2016 4th International Conference on Cyber and IT Service Management

2016 4th International Conference on Cyber and IT Service Management Bandung, Indonesia 26-27 April 2016 IEEE Catalog Number: ISBN: CFP1637Z-POD 97...
0 downloads 2 Views 457KB Size
2016 4th International Conference on Cyber and IT Service Management

Bandung, Indonesia 26-27 April 2016

IEEE Catalog Number: ISBN:

CFP1637Z-POD 978-1-4673-8444-5

Copyright © 2016 by the Institute of Electrical and Electronics Engineers, Inc All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.

***This publication is a representation of what appears in the IEEE Digital Libraries. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: ISBN (Print-On-Demand): ISBN (Online):

CFP1637Z-POD 978-1-4673-8444-5 978-1-4673-8443-8

Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com

TABLE OF CONTENTS ii-iv

Front Matter

v

Preface List of Reviewers

vi-viii

Table of Content

ix-xiv

Online Risks and Harm Analysis among the Muslim Teenagers in Bangladesh

1-4

Taslim Taher, Mohd Adam Bin Suhaimi

Developing Mobile-Based Academic Information System A Case Study at Islamic State University (UIN) Syarif Hidayatullah Jakarta

5-9

Supardi, Husni Teja Sukmana

Integrated Model Development of Horticulture and Forecast Commodity using Web Based Geographic Information System and SMS Gateway Technology

10-14

Feri Sulianta, Ai Rosita, Eka Angga Laksana

Designing An Agile Enterprise Architecture For Mining Company By Using TOGAF Framework

15-20

Rika Yuliana, Budi Rahardjo

Analysis of Effect Overclocking Durability on Intel Processor i5 4670K

21-24

Rian Fahrizal, Rocky Alfanz, Awal Sakti

Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm

25-30

Nurhayati, Syukri Sayyid Ahmad

A Preliminary Study: Implementation and QoS Analysis of Dynamic Telecytology System On Broadband and 3G/4G Network in Indonesia

31-36

Rizal Broer Bahaweres, Nge Beni Santoso

The Development of a Web-based Spatial Information System Utilization of Forest Area (Case Study: Sulawesi Island) Rika Ardiyani, Zainul Arham, Eri Rustamaji

ix

37-43

Assessment of ISMS Based On Standard ISO/IEC 27001:2013 at DISKOMINFO Depok City

44-49

Nurbojatmiko, Aries Susanto, Euis Shobariah

Readiness For Implementing Data Warehouse of Higher Education System With Sodano’s Perspective

50-54

Ade R Iskandar, Ichsan Taufik

Using Social Networks to Assess Forensic of Negative Issues

55-58

Mahyuddin K. M. Nasution, Melvani Hardi, Runtung Sitepu

Design of a Web-based Geographic Information Systems Spatial for Distribution of Historic Site

59-63

Muhamad Ickwan Santoso, Zainul Arham, Eva Khudzaeva

IT Value Model Validation for e-banking using the Partial Adjustment Valuation Approach The Case Study of PT Bank Rakyat Indonesia (Persero) Tbk.

64-67

Ahmad Hamim Thohari

A Prototype of Child Monitoring System Using Motion and Authentication with Raspberry Pi

68-73

Okky Permatasari, Siti Ummi Masruroh, Arini

Performance Evaluation of Instant Messenger in Android Operating System and iPhone Operating System

74-79

Siti Ummi Masruroh, Ilham Saputra, Nurhayati

Factor Analysis on Information Security Management in Higher Education Institutions

80-84

Puspita Kencana Sari, Nadiailhaq Nurshabrina, Candiwan

Evaluation Function Effectiveness in Wireless Sensor Network Routing using A-star Algorithm

85-89

Risma Septiana, Indah Soesanti, Noor Akhmad Setiawan

The Effect of Customer Relationship Management Toward Product Innovation At Football Distro in Bandung Evan Jaelani x

90-94

Collaborative Learning Model of Software Engineering Using Github for Informatics Student

95-99

Azizah Zakiah, Mohamad Nurkamal Fauzan

Decision Support System Model Analysis for Proposed Activities on Development Planning Forum In District Level (Case Study: Government of Cimahi)

100-105

Ardiles Sinaga, Murnawan

Critical Data Leak Analysis in Educational Environment

106-111

Ida Madieha Abdul Ghani Azmi, Qazi Mamoon Ashraf , Sonny Zulhuda, Mahyuddin Bin Daud

Research Developments in the Field Neurocomputing

112-117

Zen Munawar

Application of Genetic Algorithm for Class Scheduling (Case Study: Faculty of Science and Technology UIN Jakarta)

118-122

Sunan Parera, Husni Teja Sukmana, Luh Kesuma Wardhani

Colon Detection Using Principal Component Analysis (PCA) and Support Vector Machine (SVM)

123-128

Nova Ayu Rizanti, Arini, Anif Hanifah Setyaningrum

Analysis of Commodity Inventory with Exponential Smoothing and Silver Meal Algorithm (Case Study)

129-134

Drio Nadyatama, Qurrotul Aini, Meinarini Catur Utami

An Improved Neighbouring Similarity Method for Video Steganography

135-139

Diksy M. Firmansyah, Tohari Ahmad

Implementation of Dynamic Time Warping Algorithm on an Android Based Application to Write and Pronounce Hijaiyah Letters

140-145

Mohamad Irfan, Ichsan Taufik, Imam Zainal Mutaqin, Rio Guntur Utomo

Enhancing DE-based Data Hiding Method by Controlling the Expansion Dwi S. Angreni, Tohari Ahmad

xi

146-151

Design Analysis of Data Warehouse For Performance Evaluation Lecturer (Case Study: Faculty of Science And Technology UIN Jakarta)

152-157

Nia Kumaladewi, Yuni Sugiarti

Opinion Mining on Twitter Microblogging Using Support Vector Machine: Public Opinion about State Islamic University of Bandung

158-163

Jumadi, Dian Sa’adillah Maylawati, Beki Subaeki, Taufik Ridwan

Feature-Points Nearest Neighbor Clustering on 3D Face Models

164-168

Samuel Gandang Gunanto, Mochamad Hariadi, Eko Mulyanto Yuniarno

Design of Digital Image Application Using Vigenere Cipher Algorithm

169-173

Yana Aditia Gerhana, Entik Insanudin, Undang Syarifudin, Mohammad Rizal Zulmi

Direction of Ventricle Contraction Based on Precordial Lead ECG Signal

174-176

Leonard Goeirmanto, Richard Mengko, Tati Latifah Rajab

177-180

Semantic Textual Relatedness: A Hybrid Method Muhammad Fauzan Razandi, Moch Arif Bijaksana, Danang Junaedi, Selfiendi, Rakhmad Indra Permadi

Eldita Febrian

Analysis of Online Training System Using Ranti’s Generic IS/IT Business Value and Economic Value Added (Case Study: Bank Rakyat Indonesia)

181-188

Teddie Darmizal, Benny Ranti

Implementation of Haversine Formula for Counting Event Visitor in The Radius Based on Android Application

189-194

Cecep Nurul Alam, Aldy Rialdy Atmadja, Khaerul Manaf, Digital Khrisna Aurum

SMS Gateway and Barcode Technology for Presence of Students in SMK Unggulan Terpadu PGII Bandung: a Case Study

195-198

Muhammad Benny Chaniago, Apri Junaidi

Design a Learning Systems Use Knowledge Management Systems to Improve The Competency of Early Childhood Education Teachers U. Maman, Yuni Sugiarti, Suci Ratnawati

xii

199-204

Cosine Similarity to Determine Similarity Measure: Study Case in Online Essay Assessment

205-210

Alfirna Rizqi Lahitani, Adhistya Erna Permanasari, Noor Akhmad Setiawan

Application of Unsupervised K Nearest Neighbor (UNN) and Learning Vector Quantization (LVQ) Methods in Predicting Rupiah to Dollar

211-214

Elin Haerani, Liza Apriyanti, Luh Kesuma Wardhani

Customer Perception Mapping Analysis of Indonesian E-commerce Marketplace Sites based on Attributes Usability, Site Design, Information Quality, Trust, and Empathy (Case Study of Tokopedia, Bukalapak, Elevenia, Qoo10, and Rakuten)

215-221

Natasha Adellia, Adhi Prasetio

A Study of Social Technology Use in State Islamic University (UIN) Syarif Hidayatullah Jakarta

222-227

Muhammad Qomarul Huda, Nur Aeni Hidayah, Syopiansyah Jaya Putra

Denial-of-Service attack Possibilities on NFC Technology

228-232

Feri Fahrianto, Muhammad Fadil Lubis, Andrew Fiade

Building a Private Cloud Computing and The Analysis against DoS (Denial of Service) attacks Case Study at SMKN 6 Jakarta

233-238

Rizal Broer Bahaweres, Johan Sharif, Mudrik Alaydrus

Health Risk Prediction for Treatment of Hypertension

239-244

Gitarja Sandi, Suhono Harso Supangkat, Cepy Slamet

Semantically Annotated Corpus Model of Indonesian Translation of Quran: an Effort in Increasing Question Answering System Performance

245-249

Husni Teja Sukmana, Ria Hari Gusminta, Yusuf Durachman, Asep Fajar Firmansyah

Implementation of Association Rules with Apriori Algorithm for Increasing the Quality of Promotion

250-254

Wildan Budiawan Zulfikar, Agung Wahana, Wisnu Uriawan

Development of Software Product Line Government System with Ontology OWL Ahmad Nurul Fajar, Imam Marzuki Shofi

xiii

255-258

$QGURLG$SSOLFDWLRQIRU'LDJQRVLQJ*HQHUDO6\PSWRPVRI'LVHDVH8VLQJ  )RUZDUG&KDLQLQJ0HWKRG Imam M Shofi, Luh Kesuma, Wardhani, Ghina Anisa

  1DwYH%D\HV&ODVVLILHU$OJRULWKPDQG3DUWLFOH6ZDUP2SWLPL]DWLRQIRU 

&ODVVLILFDWLRQRI&URVV6HOOLQJ &DVH6WXG\377(/.20-DNDUWD  Sfenrianto, Indah Purnamasari, Rizal Broer Bahaweres





+RVSLWDO3DWLHQWV$UULYDO3UHGLFWLRQ8VLQJ0DUNRY&KDLQ0RGHO0HWKRG  Alwis Nazir, Lia Anggraini, Lola Octavia, Fadhilah Syafria





&RPSRVLWH1DLYH%D\HV&ODVVLILFDWLRQDQG6HPDQWLF0HWKRGWR(QKDQFH  6HQWLPHQW$FFXUDF\6FRUH Ardhian Ekawijana, Heri Heryono





,PSURYLQJWKH6HFXULW\*XDUDQWHHV$XWKHQWLFLW\DQG&RQILGHQWLDOLW\LQ  6KRUW0HVVDJH6HUYLFHRI0RELOH$SSOLFDWLRQV Teddy Mantoro, Laurentinus, Nazori Agani, Media A. Ayu



$XWKRU,QGH[

xiv

Suggest Documents