. ,., - :2' ..: : :. ' "rk, -' c' 1: ,t { ,-,,- - . -. {+'" .-r.i;. i '-.riir-F PROCEEDING !t' '9 .a i6r,. v STIKI s: ,: ;* :':. ii,; .:t -za' :, t: l: *l' ;i 'ii." L:, Jv,,,u,,,.r,,ejs\e, IC I ITECHS 201 4 The 1" lnternational Conference on lnformation Technology and Security Malang, Novemb er 27,2014 Published by: Lembaga Penelitian dan Pengabdian pada Masyarakat Sekolah Tinggi lnformatika dan Komputer lndonesia
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
. ,., - :2' ..:
: :. ' "rk, -' c' 1:,t { ,-,,- - . -. {+'"
.-r.i;. i '-.riir-F
PROCEEDING
!t''9 .ai6r,. v STIKI
s:,: ;*:':. ii,;.:t -za':, t:l: *l'
;i 'ii."L:, Jv,,,u,,,.r,,ejs\e,
IC I ITECHS 201 4The 1" lnternational Conference on lnformation Technology and Security
Malang, Novemb er 27,2014Published by:
Lembaga Penelitian dan Pengabdian pada MasyarakatSekolah Tinggi lnformatika dan Komputer lndonesia
For all delegation participants and invited guest, welcome to lnternational
Conference on lnformation Technology and Security (lC-ltechs) 2014 in
Malang lndonesia.
This conference is pa* of the framework of lCf development and security
system that became one of the activities in STIKI and STTAR. this forum
resufted in some references on the application of lCT. This activity is related
to the movement of lCf development for lndonesia.
K-ltechs aims to be a forum for communication between researchers,
activists, system developers, industrial players and all communications ICT
lndonesia and abroad.
The forum is expected to continue to be held continuously and periodically,
so we hope this conference give real contribution and direct impact for ICI
dwelopment.
Fnally, we would like to say thanks fsr all participant and event organizer
r*ro involved in the held of the lC-ltechs 2014. \IVe hope all participant and
teynote speakers got benefit from this conference.
IIST OF CONTENT
lmplementation, Challenges, and Cost Model for Calculatinglnvestment Solutions of Business Process lntelligenceArta M, Sundiaia
Bisecting Divisive Clustering Algorithm Based On Forest Graph ......Achmad Maududie, Wahyu f-atur Wibowo
3D lnteraction in Augmented Reality Environment WithReprojection lmprovement on Active and Passive Stereofko Eudi Cahyana, llyas Nuryasin, Aminudin
Design and Development of Sight-Reading Application for Kids
Ch ri sti n a The o do ra Lom d n, T ri an g gora Wi rs d in ata
t55N 2355 - 44$7
The lst lnternational Conference
on lnformation Technology and Security
1-8
9-14
15-23
Traditional Exercises as a PracticalSolution in Health Problems ForComputerUsers.l....|...rt.....J.....t....t'.rLsurentius Noer An dayo, lozu a Pala ndl, Zus an a Pudyastuti
Baum-Wetch Algorithm lmplemehtation For Knowing Data
Characteristics Related Attacks on Web Server Log 25 -35Triawsn Adi Cahyanto
Lighting System with Hybrid Energy Supply for Energy Efficiency
Renny Rakhmawsti, Safirs Nur Hanitah
lnterviewer B0T Design to Help Student Learning English for Job
lnteruiew 45-50M. tunus, M,ldioso, Martin Fatnuriydh, Mariano U$ah Hoesny,Zamah Sari
51-5s
trn SisEm E{ommerce Produk Meubel Berbasisrrt crt r....,..,......r,.,...r 66-74i@
H srcing Web Model of Product Revievy and Rating Based onCoanrs Behaviour Model Using Mixed Service-Oriented System
lE&lPrasetp
ff,rtt Of tost Time at Traffic Lights lntersection Road Using lmage
*rGn, Prasetyo Isnomo
A:stims Oassification Software Based on Bloom's Cognitive Levets
Object Recognatian Based on Genetic Algorithm With ColorSegmentation ........ .,......,.r..... ..!,.....3.., 118-1?8
Evy Poerbuningfyus, Zussna f. Prdyasfuff
V
Developing Compu&r-Based Educational Game to SupportCooperative Lea rning StrategyEva Handriyantinl
The use of Smartphone to Process personal Medical Record byusing Geogra phica I Inforrnation Syste m Tech n ologySubari, Go Frendi GunEwan
News sentiment Analysis using Naive Bayes and AdaboostErna Ddniuti
I mpleme ntasi Metode I nteger progra m rn ing u ntuk penjadua la nTenaga Medis Pada Situasi Darurat Berbasis Aprikasi Mobile 143-148Nrmad Saikhu, Loili Rochmah
129-133
134-142
149-158
Penerapan sistem InformasiAkutansi pada Toko panca JayaMenggunakan lntegrated System ....,,,...,,....,ii,.ii,...ir.r.r.i.,.,.......ri.... 1S9-1EBMichael Andrianta T, Rinabi Tonama[ g,Bus, M,Com
I m plem e ntation of Accu rate Accounti ng I nfo rmation svstemsTo Mid-Scale Wholesale Company 164-168Aloysius A, P. Putra, Adi Surydputrq'p.
conceptua I Methodology for Beq ui rement Engin ee ri ng basedon GORE and BPM 169-174Ahmad Nurulfalar,lmam M Shafi
Pergo[ahn Dfrh ldd6 Keprnsan Nlaqranakt gl0vt]pada BalaiBesarPengemba nga n Budidaya Air Tawa r { BB PBAT} Su ka bu mi denganMetode Weight Average lndex tWAt) 175-182lwEn Rizal SetiEiwan, yuntt Nttrkhatifah
Perangkat Lunak Keamanan rnformasi pada Mobile MenggunakanMetode Stream dan Generator Cipher 183-189*rep Budimsn Kusdinar, Mhhamad Ridwan
VI
*rtvs Daign lntrusion preventian system {tps) Based suricota ... #a-LgsIH lr,uonto
sern Monitoring dan pengendalian Kinerja Dosen pada prosesPerhrlhhan Berbasis Radio Frequency tdentiscation {RFID) Ditfttunsan Universitas Kanjuruhan Malangbtuiufrlrrn
194-20s
tfr.*tiple And single Haar classifier For Face Recognition ................ za6-zt3A ffi Gunowon,Subari
s'+ilr Penunjang Keputusan untuk Menentukan Rangking Taraftftrp Masyarakat Dengan Metode simple Additive weighting zL4-zz4Jfu, funiel Rudiaman Sijabat
ogtical character Recognition for lndonesian Electronic ld-card
S.rylg lttidodo
rcayE Noise cancellation for underwater Environment using
btg syahroni, Widya Andi p., Hariwahjuningrat S, R. Henggar B
@ementasi content Based rmage Retrieval untuk Menganalisaremiripan BakJeri Yoghurt Menggunakan Metode Latent $emantictndexing z4o_z4iffi Kartikasori, Chaulina Atfianti ektsvis
sofhrare Requirements specification of Database Roads and3tges in East Java Province Based on Geographic lnformation$:tem ............... 246-ZSsfryk Seby Dwdnoka
functional Model of RFID-Based students AttendanceManagement System in Higher Education lnstitution zs6-z6zK*o Wahyu Prasetyo, Setidbudi Sskdria
vI
fusessment of tmplernentation Health Center Managementlnformation System with Technology Acceptance Modet (TAM)Methad And Spearman Ranklesf fn Jember Regional Health.f,ustfn Farllnda
Relay Nade candidate Selection to Fonararding Emergency Messageln Vehicular.Ad Hoc Network ..............,,.........,.....ii.......,.......,,...r..i ?t6g-ZV3lohan Ericka
Defining Influencing5uccess Factors In iltabdl SofWare Development !GSD)Praiectst..,,.rr.'.,l....rrrrrrrirrrrrorrer....r....r,t..r'.
Anna Yultorti KhodiJah,,Dr, Andref,s Drechsler
viii
190 | IC- ITECHS 2014, ISSN 2356-4407
Analisys Design Intrusion Prevention System (IPS) Based Suricata