor that can be directed with head movements and 2 gestures namely airtap and bloom by the user directing the hand forward until the sensor is detected from the hololens. In this case the researchers visualize the type of heart disease in 3D and interact by applying hand gestures or voice input as interactions.

Paper ID : 13385

Human Detection and Identification for Home Monitoring System

D Arisandi1, M Elveny1, R Rahayu1 1Department of Information Technology, Faculty of Computer Science and Information Technology,

Universitas Sumatera Utara, Medan, Indonesia

Page 36: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 33

Email: [email protected] | [email protected] | [email protected]

Currently, a monitoring system is needed to improve security and productivity in various sectors, for example in public services such as education centers, offices, banking, stations, roads, and the industrial sector. With a monitoring system, public service activities can be well monitored. Apart from public services, a home surveillance system can be implemented, making it easier for household members to monitor home security. The monitoring system camera will record the object, the human object detection process is carried out with the Histogram of Oriented Gradient, after the object is detected, the facial recognition process of the object is carried out whether it is a member of the house or not by using Learning Vector Quantization. If the object is not a member of the house, the system will send a notification in the form of a photo of the object's face to the user's email. For object detection with the Histogram of Oriented Gradient, an average accuracy of 90% is obtained and Learning Vector Quantization for facial recognition is 85%. Paper ID : 13387

Neural Network Enhancement Forecast of Dengue Fever Outbreaks in Coastal Region

THF Harumy1*, Dewi Sartika Br Ginting2

1,2Faculty of Computer Sciences, Universitas Sumatera Utara, Medan, Indonesia

*Email: [email protected]; [email protected]

Dengue Fever is among the world's fastest-spreading mosquito-borne illnesses. In Indonesia, more than 33 percent of the world community is in danger. The Coastal Zone is one of the regions most at risk of contracting dengue fever, particularly from the social and environmental sectors, so an early diagnostic study must deal with this efficiently and effectively. This research aimed to predict and identify the coastal areas with the most severe dengue fever potential to avoid dengue fever. The methodology used is a neural network-based sensitivity Analysis and multiple linear regression. Bagan Deli, Sibolga, Tapanuli Tengah, Langkat, Medan are samples of the coastal regions used in this study. The reports used was secondary data for dengue fever patients suffering and meteorological parameters, the model used in [5-5-1] for prediction, for five years from 2014-2019. The results showed which Langkat (0.4936), Serdang Bedagai (0.4695), The Middle Of Tapanuli (0.4399), Medan (0.4313), and Sibolga (0.3133) are perhaps the most prevalent areas affected by dengue fever with a value of 89.8 percent. The Result is Temperature and humidity are the conditions that most affect the transmission of dengue fever.

Paper ID : 13389

Discovering Right Congregation For Preachers Using Clustering Approach

Afrizal Nur1, Rahmad Kurniawan2, Mohd Zakree Ahmad Nazri3, Abdul Somad Batubara4, Elin Haerani5, Imansyah Putra6

1Faculty of Usuluddin, Universitas Islam Negeri Sultan Syarif Kasim Riau, 28293 Pekanbaru, Riau, Indonesia

2,5Department of Informatics Engineering, Faculty of Science and Technology, Universitas Islam Negeri Sultan Syarif Kasim Riau, Jl. HR. Subrantas Km. 15, Pekanbaru 28293, Indonesia

Page 37: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 34

3Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia

4Visiting Professor at Universiti Islam Sultan Sharif Ali, Brunei Darussalam 6 RK Data Science Research Institute

Email: [email protected]

Indonesia, as the most populous Muslim-majority country in the world, with more than 500,000 mosques and prayer rooms, each with its congregation. Religious lectures are delivered by preachers who have been selected and appointed by the Mosque management. A mosque is functioning as the center for Islamic Education has its unique method in determining preacher, but preachers too need a way to know the mosque's congregation location. Mosques are located both in urban areas, where many mosques are nearby and at remote villages, which are sparsely populated rural areas, where the travel time between mosques is significant. The preacher’s problem can be seen as the travelling sales man with time window problem. Therefore, this study aims to develop a mosque recommender system for preachers to find the nearest mosque using machine learning. Machine learning uses informatics and statistical was deemed capable of optimizing the preacher's schedule. In this study, we used the K-means to automatically search for unknown clusters of mosques that are similar to a preacher's geolocation. Results show that by using K-Means, the approach can recommend similar congregation (mosque) to the preacher's requirement at an accuracy of about 83%. This study also revealed the best number of clusters were determined by cluster number index, cluster sum of squared errors, silhouette and time taken. Paper ID : 13392

Implementation of Not So Naive and Burkhard-Keller Tree algorithms in Indonesian-Hokkien dictionary application

M A Budiman, D Rachmawati, and Charity

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Alumni No. 9-A, Kampus USU, Medan 20155, Indonesia

Email: [email protected], [email protected], and [email protected]

In Indonesia, especially in Medan, North Sumatra, Hokkien is used in everyday life within the Chinese community. However, learning the language is still done manually. Therefore, the authors intend to create an Android-based Hokkien dictionary application. The most common typing errors found were deleting and inserting single characters, substituting and reversing adjacent characters. Exact string matching can perform a quick search, but the search will fail when the incorrect input is entered. This study aims to prove the advantages and disadvantages of each algorithm in accessing information in addition to displaying the results of the running time of both algorithms. The results showed that the search time for the Burkhard-Keller Tree algorithm increased by 72% and 96% for the Not So Naive algorithm when searching on a database containing 200 words and 400 words. The Not So Naive algorithm has a mean running time of 26.9 ms and a mean running time of 53.5 ms on the Burkhard-Keller Tree algorithm.

Page 38: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 35

Paper ID : 13393

Implementation of hybrid cryptosystem using Rabin-p algorithm and One Time Pad to secure images

M A Budiman, M Zarlis, and Hafrizah

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Alumni No. 9-A, Kampus USU, Medan 20155, Indonesia

Email: [email protected], [email protected], and [email protected]

Cryptography is a study of mathematical techniques to secure messages by encoding the messages so it cannot be read by a third party. There are two types of algorithms in cryptography, symmetric algorithm and asymmetric algorithm. Asymmetric algorithms, such as Rabin-p cryptosystem, are known to be secure if the key sizes are long enough. However, asymmetric algorithms are ineffective to encrypt large data since the calculations consume CPU time and the resulting ciphertext is multiple times bigger than the original data. In this research, we combine Rabin-p cryptosystem and One Time Pad (OTP) in a hybrid scheme to solve this problem. The OTP is used to encrypt the data (images) and Rabin-p algorithm is used to encrypt the OTP key. In this research, we demonstrate how to secure a *.bmp file with this hybrid scheme. Paper ID : 13394

Robot Arm Inverse Kinematics Wrist Tilt Repair Using PID Control System (Proportional, Integrative, Derivative)

Budi Hasian Daulay*1

, Maya Silvi Lydia2

, Rahmat W. Sembiring3

1,2Department of Computer Science, Faculty of Computer Science and Information Technology, Sumatera

Utara, Medan 20155, Indonesia

3

Department of Conputer and Information Engineering, Politeknik Negeri Medan

Email: [email protected]

, [email protected]

, [email protected]

This study aims to improve the inverse kinematics control method is usually used to control the movement of the arm robot. The tilting point on the wrist becomes the main concern because a certain point in the moving of the arm robot is tilted. Usually, the initial move on the x, y, and z coordinates, and the farthest point in these coordinates occurs the slope. In this study, the inverse kinematics control adjusted to meet the stability of the wrist in a horizontal position. The slope value is measured using the Accelerometer + gyroscope sensor and used as an error value is then processed with proportional, integrative, derivative (PID) to obtain smoother changes in motion. Paper ID : 13402

SNPE-SRGAN: Lightweight Generative Adversarial Networks for Single-Image Super-Resolution on Mobile Using SNPE Framework

Page 39: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 36

Hendrik Tampubolon1,2, Aji Setyoko2, Fanindia Purnamasari3*

1 Department of Information System, Faculty of Engineering and Computer Science, Krida Wacana Christian University, Jakarta, Indonesia

2 Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan

3 Faculty of Computer Science and Information Technology, Universitas Sumatera Utara

Email:[email protected], [email protected],[email protected]

An image resulting from a low-resolution (LR) camera on the mobile phone has lower quality than a high-resolution(HR) camera on a DSLR. Meanwhile, the HR camera is pricing if compared with the LR camera. How to achieve a single-image quality on LR camera likewise on HR camera becomes essential research in the past years. Addressing this issue can be done by upscaling a single LR image. Recently, the super-resolution generative adversarial network (SRGAN) model is one of the state-of-the-art super-resolution(SR)models employed on single-image SR. However, implementing a deep learning model like SRGAN on a mobile device is challenging in computation power and resources. This study aims to develop a smaller and lower resources model while preserving single-image SR quality on mobile devices. To meet these objectives, we convert, quantize, and compress the SRGAN model on Snapdragon Neural Processing Engine (SNPE) as an example. We then validate the SRGAN on the DIV2K dataset on which improves the model performances. Besides, we conduct experiments on GPU, DSP environment. The experimental result confirmed that SNPE-SRGAN capable of achieves not only HR images' quality but also low latency by 0.06 second and smaller model by 1.7 Mb size running on DSP. Also, the SRGAN-DLC-Quantized running on GPU has a smaller size by 1.7 Mb and lower latency by 1.151 seconds compared with Non-quantized SRGAN-TensorFlow by 9.1 Mb and 1.608 seconds latency.

Paper ID : 13404

A neural cryptography approach for digital image security using Vigenère cipher and tree parity machine

M A Budiman, Handrizal, William

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

Email: [email protected], [email protected], [email protected]

As with other form of digital media, image can also contain private information that should be kept secret. Commonly, symmetric and asymmetric cryptosystem can be used to secure an image. Symmetric-key cryptography is not a best solution as the secret key has to be transmitted through private channel. Asymmetric-key cryptosystem, however, allows transmission of key through public channel, but requires high computational power and long computational time. This paper proposes a neural cryptography approach to protect image by using tree parity machine and Vigenère cipher. By using this approach, the secret key will never be transmitted. Moreover, the whole process does not require high computational power and long computational time as in public-key cryptosystem. To overcome the weakness of Vigenère cipher, change is made to the algorithm by multiplying the key value with y-axis of image. The effectiveness is validated by the value of pearson correlation that is close to 0. Lastly, the result of experiments show neural synchronization time depends on the size of network, initial weights and randomly generated input vector.

Page 40: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 37

Paper ID : 13408

A cryptocompression system with Multi-Factor RSA algorithm and Levenstein code algorithm

M A Budiman, P Sihombing, and I A Fikri

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

Email : [email protected], [email protected], and [email protected]

Exchanging digital messages by electronic means has a major security concern. The data being sent can be accessed and read by some unintended parties if there is no security system involved. Cryptography obscures the messages being sent and they can only be read by intended recipients by using the right key. Using asymetric cryptography algorithm such as Multi-Factor RSA may help to obscure a message with high security; however, the ciphertext is usually much larger than the message so it takes much more time to transmit. In order to solve this problem, this research combines the Multi-Factor RSA with the Levenstein Code algorithm in a cryptocompression system to compress the size of the message being sent. This research also compares encrypt-then-compress scheme with compress-then-encrypt scheme. The result shows that encrypt-then-compress scheme has a better compression ratio than the compress-then-encrypt scheme. On the contrary, in terms of actual time performance, the compress-then-encrypt scheme is faster than encrypt-then-compress scheme.

Paper ID : 13412

IoT Based Automated Tomato Watering System Using ESP8266

Rossy Nurhasanah1, Lira Savina2, Zul Mahadi Nata3, Ilham Zulkhair4

1,2Faculty of Computer Science and Information Technology, Universitas Sumatera Utara 3,4Faculty of Mathematics and Natural Sciences, Universitas Sumatera Utara

Email: [email protected]

Tomatoes need a proper watering system in order to grow and provide optimal yields. The factors that must be considered in watering the tomatoes are soil moisture and air temperature. The soil moisture needed for planting tomatoes is between 60% to 80% with a temperature rate between 24 to 28 degrees Celsius. We propose to implement an IoT based agricultural technology innovation to address the problem of precise watering system based on soil moisture and air temperature rate, which can be controlled remotely via internet connection. This system was designed and assembled using ESP8266 with soil moisture sensor and DHT11. This system was also programmed to be controlled using the Telegram Messenger application. The data read by the sensor could be seen through the Telegram Bot and do watering the plants automatically or manually. Based on several experiments conducted in this study, the system could do watering as well as maintain and control soil moisture and air temperature properly. By using this system, it will be easier for farmers to control and maintain tomato plants from anywhere and anytime through the Telegram Messenger.

Page 41: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 38

Paper ID : 13413

An implementation of Rabin-p cryptosystem and affine cipher in a hybrid scheme to secure text

M A Budiman, Handrizal, and S Azzahra

Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia

Email : [email protected], [email protected], and [email protected]

One way to keep digital information secure is by using cryptographic techniques. With respect to its keys, cryptography generally is divided into two types: symmetric and asymmetric. Symmetric cryptography algorithm uses the same key in both encryption and decryption while asymmetric uses different keys for each of these processes. Asymmetric cryptography algorithm is known to be ineffective to encrypt big messages since it takes more CPU time to do the computation and the resulting ciphertext is usually much bigger than the original message. To eliminate these problems, in this research, we combine Rabin-p cryptosystem, an asymmetric cryptography algorithm, and affine cipher, a symmetric cryptography algorithm, in a hybrid scheme in order to secure messages from unwanted parties. The affine cipher is used for message encryption while Rabin-p is used for affine cipher’s key encryption. The result of this research is a hybrid cryptography scheme that can encrypt and decrypt message in the form of *.pdf files and be able to restore the message without losing integrity. Paper ID : 13416

Application of A-Star Algorithm on Pathfinding Game

Ade Candra1*, Mohammad Andri Budiman1, Rahmat Irfan Pohan1 1Faculty of Computer Science and Information Technology, Universitas Sumatera Utara

*Email: [email protected]

Pathfinding is the method for determining the shortest path. Pathfinding is widely used in various fields of Computer Science. One of them is game development. This research will design and analyze the pathfinding using the A-Star algorithm and implement it on a tree planting game. The Artificial Intelligence in the game will find its own shortest path from the start node to the goal node. The heuristic of A-Star is the Manhattan Distance that allows movement in four different directions. The result shows that the number of visited nodes will increase if the grid has many obstacle nodes, and the average time of the A-Star pathfinding process is 0.0732 seconds.

Paper ID : 13419

Research Review on Big Data Usage for Learning Analytics and Educational Data Mining: A Way Forward to Develop an Intelligent Automation System

A Yunita1,2, H B Santoso1, Z A Hasibuan3

1 Faculty of Computer Science, Universitas Indonesia

Page 42: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 39

2 Faculty of Science and Computer Science, Universitas Pertamina 3 Faculty of Computer Science, Universitas Dian Nuswantoro

Email: [email protected]

Digitalization and the development of information technology, especially Artificial Intelligence, have been embraced in all fields. At the same time, data has grown mostly from the digital footprints or any technology information system. The development of technology and big data offers enormous opportunities to conduct big data analytics in any field, including education. This study aims to review current research related to big data analytics in education and explain future research direction. Using Kitchenham's technique, we selected and clustered the literature into the types of data, methods, type of data analytics and learning analytics applications used. The results show that research of big data learning analytics generally aims to improve the learning process, analyze learner behavior for student profiling, improve student retention and evaluate student feedback in the context of MOOCs and Learning Management System. Several future directions for this topic are: 1) building a big open dataset including data pre-processing and addressing the problem of imbalanced dataset, 2) process mining for learning log activity to gain knowledge and insights from online behavior, not only from the perspective of the learner but also from the activities of the teacher, 3) designing an automated framework that uses big data and allows descriptive, predictive, prescriptive analytical learning to be carried out. To summarize, embracing big data to learning analytics and educational data mining is an open research area that seems very powerful in education. Paper ID : 13420

Contribution Principal Component Analysis to Optimizing Data by Reducing Product Data on Transaction

Dewi Sartika Br Ginting1 , Fuzy Yustika Manik2 and Fanindia Purnamasari3,

1,2 Department of Computer Science, Universitas Sumatera Utara, Jl. Alumni No. 9-A ,Medan 20155- Indonesia

3 Department of Information Technology, Universitas Sumatera Utara, Jl. Alumni No. 9-A, Medan 20155- Indonesia

Email: [email protected], [email protected], [email protected]

Principal component analysis is to analyze the observation data table into a new data table that has the same correlation. And the aim is to simplify the previously complex observation data so that it is easier to process or analyze. The dataset used is transaction data which is often used by the association method in sales analysis, where the data taken consists of 1397 types of products sold in 1200 transactions. In this data, there are products that have very small sales, which means that the percentage of these products has very little effect on the future process, namely sales analysis with the association method. Therefore the authors try to optimize the data to become ready to use data by reducing products that have a small percentage value that affects research for the dataset. And on this occasion the author uses the main component analysis method to reduce products or form products that can represent the entire dataset without reducing the quality of the data for analysis. From the results of research conducted on transaction data, there was a product decline of 65.21%, where the products totaling 1397 were reduced to 486 products that could represent without reducing their value.

Page 43: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 40

Paper ID : 13473

Social network extraction based on Web: A Review about Supervised Methods

Mahyuddin K. M. Nasution1*, Shahrul Azman Noah2

1Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, USU, Padang Bulan 20155, Medan, Sumatera Utara, Indonesia

2Knowledge Technology Resarch Group, M-CAIT, Fakulti Teknologi dan Sains Maklumat, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia.

E-mail: *[email protected]

The extraction of social networks from specific sources of information is essential. It relates to the disclosure of social structures with prevailing behavior in accordance with that information source. This of course requires methods that are generally in a supervised flow. The method changes based on the demands of data modeling, which are generally textual, but do not rule out other types of information, such as databases or different literacy. This paper reviews the methods that have been developed and the types of information sources involved as input to the social network extraction process. This brief review follows the literature related to social network extraction involving supervised methods. Paper ID : 13474

Experimental study of seawater evaporation using natural convection principles

Divan Apryanto Sibarani1, Horas Siagian1, H. Ambarita1,2

1Mechanical Engineering, Faculty of Engineering, Universitas Sumatera Utara Jl. Almamater Kampus USU Medan 20155, Indonesia

2Sustainable Energy and Biomaterial Centre of Excellent, Faculty of Engineering, Universitas Sumatera Utara, Jl. Almamater Kampus USU Medan 20155, Indonesia

Email: [email protected]

Evaporation of seawater into the air is a phenomenon that involves heat and mass transfer. The process of evaporation of water can be divided into different categories based on the flow regime, such as natural convection. The rate of evaporation that occurs in seawater without treatment or is called natural convection method only takes into account the density difference between the existing fluids. The method has been tested in natural convection with the result that the highest rate of evaporation of water in the tub is directly proportional to the radiation received. It was found that experimental result have a good agreement. Paper ID : 13475

Thermal Analysis on Heat Pump Chili Drying Chamber with variations in the direction of air flow using Computational Fluid Dynamics

A.H. Siburian1,2, P.G. Silalahi1,2 N. D. M. Romauli3 and H. Ambarita1,2*

Page 44: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 41

1Mechanical Engineering Department, Universitas Sumatera Utara, Medan 20155, Indonesia

2Sustainable Energy and Research Centre, Universitas Sumatera Utara, Medan 20155, Indonesia 3Food Science and Technology, Faculty of Agriculture, Universitas Sumatera Utara, Medan 20155,

Indonesia

Email: [email protected]

Drying chilies using a heat pump includes drying at low temperatures so that the temperature distribution and flow direction in the drying chamber need to be considered. The distribution of temperature and flow direction in the heat pump drying room with a drying room size of 1 m x 0.8 m x 0.75 m to dry 1 kg of chilies built in the Sustainable Energy and Research Center (SERC) laboratory is not good enough to make the drying time longer. The procedure has been established with the aim of evaluating the speed distribution and temperature of the drying air in the drying chamber to determine the need for redesign. Computational Fluid Dynamics (CFD) is used to analyze flow patterns that occur in the drying chamber where in this study two types of flow directions that enter the heat pump chili drying chamber are compared. CFD has replaced the classical numerical analysis method of drying processes based on experimental models. Analytical methods and experimental methods are limited in describing the distribution of temperature and air flow in the drying chamber. In this case, the finite element method is used in the form of CFD analysis where the geometry of the drying chamber is divided into several analyzed elements. After doing the CFD simulation, it is obtained that the heat pump chili drying chamber model with the flow direction from below the temperature increases faster than the heat pump chili drying chamber model with the flow direction from the side. The simulation results show that the drying room with the direction of hot air flow from below, the temperature of the dried chilies increases faster and the temperature distribution is better than the drying room with the flow direction from the side. In both models of the drying chamber, the temperature value is obtained in the timestep 600, namely in the drying chamber model with hot air flow from the side is 305,569 K and in the drying chamber model with hot air flow from below is 313,697 K. For the drying model in this heat pump chili drying room it is advisable to use the flow direction from below because it is better. This solution can also be offered to get the right drying chamber model. Paper ID : 13476

Maple as a tool to understand marketing game for up to four companies

Zahedi1 , Suparni2 , Marwan Affandi3, Yenny Suzana4, Fachrur Razi5 1 University of Sumatera Utara,

2 IAIN Padang Sidempuan, 3 Rajamangala University of Technology Srivijaya (RUTS), Songkhla, Thailand,

4 IAIN Langsa, 5 Institut Teknologi Medan

Email: [email protected]

In business environment, advertisement is very important. Companies spent a lot of money to advertise their products. When there are several players which have the same product to market, the competition will be quite tough since the market size is finite. The amount of the money spent for advertisement will affect the sale of the product. The profit for each company will depend on the amount of money spent for advertisement. However, this will also depend on the money spent by other companies, making the determination of the optimum profit become difficult. For two and three companies, exact value of the optimum profit for each company can be found. However, the analysis for more than three companies is quite complicated so we must resort to numerical

Page 45: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 42

method. Examples for the cases of two, three and four companies are given. A company with the smallest effectiveness factor and gross profit will have the smallest optimum profit. Maple has been widely used to derive formulas and to solve the case studies in this paper. Paper ID : 13543

Securing IoT Network against DDoS Attacks using Multi-agent IDS

Bedine Kerim1

1 Department of Information Technology, College of Computer Science and Information Technology Albaha University, Saudi Arabia

Email: [email protected]

The crucial issue of Internet of Things (IoT) is vulnerable towards various kinds of security threats, especially on denial-of-service (DoS) attacks as IoT network consists of millions of devices attached to the network. There are plenty of intrusion detection systems (IDSs) available for IoT networks, however, the accuracy detection yet still a big problem. To address the problem, this paper proposes an ensemble IDS for IoT networks. The proposed IDS uses Multi-agent System (MAS) concept and ensemble the Information Gain feature selection algorithm with J48 classifier algorithm for the proposed IDS. Experimental results show the proposed MAS-J48-IDS provides the best accuracy performance of 99.8% for all selected features compared to IDSs that use Naïve Bayesian (NB) and Random Forest (RF) classifiers. Besides, the use of MAS contributes towards the load balancing among the nodes in the network itself. Paper ID : 13544

Effect of airflow on Heat Pump in drying mode

H V Sihombing1,3, N D M Romauli2, K N Sinamo2, H Ambarita1*, 1Sustainable Energy Research Centre, Faculty of Engineering, University of Sumatera Utara, Medan,

Sumatera Utara, Indonesia. 2Food Science and Technology, Faculty of Agriculture, University of Sumatera Utara, Medan, Sumatera

Utara, Indonesia. 3Mechanical Engineering Department, Faculty of Engineering, University of Sumatera Utara, Medan,

Sumatera Utara, Indonesia.

Manufacturers develop new technologies to process sensitive food materials to supply new products with improved properties and high quality. Heat pump technologies for drying can contribute to increased productivity, product quality, environmental and energy-saving benefits. Development of heat pump increase to decrease the drying time. A heat pump has been designed and fabricated. This paper improves the drying process with a variance air flow of the heat pump. During the experiment, the temperature, and relative humidity of hot drying air was the measure. The heat was analysed during the drying experiment. The result showed that the airflow of the drying has a high impact on drying. The temperature on the drying are plotted. This fact suggests that the direct contact on surface commodity, made the temperature on commodity has high.

Page 46: THE I - USU Conference Systems(ICCAI) Faculty of Computer Science and Information Technology Universitas Sumatera Utara, Medan, Indonesia December 1, 2020 Book of Abstracts – The

Book of Abstracts – The 5th International Conference on Computing and Applied Informatics 2020

Medan, Indonesia | 1sh December 2020 43