Comparative Analysis of the Performance of the - Institutional ...

Post on 07-Jan-2023

0 views 0 download

Transcript of Comparative Analysis of the Performance of the - Institutional ...

Comparative Analysis of the Performance of the Fasttext and Word2vec Methods on the Semantic Similarity Query of Sirah Nabawiyah Information Retrieval System: A systematic literature review.

1st Etna Syirfa Qorina Universitas Islam Negeri Syarif

Hidayatullah Jakarta, Indonesia

etna.syirfa16@mhs.uinjkt.ac.id

4th Arif Zamhari Universitas Islam Negeri Syarif

Hidayatullah Jakarta, Indonesia

arifzamhari@uinjkt.ac.id

2nd Hamka Hasan Universitas Islam Negeri Syarif

Hidayatullah Jakarta, Indonesia

hamkahasan@uinjkt.ac.id

3rd Khadijah Hulliyah Universitas Islam Negeri Syarif

Hidayatullah Jakarta, Indonesia

khodijah.hulliyah@uinjkt.ac.id

5th Didin Saepudin Universitas Islam Negeri Syarif

Hidayatullah Jakarta, Indonesia

didin.saepudin@uinjkt.ac.id

Abstract— In the field of text processing or Natural Language Processing, the increasing popularity of the use of words used in the field of Natural Language Processing can motivate the performance of each of the existing word embedding models to be compared. Semantic similarities have an important role in the field of language. Keywords are the most important thing in finding information. Seeing the benefits and studying the knowledge of Sirah Nabawiyah, especially from unreliable sources, a system to retrieve information was proposed for viewing and studying Sirah Nabawiyah. Based on the explanation above, the writer conducted a Systematic Literature Review (SLR) which was related to the semantic similarity comparison of the word embedding method, namely fast text and word2vec which contributed to the information retrieval system using the knowledge discovery in database method approach to documents in the form of Sirah nabawiyah text. Analysis and comparisons of several pieces of literature have been carried out. As a result, there are several criteria to complement the advantages and disadvantages of previous research.

Keywords— Semantic, Fasttext, Word2vecc, Information Retrieval, Query

I. INTRODUCTION

In the field of text processing or Natural Language Processing (NLP), the technique of representing words into vectors is an interesting topic in ongoing research. This representation is very important because it will have a significant impact on the accuracy or performance of the learning model to be built [1].

The increasing popularity of the use of word embedding used in the field of Natural Language Processing can motivate the performance of each of the existing word embedding models to be compared [5]. Word embeddings can be used to describe the closeness of a word or a document, but this closeness is contextual closeness according to the training data used in its formation, so that often this closeness is not the meaning of a word, but that each method in word embeddings can be used in calculating semantic similarity. a word from the query requested by the user [4].

Word2vec is a vector representation created by Google. Word2vec is also a set of several interrelated models used to produce word embeddings [[5]. In 2016, Facebook AI Research proposed FastText. In-text categorization tasks, FastText can often achieve accuracy comparable to deep networks, but much faster than deep learning methods in training time [6].

Semantic similarities have an important role in the field of language, especially those related to the similarity of the meaning of words. Semantic similarity between words is the search for the similarity between two or more words. Semantic similarity is also a mathematical tool used to estimate the strength of semantic relations between language units, concepts, or examples, through numerical descriptions obtained according to the comparison of information that supports their meaning or describes their properties [3].

Keywords/queries are the most important thing in finding information. The use of the right keywords yields relevant information. When using it as a query, users use various natural languages [2].

Sirah Rasulullah SAW is one of the writings of scholars who need to be highlighted because it has played a major role in developing Islamic preaching and sharia throughout the world since a long time ago [7]. The writing of books about the Sirah or biographies has not been interrupted until today, however, the fundamental difference is that these books were made not from the analysis of the author, or even from thoughts based on concrete evidence. However, the majority of books currently available are books whose data is only obtained from excerpts and news from others [7].

Seeing the benefits and importance of studying the Sirah nabawiyah especially with reliable sources, a system of information retrieval is proposed to find out and study the Sirah Nabawiyah from the book Ar-Rahiq Al-Makhtum by Shaykh Shafiyyurahman Al-Mubarakfuri [8].

An automated system is needed to assist users in finding information. The information retrieval system is a system used to find information that is relevant to the needs of its users automatically from a document collection [9]. The information retrieval system consists of three components

Authorized licensed use limited to: University of Ghana. Downloaded on December 18,2020 at 17:02:05 UTC from IEEE Xplore. Restrictions apply.

The 8th International Conference on Cyber and IT Service Management (CITSM 2020) On Virtual, October 23-24, 2020

main, namely input (input), processor (processor), and output (output). According to Manning et al (2009) Information Retrieval (IR) is finding materials (usually documents) that are unstructured (usually) that meet the information needs of large collections (usually stored on computers) [10].

The indexing process is a process to give weight to words in a document, the weighting method in this study uses the Term Frequency-Inverse Document Frequency weighting method. The retrieval process is a process to calculate the similarity of a query to a document because the case most frequently studied in the retrieval system process is text and is represented in a certain form [11]

The Vector Space method is an algebraic model for describing text documents (multiple objects) as vectors of identifiers. Typically used in information filtering, information retrieval, indexing, and ranking and ranking of relevant ones [12].

Based on the explanation above, the writer researched in comparison to the semantic similarity of the word embedding method, namely fast text, and word2vec which contributed to the field of information retrieval systems using the knowledge discovery in the database method approach in text documents. In-text processing we use preprocessing which is commonly used in text mining. The research aims to create an information retrieval system and use the concept of semantic equation analysis to find knowledge on queries and text data in the database from the book Ar-Rahiq Al-Makhtum by Shafiyyurahman Al-Mubarakfuri. Word2vec and fast text methods are used in the calculation of semantic similarity between words based on the Indonesian Wikipedia corpus to find words that have semantic similarities from the query requested by the user and processed in the Vector Space Model method. The parameters used in the comparison of the performance of the word embedding method are vector dimensions, time velocity and the level of word accuracy obtained.

II. RELATED WORK

Semantic calculation analysis conducted by Nabila Nanda, Arif Bijaksana, M.Tech, and Indra Lukmana Sardi [13] explains the use of the word2vec method in English semantic word search using several corpus with the skipgram algorithm and using vector dimension parameters 300 dan windows size 7,9 dan 11. It is known that the greater the window value. size, the lower the correlation value. This study uses the gold standard as an evaluation method, the results of the correlation value of word2vec are still relatively weak when compared to the gold standard, namely with the highest correlation value in window size 7 of 0.19235.

Research by Wohlgenannt, Gerhard Klimov, et al [14] explained that the comparison of the performance of the semantic fasttext, latex, and glove models in searching for queries on linked data. The parameters of this research are 100,000 Wikipedia dataset, the number of vector dimensions is 50, 150, and 300, and the time of use. However, testing this method still uses wiki data. The result of this study is that the fastest method is superior to latex and gloves.n

Research by Kunhadji [8] explains that the Word2vec method and the vector space model can be implemented in an information retrieval system with the source of the book

ArRahiq Al-Makhtum by Shafiyyurahman Al-Mubarakfuri. The system can return relevant information from user-entered queries. The query has semantic similarities between the words of the model that was created with the Word2vec model using the Indonesian Wikipedia data dump. However, for the development of the research, it is directed to use models from other information retrieval systems to be able to compare performance results so that the best model of information retrieval systems can be found.

Research by Ye Yuan [15] explained that using the semantic fast text, doc2vec, glove, and word2vec methods on information retrieval to find information about COVID-19, with vector dimension parameters 256, 100 documents from Wikipedia and time data. The results of this study indicate that the word2vec and glove methods are superior to the fast text and doc2vec methods. The calculation of this method uses cosine similarity to be able to apply the ranking of the four methods.

Research by Derry Jatnika, Moch Arif Bijaksana dan Arie Ardiyanti Suryani [3] explained that the word2vec method is used to find semantic similarities with the skip-gram algorithm on 120,000 English words using vector dimensions 50, 150, and 300 and window sizes 3, 6, 9. However, if using a larger amount of data it takes a longer time. The result of this research is that the number of vector dimensions 300 with window size 9 is superior because the number of vector dimensions and window size can affect the appearance of words.

III. RESEARCH METHODS

This study uses the Systematic Literature Review (SLR) method to compare the performance of fast text and word2vec in terms of the similarity of the word meaning of a query used by users when reading Sirah nabawiyyah through a system. Systematic Literature Review (SLR) is defined as the process of identifying, assessing, and interpreting all available research evidence with the aim of providing answers to specific research questions. This paper adopts the steps presented, namely planning, implementing, and reporting.

A. Planning

1) Identifying the Need. As has been explained, the problem raised in this study is

with the fast text and word2vec methods, which are used in the field of word embedding, based on the literature study used by the author, both methods have their respective strengths and weaknesses, therefore, the authors want to analyze the performance comparison of the fasttext and word2vec methods using Sirah nabawiyah book Ar-Rahiq Al-Makhtum by Shafiyyurahman Al-Mubarakfuri, in addition to getting the best results from the two methods, this system can make it easier for the reader of Sirah nabawiyah to find the link between the words being searched using the desired query/keyword.

2) Research Questions The research question (RQ) was determined to keep the

review focused. The research questions and motivation for this study are presented in Table I.

Authorized licensed use limited to: University of Ghana. Downloaded on December 18,2020 at 17:02:05 UTC from IEEE Xplore. Restrictions apply.

The 8th International Conference on Cyber and IT Service Management (CITSM 2020) On Virtual, October 23-24, 2020

TABLE I. RESEARCH QUESTIONS ON LITERATURE REVIEW

ID Questions MotvationR1 How can you

compare the results of the semantic word embedding?

Knowing the best performance of word embedding semantics, using multiple vector values.

R2

How to implement semantic similarity in information retrieval using knowledge discovery in database approach?

Knowing the merging of word embedding performance with information retrieval using the knowledge discovery in database approach.

B. Conducting

1) Conduct the Review At this stage, the authors compile a collection of literature

sourced from several leading online databases such as Google Scholar, Researchgate, IEEE Explore, and several university e-journal portals. In the process of searching for literature, the author uses several keywords such as "fast text", "word2vec", "information retrieval system", "term frequency-inverst document frequency" and "Sirah nabawiyyah".

2) Inclusion and Exclusion a) Inclusion

Literature indirectly or directly answers one or all Research Questions (RQ), which relates to the effect of the number of dimensional vectors, the value of the vector produced, and the time required in the process. Regarding the use of fast text and wor2vec methods in the system.

b) Exclusion Meanwhile, the literature exclusion category was

irrelevant, not related to the research conducted, and did not clearly explain each stage of the research.

C. Reporting

This stage has 2 (two) stages, namely results and discussion, for this stage is further explained in the results and discussion section.

IV. RESULT AND DISCUSSIONS

A. Result

The authors obtained 30 literature. After passing the Conducting phase, only 15 literature was declared valid. Then, 15 literature is divided into 2 parts based on their relationship with the Research Questions (RQ) in this study (some literature are included in more than one category:

• 5 literature related to the best performance of word embedding semantics, using multiple vector values. (for RQ1).

• 10 literature related to word embedding performance with information retrieval (for RQ2).

B. Discussion

Based on the analysis of some of the previous literature, the authors decided to add to the existing criteria from the various strengths and weaknesses of previous studies. Here are a few things to add to the research:

RQ1: How can you compare the results of the semantic word embedding?

Based on the analysis of the comparison of 5 literature related to the best performance of word embedding semantics, using multiple vector values several criteria to complement the existing strengths and weaknesses of the previous research:

• Adds the dimension number to another vector.

In the previous study, the maximum use of vector dimensions was 300. Therefore, this study analyzes the two methods from the diversity of the number of vector dimensions used, such as wanting 100, 300, and 500 vectors and also using various window sizes to see what factors are involved. can affect the appearance of words.

• Using time parameters

In this study, the authors use the time parameter when the process runs the method so that the performance ratio analysis factor of the method used is more diverse

RQ2: Related To Word Embedding Performance With Information Retrieval?

In previous research, the search for semantic similarities only used test data on wikidata. Therefore we propose to build a system with a user-friendly interface to easily learn Sirah Nabawiyah. We use an information retrieval system to make it easier for users to find documents according to the desired keywords.

V. CONCLUSION

In this paper, Systematic Literature Review (SLR) to analyze the comparison of the word embeddings fasttext and word2vec methods on the semantic similarity query of the Sirah Nabawiyah information retrieval system uses the knowledge discovery in database approach. The results of the SLR have been answered from previous research statements. Based on the comparative analysis of several kinds of literature that have been previously described, it is known that several factors of the semantic word embedding method have various results in word searches using queries. Therefore, the application of this method can be used in certain research cases. It is known that the amount of data, dimension vector, window size, and time can affect the performance of the method in the word embedding. Because the results of the previous research the word2vec method is more commonly used, while the new FasText method is considered more effective, this study will compare the performance of the fastText and word2vec methods using several dimensional

Authorized licensed use limited to: University of Ghana. Downloaded on December 18,2020 at 17:02:05 UTC from IEEE Xplore. Restrictions apply.

The 8th International Conference on Cyber and IT Service Management (CITSM 2020) On Virtual, October 23-24, 2020

vectors. To test the information retrieval system used to find the relevance of the query on the Sirah nabawiyah book of ArRahiq Al-Makhtum by Shaykh Shafiyyurahman Al-Mubarakfuri in order to get a more varied semantic equation query to complement the weaknesses and strengths that existed before the research was proposed.

REFERENCES [1] Z. Arliyanti Nurdin, Bernadus, Anugrayani, “Performance Comparison

of Word2vec, Glove, and Fasttext Embedding in Text Classification,” Vol. 14, No. 2, 2020.

[2] E. Tanuwijaya, S. Adam, M. F. Anggris, And A. Z. Arifin, “Query Expansion Using Word Embedding And Pseudo Relevance Feedback,” Regist. J. Ilm. Teknol. Sist. Inf., Vol. 5, No. 1, P. 47, 2019.

[3] D. Jatnika, M. A. Bijaksana, and A. A. Suryani, “Word2vec model analysis for semantic similarities in English words,” Procedia Comput. Sci., vol. 157, pp. 160–167, 2019.

[4] M. M. Rani, M. A. Bijaksana, and S. Al Faraby, “Analysis and Implementation of Semantic Similarities Between Texts Using Alignment Approaches and Semantic Vector in Al-Qur'an Translation Analysis and Implementation Sematics Text Similiarity using Alignment and Semantic Vector in Translation of the Qur 'an,” Univ. Telkom, vol. 4, no. 2, pp. 3254–3262, 2017.

[5] F. Rahutomo, D. S. E. Ikawati, and O. A. Rohman, “Evaluation of Word2Vec Features in the Online Essay Exam System, "JIPI (Journal of Science. Research and Learning Informatics., vol. 4, no. 1, pp. 36–45, 2019.

[6] A. Joulin, E. Grave, P. Bojanowski, M. Douze, H. Jégou, and T. Mikolov, “FastText.zip: Compressing text classification models,” pp. 1–13, 2016.

[7] Ibnu Hisyam, “Complete History of Life of the Prophet sallallaahu 'Alaihi wa Sallam,” 2015.

[8] K. Rahmata, “Implementation of the word2ec method and the vector space model in the Sirah Nabawiyah learning information retrieval system," 2020.

[9] A. M. Siregar, “Comparison of Weighted Words in Information Retrieval Systems, "Techno Xplore J. Komput Science. and Teknol. Inf., Vol. 2, no. 2, pp. 1–9, 2018.

[10] K. D. Putung, A. S. M. Lumenta, and A. Jacobus, "Application of Information Retrieval System in Thesis Document Collection," J. Tek. Inform., Vol. 8, no. 1, 2016.

[11] D. Wahyudi, T. Susyanto, and D. Nugroho, “Implementasi Dan Nazief & Adriani and Porter Stemming Algorithm Analysis in Indonesian Language Documents, "J. Ilm. SINUS, vol. 15, no. 2, 2017.

[12] R. R. Bintana, C. Fatichah, and D. Purwitasari, "Question-Answer Search Using Convolutional Neural Networks on the Topic of Indonesian Language Religion," J. Ultim., Vol. 10, no. 1, pp. 57–64, 2018.

[13] I. Nabila, Arif Bijaksana, "Word2vec Analysis for the Calculation of Semantic Similarities between Words," e-Proceeding Eng., Vol. Vol.5, No., no. 3, pp. 7603–7612, 2018.

[14] G. Wohlgenannt, N. Klimov, D. Mouromtsev, D. Razdyakonov, D. Pavlov, and Y. Emelyanov, “Using word embeddings for visual data exploration with ontodia and wikidata,” CEUR Workshop Proc., Vol. 1932, pp. 1–8, 2017.

[15] Y. Yuan, "Improving Information Retrieval by Semantic Embedding," 2020.

Authorized licensed use limited to: University of Ghana. Downloaded on December 18,2020 at 17:02:05 UTC from IEEE Xplore. Restrictions apply.

xii

TABLE OF CONTENT

FRONT MATTER ii-iv

PREFACE v

COMMITTEES vi-xi

TABLE OF CONTENT xii-xxiii

Applying of Quranic Glossary Approach to Improve Indonesian Qur'an Translation Search Engine Performance

1 Fenty Eka Muzayyana Agustin, M. Hani Rizqi Maulidi, Ria Hari Gusmita, Rina Candra Noor Santi, Maria Ulfa, and Robi Sugara

1-5

Website Trust to User Online based Shari’ah Model Determinant:

A Case Study toward User Behavior Model 2 Herlino Nanang, Yusuf Durachman, Ahmad Fazilah Misman, Zahidah Zulkifli, Husni

Teja Sukmana, and Kusmana 6-10

Motorcycle Secondary Authentication System Using Arduino-

Based HC-05 and SIM800l Module 3 Nenny Anggraini, Imam Marzuki Shofi, and Mahfudz Nurzamzami 11-17

Social Anxiety on Instagram Second Account User 4 Uzdatul 'Ilma, Rena Latifa, Imam Subchi, Layyinah, Natris Idriyani, and Mumin Roup 18-22

Consumer Trust to Buy Green Product: Investigation of Green

Perceived Value with Green Satisfaction Mediation

5 Harrie Lutfie and Dandy Marcelino 23-28

Investigating Facebook Advertising Features Through

Performance Expectancy on Customer Purchase Intention

6 Harrie Lutfie and Dandy Marcelino 29-35

Information Need and Expectation Model for Measuring the Use

of Institutional Repositories

7 Agus Rifai, Ade Abdul Haq, Amrullah Hasbana, Asriyati, Fadhilah Suralaga, and Usep Abdul Matin

36-42

Measuring the Effect of Advertising Value and Brand Awareness

on Purchase Intention through the Flow Experience Method on Facebook's Social Media Marketing Big Data

8 Sampurno Wibowo, Rahmat Hidayat, Yuyus Suryana, Diana Sari, and Umi Kaltum 43-47

xiii

Quality in Use Measurement of Google Classroom in Online

Learning 9 Dewi Khairani, Dede Rosyada, Zulkifli, Amany Burhanuddin Lubis, Annisa Daffa

Oktriyana, and Ellrica Dewi Herawati Jana48-52

Designing Arduino-Based Devices for Fluid Height Monitor

10 Faiz Dhiaulhaq, Unan Yusmaniar Oktiawati, and Irving V Paputungan 53-56

Analysis of Customer Satisfaction in Go-Food Services:

Customer Relationship Management 11 Muharman Lubis and Chandra Wardana 57-64

Using AES and DES Cryptography for System Development File

Submission Security Mobile-Based

12 Rismayani and Cucut Susanto 65-71

Knowledge Base System (KBS) Uses Ternary Grid in Islamic

Philosophers 13 Siti Ummi Masruroh, Nurul Faizah Rozy, Kusmana, Velia Handayani, Asep Saepudin

Jahar, and Dewi Aprilia Ningrum 72-78

Performance of Acne Type Identification Using GLCM and SVM 14 Anif Hanifa Setianingrum, Siti Ummi Masruroh, and Syifa Fitratul M 79-82

Smart Regency E-Service Quality Analysis with Multidimensional Hierarchical Model (MHM) Approach: an Empirical Study of Madura District

15 Aang Kisnu Darmawan, Daniel Oranova Siahaan, Tony Dwi Susanto, Achmad Nizar Hidayanto, Busro Akramul Umam, Miftahul Walid, Hoiriyah, Aang Subiyakto, and Betty Dewi Puspasari

83-89

Transactional Quality, Relational Quality and Customer Loyalty

Aspects in Transactional E-commerce

16 Shofiya Arrahmani, Yusuf Durachman, Eva Khudzaeva, Usep Abdul Matin, and Kusmana

90-94

Social Media Technology Adoption for Improving MSMEs

Performance in Bandung: a Technology-Organization-Environment (TOE) Framework

17 Astri Wulandari, Bethani Suryawardani, and Dandy Marcelino 95-102

Performance Analysis of Black Hole Attack and Flooding Attack

AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)

xiv

18 Andrew Fiade, Afie Yudha Triadi, Ahmad Sulhi, Siti Ummi Masruroh, Velia Handayani, and Hendra Bayu Suseno

103-107

Analysis and Comparative Between Profile Matching and SAW

Method in Decision Support 19 Helmi Kurniawan, Ashari P Swondo, Eka Purnama Sari, Khairul Ummi, Muhammad

Rusdi Tanjung, and Yusfrizal 108-112

Arduino Based Digital Desk Nameplate Design Using Android

Controls Based on Arduino

20 Fauzi Syarif, Fhery Agustin, Asbon Hendra Azhar, Ratih Adinda Destari, and Hardianto

113-116

Acceptance of Ubiquitous Registration Information Systems

21 Dwi Yuniarto, Dani Indra Junaedi, and Esa Firmansyah 117-122

Smart Farming Precision Agriculture Project Success based on

Information Technology Capability

22 Dwi Yuniarto, Dody Herdiana, and Dani Indra Junaedi 123-128

Examining Readiness of E-Learning Implementation Using

Information System Readiness Impact Model 23 Esa Firmansyah, Dody Herdiana, and Dwi Yuniarto 129-133

Analysis of Web Security Using Open Web Application Security

Project 10

24 Muhammad Agreindra Helmiawan, Yan Yan Sofiyan, Fidi Supriadi, Fathoni Mahardika

134-138

Artificial Intelligence in The Game to Respond Emotion Using

Fuzzy Text and Logic

25 Asep Saeppani and Yanyan Sofiyan 139-143

Analysis of Data Prediction Generate by Admission Student

Application using Least Square Method

26 Irfan Fadil, Muhammad Agreindra Helmiawan, and Dani Indra Junaedi 144-148

Distributing Parallel Virtual Image Application using Continuous

Integrity/Continuous Delivery Based on Cloud Infrastructure

27 Irfan Fadil, Asep Saeppani, Agun Guntara, and Fathoni Mahardika 149-152

A Model of Virtual Learning Environments Using Micro-Lectures,

MOODLE, and SLOODLE 28 Fidi Supriadi, Muhammad Agreindra Helmiawan, Yan Yan Sofiyan, and Agun

Guntara 153-156

xv

Enterprise Information System Planning Using TOGAF

Architecture Development Method on XYZ College

29 Agun Guntara, Asep Saeppani, Irfan Fadil, and Fidi Supriadi 157-162

Analysis of Factors That Affect The Quality of E-Government

Services: A Case Study in Ombudsman of the Republic of Indonesia

30 Yusuf Durachman, Nur Yasin, Damayanti Harahap, Rodoni, Andi Faisal Bakti, and Masri Mansur

163-169

Identification of Anorexia Nervosa and Bulimia Nervosa Eating

Disorders Using the Dempster Shafer Method

31 Dini Ridha Dwiki Putri, Muhammad Reza Fahlevi, Fitri Pranita Nasution, Lahmudin Sipahutar, Rida Utami, and Elvin Syahrin

170-174

Using WebQual 4.0 For Measuring Quality of E-learning Services

During COVID-19 Pandemic

32 Rismayani and Y Johny W Soetikno 175-181

Critical Success Factors of Data Integration on Digital Human

Capital Information System to Support Digital Transformation

33 Joy Gabriel, Anabella Mayzira, Julian Aditya, Muhammad Itsari, Suryo Satrio and Yova Ruldeviyani

182-188

The Use of Honeypot in Machine Learning Based on Malware

Detection: A Review

34 Iik Muhamad Malik Matin and Budi Rahardjo 189-194

Online Shop Recommendations: Decision Support System Based

on Multi-Objective Optimization on the Basis of Ratio Analysis

35 Okfalisa, Zulfahri, Dwi Utari Iswavigra, Megawati, and Saktioto 195-200

Selection of E-Marketplaces Factors Affecting Indonesian

Women's Business Loyalty Using Simple Multi-Attribute Rating Technique (SMART) Method

36 Linda Marlinda, Yusuf Durachman, Eva Zuraidah, Tukino, Widiyawati, and Sabar Hanadwiputra

201-205

A Framework For Collecting And Analysis PE Malware Using

Modern Honey Network (MHN)

37 Iik Muhamad Malik Matin and Budi Rahardjo 206-210

xvi

The Combination of Natural Language Processing and Entity Extraction for Academic Chatbot

38 Lukas Tommy, Chandra Kirana, and Leo Riska 211-216

Classification of Falciparum Parasite in Human Red Blood Cells

Using Randomly Wired Neural Network

39 Nur Inayah, Muhaza Liebenlito, Nina Fitriyati, and Kharisma Monardo 217-220

Trend Moment Method on Identification of Food Product Sales

40 Rida Utami, Lahmuddin Sipahutar, Dini Ridha Dwiki Putri, Fitri Pranita Nasution, Fetty Ade Putri, and Maulia Rahman

221-224

Particle Swarm Optimization Feature Selection for Breast Cancer

Prediction 41 Nurhayati, Fajar Agustian, and Muhammad Dzil Ikram Lubis 225-230

Model Decision Support System for Diagnosis Covid-19 Using

Forward Chaining: a Case in Indonesia

42 Henderi, Miftah Maulana, Harco Leslie Hendric S. Warnars, Didik Setiadi and Taufik Qurrohman

231-234

Determinants of Continuance Use Intention of Mobile-based

Electronic Ticketing

43 Aries Susanto, Israhadi Tri Hutama, Elsy Rahajeng, and Aida Fitriyani 235-240

Analysis Using The Technology Acceptance Model (TAM) and

DeLone & McLean Information System (D&M IS) Success Model of AIS Mobile User Acceptance

44 Nur Aeni Hidayah, Nidaul Hasanati, Ranti Novela Putri, Kamal Fikri, Zahrotun Nihayah, and Abdul Muin

241-244

Logical Fallacies in Social Media: A Discourse Analysis in

Political Debate

45 Didin Nuruddin Hidayat, Nurhalimah, Maya Defianty, Ummi Kultsum, Zulkifli, and Agus Sufyan

245-249

Development of Sensor For Detecting Alcohol Baswe on

Polyvinylidene Fluoride (PVDF)

46 Zahra Razani Husna, Ambran Hartono and Ryan Rizaldy 250-257

Vehicle Rental Facility Using Genetic Algorithm

47 Anif Hanifa Setianingrum, Nurul Faizah Rozy, and Anindya Putri Sahira 258-263

xvii

Science Adaptive Assessment-Tool Accommodating HOTS Assessment Based on Learning Style

48 Zulfiani Zulfiani , Iwan Permana Suwarna, Muhamad Arif, Nengsih Juanengsih, and Dzikri Rahmat Romadhon

264-268

Implementation of E-learning during a Pandemic: Potentials and

Challenges

49 Agus Sufyan, Didin Nuruddin Hidayat, Amany Lubis, Ummi Kultsum, Maya Defianty, and Fadhilah Suralaga

269-273

Evaluation of e-Halal Certification System Acceptance to Improve

Halal Certification Services at LPPOM MUI 50 Nia Kumaladewi, Suci Ratnawati, Yuni Sugiarti, and Amany Burhanuddin Umar Lubis 274-278

The Effectiveness of Using Ednodo-Based E- Learning in the

Blended Learning Process To Increase Student Motivation and Learning Outcomes

51 Sita Ratnaningsih, Miswan, Yazid Hady, Ratna Sari Dewi, Fahriany, and Muhammad Zuhdi

279-283

Pattern Recognition of Batak Script Using Habbian Method

52 Frinto Tambunan, Erwin Ginting, Edy Victor Haryanto, and Muhammad Fauzi 284-287

Chat Message Security Enhancement on WLAN Network Using

Hill Cipher Method

53 Ulfah Indriani, Heri Gunawan, Ahir Yugo Nugroho Harahap, and Hetty Zaharani 288-292

Performance Evaluation of First Hop Redundancy Protocol (FHRP)

on VRRP, HSRP, GLBP with Routing Protocol BGP and EIGRP

54 Imelda Ristanti Julia, Hendra Bayu Suseno, Luh Kesuma Wardhani, Dewi Khairani, Khodijah Hulliyah, and Asep Taufik Muharram

293-297

Automatic Monitoring and Control System in Aeroponic Plant Agriculture

55 Iwan Fitrianto Rahmad, Lili Tanti, Ratih Puspasari, Evri Ekadiansyah, and Vidi Agung Fragastia

298-302

Description Method to Find Patterns on Employee Attendance

56 Siti Aliyah, Dwi Ardiyanti, Fitiana Harahap, and Efani Desi 303-306

Information Security Risk Management Analysis Using ISO 27005:

2011 For The Telecommunication Company

57 Syopiansyah Jaya Putra, Muhamad Nur Gunawan, Achmad Falach Sobri, JM Muslimin, Amilin, and Didin Saepuddin

307-311

xviii

Heuristic Evaluation In Mobile Augmented Reality Applications In Designing Houses

58 Rita Novita Sari, Ratna Sri Hayati, Fujiati, Sri Lestari Rahayu, and Soeheri 312-316

Towards the Implementation of Arabic Language Mobile Apps

Learning: Designed by User Insight

59 Rizky Putri Fajriati, Dewi Khairani, Nurul Faizah Rozy, Nanang Husin, Lisa Wiyartanti, and Tabah Rosyadi

317-321

Cyber Learning: Simulation on Installing Optical Fiber

60 Fadillah Dwitama, Sri Lestari Rahayu, Rofiqoh Dewi, and Wiwi Verina 322-325

Analytic Hierarchy Process (AHP) Modelling For ATM Machine

Placement

61 Andrian Syahputra, Safrizal, Khairani Puspita, Rizki Maulida, Jane Elnovreny and Wirhan Fahrozi

326-329

Wavelet Analysis and Comparison from Coiflet Family on Image

Compression

62 Rohima and Muhammad Barkah Akbar 330-334

Examining the Implications of Unified Theory of Acceptance and

Use of Technology for National Library Navigation Systems

63 Aries Susanto, Zaky Tamimi, Meinarini Catur Utami, Aida Fitriyani, Imam Sujoko, and Asmawi

335-340

E-Commerce Portal as Promotion Media and Market Place By

Adopting Business Model Innovation for SMEs

64 Suci Ratnawati and Luthfiyyah Widianingsih 341-345

Comparison and Analysis Several Wavelet from Daubechies

Family in Image Compression

65 Muhammad Barkah Akbar 346-350

Celebrity Endorser in Supporting SMEs through Social Media in

Pandemic Situation

66 Sri Hidayati, Cut Erika Ananda Fatimah, Ela Patriana, Maria Ulfa, Yuke Rahmawati, and Ai Maryani

351-355

Analysis of Continuance Use of Video On Demand Applications by

Using the Hedonic Motivation System Adoption Model

67 Muhammad Qomarul Huda, Nur Aeni Hidayah, Tania Nur Hafizah Hersyaf, Imam Sujoko, and Asmawi

356-361

xix

Gamified Learning Platform Analysis for Designing a Gamification-Based UI / UX of E-learning Applications: A Systematic Literature Review

68 Velia Handayani, Fahrizal Lukman Budiono, Dede Rosyada, Rona Nisa Sofia Amriza, Zulkifli, and Siti Ummi Masruroh

362-366

Identifying Pork Raw-Meat Based on Color and Texture Extraction

Using Support Vector Machine

69 Sriwanti Ayu Aisah, Anif Hanifa Setianingrum, Luh Kesuma Wardhani, and Rizal Broer Bahaweres

367-371

Optimization of MSE Accuracy Value Measurement Applying False

Alarm Rate in Forecasting on Fuzzy Time Series based on Percentage Change

70 Arif Ridho Lubis, Santi Prayudani, and Al-Khowarizmi 372-376

A Case Study of E-Kanban Implementation in Indonesian

Automotive Manufacture

71 Christian Ricky and Yasuo Kadono 377-383

Instrument Calibration on the ASEAN Entrepreneurship Profiling

Website

72 Sasmoko, Yasinta Indrianti, Fredy Pumomo, and Mohd. Khairuddin bin Ramly 384-387

Assessing Computer Anxiety in Vocational High School Students

73 Roby Farhan, Rena Latifa, Natris Idriyani, Layyinah, Imam Subchi, and Asep Saepudin Jahar

388-391

Investigation of IT Competence of IT Students in Facing the Industrial Revolution 4.0

74 Viva Arifin, Mohamed Razi Mohamed Jalaldeen, Mira Kartiwi, and Lili Marziana Abdullah

392-397

Clustering and Correlation Methods for Predicting Coronavirus COVID-19 Risk Analysis in Pandemic Countries

75 Rahmad Kurniawan, Siti Norul Huda Sheikh Abdullah, Fitra Lestari, Mohd Zakree Ahmad Nazri, Akhmad Mujahidin, and Noridayu Adnan

398-402

Digital Folklore in Early Childhood Disaster Education

76 Maila D.H. Rahiem, Husni Rahim, Imam Subchi, Zulkifli, Sururin, and Khalimi 403-406

Information Security Awareness of Students on Academic Information System Using Kruger Approach

77 Nurbojatmiko, Asep Fajar Firmansyah, Qurrotul Aini, Akhmad Saehudin, and Siti Amsariah

407-413

xx

Determinants of Lecturer Performance to Enhance Accreditation in Higher Education

78 Untung Rahardja, Ninda Lutfiani, Ageng Setiani Rafika, and Eka Purnama Harahap 414-420

The Impact of Socio-Economic in Digital Signature Using Blockchain Application

79 Muhamad Yusup, Dede Cahyadi, Erick Febriyanto, Mardiana, and Frizca Budiarty 421-426

E-business Adoption Models in Organizational Contexts on the TAM Extended Model: A Preliminary Assessment

80 Asrul Sani, Nur Nawaningtyas P, Rizal R, Yenni Khristiana, Achmad Udin Zailani, and T. Husain

427-431

Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts

81 Maxrizal Maxrizal, Syafrul Irawadi, and Sujono Sujono 432-436

Proof of Blockchain Work on the Security of Academic Certificates

82 Indri Handayani, Ruli Supriati, Euis Siti Nur Aisyah, and Sulistiawati 437-441

Effect Digital Learning on Student Motivation during Covid-19

83 Ida Faridah, Febi Ratna Sari, Tri Wahyuningsih, Fitra Putri Oganda, and Untung Rahardja

442-446

Attendance Monitoring with GPS Tracking on HR Management

84 Burham Isnanto, Ari Amir, and Supardi 447-450

Redesigning User Interface based on User Experience using Goal-directed Design Method

85 Aang Subiyakto, Viranda Adhiazni, Evy Nurmiati, Nida’ul Hasanati, Sumarsono Sumarsono, and Moh. Irfan

451-456

Use of the Advanced Encryption Standard Algorithm for Encryption Short Message Service on Real Count Applications

86 Ari Amir Alkodri, Burham Isnanto, Supardi, Anisah, Seno Hadi Saputro, and Agus Dendi Rachmatsyah

457-462

An Analysis of Attitude on Intention to Purchase Online Halal Cosmetics

87 Bambang Suryadi, Asep Saepudin Jahar, Zulkifli, Elvi Fetrina, Meinarini Catur Utami, and Shofiya Arrahmani

463-466

Kohonen Network Modeling for Lemma Recognition in Bangka Dialect of Malay

xxi

88 Eza Budi Perkasa, Hadi Santoso, Supardi, and Ari Amir Alkodri 467-470

Evaluation of CEISA Application Information System at KPPBC Type Madya Pabean C

89 Bambang Adiwinoto, Harrizki Arie Pradana, Fitriyanti, Marna, Ari Amir Alkodri, Elly Yanuarti, and Agustina Mardeka Raya

471-475

E-Voting Software Quality Analysis with McCall's Method

90 Fransiskus Panca Juniawan, Dwi Yuny Sylfania, Laurentinus Laurentinus, Rahmat Sulaiman, Rendy Rian Chrisna Putra, Harrizki Arie Pradana, Tri Sugihartono and Hengki Hengki

476-480

Web-Based Village Fund Management Monitoring System

91 Hilyah Magdalena, Hadi Santoso, and Ade Septryanti 481-487

Development of a Web-Based Customer Relationship Management (CRM) System for Beauty Clinic

92 Sarwindah, Marini, Hengki, and Sherlly Febriyanti 488-492

The Impact of Ease of Use and Attitude Toward Using Document Submission System Application on Behavior Intention

93 Tri Sugihartono, Rendy Rian Chrisna Putra, Laurentinus Laurentinus, Parlia Romadiana, Harrizki Arie Pradana and Delpiah Wahyuningsih

493-497

Modeling the Smart Education and Coaching to Support "Yuk Nabung Saham Program"

94 Hengki Hengki, Supardi Supardi, Rahmat Sulaiman, Sarwindah Sarwindah, Fransiskus Panca Juniawan and Dwi Yuny Sylfania

498-501

SAW Method in Supporting the Process of Admission of New Junior High School Students

95 Hamidah, Okkita Rizan, Delpiah Wahyuningsih, Harrizki Arie Pradana, and Silga Ramadella

502-506

The Effectiveness of Information Technology as a Learning Media Towards Teaching Role: Case Study for Student due to Pandemic Covid-19

96 Zaharah, Indrayanto, Cut Dhin Nourwahidah, Akhmad Saehudin, Hamka Hasan, and Kamarusdiana

507-512

E-Commerce Portal as Promotion Media and Market Place By Adopting Business Model Innovation for SMEs

97 Parlia Romadiana, Sofian Lusa, Lili Indah Sari, Delpiah Wahyuningsih, Ellya Helmud, and Tri Sugihartono

513-518

xxii

Comparative Analysis of the Performance of the Fasttext and Word2vec Methods on the Semantic Similarity Query of Sirah Nabawiyah Information Retrieval System: A Systematic Literature Review

98 Etna Syirfa Qorina, Hamka Hasan, Khadijah Hulliyah, Arif Zamhari, and Didin Saepudin

519-522

The Role of Satisfaction and Ease of Use on User Attitudes of E-Learning: Case Study MI Mumtaza

99 Sururin, Munzier Suparta, Herlino Nanang, Amelia Zakiyyatun Nufus, Kamarusdiana, and Yazid Hady

523-527

RC4 Algorithm and Steganography to Double Secure Messages in Digital Image

100 Rahmat Sulaiman, Chandra Kirana, Tri Sugihartono, Laurentinus Laurentinus and Fransiskus Panca Juniawan

528-531

Design Fuzzy Expert System And Certainty Factor In Early Detection of Stroke Disease

101 Laurentinus Laurentinus, Kiswanto Kiswanto, Rahmat Sulaiman, Fransiskus Panca Juniawan, Dwi Yuny Sylfania, Putri Kurniawan and Harrizki Arie Pradana

532-538

IT Governance: A Determining Factor Ensuring Online Learning Mechanisms

102 Sandy Kosasi, Husni Teja Sukmana, I Dewa Ayu Eka Yuliani, Budi Susilo, and Diana Fitriani

539-545

Disrupting Agro-industry Supply Chain In Indonesia With Blockchain Technology: Current and Future Challenges

103 Irawan Afrianto, Taufik Djatna, Yandra Arkeman, Imas Sukaesih Sitanggang, and Irman Hermadi

546-552

Using Blockchain Data Security Management for E-Voting Systems

104 Erick Febriyanto, Triyono, Nina Rahayu, Kelvin Pangaribuan, and Po Abas Sunarya 553-557

Decision Support System For Determining The Provision Of Single Tuition Relief Using KNN and SAW Methods

105 Erwin Apriliyanto, Yovita Kinanti Kumarahadi, Donny Yulianto, and Kusrini Kusrini 558-563

User Evaluation of Mobile-based Smart Mango Pest Identification

106 Kusrini, Suputa, Arief Setyanto, I Made Artha Agastya, Herlambang Priantoro, Fadlurahman, and Krishna Chandramouli

564-570

Implementation of Data Augmentation Using Convolutional Neural Network for Batik Classification

xxiii

107 Chan Uswatun Khasanah, Ema Utami, and Suwanto Raharjo 571-575

Mortality Prediction Using Data Mining Classification Techniques in Patients With Hemorrhagic Stroke

108 Indarto, Ema Utami, and Suwanto Raharjo 576-580

COVID-19: Accelerating Digital Transformation for University’s Research Administration

109 Putra Adi Syani, Maila D.H. Rahiem, Imam Subchi, Rina Suryani, Fauqi Kurniawan, and Gunawan

581-586

A Conceptual Paper on the Influence of Social-economic Status on Attitude Towards Online Health Information Seeking Behaviour: A Malaysian Context

110 Harima Nalugwa, Mira Kartiwi, Teddy Surya Gunawan, Jamalludin Ab Rahman, and Faisal Kasirye

587-592

Data Analytics of Fourier-Transform Infrared Spectroscopy (FTIR) For Halal and Non-Halal Adulterations

111 Akbar Arief, Mira Kartiwi, and Irwandi Jaswir 593-598

Development of Very Low Frequency Data Acquisition System using Raspberry Pi

112 Teddy Surya Gunawan, Syed Nasibur Rahman, Mira Kartiwi, and Eko Ihsanto 599-603

Social Network Analysis using Python Data Mining

113 Teddy Surya Gunawan, Nur Aleah Jehan Abdullah, Mira Kartiwi, and Eko Ihsanto 604-610

The Influence of Gender and Level of Education on Motivations for Seeking Health Information Online among Parents

114 Mira Kartiwi, Teddy Surya Gunawan, Jamalludin Ab Rahman, and Nur Agustini 611-614

HAR-MI with COSTE in Handling Multi-Class Imbalance

115 Hartono, Silvia Lestari, Andi Rahmadsyah, Ridha Maya Faza Lubis, and Muhammad Gunawan

615-619

Face Recognition Using Eigenface Algorithm On Laptop Camera

116 Rika Rosnelly, Mutiara S. Simanjuntak, Ade Clinton Sitepu, Mulkan Azhari, Sandy Kosasi, and Husen

620-623

AUTHORS INDEX 624-633

ii

2020 8th International Conference on Cyber and IT Service Management

ISB Atma Luhur, Pangkalpinan

(Virtual Conference)

October 23-24, 2020

iii

2020 8th International Conference On Cyber And IT Service Management (CITSM)

ISB Atma Luhur, Pangkalpinang (Virtual)

Phone: +6281384175979

Email : contact.citsm@uinjkt.ac.id

Website : http://citsm.id/

August 7-9, 2018

iv

2020 8th International Conference On Cyber And IT Service Management (CITSM)

Copyright ©2020 by the Institute of Electrical and Electronics Engineers, Inc. All rights

reserved.

Copyright and Reprint Permission

Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond

the limit of U.S. copyright law, for private use of patrons, those articles in this volume that carry

a code at the bottom of the first page, provided that the per-copy fee indicated in the code is

paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

Other copying, reprint, or reproduction requests should be addressed to IEEE Copyrights

Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 1331, Piscataway, NJ 08855-1331.

Additional copies of this publication are available from

Curran Associates, Inc.

57 Morehouse Lane

Red Hook, NY 12571 USA

+1 845 758 0400

+1 845 758 2633 (FAX)

vi

COMMITTEES Honorary Chairs Fachrul Razi, Religious Affairs Minister of the Republic of Indonesia Johnny G. Plate, ICT Minister of the Republic of Indonesia Amany Lubis, Rector of State Islamic University of Syarif Hidayatullah Jakarta Steering Committee Co-Chairs Lily Surayya Eka Putri, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Syopiansyah Jaya Putra, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Ismail Khalil, Johannes Kepler University Linz, Austria Tri Haryanto, IT Best Practice, Indonesia Djoko Soetarno, Coris, Indonesia Abdul Wahab Abdul Rahman, International Islamic University Malaysia, Malaysia Sri Hartati, IndoCEISS, Indonesia Computer Electronic and Instrumentation Support Society General Organizing Chair Yusuf Durachman, Syarif Hidayatullah State Islamic University Jakarta Harrizki Arie Pradana, ISB Atma Luhur Organizing Committee (Syarif Hidayatullah State Islamic University Jakarta) Dewi Khairani Siti Ummi Masruroh Yuditha Ichsani Syopiansyah Jaya Putra Imam M. Shofi Luh Kesuma Wardhani Fenty Eka Muzayyana Agustin Khodijah Hulliyah Nurhayati Aries Susanto A’ang Subiyakto Qurrotul Aini Herlino Nanang Asep Taufik Muharram Muhammad Aqil Pratama Muhammad Samiaji Abdul Zahoor Fatoumatta Binta Jallow (ISB Atma Luhur) Agustina Mardeka Raya Niken Sumarni Rendy Rian Chrisna Putra Supardi Dian Novianto Sujono Parlia Romadiana Wishnu Aribowo Probonegoro Laurentinus Fransiskus Panca Juniawan Rahmat Sulaiman Erie Yunantari

vii

Aldi Nova Roji Rizki Septian Babelian M. Rifky Farhandi Arie Dewa Bagaskara Eka Sukmadewi Boy Hangga Jerry Jauhari Handi Susilo Yohanes Setiawan Yudi Septiawan Farah Dilah Nahdah Tessa Hervika Gugud Putra Babel Mutia Amirah Rahim Amanda Monica Kristina Technical Program Committee Chair Ismail Khalil, Johannes Kepler University, Austria Technical Program Committee Co-Chair DR. Hadi Santoso, ISB Atma Luhur DR. Sandy Kosasi, STIMIK Pontianak Husni Teja Sukmana, Ph.D Technical Program Committee Kuncoro Wastuwibowo, IEEE Indonesian Section Shingo Mabu, Yamaguchi University Rosiyati Mh Thamrin, STMIK Sepuluh Nopember Jayapura, Indonesia A’ang Subiyakto, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Agus Setiawan, Multimatics, Indonesia Norzaliza Md Nor, International Islamic University, Malaysia Noor Azura Zakaria, International Islamic University, Malaysia Nurul Liyana Mohamad Zulkifli, International Islamic University, Malaysia Muna Azuddin, International Islamic University, Malaysia Norzariyah Yahya, International Islamic University, Malaysia Akram M. Zeki, International Islamic University, Malaysia Normaziah Abdul Aziz, International Islamic University, Malaysia Abdullah Alkalbani, University of Buraimi, Sultanate of Oman Suvdaa Batsuuri Affiliasi, School of Engineering and Applied Sciences, National University of Mongolia Suryadiputra Liawatimena, IEEE Indonesian Section Computer Society Chapter, Bina Nusantara University Dwiza Riana, STMIK Nusa Mandiri, Indonesia M Qomarul Huda, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Muhammad Izman Herdiansyah, Bina Darma University, Palembang, Indonesia Iwan Setyawan, Kristen Satya Wacana University, Indonesia Abdul Syukur, Dian Nuswantoro University, Indonesia Heru Agus Santoso, Dian Nuswantoro University, Indonesia Affandy, Dian Nuswantoro University, Indonesia Andrew Tanny Liem, Klabat University, Indonesia Muhammad Rusli, The School of Information Management and Computer Engineering (STIKOM) Bali, Indonesia I Gde Putu Wirarama Wedashwara Wirawan, The School of Information Management and Computer Engineering (STIKOM) Bali, Indonesia

viii

Yudi Agusta, The School of Information Management and Computer Engineering (STIKOM) Bali, Indonesia Taqwa Hariguna, The College of Information Management and Computer Science (AMIKOM) Purwokerto, Indonesia M. Suyanto, The College of Information Management and Computer Science (AMIKOM) Yogyakarta, Indonesia Ema Utami, The College of Information Management and Computer Science (AMIKOM) Yogyakarta, Indonesia Adam Suhaimi, International Islamic University Malaysia Nurhayati, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Amin Anjomshoaa, Vienna University of Technology, Austria Andrzej Gospodarowicz, Wroclaw University of Economics, Poland Ankhaa Bayar, National University of Mongolia Ashraf Elnagar, University of Sharjah Alimuddin, Tirtayasa University, Indonesia Abdelkader Hameurlain, Institut de Recherche en Informatique de Toulouse Paul Sabatier University Aries Susanto HT, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Bernardo Nugroho Yahya, Ulsan National Institute of Science and Technology, Korea Christian Huemer, Vienna University of Technology, Austria Dieter Kranzlmüller, Ludwig-Maximilians-Universität München, Germany Dimitris Karagiannis, University of Vienna, Austria Duong Anh Duc, University of Information Technology, Vietnam Elly Matul Imah, Sepuluh Nopember Institute of Technology, Indonesia Fauzan Noordin, International Islamic University Malaysia Fadi Aloul, American University of Sharjah Adel Ali Al-Jumaily, University of Technology Sydney Lintang Yuniar Banowosari, Gunadarma University, Indonesia Asad I Khan, Monash University Bessam Abdulrazak, Université de Sherbrooke Ferry Preska Wathan, Universitas Kader Bangsa, Indonesia Ford Lumban Gaol, Bina Nusantara University, Indonesia Geert Poels, Ghent University, Belgium Imam M. Shofi, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Gerald Quirchmayr, University of Vienna, Austria Gerhard Budin, University of Vienna, Austria Gerti Kappel, Vienna University of Technology, Austria Günter Müller, University of Freiburg, Germany Günther Pernul, University of Regensburg, Germany Hadipurnawan Satria, Sriwijaya University, Indonesia Hamideh Afsarmanesh, University of Amsterdam, Netherlands Hoang Xuan Dau, Posts and Telecommunications Institute of Technology, Vietnam Husnayati Hussin, International Islamic University Malaysia Hyerim Bae, Pusan National University, Korea Harisno, Bina Nusantara University, Indonesia Ismail Khalil, Johannes Kepler University Linz, Austria Irman Hermadi, Bogor Agricultural Institute, Indonesia Indra Budi, University of Indonesia, Indonesia Kudang Boro Seminar, Bogor Agricultural Institute, Indonesia Marimin, Bogor Agricultural Institute, Indonesia Jarot Sembodo, Bina Nusantara University, Indonesia Jaafar Gaber, Universite de Technologie de Belfort-Montbeliard Josaphat Tetuko Sri Sumantyo, Chiba University, Japan Jamshid B Mohasefi, Urmia University Pavel Lozhnikov, Omsk State Technical University Russia

ix

Josef Küng, Johannes Kepler Universität Linz, Austria Katsumi Tanaka, Kyoto University, Japan Key Sun Choi, Korea Advanced Institute of Science and Technology, Korea Khalid Latif, National University of Sciences and Technology, Pakistan Kamel Karoui, RIADI Laboratory Lenka Lhotska, Czech Technical University, Czech Republic Luis M. Camarinha Matos, Universidade Nova de Lisboa, Portugal Masatoshi Arikawa, University of Tokyo, Japan Mansoor Ahmed, COMSATS Institute of Information Technology Media Anugerah Ayu, Universitas Siswa Bangsa Internasional, Indonesia Mizuho Iwaihara, Faculty of Science and Engineering Waseda University, Japan Mohamed Alkanhal, King Abdulaziz City for Science and Technology Mohd Farhan Md Fudzee, Universiti Tun Hussein Onn Imam Machdi, Institute of Statistics Narayanan Kulathuramaiyer, Universiti Malaysia Sarawak, Malaysia Nashrul Hakiem, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Nguyen Thah Binh, IIASA, Austria Nguyen Tuan, Vietnam National University, Vietnam Oky Dwi Nurhayati, Diponegoro University, Indonesia Prihandoko, Gunadarma University, Indonesia R. Rizal Isnanto, Diponegoro University, Indonesia Robert P. Biuk-Aghai, University of Macau, China Ahmad Nurul Fajar, Bina Nusantara University, Indonesia Roslina, International Islamic University Malaysia, Malaysia Sfenrianto, Bina Nusantara University, Indonesia Shuaib Karim, Quaid-i-Azam University, Pakistan Somchai Chatvichienchai, University of Nagasaki, Japan Sourav S. Bhowmick, Nanyang Technological University, Singapore Sukrisno. Mardiyanto, Institute Technology of Bandung, Indonesia Tarek Sheltami, King Fahd University of Petroleum and Minerals, Tetsuya Furukawa, University of Kyushu, Japan Thoai Nam, HCMC University of Technology, Vietnam Taufik, Bina Nusantara University, Indonesia Vladimir Marik, Czech Technical University, Czech Republic Werner Winiwarter, University of Vienna, Austria Wichian Chutimaskul, King Mongkut's University of Technology Thonburi, Thailand Wikan Danar Sunindyo, Bandung Institute of Technology, Indonesia Syopiansyah Jaya Putra, State Islamic University of Syarif Hidayatullah Jakarta, Indonesia Zainal A Hasibuan, University of Indonesia, Indonesia Zaheer Khan, University of the West of England Okfalisa, Syarif Kasim State Islamic University Riau, Indonesia Lee Jeong Bae, Busan University of Foreign Studies, South Korea Bae Jihye, SunMoon University, South Korea KyungOh Lee, SunMoon University, South Korea Kwon Jin Bae, SunMoon University, South Korea Febiansyah Hidayat, Surya University, Indonesia Adila A Krisnadhi, Wright State University, United State of Amerika Muhammad Agni Catur, Sampoerna University, Indonesia Aries Kusdaryono, Ministry of Communication and Informatics, Indonesia Samsuryadi Sahmin, Sriwijaya University, Indonesia M. Fachrurrozi, Sriwijaya University, Indonesia Teddy Mantoro, Sampoerna University, Indonesia Qonita Shahab, UX Specialist, Netherlands Murni Mahmud, International Islamic University, Malaysia Noor Azurati, Universiti Teknologi Malaysia, Malaysia

x

Azizul Azizan, Universiti Teknologi Malaysia, Malaysia Adamu Ibrahim, Universiti Teknologi Malaysia, Malaysia Kamilia Bin Kamardin, Universiti Teknologi Malaysia, Malaysia Akeem Olowo, Universiti Teknologi Malaysia, Malaysia Sya Azmeela, Universiti Teknologi Malaysia, Malaysia Kusrini, Amikom University, Indonesia Kim Jin Mook, Sunmoon University, South Korea Houari Sabirin, KDDI Research, Inc Khamis Faraj Alarabi Aljribi, Baniwalid University, Libya Leon Andretti Abdillah, Bina Darma University, Indonesia Darmawan Napitupulu, Indonesian Research Institute, Indonesia Golooba Moses, Islamic University In Uganda Rika Rosnelly, Universitas Potensi Utama, Indonesia Wendi Usino, Budi Luhur University, Indonesia Mochamad Wahyudi, Bina Sarana Informatika, Indonesia Roy Rudolf Huizen, Universitas Sumatera Utara Medan, Indonesia Wisnu Ananta Kusuma, Bogor Agricultural University Opim Salim Sitompul, Universitas Sumatera Utara Medan, Indonesia Purwanto, Udinus Semarang, Indonesia Yana Aditia Gerhana, UIN Sunan Gunung Djati Bandung, Indonesia Ali Ramdhani, UIN Sunan Gunung Djati, Indonesia Agus Rifai, Syarif Hidayatullah State Islamic University, Jakarta Diyah Puspitaningrum, Bengkulu University, Indonesia Umar Aditiawarman, International Islamic University Malaysia Dini Octarina Dwi Handayani, Taylors University Arief Setyanto, AMIKOM Yogyakarta, Indonesia Elis Ratna Wulan, UIN Sunan Gunung Djati, Indonesia Muljono, UDINUS Semarang, Indonesia Muhammad Said Hasibuan, IBI Darmajaya, Indonesia Untung Rahardja, STMIK Rahardja, Indonesia Sri Hartati, Gadjah Mada University, Indonesia Muharman Lubis, Telkom University, Indonesia Retantyo Wardoyo, Gadjah Mada University, Indonesia Insap Santosa, Gadjah Mada University, Indonesia Sunny Arief Sudiro, STMIK Jakarta STI&K, Indonesia Evi Triandini, STIKOM Bali, Indonesia Rahmat Sembiring, Poltek Medan, Indonesia Rena Latifa, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Achmad Nizar Hidayanto, UDINUS Semarang, Indonesia Soetam Rizky Wicaksono, Machung Univesity Nur Sultan Salahuddin, Gunadarma University, Indonesia Yaqoob Koondhar, Sindh Agriculture University Tandojam, Pakistan Ankhbayar Yukhuu, The national university of Mongolia M. Ary Heryanto, UDINUS Semarang, Indonesia Arief Fatchul Huda, UIN Sunan Gunung Djati, Indonesia Very Ronny Palilingan, Universitas Negeri Manado, Indonesia Mohammad Syafrullah, Budi Luhur University, Indonesia Meyliana, Bina Nusantara University, Indonesia Masayu Leylia Khodra, ITB, Indonesia Heru Susanto, Indonesian Institute of Science, Indonesia Rifki Sadikin, Indonesian Institute of Science, Indonesia Muhammad Khusairi Osman, Universiti Teknologi Mara (UiTM) Malaysia Lili Wulandhari, Bina Nusantara University, Indonesia Rizal Bahaweres, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Qurrotul Aini, Syarif Hidayatullah State Islamic University Jakarta, Indonesia

xi

Nanang Husin, University of Indonesia, Indonesia Zulkifli, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Imam Subchi, Syarif Hidayatullah State Islamic University Jakarta, Indonesia Malia Rahiem, Syarif Hidayatullah State Islamic University Jakarta, Indonesia

PREFACE

Assalaamu ‘alaykum warahmatullahi wabarakaatuh, The CITSM 2020 is in the general area of communication and information technology. It provides a forum for presenting and discussing the latest innovations, results and developments in IT Management & organizations, IT Applications, Cyber & IT Security, and ICT. The main objective of this conference is to provide a forum for engineers, academia, scientist, industry, and researchers to present the result of their research activities in the field of Computer and Information Technology. The primary focus of the conference is to create an effective medium for institutions and industries to share ideas, innovations, and problem-solving techniques. There are 214 papers submission and only 126 papers are accepted.

The accepted papers will be presented in one of the regular sessions and will be published in the conference proceedings volume. All accepted papers are submitted to IEEEXplore. IEEE Conference Number: #50537. Catalog Number: CFP2037Z-ART, ISBN: 978-1-7281-7701-4, CFP2037Z-USB, ISBN: 978-1-7281-7700-7. On behalf of the CITSM 2020 organizers, we wish to extend our warm welcome and would like to thank for all Keynote Speakers, Reviewers, Authors, and Committees, for their effort, guidance, contribution and valuable support. Finally, thanks to all lecturers and staffs of the Faculty of Science & Technology, UIN Syarif Hidayatullah Jakarta and ISB Atma Luhur and other parties that directly and indirectly make this event successful. Wa billahi taufiq wal hidaayah. Wallahul muwaffiq ila aqwamit-tharieq. Wasalaamu ‘alaykum warahmatullahi wabarakaatuh. Yusuf Durachman (Organizing Chair)