首页 > 最新文献

2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

英文 中文
Fingerprint clustering algorithm for data profiling using pentaho data integration 基于五边形数据集成的指纹聚类数据分析算法
Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan
Data profiling is an abnormality in the search process data that undermine the value of the data. Type of data profiling analysis techniques to detect duplication of text within a single paragraph can by using a text cluster. In this paper aims at doing text algorithm transformation cluster with fingerprint method using Pentaho Data Integration (PDI). As for methods used to conduct implementation text cluster with Pentaho Data Integration is to do a mapping algorithm fingerprint method on component contained in Pentaho, then perform a transformation per component, and further evaluation of the results of a text cluster with open source data profiling tool. Implementation of text clusters with Pentaho Data Integration successfully done but there is still some rudimentary logic. The results from implementation of clusters number on the transformation by using Pentaho Data Integration is greater than a number of text clusters by using the OpenRefine tool.
数据剖析是在数据搜索过程中出现的一种异常现象,它破坏了数据的价值。类型的数据分析技术可以通过使用文本聚类来检测单个段落中的重复文本。本文的目的是利用Pentaho Data Integration (PDI)对指纹方法进行文本算法转换聚类。使用Pentaho Data Integration实现文本聚类的方法是对Pentaho中包含的组件做映射算法指纹方法,然后对每个组件进行转换,再使用开源数据分析工具对文本聚类的结果进行进一步评估。使用Pentaho Data Integration成功地实现了文本集群,但仍然存在一些基本的逻辑。使用Pentaho Data Integration实现簇数转换的结果大于使用OpenRefine工具实现的文本簇数转换的结果。
{"title":"Fingerprint clustering algorithm for data profiling using pentaho data integration","authors":"Febri Dwiandriani, T. F. Kusumasari, M. A. Hasibuan","doi":"10.1109/ICITISEE.2017.8285528","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285528","url":null,"abstract":"Data profiling is an abnormality in the search process data that undermine the value of the data. Type of data profiling analysis techniques to detect duplication of text within a single paragraph can by using a text cluster. In this paper aims at doing text algorithm transformation cluster with fingerprint method using Pentaho Data Integration (PDI). As for methods used to conduct implementation text cluster with Pentaho Data Integration is to do a mapping algorithm fingerprint method on component contained in Pentaho, then perform a transformation per component, and further evaluation of the results of a text cluster with open source data profiling tool. Implementation of text clusters with Pentaho Data Integration successfully done but there is still some rudimentary logic. The results from implementation of clusters number on the transformation by using Pentaho Data Integration is greater than a number of text clusters by using the OpenRefine tool.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spatial flood risk mapping in east Java, Indonesia, using analytic hierarchy process — natural breaks classification 基于层次分析法的印尼爪哇东部洪涝风险空间制图
A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi
East Java is one of the provinces in Indonesia that is often hit by floods. Recorded about 170 data flood disaster since 2011 to 2015 that hit the 31 districts and cities in East Java. The government's efforts in dealing with flood disaster require a decision support system in determining the areas to be targeted in the flood disaster mitigation process. National Disaster Management Agency, called BNPB, has issued guidance documents in conducting disaster risk mapping in Indonesia based on threat, vulnerability and capacity level. Index method is used to calculate the risk value based on a threshold nominal value of the certain range, even though some of the criterias involve preference values. This research proposes a new hybrid analytic hierarchy process (AHP) — natural break classification strategy to calculate flood risk index to solve the combination of nominal and preferences values of criterias that produce Spatial Decision Support System (SDSS). AHP method is used to calculate priority value of assessment according to hazard, vulnerability and capacity indexes. The priority value that is obtained from AHP method is classified by natural break into three level of flood risk consist of low, medium and high Flood risk mapping with AHP method — natural break obtain an effective classification than the index method.
东爪哇是印度尼西亚经常遭受洪水袭击的省份之一。从2011年到2015年,记录了大约170起洪水灾害,袭击了东爪哇的31个地区和城市。政府在处理洪水灾害方面的努力需要一个决策支持系统,以确定在减轻洪水灾害过程中的目标地区。国家灾害管理局(简称BNPB)发布了指导文件,指导印度尼西亚根据威胁、脆弱性和能力水平绘制灾害风险地图。指数法是根据一定范围内的阈值标称值来计算风险值,尽管有些标准涉及偏好值。为解决空间决策支持系统(SDSS)中标称值和偏好值的组合问题,提出了一种新的混合层次分析法-自然决裂分类策略来计算洪水风险指数。采用层次分析法,根据危险性、脆弱性和能力指标计算评价的优先级值。将AHP法得到的优先级值按自然决裂划分为低、中、高三个等级的洪水风险,用AHP法-自然决裂进行洪水风险映射,得到比指数法更有效的分类。
{"title":"Spatial flood risk mapping in east Java, Indonesia, using analytic hierarchy process — natural breaks classification","authors":"A. Fariza, IlhamdiMuhammad Rusydi, Jauari Akhmad Nur Hasim, A. Basofi","doi":"10.1109/ICITISEE.2017.8285539","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285539","url":null,"abstract":"East Java is one of the provinces in Indonesia that is often hit by floods. Recorded about 170 data flood disaster since 2011 to 2015 that hit the 31 districts and cities in East Java. The government's efforts in dealing with flood disaster require a decision support system in determining the areas to be targeted in the flood disaster mitigation process. National Disaster Management Agency, called BNPB, has issued guidance documents in conducting disaster risk mapping in Indonesia based on threat, vulnerability and capacity level. Index method is used to calculate the risk value based on a threshold nominal value of the certain range, even though some of the criterias involve preference values. This research proposes a new hybrid analytic hierarchy process (AHP) — natural break classification strategy to calculate flood risk index to solve the combination of nominal and preferences values of criterias that produce Spatial Decision Support System (SDSS). AHP method is used to calculate priority value of assessment according to hazard, vulnerability and capacity indexes. The priority value that is obtained from AHP method is classified by natural break into three level of flood risk consist of low, medium and high Flood risk mapping with AHP method — natural break obtain an effective classification than the index method.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123084421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of birds detector and repellent using frequency based arduino uno with android system 基于频率的arduino与android系统的鸟类探测器与驱蚊器设计
Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis
Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.
印度尼西亚是一个农业国家。许多印尼人以务农为生。植物和害虫有关,有植物的地方就一定有害虫。害虫是破坏植物的动物。害虫吃植物并伤害鸟类就是一个例子。本研究开发设计了鸟类探测器和驱虫剂的原型。这个原型机有一个运动检测系统,它会产生一定频率的驱虫剂,这样鸟儿就会被打扰。该原型由PIR传感器作为检测器来检测鸟类的运动,并使用LC振荡器型colpit与压电超声传感器作为驱避器。实验结果表明,PIR传感器在探测距离为0 cm - 500 cm的情况下工作,在60 kHz左右的频率信号下会对鸟产生干扰。
{"title":"Design of birds detector and repellent using frequency based arduino uno with android system","authors":"Y. Siahaan, B. A. Wardijono, Yulisdin Mukhlis","doi":"10.1109/ICITISEE.2017.8285503","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285503","url":null,"abstract":"Indonesia is an agrarian country. Many Indonesians work as farmers to survive. Plants are related to pests, where there are plants there must be pests. Pests are animals that damage the plants. One example of pests that eat plants and harm is birds. This research has developed and designed prototype detector and repellent of birds. The prototype has a motion detection system which then proceeds to a repellent that generates a certain frequency, so the bird will be disturbed. This prototype consists of PIR sensors as a detector to detect movement from birds and using LC oscillator type colpitts with Piezo Ultrasonic sensor as repeller. The results of the experiment are the PIR sensor working with a detection distance between 0 cm–500 cm, and the bird will be disturbed at a frequency signal of about 60 kHz.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Applying rough set theory for filtering large number of coronary artery disease (CAD) rules 应用粗糙集理论对大量冠心病(CAD)规则进行过滤
Alfiah Fajriani, N. A. Setiawan, T. B. Adji
This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.
本研究应用粗糙集理论(RST)方法对克利夫兰冠状动脉疾病(CAD)数据集中生成的大量规则进行过滤。应用了三个阶段。第一阶段是规则抽取,获取规则数量;第二阶段是基于支持度的规则过滤;最后阶段是使用粗糙集进行属性约简的规则选择。每个阶段都是用罗塞塔软件计算的。使用验证数据可以看到RST方法在泛化方面的改进。在Cleveland CAD数据集上的实验结果表明,基于数据测试的准确率为0.859504,基于验证数据的准确率为0.770492,RST方法仍然比未过滤的规则有更好的准确率,没有比未过滤的规则提高准确率,但优于使用其他属性选择。
{"title":"Applying rough set theory for filtering large number of coronary artery disease (CAD) rules","authors":"Alfiah Fajriani, N. A. Setiawan, T. B. Adji","doi":"10.1109/ICITISEE.2017.8285531","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285531","url":null,"abstract":"This research is to apply Rough Set Theory (RST) method for filtering large number of generated rules from Cleveland Coronary Artery Disease (CAD) data set. Three stages are applied. First stage is rule extraction to get number of rules, second stage is rule filtering based on support value and the last stage is rule selection which is using Rough Set to reduct attribute. Every stage is being computed by using Rosetta software. Using validation data is to see the generalization improvement of RST method. The result of this experiment on Cleveland CAD data sets shows that RST method still has better accuracy than unfilterd rules based on accuracy on data testing which is 0.859504 and for validation data the accuracy is 0.770492 and there is no accuracy improvement from unfiltered rules but better than using other attribute selection.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction 非线性自回归外生模型(NARX)在股价指数预测中的应用
Antoni Wibowo, Harry Pujianto, D. R. S. Saputro
The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.
在金融领域,股票市场可以在相对较短的时间内提供巨额利润。然而,如果投资者和交易者不仔细观察影响股市的因素,它也有很高的风险。因此,他们应该关注股票市场的动态波动和运动,以优化投资收益。本文提出了一个非线性自回归外生模型(NARX)来预测股票市场的走势,特别是收盘价指数的走势。作为案例研究,我们考虑预测印尼综合指数(IHSG)收盘价格的走势,并选择输入神经元数、单层神经元数、反馈延迟数、输入延迟数和输出神经元数分别为6、10、1、2和1的最佳NARX结构进行IHSG预测。
{"title":"Nonlinear autoregressive exogenous model (NARX) in stock price index's prediction","authors":"Antoni Wibowo, Harry Pujianto, D. R. S. Saputro","doi":"10.1109/ICITISEE.2017.8285507","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285507","url":null,"abstract":"The stock market can provide huge profits in a relatively short time in financial sector. However, it also has a high risk for investors and traders if they are not careful to look the factors that affect the stock market. Therefore, they should give attention to the dynamic fluctuations and movements of the stock market to optimize profits from their investment. In this paper, we present a nonlinear autoregressive exogenous model (NARX) to predict the movements of stock market especially the movements of the closing price index. As case study, we consider to predict the movement of the closing price in Indonesia composite index (IHSG) and choose the best structures of NARX for IHSG's prediction which the number of input neurons, neurons in its single layer, feedback delay, input delay and output neuron are 6, 10, 1, 2 and 1, respectively.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Push notification based login using BLE devices 使用BLE设备基于推送通知登录
G. Varshney, M. Misra
Due to the consistent number of phishing attacks there is a need to develop secure authentication schemes. These days phishing is mostly carried out using malicious browser extensions or other sophisticated credential stealing techniques such as CR/RT MITM phishing attack. Therefore, it is required to develop secure authentication schemes for handling these attacks. A set of popular authentication schemes has been analyzed in this paper and it is found that they are unsafe against credential stealing attacks such as CR/RT MITM phishing, malicious browser extensions, key loggers and malwares. A novel push notification based scheme that uses BTADDR as the user identification token and performs real time modification and verification of BLE device (Bluetooth 4.0+ Version) descriptor value for user authentication has been proposed in this paper. The scheme is better in terms of security provided by the existing two factor authentication schemes (OTP/PIN, QR Code/Barcode, Graphical password/ CAPTCHA) and the usual push notification based login authentication schemes that uses username as the user identification token. Scheme has been compared with other popular schemes using the Bonneau et al. assessment framework in terms of usability, deployability and security. The results obtained are promising which suggest Bluetooth based push notification schemes can be a good option for future web authentication.
由于网络钓鱼攻击的数量不断增加,因此需要开发安全的身份验证方案。如今,网络钓鱼主要使用恶意浏览器扩展或其他复杂的凭证窃取技术,如CR/RT MITM网络钓鱼攻击。因此,需要开发安全的身份验证方案来处理这些攻击。本文分析了一组流行的认证方案,发现它们对于CR/RT MITM网络钓鱼、恶意浏览器扩展、密钥记录程序和恶意软件等凭证窃取攻击是不安全的。本文提出了一种新的基于推送通知的方案,该方案以BTADDR作为用户身份令牌,对BLE设备(蓝牙4.0+版本)描述符值进行实时修改和验证,用于用户身份验证。现有的两因素认证方案(OTP/PIN, QR码/条形码,图形密码/ CAPTCHA)和通常使用用户名作为用户身份令牌的基于推送通知的登录认证方案提供的安全性方面,该方案更好。使用Bonneau等人的评估框架,将Scheme与其他流行的方案在可用性、可部署性和安全性方面进行了比较。结果表明,基于蓝牙的推送通知方案是未来web认证的一个很好的选择。
{"title":"Push notification based login using BLE devices","authors":"G. Varshney, M. Misra","doi":"10.1109/ICITISEE.2017.8285554","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285554","url":null,"abstract":"Due to the consistent number of phishing attacks there is a need to develop secure authentication schemes. These days phishing is mostly carried out using malicious browser extensions or other sophisticated credential stealing techniques such as CR/RT MITM phishing attack. Therefore, it is required to develop secure authentication schemes for handling these attacks. A set of popular authentication schemes has been analyzed in this paper and it is found that they are unsafe against credential stealing attacks such as CR/RT MITM phishing, malicious browser extensions, key loggers and malwares. A novel push notification based scheme that uses BTADDR as the user identification token and performs real time modification and verification of BLE device (Bluetooth 4.0+ Version) descriptor value for user authentication has been proposed in this paper. The scheme is better in terms of security provided by the existing two factor authentication schemes (OTP/PIN, QR Code/Barcode, Graphical password/ CAPTCHA) and the usual push notification based login authentication schemes that uses username as the user identification token. Scheme has been compared with other popular schemes using the Bonneau et al. assessment framework in terms of usability, deployability and security. The results obtained are promising which suggest Bluetooth based push notification schemes can be a good option for future web authentication.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of embedded zigbee machine to machine smart street lighting system 嵌入式zigbee机对机智能路灯系统的设计
D. A. Widodo, N. Iksan, Alfa Faridh Suni
Energy monitoring and controlling systems of smart street lighting system were highly dependent on the gateway in order to perform the communication between sensors and actuators to the users. M2M technology allows the process of device control more effectively because it is not centered on the Gateway but on the devices to device related. Congestion, delays and communication errors to be a challenge in the development of M2M technology. This research proposed M2M technology to make direct communication between devices and users with less congestion, delays and communication errors. The design of embedded zigbee using M2M technology was developed as dimmer control for LED lights and communication between devices. Furthermore, zigbee communication performance have been evaluated using received signal strength (RSSI) and network throughput. The ideal distance between zigbee in barrier area is approximately 30m and −83 dBm of RSSI. In loss area is approximately 65m and −80 dBm of RSSI. Performance of zigbee device communications shows the use of direct configuration is better than using a router. So that, on configuration via router, the number of transmitting nodes should be minimized.
智能街道照明系统的能量监测和控制系统高度依赖于网关,以执行传感器和执行器与用户之间的通信。M2M技术使设备控制过程更加有效,因为它不是以网关为中心,而是以设备到设备相关的设备为中心。拥塞、延迟和通信错误将成为M2M技术发展的挑战。本研究提出M2M技术,实现设备与用户之间的直接通信,减少拥塞、延迟和通信错误。采用M2M技术设计嵌入式zigbee,实现LED灯调光控制和设备间通信。此外,使用接收信号强度(RSSI)和网络吞吐量对zigbee通信性能进行了评估。zigbee在屏障区的理想距离约为30m, RSSI为- 83 dBm。在损耗面积约为65m和- 80dbm的RSSI。zigbee设备通信性能表明,使用直接配置优于使用路由器。因此,在通过路由器配置时,应尽量减少发送节点的数量。
{"title":"Design of embedded zigbee machine to machine smart street lighting system","authors":"D. A. Widodo, N. Iksan, Alfa Faridh Suni","doi":"10.1109/ICITISEE.2017.8285536","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285536","url":null,"abstract":"Energy monitoring and controlling systems of smart street lighting system were highly dependent on the gateway in order to perform the communication between sensors and actuators to the users. M2M technology allows the process of device control more effectively because it is not centered on the Gateway but on the devices to device related. Congestion, delays and communication errors to be a challenge in the development of M2M technology. This research proposed M2M technology to make direct communication between devices and users with less congestion, delays and communication errors. The design of embedded zigbee using M2M technology was developed as dimmer control for LED lights and communication between devices. Furthermore, zigbee communication performance have been evaluated using received signal strength (RSSI) and network throughput. The ideal distance between zigbee in barrier area is approximately 30m and −83 dBm of RSSI. In loss area is approximately 65m and −80 dBm of RSSI. Performance of zigbee device communications shows the use of direct configuration is better than using a router. So that, on configuration via router, the number of transmitting nodes should be minimized.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Continuous and transparent access control framework for electronic health records: A preliminary study 持续和透明的电子健康记录访问控制框架:初步研究
M. Jayabalan, T. O'Daniel
The thrust of technological advancement in healthcare today lies in improving the quality and timeliness of patient services. Medical information is accessed through various means that require efficient methods for protecting patient privacy and security. Healthcare providers implement a set of information security mechanisms such as access control, authentication, log analysis etc. to protect disclosure of data to the unauthorized person. This research proposes a continuous and transparent access control framework based on a preliminary study. The proposed framework has three core components: adaptive authentication, risk analysis and data transparency mapped with Role Based Access Control. The adaptive authentication validates the user through behavior profiling, risk analysis measures the amount of risk in user data access, and data transparency allows patients and administrators to monitor data consumption and detect deviation from patient consent.
当今医疗保健技术进步的关键在于提高患者服务的质量和及时性。医疗信息通过各种方式访问,需要有效的方法来保护患者的隐私和安全。医疗保健提供商实现一组信息安全机制,如访问控制、身份验证、日志分析等,以保护向未经授权的人员披露数据。本研究在初步研究的基础上,提出了一个连续透明的访问控制框架。该框架有三个核心组件:自适应认证、风险分析和基于角色的访问控制映射的数据透明度。自适应身份验证通过行为分析验证用户,风险分析测量用户数据访问中的风险量,数据透明度允许患者和管理员监控数据消耗并检测偏离患者同意的情况。
{"title":"Continuous and transparent access control framework for electronic health records: A preliminary study","authors":"M. Jayabalan, T. O'Daniel","doi":"10.1109/ICITISEE.2017.8285487","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285487","url":null,"abstract":"The thrust of technological advancement in healthcare today lies in improving the quality and timeliness of patient services. Medical information is accessed through various means that require efficient methods for protecting patient privacy and security. Healthcare providers implement a set of information security mechanisms such as access control, authentication, log analysis etc. to protect disclosure of data to the unauthorized person. This research proposes a continuous and transparent access control framework based on a preliminary study. The proposed framework has three core components: adaptive authentication, risk analysis and data transparency mapped with Role Based Access Control. The adaptive authentication validates the user through behavior profiling, risk analysis measures the amount of risk in user data access, and data transparency allows patients and administrators to monitor data consumption and detect deviation from patient consent.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On part of speech tagger for Indonesian language 印尼语词性标注器的研究
R. S. Yuwana, A. R. Yuliani, H. Pardede
In this paper we present an evaluation of six popular methods for Part-of-Speech (POS) tagging tasks of Indonesian language. They are Unigram, Hidden Markov Model, TnT, Brills, Naive Bayes, and Maximum Entropy taggers. Indonesian language, while is one of most spoken language in the world has very limited data for POS tagging tasks. Therefore, it is interesting to investigate and evaluate some popular approaches in POS tagging when dealing for such conditions. The results of our experiments show that Maximum Entropy provides the highest accuracy of all methods. It is consistently better even when the size of the training data is varied.
本文对印尼语词性标注的六种常用方法进行了评价。它们是Unigram, Hidden Markov Model, TnT, Brills,朴素贝叶斯和最大熵标记器。印尼语虽然是世界上使用最多的语言之一,但用于词性标注任务的数据非常有限。因此,在处理这种情况时,调查和评估一些流行的词性标注方法是很有趣的。我们的实验结果表明,最大熵提供了所有方法中最高的准确性。即使训练数据的大小不同,它也总是更好。
{"title":"On part of speech tagger for Indonesian language","authors":"R. S. Yuwana, A. R. Yuliani, H. Pardede","doi":"10.1109/ICITISEE.2017.8285530","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285530","url":null,"abstract":"In this paper we present an evaluation of six popular methods for Part-of-Speech (POS) tagging tasks of Indonesian language. They are Unigram, Hidden Markov Model, TnT, Brills, Naive Bayes, and Maximum Entropy taggers. Indonesian language, while is one of most spoken language in the world has very limited data for POS tagging tasks. Therefore, it is interesting to investigate and evaluate some popular approaches in POS tagging when dealing for such conditions. The results of our experiments show that Maximum Entropy provides the highest accuracy of all methods. It is consistently better even when the size of the training data is varied.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Planning analysis and control of inventory goods pt. x with material requirement planning method 运用物料需求计划法对库存物品进行计划分析和控制
Denny Andwiyan, M. Irsan, D. F. Murad, Djamaludin
Material Requirement Planning is a method to decide what, when and how many component and material needed for the production planning. This research studies how far the Material Requirement Planning's application could control material stock investment at PT. X, where the company is currently experiencing an increase in finished goods inventory. PT.X has two categories, namely Special Lighting lamps (SP) and General Lighitng. Among the two types of light bulbs that SP has increased quite significant inventory when compared with GL lights. Dengan rata-rata stock perbulan 4,505,864 pcs atau IDR 42. 78 Miliar Therefore, the author intends to find out more about the good and the control system to calculate and analyze the level of finished goods inventory optimum using the ABC method of analysis as a determinant of sales by product category, methods ordering quantity EOQ to see the finished product and Re Order Point is to an order goods so that the goods may ultimately be used in accordance with the expected. Dari Analisa diatas dapat disimpulkan bahwa dari total produk 267 pc yang hanya masuk kedalam kategori A dan B hanya 85 pcs. Sedangkan dilihat dari persediaan yang ada dapat diturunkan menjadi 66,8 % dari total persediaan yang ada dengan rata-rata perbulannya 4,505,864 pcs.
物料需求计划是一种决定生产计划所需的部件和材料的种类、时间和数量的方法。本研究研究了PT. X公司目前成品库存增加的情况下,物料需求计划的应用能在多大程度上控制物料库存投资。PT.X有两类,即特殊照明灯具(SP)和普通照明灯具。在这两种灯泡中,SP相比GL增加了相当大的库存。登干股票按比例卖出4,505,864件,折合印尼盾42卢比。因此,作者打算找出更多的控制系统来计算和分析产成品库存的最优水平,使用ABC分析方法作为销售的决定因素,按产品类别,EOQ的方法来看产成品的订购数量和重新订购点是一个订购的货物,使货物最终可以按照预期使用。达里Analisa数据,dapat dispulkan bahwa达里总产品267个阳汉雅masuk kedalam kategori A和B汉雅85个。Sedangkan dililhat dari persediaan yang ada dapat diturunkan menjadi 66,8 %达总perbulannya 4,505,864件。
{"title":"Planning analysis and control of inventory goods pt. x with material requirement planning method","authors":"Denny Andwiyan, M. Irsan, D. F. Murad, Djamaludin","doi":"10.1109/ICITISEE.2017.8285510","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285510","url":null,"abstract":"Material Requirement Planning is a method to decide what, when and how many component and material needed for the production planning. This research studies how far the Material Requirement Planning's application could control material stock investment at PT. X, where the company is currently experiencing an increase in finished goods inventory. PT.X has two categories, namely Special Lighting lamps (SP) and General Lighitng. Among the two types of light bulbs that SP has increased quite significant inventory when compared with GL lights. Dengan rata-rata stock perbulan 4,505,864 pcs atau IDR 42. 78 Miliar Therefore, the author intends to find out more about the good and the control system to calculate and analyze the level of finished goods inventory optimum using the ABC method of analysis as a determinant of sales by product category, methods ordering quantity EOQ to see the finished product and Re Order Point is to an order goods so that the goods may ultimately be used in accordance with the expected. Dari Analisa diatas dapat disimpulkan bahwa dari total produk 267 pc yang hanya masuk kedalam kategori A dan B hanya 85 pcs. Sedangkan dilihat dari persediaan yang ada dapat diturunkan menjadi 66,8 % dari total persediaan yang ada dengan rata-rata perbulannya 4,505,864 pcs.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1