Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257117
K. R. Sungkono, R. Sarno
The Financial Services Authority does fraud detection through several activities that are recorded in the event logs for detecting fraud. Patterns of Fraud Detection are used to analyze the performances of fraud detection and predict the next fraud detection. Patterns of Fraud Detection can be observed using a map model of fraud detection. On the other hand, modeling fraud detection is difficult because the fraud detection cannot be directly observed through an event log. The event log only records activities triggering by fraud detection. This paper proposes an intention mining method for modeling fraud detection using Coupled Hidden Markov Model. The proposed method determines strategies utilizing the activities and forms a map model of fraud detection using probabilities of Coupled Hidden Markov Model. The experiment outcomes show that the proposed method gets an appropriate map model of fraud detection. This paper also demonstrates that an obtained model using proposed method gets the better validity than an obtained model using Map Miner Method.
{"title":"Patterns of fraud detection using coupled Hidden Markov Model","authors":"K. R. Sungkono, R. Sarno","doi":"10.1109/ICSITECH.2017.8257117","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257117","url":null,"abstract":"The Financial Services Authority does fraud detection through several activities that are recorded in the event logs for detecting fraud. Patterns of Fraud Detection are used to analyze the performances of fraud detection and predict the next fraud detection. Patterns of Fraud Detection can be observed using a map model of fraud detection. On the other hand, modeling fraud detection is difficult because the fraud detection cannot be directly observed through an event log. The event log only records activities triggering by fraud detection. This paper proposes an intention mining method for modeling fraud detection using Coupled Hidden Markov Model. The proposed method determines strategies utilizing the activities and forms a map model of fraud detection using probabilities of Coupled Hidden Markov Model. The experiment outcomes show that the proposed method gets an appropriate map model of fraud detection. This paper also demonstrates that an obtained model using proposed method gets the better validity than an obtained model using Map Miner Method.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"115 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257088
Johanes Andre Ridoean, R. Sarno, Dwi Sunaryo, D. Wijaya
Music can affect a person's mood. Music psychologists agree that music has a significant impact on a person's mood that determines their behavior. Therefore, our research examines the audio features that affect mood. Our method is to perform feature extraction based on MPEG-7 Low-Level Descriptors. MPEG-7 is international standardized multimedia metadata in ISO/IEC 15938. In this paper, we have made a researched about music mood classification using Audio Power and Audio Harmonicity features. The result of the extraction of the MPEG-7 obtained 17 features low-level descriptors. These features are classified using Support Vector Machine (SVM). There are two stages of SVM: training and prediction phase. Traning phase is when the machine learns to recognize the characteristics of the signal on a label while in prediction phase, it gives the predicted outcome of a label on a new signal characteristic pattern. The success rate of this experiment was 74.28% using Audio Power and Audio Harmonicity, 37.14% using Audio Spectrum Projection, and 28.57% using Audio Power, Audio Harmonicity and Audio Spectrum Projection.
{"title":"Music mood classification using audio power and audio harmonicity based on MPEG-7 audio features and Support Vector Machine","authors":"Johanes Andre Ridoean, R. Sarno, Dwi Sunaryo, D. Wijaya","doi":"10.1109/ICSITECH.2017.8257088","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257088","url":null,"abstract":"Music can affect a person's mood. Music psychologists agree that music has a significant impact on a person's mood that determines their behavior. Therefore, our research examines the audio features that affect mood. Our method is to perform feature extraction based on MPEG-7 Low-Level Descriptors. MPEG-7 is international standardized multimedia metadata in ISO/IEC 15938. In this paper, we have made a researched about music mood classification using Audio Power and Audio Harmonicity features. The result of the extraction of the MPEG-7 obtained 17 features low-level descriptors. These features are classified using Support Vector Machine (SVM). There are two stages of SVM: training and prediction phase. Traning phase is when the machine learns to recognize the characteristics of the signal on a label while in prediction phase, it gives the predicted outcome of a label on a new signal characteristic pattern. The success rate of this experiment was 74.28% using Audio Power and Audio Harmonicity, 37.14% using Audio Spectrum Projection, and 28.57% using Audio Power, Audio Harmonicity and Audio Spectrum Projection.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257171
Febriyandika Tarang Boro, I. Riyanto, K. Adiyarta
One of the parameters that determine the quality of the coffee beverage is by grinding the coffee beans correctly. In addition to proper grinding process, water temperature settings also become an important part. Grinding and brewing process must be done in a short time so that the taste of the coffee bean is not lost and the quality is maintained. A control system based on PID (Proportional Integral Derivative) is used to maintain proper water temperature. The components used is LM35 temperature sensor, Solenoid Valve, AC dimmer, and DC Motor that is connected to a Nuvoton NUC140 module that serves as the main controller of the system. Temperature control is done by adjusting the voltage of the AC dimmer circuit to heat the element with the PWM changes removed from the microcontroller. The PID parameter is determined using the Ziegler-Nichols method. The test results with Kp = 13, Ki = 116, and Kd = 29 systems have a response with a constant time of 613 seconds and the air temperature can be stable at 90 ° C with a steady state error of 1.1%. Overall, the system can process 8 grams of coffee beans for 5 minutes started from grinding the coffee beans to brewing.
{"title":"Automatic coffee grinding and brewing process with NUC140 microcontroller","authors":"Febriyandika Tarang Boro, I. Riyanto, K. Adiyarta","doi":"10.1109/ICSITECH.2017.8257171","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257171","url":null,"abstract":"One of the parameters that determine the quality of the coffee beverage is by grinding the coffee beans correctly. In addition to proper grinding process, water temperature settings also become an important part. Grinding and brewing process must be done in a short time so that the taste of the coffee bean is not lost and the quality is maintained. A control system based on PID (Proportional Integral Derivative) is used to maintain proper water temperature. The components used is LM35 temperature sensor, Solenoid Valve, AC dimmer, and DC Motor that is connected to a Nuvoton NUC140 module that serves as the main controller of the system. Temperature control is done by adjusting the voltage of the AC dimmer circuit to heat the element with the PWM changes removed from the microcontroller. The PID parameter is determined using the Ziegler-Nichols method. The test results with Kp = 13, Ki = 116, and Kd = 29 systems have a response with a constant time of 613 seconds and the air temperature can be stable at 90 ° C with a steady state error of 1.1%. Overall, the system can process 8 grams of coffee beans for 5 minutes started from grinding the coffee beans to brewing.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257134
H. J. Setyadi, P. P. Widagdo, T. D. Susanto
Along with the rapid development of Information and Communication Technology (ICT) that provides much benefits for human life, there is also another side in it. One of the negative impacts of ICT is the stress caused by the inability to adapt to the technological environment, where the behavior can affect the mental and behavior that impact on user satisfaction and decreased performance. Technostress can generally be defined as the mental stress that employees experience because of the use of Information and Communications Technologies in the workplace. Factors of age and gender in previous studies revealed that old age tends to avoid technostress, and the male gender have high technostress level because they always want to find new things and try a new technology. Previous studies that have not yet seen the effect of differences age perceptions between cognitive age (young spirits) and chronological age (actual age) to technostress into a separate research that will be conducted by researchers. The results of this study prove empirically that the more a person has a cognitive age (young spirited) can reduce the influence of people experiencing technostress. Technostress was also proven to affect satisfaction, performance. The main factors trigger technostress from the results of this research is techno overload, techno uncertainty and techno insecurity. The results of research implications also show that technostress has a relationship to the user's intention to continue the use of technology.
{"title":"Cognitive age and chronological age of the technostress that effect on satisfaction, performance, and intention of continue the use of information technology in the university","authors":"H. J. Setyadi, P. P. Widagdo, T. D. Susanto","doi":"10.1109/ICSITECH.2017.8257134","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257134","url":null,"abstract":"Along with the rapid development of Information and Communication Technology (ICT) that provides much benefits for human life, there is also another side in it. One of the negative impacts of ICT is the stress caused by the inability to adapt to the technological environment, where the behavior can affect the mental and behavior that impact on user satisfaction and decreased performance. Technostress can generally be defined as the mental stress that employees experience because of the use of Information and Communications Technologies in the workplace. Factors of age and gender in previous studies revealed that old age tends to avoid technostress, and the male gender have high technostress level because they always want to find new things and try a new technology. Previous studies that have not yet seen the effect of differences age perceptions between cognitive age (young spirits) and chronological age (actual age) to technostress into a separate research that will be conducted by researchers. The results of this study prove empirically that the more a person has a cognitive age (young spirited) can reduce the influence of people experiencing technostress. Technostress was also proven to affect satisfaction, performance. The main factors trigger technostress from the results of this research is techno overload, techno uncertainty and techno insecurity. The results of research implications also show that technostress has a relationship to the user's intention to continue the use of technology.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257119
S. Mariana, I. Surjandari, Arian Dhini, Asma Rosyidah, P. Prameswari
Improvement in service quality in Online Public Access Catalog (OPAC) of Universitas Indonesia's library is required due to its increasing use. Book recommendation system is one of the efforts that is conducted by Universitas Indonesia to improve it by providing related books the user may need. Thus, it is required to know how the books correlation is. This research uses data mining to process numerous data by using association analysis in loan records. It is able to find interesting relationship in a large set of data. In this research, there are two approaches in association analysis used to mine the association rules namely frequent itemset mining and infrequent itemset mining. Each approach is applied through an algorithm and both have showed its own results. Then, these results are evaluated and compared to find best rules to be input of book recommendation system.
{"title":"Association rule mining for building book recommendation system in online public access catalog","authors":"S. Mariana, I. Surjandari, Arian Dhini, Asma Rosyidah, P. Prameswari","doi":"10.1109/ICSITECH.2017.8257119","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257119","url":null,"abstract":"Improvement in service quality in Online Public Access Catalog (OPAC) of Universitas Indonesia's library is required due to its increasing use. Book recommendation system is one of the efforts that is conducted by Universitas Indonesia to improve it by providing related books the user may need. Thus, it is required to know how the books correlation is. This research uses data mining to process numerous data by using association analysis in loan records. It is able to find interesting relationship in a large set of data. In this research, there are two approaches in association analysis used to mine the association rules namely frequent itemset mining and infrequent itemset mining. Each approach is applied through an algorithm and both have showed its own results. Then, these results are evaluated and compared to find best rules to be input of book recommendation system.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257153
Cut Nurul Qamari, M. Ridwan
The field of education so far often make use of technology such as presentation slides and also interactive programs as a learning and teaching media. This study attempted to apply the Android-based augmented reality (AR) technology to display the learning materials in the digital format so the students can observe the overall learning object with the help of Android application. The main aim of this study was to understand the level of interest and inputs from the students related to the provided learning object, so it can be developed better in the next chance. This study was done using the qualitative approach method with the results sourced from the observation and simulation research method, using questionnaire form given to 24 students where the questions were based from the direct simulation using Android smartphone. The results show that 85,4% of the overall students are very interested in using AR media, 95,8% stated strongly agree that the biology learning material becomes more easily understood using AR media, 86,5% stated that AR media is very easy and practical to use, 76% stated strongly agree that their Android smartphone can function well to use AR media, and 65,6% stated that the AR cards used in this study can be scanned easily with using the application. Overall, the average percentage of all students' opinions was 81,9%, which was interpreted as a strongly agreed option that AR media is interesting to be applied as a media for studying dicotyledonous plants in the biology subject.
{"title":"Implementation of Android-based augmented reality as learning and teaching media of dicotyledonous plants learning materials in biology subject","authors":"Cut Nurul Qamari, M. Ridwan","doi":"10.1109/ICSITECH.2017.8257153","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257153","url":null,"abstract":"The field of education so far often make use of technology such as presentation slides and also interactive programs as a learning and teaching media. This study attempted to apply the Android-based augmented reality (AR) technology to display the learning materials in the digital format so the students can observe the overall learning object with the help of Android application. The main aim of this study was to understand the level of interest and inputs from the students related to the provided learning object, so it can be developed better in the next chance. This study was done using the qualitative approach method with the results sourced from the observation and simulation research method, using questionnaire form given to 24 students where the questions were based from the direct simulation using Android smartphone. The results show that 85,4% of the overall students are very interested in using AR media, 95,8% stated strongly agree that the biology learning material becomes more easily understood using AR media, 86,5% stated that AR media is very easy and practical to use, 76% stated strongly agree that their Android smartphone can function well to use AR media, and 65,6% stated that the AR cards used in this study can be scanned easily with using the application. Overall, the average percentage of all students' opinions was 81,9%, which was interpreted as a strongly agreed option that AR media is interesting to be applied as a media for studying dicotyledonous plants in the biology subject.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129488577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257149
R. Masri, I. M. Purwaamijaya
The objective of researchs are (1) making matrix of a conceptual model, designing matrix of functional model and system implementation for regional function, (2) making standard operational procedure for multi criteria evaluation of regional function using geographic information system, (3) superimposing slope, soil and rain fall layers to gain regional function using multi criteria evaluation, (4) produced thematic map of regional function in district region, (5) produced attribute table of regional function in district region. Descriptive and formal correlation method is used for the research. Garut was the research site. The study was done from January 2017 to May 2017. A overlay operation is used to the superimposed slope, soil and rain layers become a regional function. Multi criteria evaluation for regional function using geographic information system could be used for the spatial arrangement.
{"title":"Multi criteria evaluation for regional function based on geographic information system","authors":"R. Masri, I. M. Purwaamijaya","doi":"10.1109/ICSITECH.2017.8257149","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257149","url":null,"abstract":"The objective of researchs are (1) making matrix of a conceptual model, designing matrix of functional model and system implementation for regional function, (2) making standard operational procedure for multi criteria evaluation of regional function using geographic information system, (3) superimposing slope, soil and rain fall layers to gain regional function using multi criteria evaluation, (4) produced thematic map of regional function in district region, (5) produced attribute table of regional function in district region. Descriptive and formal correlation method is used for the research. Garut was the research site. The study was done from January 2017 to May 2017. A overlay operation is used to the superimposed slope, soil and rain layers become a regional function. Multi criteria evaluation for regional function using geographic information system could be used for the spatial arrangement.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117290000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257152
U. Hairah, Andi Tejawati, E. Budiman, F. Agus
Efforts to accelerate basic biodiversity research in exploration activities in the archipelago of Borneo need to be done at high speed considering conservation and management, as well as an awareness of the loss of biodiversity assets, is very limited. Therefore, it is necessary to develop a biodiversity information system of Borneo that can be used in data collection, observation, and monitoring of plant biodiversity species that focuses on the management and search of endemic tree data, as well as the type of wood and its characteristics. Borneo's biodiversity information system is built using the Software Development Life Cycle (SDLC) Models and object-oriented modeling Unified Modeling Language (UML). The results have collected data of 1,482 endemic tree species, and 86 types of wood with characteristics stored in the system database. Nomenclature of the plant refers to the International Code of Botanical Nomenclature (ICBN). Performance testing of stress testing per user and per URL; average web requests processed in less than 10 seconds (<10s) or Average Click Time of 20 users 9,848ms. This explains that there is work to be done to the application and web server.
{"title":"Borneo biodiversity: Exploring endemic tree species and wood characteristics","authors":"U. Hairah, Andi Tejawati, E. Budiman, F. Agus","doi":"10.1109/ICSITECH.2017.8257152","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257152","url":null,"abstract":"Efforts to accelerate basic biodiversity research in exploration activities in the archipelago of Borneo need to be done at high speed considering conservation and management, as well as an awareness of the loss of biodiversity assets, is very limited. Therefore, it is necessary to develop a biodiversity information system of Borneo that can be used in data collection, observation, and monitoring of plant biodiversity species that focuses on the management and search of endemic tree data, as well as the type of wood and its characteristics. Borneo's biodiversity information system is built using the Software Development Life Cycle (SDLC) Models and object-oriented modeling Unified Modeling Language (UML). The results have collected data of 1,482 endemic tree species, and 86 types of wood with characteristics stored in the system database. Nomenclature of the plant refers to the International Code of Botanical Nomenclature (ICBN). Performance testing of stress testing per user and per URL; average web requests processed in less than 10 seconds (<10s) or Average Click Time of 20 users 9,848ms. This explains that there is work to be done to the application and web server.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257204
A. Prahara, A. Pranolo
The acquisition process of depth image usually produces noise and holes. This kind of defect can reduce the quality of depth image especially the existence of small or large holes which cause great loss of depth information. In this research, the depth inpainting scheme based on edge guided non local means is proposed to restore the missing depth information. Non local means (NL-means) uses similar patches within search window to recover the missing depth pixel by averaging the weighted Euclidean distance from the similar patches. The inpainting scheme iterates through boundaries of missing depth pixels. Depth image edges will act as guidance to limit the search region by using Breadth First Search (BFS). The distance calculation is performed on valid depth pixels and ignore the missing depth parts from both patches to avoid false depth information. The experiment on the depth image dataset shows that the proposed scheme can fill small to large holes on depth image with low MSE value.
深度图像的采集过程中通常会产生噪声和孔洞。这种缺陷会降低深度图像的质量,尤其是小孔或大孔的存在会造成深度信息的极大损失。在本研究中,提出了基于边缘引导的非局部均值深度修复方案来恢复缺失的深度信息。非局部均值(Non - local means, NL-means)利用搜索窗口内的相似patch,通过对相似patch的加权欧氏距离进行平均,来恢复缺失的深度像素。绘制方案通过缺失深度像素的边界迭代。深度图像边缘作为指导,使用广度优先搜索(BFS)来限制搜索区域。在有效深度像素上进行距离计算,忽略两个补丁中缺失的深度部分,以避免错误的深度信息。在深度图像数据集上进行的实验表明,该方法可以在MSE值较低的深度图像上填充大小不等的孔洞。
{"title":"Depth inpainting scheme based on edge guided non local means","authors":"A. Prahara, A. Pranolo","doi":"10.1109/ICSITECH.2017.8257204","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257204","url":null,"abstract":"The acquisition process of depth image usually produces noise and holes. This kind of defect can reduce the quality of depth image especially the existence of small or large holes which cause great loss of depth information. In this research, the depth inpainting scheme based on edge guided non local means is proposed to restore the missing depth information. Non local means (NL-means) uses similar patches within search window to recover the missing depth pixel by averaging the weighted Euclidean distance from the similar patches. The inpainting scheme iterates through boundaries of missing depth pixels. Depth image edges will act as guidance to limit the search region by using Breadth First Search (BFS). The distance calculation is performed on valid depth pixels and ignore the missing depth parts from both patches to avoid false depth information. The experiment on the depth image dataset shows that the proposed scheme can fill small to large holes on depth image with low MSE value.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICSITECH.2017.8257145
F. D. Ariyanti, S. Hadita
Food-safety should be considered as a priority by food buyer who buys online. This study to analyze the relation of food safety knowledge and behavior practices on the young adult who buys food online. The study participants were 104 undergraduate college students whom digital technologies users and experienced with e-commerce and social media. Respondents were clustered into four clusters: No Food safety knowledge, low, medium and high. Methodologies used were cluster analysis with average linkage and Ward's method. The first result shows female respondents have food safety knowledge higher than male. Second, majority respondents have low to medium food safety knowledge. Third, with low to medium food safety knowledge and triggering factor saving time, majority respondent buy food through direct food producers websites. Fourth, the decision-making factor to buy food online are equal between attractive advertisement and repeat order. Finally, indicated the study population overall has poor knowledge of food safety this implicate threat food borne. As a result, awareness and food safety educational initiatives campaigns should be developed to better inform young adults about safe food practices and habits in buying food online.
{"title":"Food safety knowledge and practices on food virtual shop","authors":"F. D. Ariyanti, S. Hadita","doi":"10.1109/ICSITECH.2017.8257145","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257145","url":null,"abstract":"Food-safety should be considered as a priority by food buyer who buys online. This study to analyze the relation of food safety knowledge and behavior practices on the young adult who buys food online. The study participants were 104 undergraduate college students whom digital technologies users and experienced with e-commerce and social media. Respondents were clustered into four clusters: No Food safety knowledge, low, medium and high. Methodologies used were cluster analysis with average linkage and Ward's method. The first result shows female respondents have food safety knowledge higher than male. Second, majority respondents have low to medium food safety knowledge. Third, with low to medium food safety knowledge and triggering factor saving time, majority respondent buy food through direct food producers websites. Fourth, the decision-making factor to buy food online are equal between attractive advertisement and repeat order. Finally, indicated the study population overall has poor knowledge of food safety this implicate threat food borne. As a result, awareness and food safety educational initiatives campaigns should be developed to better inform young adults about safe food practices and habits in buying food online.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}