2016 4th International Conference on Cyber and IT Service Management
Bandung, Indonesia 26-27 April 2016
IEEE Catalog Number: ISBN:
CFP1637Z-POD 978-1-4673-8444-5
Copyright © 2016 by the Institute of Electrical and Electronics Engineers, Inc All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.
***This publication is a representation of what appears in the IEEE Digital Libraries. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: ISBN (Print-On-Demand): ISBN (Online):
CFP1637Z-POD 978-1-4673-8444-5 978-1-4673-8443-8
Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail:
[email protected] Web: www.proceedings.com
TABLE OF CONTENTS ii-iv
Front Matter
v
Preface List of Reviewers
vi-viii
Table of Content
ix-xiv
Online Risks and Harm Analysis among the Muslim Teenagers in Bangladesh
1-4
Taslim Taher, Mohd Adam Bin Suhaimi
Developing Mobile-Based Academic Information System A Case Study at Islamic State University (UIN) Syarif Hidayatullah Jakarta
5-9
Supardi, Husni Teja Sukmana
Integrated Model Development of Horticulture and Forecast Commodity using Web Based Geographic Information System and SMS Gateway Technology
10-14
Feri Sulianta, Ai Rosita, Eka Angga Laksana
Designing An Agile Enterprise Architecture For Mining Company By Using TOGAF Framework
15-20
Rika Yuliana, Budi Rahardjo
Analysis of Effect Overclocking Durability on Intel Processor i5 4670K
21-24
Rian Fahrizal, Rocky Alfanz, Awal Sakti
Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm
25-30
Nurhayati, Syukri Sayyid Ahmad
A Preliminary Study: Implementation and QoS Analysis of Dynamic Telecytology System On Broadband and 3G/4G Network in Indonesia
31-36
Rizal Broer Bahaweres, Nge Beni Santoso
The Development of a Web-based Spatial Information System Utilization of Forest Area (Case Study: Sulawesi Island) Rika Ardiyani, Zainul Arham, Eri Rustamaji
ix
37-43
Assessment of ISMS Based On Standard ISO/IEC 27001:2013 at DISKOMINFO Depok City
44-49
Nurbojatmiko, Aries Susanto, Euis Shobariah
Readiness For Implementing Data Warehouse of Higher Education System With Sodano’s Perspective
50-54
Ade R Iskandar, Ichsan Taufik
Using Social Networks to Assess Forensic of Negative Issues
55-58
Mahyuddin K. M. Nasution, Melvani Hardi, Runtung Sitepu
Design of a Web-based Geographic Information Systems Spatial for Distribution of Historic Site
59-63
Muhamad Ickwan Santoso, Zainul Arham, Eva Khudzaeva
IT Value Model Validation for e-banking using the Partial Adjustment Valuation Approach The Case Study of PT Bank Rakyat Indonesia (Persero) Tbk.
64-67
Ahmad Hamim Thohari
A Prototype of Child Monitoring System Using Motion and Authentication with Raspberry Pi
68-73
Okky Permatasari, Siti Ummi Masruroh, Arini
Performance Evaluation of Instant Messenger in Android Operating System and iPhone Operating System
74-79
Siti Ummi Masruroh, Ilham Saputra, Nurhayati
Factor Analysis on Information Security Management in Higher Education Institutions
80-84
Puspita Kencana Sari, Nadiailhaq Nurshabrina, Candiwan
Evaluation Function Effectiveness in Wireless Sensor Network Routing using A-star Algorithm
85-89
Risma Septiana, Indah Soesanti, Noor Akhmad Setiawan
The Effect of Customer Relationship Management Toward Product Innovation At Football Distro in Bandung Evan Jaelani x
90-94
Collaborative Learning Model of Software Engineering Using Github for Informatics Student
95-99
Azizah Zakiah, Mohamad Nurkamal Fauzan
Decision Support System Model Analysis for Proposed Activities on Development Planning Forum In District Level (Case Study: Government of Cimahi)
100-105
Ardiles Sinaga, Murnawan
Critical Data Leak Analysis in Educational Environment
106-111
Ida Madieha Abdul Ghani Azmi, Qazi Mamoon Ashraf , Sonny Zulhuda, Mahyuddin Bin Daud
Research Developments in the Field Neurocomputing
112-117
Zen Munawar
Application of Genetic Algorithm for Class Scheduling (Case Study: Faculty of Science and Technology UIN Jakarta)
118-122
Sunan Parera, Husni Teja Sukmana, Luh Kesuma Wardhani
Colon Detection Using Principal Component Analysis (PCA) and Support Vector Machine (SVM)
123-128
Nova Ayu Rizanti, Arini, Anif Hanifah Setyaningrum
Analysis of Commodity Inventory with Exponential Smoothing and Silver Meal Algorithm (Case Study)
129-134
Drio Nadyatama, Qurrotul Aini, Meinarini Catur Utami
An Improved Neighbouring Similarity Method for Video Steganography
135-139
Diksy M. Firmansyah, Tohari Ahmad
Implementation of Dynamic Time Warping Algorithm on an Android Based Application to Write and Pronounce Hijaiyah Letters
140-145
Mohamad Irfan, Ichsan Taufik, Imam Zainal Mutaqin, Rio Guntur Utomo
Enhancing DE-based Data Hiding Method by Controlling the Expansion Dwi S. Angreni, Tohari Ahmad
xi
146-151
Design Analysis of Data Warehouse For Performance Evaluation Lecturer (Case Study: Faculty of Science And Technology UIN Jakarta)
152-157
Nia Kumaladewi, Yuni Sugiarti
Opinion Mining on Twitter Microblogging Using Support Vector Machine: Public Opinion about State Islamic University of Bandung
158-163
Jumadi, Dian Sa’adillah Maylawati, Beki Subaeki, Taufik Ridwan
Feature-Points Nearest Neighbor Clustering on 3D Face Models
164-168
Samuel Gandang Gunanto, Mochamad Hariadi, Eko Mulyanto Yuniarno
Design of Digital Image Application Using Vigenere Cipher Algorithm
169-173
Yana Aditia Gerhana, Entik Insanudin, Undang Syarifudin, Mohammad Rizal Zulmi
Direction of Ventricle Contraction Based on Precordial Lead ECG Signal
174-176
Leonard Goeirmanto, Richard Mengko, Tati Latifah Rajab
177-180
Semantic Textual Relatedness: A Hybrid Method Muhammad Fauzan Razandi, Moch Arif Bijaksana, Danang Junaedi, Selfiendi, Rakhmad Indra Permadi
Eldita Febrian
Analysis of Online Training System Using Ranti’s Generic IS/IT Business Value and Economic Value Added (Case Study: Bank Rakyat Indonesia)
181-188
Teddie Darmizal, Benny Ranti
Implementation of Haversine Formula for Counting Event Visitor in The Radius Based on Android Application
189-194
Cecep Nurul Alam, Aldy Rialdy Atmadja, Khaerul Manaf, Digital Khrisna Aurum
SMS Gateway and Barcode Technology for Presence of Students in SMK Unggulan Terpadu PGII Bandung: a Case Study
195-198
Muhammad Benny Chaniago, Apri Junaidi
Design a Learning Systems Use Knowledge Management Systems to Improve The Competency of Early Childhood Education Teachers U. Maman, Yuni Sugiarti, Suci Ratnawati
xii
199-204
Cosine Similarity to Determine Similarity Measure: Study Case in Online Essay Assessment
205-210
Alfirna Rizqi Lahitani, Adhistya Erna Permanasari, Noor Akhmad Setiawan
Application of Unsupervised K Nearest Neighbor (UNN) and Learning Vector Quantization (LVQ) Methods in Predicting Rupiah to Dollar
211-214
Elin Haerani, Liza Apriyanti, Luh Kesuma Wardhani
Customer Perception Mapping Analysis of Indonesian E-commerce Marketplace Sites based on Attributes Usability, Site Design, Information Quality, Trust, and Empathy (Case Study of Tokopedia, Bukalapak, Elevenia, Qoo10, and Rakuten)
215-221
Natasha Adellia, Adhi Prasetio
A Study of Social Technology Use in State Islamic University (UIN) Syarif Hidayatullah Jakarta
222-227
Muhammad Qomarul Huda, Nur Aeni Hidayah, Syopiansyah Jaya Putra
Denial-of-Service attack Possibilities on NFC Technology
228-232
Feri Fahrianto, Muhammad Fadil Lubis, Andrew Fiade
Building a Private Cloud Computing and The Analysis against DoS (Denial of Service) attacks Case Study at SMKN 6 Jakarta
233-238
Rizal Broer Bahaweres, Johan Sharif, Mudrik Alaydrus
Health Risk Prediction for Treatment of Hypertension
239-244
Gitarja Sandi, Suhono Harso Supangkat, Cepy Slamet
Semantically Annotated Corpus Model of Indonesian Translation of Quran: an Effort in Increasing Question Answering System Performance
245-249
Husni Teja Sukmana, Ria Hari Gusminta, Yusuf Durachman, Asep Fajar Firmansyah
Implementation of Association Rules with Apriori Algorithm for Increasing the Quality of Promotion
250-254
Wildan Budiawan Zulfikar, Agung Wahana, Wisnu Uriawan
Development of Software Product Line Government System with Ontology OWL Ahmad Nurul Fajar, Imam Marzuki Shofi
xiii
255-258
$QGURLG$SSOLFDWLRQIRU'LDJQRVLQJ*HQHUDO6\PSWRPVRI'LVHDVH8VLQJ )RUZDUG&KDLQLQJ0HWKRG Imam M Shofi, Luh Kesuma, Wardhani, Ghina Anisa
1DwYH%D\HV&ODVVLILHU$OJRULWKPDQG3DUWLFOH6ZDUP2SWLPL]DWLRQIRU
&ODVVLILFDWLRQRI&URVV6HOOLQJ&DVH6WXG\377(/.20-DNDUWD Sfenrianto, Indah Purnamasari, Rizal Broer Bahaweres
+RVSLWDO3DWLHQWV$UULYDO3UHGLFWLRQ8VLQJ0DUNRY&KDLQ0RGHO0HWKRG Alwis Nazir, Lia Anggraini, Lola Octavia, Fadhilah Syafria
&RPSRVLWH1DLYH%D\HV&ODVVLILFDWLRQDQG6HPDQWLF0HWKRGWR(QKDQFH 6HQWLPHQW$FFXUDF\6FRUH Ardhian Ekawijana, Heri Heryono
,PSURYLQJWKH6HFXULW\*XDUDQWHHV$XWKHQWLFLW\DQG&RQILGHQWLDOLW\LQ 6KRUW0HVVDJH6HUYLFHRI0RELOH$SSOLFDWLRQV Teddy Mantoro, Laurentinus, Nazori Agani, Media A. Ayu
$XWKRU,QGH[
xiv