proceedings of second international conference on...

22
Lecture Notes in Electrical Engineering 365 Felix Pasila Yusak Tanoto Resmana Lim Murtiyanto Santoso Nemuel Daniel Pah Editors Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015)

Upload: dangkiet

Post on 03-May-2019

220 views

Category:

Documents


0 download

TRANSCRIPT

Lecture Notes in Electrical Engineering 365

Felix PasilaYusak TanotoResmana LimMurtiyanto SantosoNemuel Daniel PahEditors

Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015)

Lecture Notes in Electrical Engineering

Volume 365

Board of Series editors

Leopoldo Angrisani, Napoli, ItalyMarco Arteaga, Coyoacán, MéxicoSamarjit Chakraborty, München, GermanyJiming Chen, Hangzhou, P.R. ChinaTan Kay Chen, Singapore, SingaporeRüdiger Dillmann, Karlsruhe, GermanyHaibin Duan, Beijing, ChinaGianluigi Ferrari, Parma, ItalyManuel Ferre, Madrid, SpainSandra Hirche, München, GermanyFaryar Jabbari, Irvine, USAJanusz Kacprzyk, Warsaw, PolandAlaa Khamis, New Cairo City, EgyptTorsten Kroeger, Stanford, USATan Cher Ming, Singapore, SingaporeWolfgang Minker, Ulm, GermanyPradeep Misra, Dayton, USASebastian Möller, Berlin, GermanySubhas Mukhopadyay, Palmerston, New ZealandCun-Zheng Ning, Tempe, USAToyoaki Nishida, Sakyo-ku, JapanBijaya Ketan Panigrahi, New Delhi, IndiaFederica Pascucci, Roma, ItalyTariq Samad, Minneapolis, USAGan Woon Seng, Nanyang Avenue, SingaporeGermano Veiga, Porto, PortugalHaitao Wu, Beijing, ChinaJunjie James Zhang, Charlotte, USA

About this Series

“Lecture Notes in Electrical Engineering (LNEE)” is a book series which reportsthe latest research and developments in Electrical Engineering, namely:

• Communication, Networks, and Information Theory• Computer Engineering• Signal, Image, Speech and Information Processing• Circuits and Systems• Bioengineering

LNEE publishes authored monographs and contributed volumes which presentcutting edge research information as well as new perspectives on classical fields,while maintaining Springer’s high standards of academic excellence. Alsoconsidered for publication are lecture materials, proceedings, and other relatedmaterials of exceptionally high quality and interest. The subject matter should beoriginal and timely, reporting the latest research and developments in all areas ofelectrical engineering.

The audience for the books in LNEE consists of advanced level students,researchers, and industry professionals working at the forefront of their fields. Muchlike Springer’s other Lecture Notes series, LNEE will be distributed throughSpringer’s print and electronic publishing channels.

More information about this series at http://www.springer.com/series/7818

Felix Pasila • Yusak TanotoResmana Lim • Murtiyanto SantosoNemuel Daniel PahEditors

Proceedings of SecondInternational Conferenceon Electrical Systems,Technology and Information2015 (ICESTI 2015)

123

EditorsFelix PasilaDepartment of Electrical EngineeringPetra Christian UniversitySurabayaIndonesia

Yusak TanotoDepartment of Electrical EngineeringPetra Christian UniversitySurabayaIndonesia

Resmana LimDepartment of Electrical EngineeringPetra Christian UniversitySurabayaIndonesia

Murtiyanto SantosoDepartment of Electrical EngineeringPetra Christian UniversitySurabayaIndonesia

Nemuel Daniel PahUniversity of SurabayaSurabayaIndonesia

ISSN 1876-1100 ISSN 1876-1119 (electronic)Lecture Notes in Electrical EngineeringISBN 978-981-287-986-8 ISBN 978-981-287-988-2 (eBook)DOI 10.1007/978-981-287-988-2

Library of Congress Control Number: 2015960766

© Springer Science+Business Media Singapore 2016This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar ordissimilar methodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exemptfrom the relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material containedherein or for any errors or omissions that may have been made.

Printed on acid-free paper

This Springer imprint is published by SpringerNatureThe registered company is Springer Science+Business Media Singapore Pte Ltd.

Contents

Part I Invited Speaker

1 Computational Intelligence Based Regulation of the DC Busin the On-grid Photovoltaic System . . . . . . . . . . . . . . . . . . . . . . . . 3Mauridhi Hery Purnomo, Iwan Setiawan and Ardyono Priyadi

2 Virtual Prototyping of a Compliant Spindle for RoboticDeburring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Giovanni Berselli, Marcello Pellicciari, Gabriele Bigiand Angelo O. Andrisano

3 A Concept of Multi Rough Sets Defined on Multi-contextualInformation Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Rolly Intan

Part II Technology Innovation in Robotics Image Recognitionand Computational Intelligence Applications

4 Coordinates Modelling of the Discrete Hexapod Manipulatorvia Artificial Intelligence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Felix Pasila and Roche Alimin

5 An Object Recognition in Video Image Using ComputerVision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Sang-gu Kim, Seung-hoon Kang, Joung Gyu Leeand Hoon Jae Lee

6 Comparative Study on Mammogram Image EnhancementMethods According to the Determinant of RadiographyImage Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Erna Alimudin, Hanung Adi Nugroho and Teguh Bharata Adji

v

7 Clustering and Principal Feature Selection Impactfor Internet Traffic Classification Using K-NN . . . . . . . . . . . . . . . . 75Trianggoro Wiradinata and P. Adi Suryaputra

8 Altitude Lock Capability Benchmarking: Type 2 Fuzzy,Type 1 Fuzzy, and Fuzzy-PID with Extreme AltitudeChange as a Disturbance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Hendi Wicaksono, Yohanes Gunawan, Cornelius Kristantoand Leonardie Haryanto

9 Indonesian Dynamic Sign Language Recognition at ComplexBackground with 2D Convolutional Neural Networks . . . . . . . . . . 91Nehemia Sugianto and Elizabeth Irenne Yuwono

10 Image-Based Distance Change Identification by SegmentCorrelation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99Nemuel Daniel Pah

11 Situation Awareness Assessment Mechanismfor a Telepresence Robot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107Petrus Santoso and Handry Khoswanto

12 Relevant Features for Classification of Digital MammogramImages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Erna Alimudin, Hanung Adi Nugroho and Teguh Bharata Adji

13 Multi-objective Using NSGA-2 for Enhancingthe Consistency-Matrix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Abba Suganda Girsang, Sfenrianto and Jarot S. Suroso

14 Optimization of AI Tactic in Action-RPG Game . . . . . . . . . . . . . . 131Kristo Radion Purba

15 Direction and Semantic Features for Handwritten BalineseCharacter Recognition System . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Luh Putu Ayu Prapitasari and Komang Budiarta

16 Energy Decomposition Model Using Takagi-SugenoNeuro Fuzzy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149Yusak Tanoto and Felix Pasila

17 Odometry Algorithm with Obstacle Avoidanceon Mobile Robot Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Handry Khoswanto, Petrus Santoso and Resmana Lim

vi Contents

Part III Technology Innovation in Electrical Engineering,Electric Vehicle and Energy Management

18 Vision-Based Human Position Estimation and FollowingUsing an Unmanned Hexarotor Helicopter . . . . . . . . . . . . . . . . . . 165Jung Hyun Lee and Taeseok Jin

19 The Role of Renewable Energy: Sumba Iconic Island, anImplementation of 100 Percent Renewable Energy by 2020 . . . . . . 173Abraham Lomi

20 Electromechanical Characterization of Bucky Gel ActuatorBased on Polymer Composite PCL-PU-CNTfor Artificial Muscle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Yudan Whulanza, Andika Praditya Hadiputra, Felix Pasilaand Sugeng Supriadi

21 A Single-Phase Twin-Buck Inverter . . . . . . . . . . . . . . . . . . . . . . . 193Hanny H. Tumbelaka

22 Performance Comparison of Intelligent Controlof Maximum Power Point Tracking in PhotovoltaicSystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203Daniel Martomanggolo Wonohadidjojo

23 Vehicle Security and Management System on GPSAssisted Vehicle Using Geofence and Google Map . . . . . . . . . . . . . 215Lanny Agustine, Egber Pangaliela and Hartono Pranjoto

24 Security and Stability Improvement of Power SystemDue to Interconnection of DG to the Grid . . . . . . . . . . . . . . . . . . . 227Ni Putu Agustini, Lauhil Mahfudz Hayusman, Taufik Hidayatand I. Made Wartana

25 Solar Simulator Using Halogen Lamp for PV Research . . . . . . . . . 239Aryuanto Soetedjo, Yusuf Ismail Nakhoda, Abraham Lomiand Teguh Adi Suryanto

26 Artificial Bee Colony Algorithm for Optimal PowerFlow on Transient Stability of Java-Bali 500 KV . . . . . . . . . . . . . . 247Irrine Budi Sulistiawati and M. Ibrahim Ashari

27 Sizing and Costs Implications of Long-Term ElectricityPlanning: A Case of Kupang City, Indonesia. . . . . . . . . . . . . . . . . 257Daniel Rohi and Yusak Tanoto

28 Dynamic Simulation of Wheel Drive and Suspension Systemin a Through-the-Road Parallel Hybrid Electric Vehicle . . . . . . . . 263Mohamad Yamin, Cokorda P. Mahandari and Rasyid H. Sudono

Contents vii

29 A Reliable, Low-Cost, and Low-Power Base Platformfor Energy Management System . . . . . . . . . . . . . . . . . . . . . . . . . . 271Henry Hermawan, Edward Oesnawi and Albert Darmaliputra

30 Android Application for Distribution Switchboard Design . . . . . . . 279Julius Sentosa Setiadji, Kevin Budihargono and Petrus Santoso

Part IV Technology Innovation in Electronic, Manufacturing,Instrumentation and Material Engineering

31 Adaptive Bilateral Filter for Infrared Small TargetEnhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Tae Wuk Bae and Hwi Gang Kim

32 Innovative Tester for Underwater Locator BeaconUsed in Flight/Voyage Recorder (Black Box) . . . . . . . . . . . . . . . . . 299Hartono Pranjoto and Sutoyo

33 2D CFD Model of Blunt NACA 0018 at High ReynoldsNumber for Improving Vertical Axis Turbine Performance . . . . . . 309Nu Rhahida Arini, Stephen R. Turnock and Mingyi Tan

34 Recycling of the Ash Waste by Electric Plasma Treatmentto Produce Fibrous Materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319S.L. Buyantuev, A.S. Kondratenko, E.T. Bazarsadaevand A.B. Khmelev

35 Performance Evaluation of Welded Knitted E-Fabricsfor Electrical Resistance Heating. . . . . . . . . . . . . . . . . . . . . . . . . . 327Senem Kursun Bahadir, Ozgur Atalay, Fatma Kalaoglu,Savvas Vassiliadis and Stelios Potirakis

36 IP Based Module for Building Automation System . . . . . . . . . . . . 337J.D. Irawan, S. Prasetio and S.A. Wibowo

37 Influence of CTAB and Sonication on Nickel HydroxideNanoparticles Synthesis by Electrolysis at High Voltage . . . . . . . . . 345Yanatra Budipramana, Suprapto, Taslim Ersamand Fredy Kurniawan

38 Waste Industrial Processing of Boron-Treated by PlasmaArc to Produce the Melt and Fiber Materials . . . . . . . . . . . . . . . . 353S.L. Buyantuev, Ning Guiling, A.S. Kondratenko, Junwei Ye,E.T. Bazarsadaev, A.B. Khmelev and Shuhong Guo

39 Design of Arrhythmia Detection Device Based on FingertipPulse Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363R. Wahyu Kusuma, R. Al Aziz Abbie and Purnawarman Musa

viii Contents

40 Analysis of Fundamental Frequency and Formant Frequencyfor Speaker ‘Makhraj’ Pronunciation with DTW Method . . . . . . . 373Muhammad Subali, Miftah Andriansyah and Christanto Sinambela

41 Design and Fabrication of “Ha ( )” Shape-Slot MicrostripAntenna for WLAN 2.4 GHz . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383Srisanto Sotyohadi, Sholeh Hadi Pramono and Moechammad Sarosa

42 Investigation of the Electric Discharge Machiningon the Stability of Coal-Water Slurries . . . . . . . . . . . . . . . . . . . . . 393S.L. Buyantuev, A.B. Khmelev, A.S. Kondratenkoand F.P. Baldynova

43 A River Water Level Monitoring System Using Android-BasedWireless Sensor Networks for a Flood Early Warning System . . . . 401Riny Sulistyowati, Hari Agus Sujono and Ahmad Khamdi Musthofa

44 The Influence of Depth of Cut, Feed Rate and Step-Over onSurface Roughness of Polycarbonate Material in SubtractiveRapid Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409The Jaya Suteja

45 Adaptive Cars Headlamps System with Image Processingand Lighting Angle Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415William Tandy Prasetyo, Petrus Santoso and Resmana Lim

46 Changes in the Rheological Properties and the Selectionof a Mathematical Model of the Behavior of Coal-WaterSlurry During Transport and Storage . . . . . . . . . . . . . . . . . . . . . . 423S.L. Buyantuev, A.B. Khmelev and A.S. Kondratenko

47 Design of a Fetal Heartbeat Detector. . . . . . . . . . . . . . . . . . . . . . . 429Nur Sultan Salahuddin, Sri Poernomo Sari, Paulus A. Jambormiasand Johan Harlan

Part V Technology Innovation in Internet of Things and ItsApplications

48 Network Traffic and Security Event Collecting System. . . . . . . . . . 439Hee-Seung Son, Jin-Heung Lee, Tae-Yong Kimand Sang-Gon Lee

49 Paper Prototyping for BatiKids: A Technique to ExamineChildren’s Interaction and Feedback in Designinga Game-Based Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447Hestiasari Rante, Heidi Schelhowe and Michael Lund

Contents ix

50 Tracing Related Scientific Papers by a Given SeedPaper Using Parscit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457Resmana Lim, Indra Ruslan, Hansin Susatya, Adi Wibowo,Andreas Handojo and Raymond Sutjiadi

51 Factors Affecting Edmodo Adoption as Online LearningMedium . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465Iwa Sungkono Herlambangkoro and Trianggoro Wiradinata

52 Principal Feature Selection Impact for Internet TrafficClassification Using Naïve Bayes . . . . . . . . . . . . . . . . . . . . . . . . . . 475Adi Suryaputra Paramita

53 Study on the Public Sector Information (PSI) Service Modelfor Science and Technology Domain in South Korea . . . . . . . . . . . 481Yong Ho Lee

54 Digital Natives: Its Characteristics and Challengeto the Library Service Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Siana Halim, Felecia, Inggrid, Dian Wulandariand Demmy Kasih

55 Web-Based Design of the Regional Health Service Systemin Bogor Regency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495B. Sundari, Revida Iriana and Bertilia Lina Kusrina

56 Security Handwritten Documents Using Inner Product . . . . . . . . . 501Syaifudin and Dian Pratiwi

57 Augmented Reality Technique for Climate Change Mitigation . . . . 511Ruswandi Tahrir

58 Cyber Security for Website of Technology Policy Laboratory . . . . 521Jarot S. Suroso

59 TAM-MOA Hybrid Model to Analyze the Acceptance ofSmartphone for Pediatricians in Teaching Hospitalin Indonesia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529Oktri Mohammad Firdaus, Nanan Sekarwana,T.M.A. Ari Samadhi and Kah Hin Chai

60 Development of the Remote Instrumentation SystemsBased on Embedded Web to Support Remote Laboratory . . . . . . . 537F. Yudi Limpraptono and Irmalia Suryani Faradisa

61 Enhancing University Library Services with Mobile LibraryInformation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545Singgih Lukman Anggana and Stephanus Eko Wahyudi

x Contents

62 Multi Level Filtering to Classify and Block UndesirableExplicit Material in Website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553Mohammad Iqbal, Hifshan Riesvicky, Hasma Rasjidand Yulia Charli

63 Query Rewriting and Corpus of Semantic Similarityas Encryption Method for Documents in IndonesianLanguage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565Detty Purnamasari, Rini Arianty, Diana Tri Susetianingtiasand Reni Diah Kusumawati

64 Securing Client-Server Application Design for InformationSystem Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573Ibnu Gunawan, Djoni Haryadi Setiabudi, Agustinus Noertjahyanaand Yongky Hermawan

Part VI Technology Innovation in Information, Modellingand Mobile Applications

65 Analyzing Humanitarian Logistic Coordinationfor Disaster Relief in Indonesia . . . . . . . . . . . . . . . . . . . . . . . . . . . 583Tanti Octavia, I. Gede Agus Widyadanaand Herry Christian Palit

66 Surakarta Cultural Heritage Management Basedon Geographic Information Systems . . . . . . . . . . . . . . . . . . . . . . . 589Ery Dewayani and M. Viny Christanti

67 Gray Code of Generating Tree of n Permutationwith m Cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599Sulistyo Puspitodjati, Henny Widowati and Crispina Pardede

68 Android and iOS Hybrid Applications for SurabayaPublic Transport Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607Djoni Haryadi Setiabudi and Lady Joanne Tjahyana

69 Games and Multimedia Implementation on Heroic Battleof Surabaya: An Android Based Mobile Device Application . . . . . . 619Andreas Handojo, Resmana Lim, Justinus Andjarwirawanand Sandy Sunaryo

70 Streamlining Business Process: A Case Study of Optimizinga Business Process to Issue a Letter of Assignmentfor a Lecturer in the University of Surabaya . . . . . . . . . . . . . . . . . 631S.T. Jimmy

71 Design of Adventure Indonesian Folklore Game . . . . . . . . . . . . . . 639Kartika Gunadi, Liliana and Harvey Tjahjono

Contents xi

72 Measuring the Usage Level of the IE Tools in SMEsUsing Malcolm Baldrige Scoring System . . . . . . . . . . . . . . . . . . . . 649I. Nyoman Sutapa, Togas W.S. Panjaitan and Jani Rahardjo

73 Enumeration and Generation Aspects of Tribonacci Strings . . . . . . 659Maukar, Asep Juarna and Djati Kerami

74 A Leukocyte Detection System Using Scale InvariantFeature Transform Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669Lina and Budi Dharmawan

75 The Diameter of Enhanced Extended Fibonacci CubeInterconnection Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675Ernastuti, Mufid Nilmada and Ravi Salim

76 Prototype Design of a Realtime Monitoring System of a FuelTank at a Gas Station Using an Android-Based MobileApplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685Riny Sulityowati and Bayu Bhahtra Kurnia Rafik

xii Contents

Introduction

This book includes the original, peer-reviewed research papers from the 2ndInternational Conference on Electrical Systems, Technology and Information(ICESTI 2015), held during 9–12 September 2015, at Patra Jasa Resort & VillasBali, Indonesia.

The primary objective of this book is to provide references for dissemination anddiscussion of the topics that have been presented in the conference. This volume isunique in that it includes work related to Electrical Engineering, Technology andInformation towards their sustainable development. Engineers, researchers as wellas lecturers from universities and professionals in industry and government willgain valuable insights into interdisciplinary solutions in the field of ElectricalSystems, Technology and Information, and its applications.

The topics of ICESTI 2015 provide a forum for accessing the most up-to-dateand authoritative knowledge and the best practices in the field of ElectricalEngineering, Technology and Information towards their sustainable development.The editors selected high quality papers from the conference that passed through aminimum of three reviewers, with an acceptance rate of 50.6 %.

In the conference there were three invited papers from keynote speakers, whosepapers are also included in this book, entitled: “Computational Intelligence basedRegulation of the DC bus in the On-Grid Photovoltaic System”, “VirtualPrototyping of a Compliant Spindle for Robotic Deburring” and “A Concept ofMulti Rough Sets Defined on Multi-Contextual Information Systems”.

The conference also classified the technology innovation topics into five parts:“Technology Innovation in Robotics, Image Recognition and ComputationalIntelligence Applications”, “Technology Innovation in Electrical Engineering,Electric Vehicle and Energy Management”, “Technology Innovation in Electronic,Manufacturing, Instrumentation and Material Engineering”, “TechnologyInnovation in Internet of Things and Its Applications” and “Technology Innovationin Information, Modeling and Mobile Applications”.

In addition, we are really thankful for the contributions and for the valuable timespent in the review process by our Advisory Boards, Committee Members andReviewers. Also, we appreciate our collaboration partners (Petra Christian

xiii

University, Surabaya; Gunadarma University, Jakarta; UBAYA, Surabaya,University of Ciputra, Surabaya, Institute of National Technology, Malang andLNEE Springer, Germany), our supporting institution (Oulu University, Finland,Widya Mandala Catholic University, Surabaya and Dongseo University, Korea)and our sponsors (Continuing Education Centre, Petra Christian University,Surabaya and Patrajasa Resort Hotel, Bali).

On behalf of the editors Felix Pasila

xiv Introduction

Chapter 63Query Rewriting and Corpus of SemanticSimilarity as Encryption Methodfor Documents in Indonesian Language

Detty Purnamasari, Rini Arianty, Diana Tri Susetianingtiasand Reni Diah Kusumawati

Abstract Encryption and decryption can be used to the security of data orimportant documents. Many methods have been developed to perform encryptionand decryption. In this article, the research is conducted to develop a corpus ofsemantic similarity in Indonesian, and query rewriting technique that is used as onemethod of encryption and decryption. Corpus of semantic similarity is used to find anew query that will form a new document encryption, and the technique that isdeveloped in this study is to secure documents in Indonesian. Encrypted documentis using query rewriting techniques and corpus of semantic similarity, it will be adocument with a good sentence structure, so it looks like the original document andis not expected to attract the attention of hackers. The categorization of documentswas also performed on the stage of the encryption.

Keywords Corpus � Document � Encription � Security � Semantic similarity �Query rewriting

63.1 Introduction

Delivery of data or documents in text form is becoming increasingly easy withoutknowing the distance and time, since technology and science have been developing.E-mail was one of example from the technology that give the easy way to send animportant document.

Advances in technology of internet is accompanied also by the crimes com-mitted by this technology, as it is known among them is the term hacker. Hacker is

D. Purnamasari (&) � R. AriantyInformation System Department, Gunadarma University, Jakarta, Indonesiae-mail: [email protected]

D.T. SusetianingtiasComputer System Department, Gunadarma University, Jakarta, Indonesia

R.D. KusumawatiManagement Department, Gunadarma University, Jakarta, Indonesia

© Springer Science+Business Media Singapore 2016F. Pasila et al. (eds.), Proceedings of Second International Conferenceon Electrical Systems, Technology and Information 2015 (ICESTI 2015),Lecture Notes in Electrical Engineering 365, DOI 10.1007/978-981-287-988-2_63

565

someone who goes into a computer system without permission and usually over anetwork/internet to commit crimes such as identity theft, and theft of intellectualproperty [1].

One way that can be used to secure the data/documents from hackers is toencrypt a document. Encryption is the process of securing the information to makethat information cannot be read without the aid of special knowledge, whileDecryption is the reverse of encryption is the process of converting encrypted datathat has been returned to the original data, so it can be read or understood back.Two keys are used, namely: the public key used for encryption and private key usedfor decryption [4].

A study on the security of file transmissions using the RSA algorithm has beenmodified with a public key of an asymmetric method [5]. Text watermarking whichcombines images and text to encrypt documents can also be done to maintain thesecurity of data as it is done by Jaseena et al. [6].

In this article the query rewriting techniques are developed by using a corpus ofsemantic similarity in Indonesian language. This technique is used as a method ofencryption and decryption of the document in Indonesian language.

Query rewriting is the stage of the information search process in which the initialquery statement users enhanced by adding the term [9].

Query rewriting is used as a technique to perform encryption and decryptionassisted with the corpus of semantic similarity in Indonesian language, and in thisarticle also described the steps being taken to build the corpus.

Semantics Similarity is a method to perform a search equivalence meaning ofconcepts/words. Semantics Similarity provides rules for interpreting the syntax thatdoes not give meaning directly but limits the possible interpretations of what isstated [3].

Encryption method using query rewriting technique provides results in the formof encrypted document was still good, so it is not known that in fact the documenthas been encrypted.

63.2 Research Methods

63.2.1 Stage for Developing of Corpus Semantic Similarity

Corpus is a collection of words that arranged systematically. Research on the corpusby using semantic similarity ever undertaken, and this corpus in English [7].

In this research, the corpus of semantic similarity is the corpus that contain thewords in Indonesian and contain the value of its semantic similarity. Measurementof semantic similarity between two words is done by using the method of Jiang andConrath, since the calculation of semantic similarity with Jiang and Conrath(JNC) showed the best results [2, 10].

566 D. Purnamasari et al.

Figure 63.1 is general stages to develop of the corpus of semantic similarity inIndonesian.

General stages to develop of the corpus in this research as shown in Fig. 63.1are:

1. Collection of words in Indonesian by using Indonesian thesaurus dictionaryofficial printed by Eko Endarmoko and published 2006 by Gramedia PustakaUtama (GPU). In this step, it is grouped based on similar meaning words.

2. Based on the words collected in step 1, then the value of semantic similarity islooked for using the method of Jiang and Conrath.

3. Input the words and the value of semantic similarity to the corpus.

The corpus be equipped with the value of semantic similarity, because this valuewill be used at the time of the query rewriting to perform encryption and decryptionof the document in Indonesian language.

63.2.2 Query Rewriting as Encryption Method

Query rewriting in this article for the encryption method is as follows:

1. Reading of the text/document.2. Determinate category for theme/content of the document based on the number of

words contained in the document.3. Separate the sentence in paragraph.4. Separate the sentence structure.5. Create a public key by look from the category that has been done in step 2 and

look at the value of semantic similarity in the corpus.

Fig. 63.1 Stages todeveloping of corpus

63 Query Rewriting and Corpus of Semantic Similarity … 567

6. Rewrite a new query into a new document which is the result of encryption. Thisdocument already contains a new query based on a formula obtained in step 6.

7. Create a private key to restore the encrypted document into the originaldocument.

Document does not only contain one sentence, but more than one sentence.Therefore, step 2 takes categorization for theme/content of the document. This isdone, in order to document the results of encryption consists of sentences thatcompose a new document that is encrypted to keep in touch between sentences.

Categorization in step 2 of this research was created by counting the number ofwords that appear in most documents.

Separation sentence in step 3 is conducted by the following method [8]:

1. Position to read the document starts from the beginning of the documentcharacter.

2. If punctuation characters beside the point (“.”) is found, then the character willbe deleted, and if reading documents find the character dot (“.”) or a questionmark (?) Or an exclamation mark (!), then separate sentences of position initialreading of the document until the character point/question mark/exclamationpoints are found and saved to a temporary database.

3. After separating the sentence, then move the starting position and read docu-ments on the initial character of the next sentence.

4. Back to step (2) and step (3) and continue this separation sentence, until the endof the document or until characters in the document are no longer found.

Separation of sentence structure in step 4 of this research is done by determiningword as the subject, predicate, object, preposition, and adverb.

Text documents is a series of paragraphs that consists of many sentences. Thesentence itself is a series of words that can express their ideas, thoughts, or feelings.The sentence is the smallest unit of language that expresses a complete thought,either by writing or verbally. In the sentence should have at least the ‘Subjek/S’(subject) and a ‘pedikat/P’ (predicate). If it does not have a subject and a predicate,it is not called the sentence but called phrases. Elements of sentences in Indonesianis the ‘Subjek/S’ (subject), ‘Predikat/P’ (predicate), ‘Objek/O’ (Object), and‘Keterangan/K’ (adverb) [8].

Elements of the sentence has been known, so that the preprocessing createddatabase containing (i) prepositions, (ii) subject, (iii) object, and (iv) adverb, and(v) predicate

A public key to change the original document into a document that has beenencrypted by looking at the categories, and refers to the value of semantic similarityin Indonesian corpus.

A public key can be created by the user to determine the value of semanticsimilarity that will be used based on the desired level of closeness meaning. Oncethe desired value has been determined, then the query rewriting as a result of theencryption is done.

568 D. Purnamasari et al.

Documents that have been encrypted can be returned into the original document(the decryption process) by creating the complement from a public key.

63.3 Results and Disscussion

63.3.1 Corpus of Semantic Similarity

Creating corpus of semantic similarity is done by studying the Indonesian languagesyntax and semantics in Indonesian. The value of semantic similarity is done withreference to the thesaurus dictionary that has been officially published, and based onthe dictionary.

For the examples of words that will be included in corpus is the word ‘politik’(politics). Based on the thesaurus dictionary, the word ‘politik’ (politics) have thesame meaning with three words, namely:

1. Word ‘Garis haluan’ (outline)2. Word ‘Kebijakan’ (wisdom)3. Word ‘Strategi’ (strategy)

Then calculating the value of semantic similarity by using the method of Jiang &Congrath and WordNet similarity [11], which is conducted between 2 words foundin the dictionary thesaurus (presented in Table 63.1).

After the value of semantic similarity is found, then the words and the value isstored into the corpus.

The categories in step 2 is used in the encryption methods to produce a docu-ment that contains the encryption result interconnected constituent sentences.

The categories are also set in advance as preprocessing of this research.Documents can be categorized for example:

1. categorized ‘politik’ (politics)2. categorized ‘teknologi informasi’ (information technology)3. categorized ‘ekonomi’ (economics)

Table 63.1 Example for thevalue of word semanticsimilarity

No Word 1 Word 2 Value

1 ‘Politik’(politics)

‘GarisHaluan’(outline)

0.066

2 ‘Politik’(politics)

‘Kebijakan’ (wisdom) 0.077

3 ‘Politik’(politics)

‘Strategi’ (strategy) 0.087

63 Query Rewriting and Corpus of Semantic Similarity … 569

63.3.2 Encryption and Decryption

In the encryption process, paragraphs of a document is separated between thesentence. The following is an example of a sentence in Indonesian:

Alat untuk e-counting dapat disimpan di kantor desa.(Tools for e-counting can be stored in the village office)

The example above is a sentence that will be separated by the word, and 8 wordsare found. Each word will be checked into a database that has been prepared inpreprocessing to determine its position in the sentence structure, whether as asubject, predicate, object, adverb, preposition. The words are:

(1) “Alat” (tools) as a ‘subjek’ (subject), (2) “Untuk” (for) as a ‘kata depan’(preposition), (3) “E-counting” as a ‘keterangan’ (adverb), (4) “Dapat” (can be) as a‘keterangan’ (adverb), (5) “Disimpan” (stored) as a ‘predikat’ (predicate), (6) “Di”(in) as a ‘kata depan’ (preposition), (7) “Kantor” (office) as a ‘keterangan’ (adverb),(8) “Desa” (village) as a ‘keterangan’ (adverb).

Once it is separated by the structure of the sentence, look for a new query fromthe word of the original document by using a corpus of semantic similarity. Steps tofind a new query that will be used to prepare encrypted documents are as follows:

1. Define categories of documents as a result of encrypted document.2. Determine the value of semantic similarity by user to be encrypted document.3. The new query is obtained by the value of the semantic similarity.4. New Query will be rewriting into a new sentence in accordance with the order of

appearance of the word in a sentence.

Encrypted documents will be back to an original document (the decryptionprocess) by reversing (create complement) of semantic similarity values from thepublic key.

63.4 Conclusions

Developing the corpus of semantic similarity in Indonesian is done by looking atthe Indonesian thesaurus dictionary that has been published officially and the valueof semantic similarity obtained using the method of Jiang and Conrath.

Query rewriting is a technique that used to create a new document from the newquery by using a corpus of semantic similarity. Methods of encryption anddecryption by using this technique remains to form a document into a series ofwords/phrases to be a good structure.

Further research can be done by designing a method to enrich the corpus ofsemantic similarity, and developing methods to separate Indonesian complex sen-tence structure. Implementation of the query rewriting techniques as the method ofencryption and decryption is also can be done to continue this research.

570 D. Purnamasari et al.

Acknowledgments This work is partially supported by Gunadarma University, and Study Centerof Information System Technology at Gunadarma University Jakarta Indonesia.

References

1. Ashoor, A.S., Gore, S.: What is the difference between Hackers and Intruders. Int. J. Sci. Eng.Res. 2(7), 1–3 (2011)

2. Budanitsky, A., Hirst, G.: Evaluating wordnet-based measures of lexical semantic relatedness.J. Comput. Linguist. 32, 13–47 (2006)

3. Euzenat, J.: Towards a Principled Approach to Semantic Interoperability. INRIARhône-Alpes, Montbonnot Saint-Martin (France) (2001)

4. Goyal, S.: A survey on the application of cryptography. Int. J. Sci. Technol. 1, 3 (2012)5. Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg.

Sci. Eng. 1, 4 (2013)6. Jaseena, K.U., John, A.: Text watermarking using combined image and text for authentication

and protection. Int. J. Comput. Appl. 20, 4 (2011)7. Mihalcea, R., Corley, C., Strapparava, C.: Corpus-based and knowledge-based measures of

text semantic similarity. In: Proceedings of the 21st National Conference on ArtificialIntelligence, vol. 1, pp. 775–780 (2006)

8. Purnamasari, D., Wicaksana, I.W.S., Anissa, L.R., Anneke, A.P.S., Gustin, H.: PenerapanSemantic Similarity pada Kriptografi Suatu Dokumen Teksdalam Bahasa Indonesia. In:Proceeding Seminar Nasional Kommit (2014)

9. Shiri, A., Revie, C.: Query expansion behavior within a thesaurus-enhanced searchenvironment: a user-centered evaluation. J. Am. Soc. Inf. Sci. Technol. 57, 4 (2006)

10. Sridhara, G., Hill, E., Pollock, L., Vijay, S.K.: Identifying word relations in software: acomparative study of semantic similarity tools. In: Proceedings of the 16th IEEE InternationalConference on Program Comprehension, pp. 123–132 (2008)

11. Wordnet Similarity: http://marimba.d.umn.edu/cgi-bin/similarity/similarity.cgi. Accessed 01Apr 2015

63 Query Rewriting and Corpus of Semantic Similarity … 571