首页 > 最新文献

2017 3rd International Conference on Science in Information Technology (ICSITech)最新文献

英文 中文
Mobile application development with augmented reality for promoting tourism objects in Southwest Sumba 利用增强现实技术开发移动应用程序,推广松巴西南部的旅游景点
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257110
David Kadi, Suyoto, A. Santoso
Southwest Sumba is a regency located on the island of Sumba and falls under the jurisdiction area of the province of East Nusa Tenggara. This regency is well-known for its wide variety of and interesting tourism objects, such as its nature, culture, and marine tourism. Nevertheless, one of the things that proved to be obstacles in promoting tourism objects to potential visitors is the lack of information about their very own existence. Therefore, any form of location-based information services is particularly needed to be developed so that this so-called information can be accessed in real time, direct routes to tourism objects, and one that can quickly provide information regarding tourism objects. In this research, location-based information services are developed in a form of a mobile app that combines Location Based Service (LBS) with Augmented Reality (AR). This application use markerless method planted in AR to track object of Point of Interest (POIs) for tourism objects. Furthermore, each POIs of tourism objects is tracked based on three different coordinate points for each location and can make it easier for tourists to obtain information regarding tourism objects.
西南松巴是位于松巴岛的一个摄政区,属于东努沙登加拉省的管辖范围。这个摄政以其种类繁多和有趣的旅游对象而闻名,比如它的自然、文化和海洋旅游。然而,事实证明,在向潜在游客推销旅游景点时存在的障碍之一是缺乏有关这些景点本身存在的信息。因此,特别需要开发任何形式的基于位置的信息服务,使这种所谓的信息可以实时访问,直接到旅游对象的路线,并且可以快速提供有关旅游对象的信息。在本研究中,基于位置的信息服务以一种结合了基于位置的服务(LBS)和增强现实(AR)的移动应用程序的形式开发。该应用程序使用无标记方法植入AR来跟踪旅游对象的兴趣点(POIs)。此外,旅游对象的每个poi基于每个位置的三个不同的坐标点进行跟踪,可以使游客更容易获得有关旅游对象的信息。
{"title":"Mobile application development with augmented reality for promoting tourism objects in Southwest Sumba","authors":"David Kadi, Suyoto, A. Santoso","doi":"10.1109/ICSITECH.2017.8257110","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257110","url":null,"abstract":"Southwest Sumba is a regency located on the island of Sumba and falls under the jurisdiction area of the province of East Nusa Tenggara. This regency is well-known for its wide variety of and interesting tourism objects, such as its nature, culture, and marine tourism. Nevertheless, one of the things that proved to be obstacles in promoting tourism objects to potential visitors is the lack of information about their very own existence. Therefore, any form of location-based information services is particularly needed to be developed so that this so-called information can be accessed in real time, direct routes to tourism objects, and one that can quickly provide information regarding tourism objects. In this research, location-based information services are developed in a form of a mobile app that combines Location Based Service (LBS) with Augmented Reality (AR). This application use markerless method planted in AR to track object of Point of Interest (POIs) for tourism objects. Furthermore, each POIs of tourism objects is tracked based on three different coordinate points for each location and can make it easier for tourists to obtain information regarding tourism objects.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Seamless presence system in classroom 教室无缝到场系统
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257143
M. Qusyairi, M. Abdurohman, Asep Mulyana
This paper proposes a seamless presence system using Bluetooth technology to reduce processing time of presence system in classroom. Presence systems that are widely used today are using RFID technology, where the user applying the queuing mechanism in operation. For a fairly number of participants, this situation is a wasting of time as well as reduces convenience for participants. The proposed system consists of two main parts: The S canner and Server. S canner used to detect and identify the presence of the student(s) while the server (which consist of OpenMTC Server and an Application Server) are responsible to verify the data received from the S canner as well as display on application. System could cover 7.99 meters of effective distance (in average) in hall room, and 4.86 meters of effective distance (in average) in normal classroom (the classroom that has 8m × 8m of size). Performance of the system including the success rate of scan inquiry is 76.32% (in average) while scan inquiry latency is 61.46 seconds.
本文提出了一种采用蓝牙技术的无缝出勤系统,以减少课堂出勤系统的处理时间。目前广泛使用的在场系统都是采用RFID技术,其中用户在操作中应用排队机制。对于相当一部分参与者来说,这种情况既浪费了时间,也降低了参与者的便利性。该系统主要由两个部分组成:服务器和服务器。S扫描器用于检测和识别学生的存在,而服务器(由OpenMTC服务器和应用程序服务器组成)负责验证从S扫描器接收的数据以及在应用程序上的显示。系统在厅堂教室的有效距离平均为7.99米,在普通教室(8m × 8m的教室)的有效距离平均为4.86米。系统的扫描查询成功率平均为76.32%,扫描查询延迟为61.46秒。
{"title":"Seamless presence system in classroom","authors":"M. Qusyairi, M. Abdurohman, Asep Mulyana","doi":"10.1109/ICSITECH.2017.8257143","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257143","url":null,"abstract":"This paper proposes a seamless presence system using Bluetooth technology to reduce processing time of presence system in classroom. Presence systems that are widely used today are using RFID technology, where the user applying the queuing mechanism in operation. For a fairly number of participants, this situation is a wasting of time as well as reduces convenience for participants. The proposed system consists of two main parts: The S canner and Server. S canner used to detect and identify the presence of the student(s) while the server (which consist of OpenMTC Server and an Application Server) are responsible to verify the data received from the S canner as well as display on application. System could cover 7.99 meters of effective distance (in average) in hall room, and 4.86 meters of effective distance (in average) in normal classroom (the classroom that has 8m × 8m of size). Performance of the system including the success rate of scan inquiry is 76.32% (in average) while scan inquiry latency is 61.46 seconds.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indonesian document retrieval using vector space method 印尼语文档检索使用向量空间方法
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257196
Novi Sofia Fitriasari, Khalifa Esha Iftitah, P Rizky Rachman Judhie
The rapid development of technology resulted in the extensive information distribution. It takes a system that can organize a set of information and simplify information search. The concept of retrieval system can simplify information search process. Current studies on information searching are dominated by documents in English, yet very few about documents in Indonesian. Therefore this study focuses on document search in Indonesian language using vector space method. The vector space method processes data already in the index to calculate the value of similarity with the user-provided query. The result is a list of ranked and relevant documents to the user-provided query. The performance results obtained by the system were the average value of precision 0.45, recall 0.96, and f-measure 0.54. The system produced a high recall value compared to precision in the document search process. This study shows that the vector space method is able to search and produce relevant documents.
科技的飞速发展导致了信息的广泛传播。它需要一个能够组织一组信息并简化信息搜索的系统。检索系统的概念可以简化信息检索过程。目前对信息检索的研究以英文文献为主,而对印尼语文献的研究很少。因此,本研究的重点是利用向量空间方法进行印尼语文档检索。向量空间方法处理索引中已有的数据,以计算与用户提供的查询的相似度值。结果是对用户提供的查询进行排序的相关文档列表。系统的平均精密度为0.45,召回率为0.96,f-measure为0.54。该系统在文档搜索过程中产生了较高的查全率。研究表明,向量空间方法能够搜索并生成相关文档。
{"title":"Indonesian document retrieval using vector space method","authors":"Novi Sofia Fitriasari, Khalifa Esha Iftitah, P Rizky Rachman Judhie","doi":"10.1109/ICSITECH.2017.8257196","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257196","url":null,"abstract":"The rapid development of technology resulted in the extensive information distribution. It takes a system that can organize a set of information and simplify information search. The concept of retrieval system can simplify information search process. Current studies on information searching are dominated by documents in English, yet very few about documents in Indonesian. Therefore this study focuses on document search in Indonesian language using vector space method. The vector space method processes data already in the index to calculate the value of similarity with the user-provided query. The result is a list of ranked and relevant documents to the user-provided query. The performance results obtained by the system were the average value of precision 0.45, recall 0.96, and f-measure 0.54. The system produced a high recall value compared to precision in the document search process. This study shows that the vector space method is able to search and produce relevant documents.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilisation of down and upsample in pre-processing to enhance quality of kinect depth compression 在预处理中利用上下采样来提高kinect深度压缩的质量
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257183
Christin Panjaitan, Chung-An Shen, S. Ruan
This paper presents high performance kinect depth video compression with low computational cost. In the proposed scheme, down-sample is placed at the first part of pre-processing to reduce computational cost. Therefore, down-sampled image is refined in the middle of pre-processing part. At last stage of preprocessing, up-sample scheme is located in order to return into the original size then feed into H.264/AVC encoder. The proposed method can gain 3–4 dB and reduce computational time by 44 %–50 %.
本文提出了一种计算成本低的高性能kinect深度视频压缩方法。在该方案中,下采样置于预处理的第一部分,以减少计算成本。因此,在预处理过程中对下采样图像进行细化处理。在预处理的最后阶段,定位上采样方案,使图像恢复到原始尺寸,然后送入H.264/AVC编码器。该方法的增益可达3 ~ 4 dB,计算时间可减少44% ~ 50%。
{"title":"Utilisation of down and upsample in pre-processing to enhance quality of kinect depth compression","authors":"Christin Panjaitan, Chung-An Shen, S. Ruan","doi":"10.1109/ICSITECH.2017.8257183","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257183","url":null,"abstract":"This paper presents high performance kinect depth video compression with low computational cost. In the proposed scheme, down-sample is placed at the first part of pre-processing to reduce computational cost. Therefore, down-sampled image is refined in the middle of pre-processing part. At last stage of preprocessing, up-sample scheme is located in order to return into the original size then feed into H.264/AVC encoder. The proposed method can gain 3–4 dB and reduce computational time by 44 %–50 %.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Route selection based on real time traffic condition using Ant Colony System and fuzzy inference system 利用蚁群系统和模糊推理系统进行基于实时交通状况的路径选择
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257087
Erick Alfons Lisangan, Sean Coonery Sumarta
Route selection from the point of origin to destination today is not only considering the shortest distance but also traffic conditions, such as average speed and vehicle intensity. In this research, we propose method of the ant's location selection using Fuzzy Inference System in the Ant Colony System. The location selection not only consider the distance but also the probability of next location. The probability of next location is the output of fuzzy inference system with the input is the traffic conditions between current location and next location. The dataset is data of traffic condition in the area of Aarhus, Denmark. The results show that the route selection is not only based on the distance location but also the traffic condition between locations. The proposed method is expected to be the basis to develop the real-time location searching's application with input coming from sensors by considering the average execution less than one second in finding route.
如今,从起点到目的地的路线选择不仅要考虑最短距离,还要考虑交通状况,如平均速度和车辆强度。在本研究中,我们提出了在蚁群系统中利用模糊推理系统进行蚁群选址的方法。位置选择不仅考虑了距离,而且考虑了下一个位置的概率。下一个位置的概率是模糊推理系统的输出,输入是当前位置与下一个位置之间的交通状况。该数据集是丹麦奥胡斯地区的交通状况数据。结果表明,路径选择不仅要考虑距离位置,而且要考虑位置之间的交通状况。考虑到寻路的平均执行时间小于1秒,该方法有望成为开发传感器输入实时定位搜索应用的基础。
{"title":"Route selection based on real time traffic condition using Ant Colony System and fuzzy inference system","authors":"Erick Alfons Lisangan, Sean Coonery Sumarta","doi":"10.1109/ICSITECH.2017.8257087","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257087","url":null,"abstract":"Route selection from the point of origin to destination today is not only considering the shortest distance but also traffic conditions, such as average speed and vehicle intensity. In this research, we propose method of the ant's location selection using Fuzzy Inference System in the Ant Colony System. The location selection not only consider the distance but also the probability of next location. The probability of next location is the output of fuzzy inference system with the input is the traffic conditions between current location and next location. The dataset is data of traffic condition in the area of Aarhus, Denmark. The results show that the route selection is not only based on the distance location but also the traffic condition between locations. The proposed method is expected to be the basis to develop the real-time location searching's application with input coming from sensors by considering the average execution less than one second in finding route.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128750370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing data security using DES-based cryptography and DCT-based steganography 使用基于des的加密技术和基于dct的隐写技术增强数据安全性
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257187
Achmad Solichin, Erwin Wahyu Ramadhan
The security and privacy of the data transmitted is an important aspect of the exchange of information on the Internet network. Cryptography and Steganography are two of the most commonly used digital data security techniques. In this research, we proposed the combination of the cryptographic method with Data Encryption Standard (DES) algorithm and the steganographic method with Discrete Cosine Transform (DCT) to develop a digital data security application. The application can be used to secure document data in Word, Excel, Powerpoint or PDF format. Data encrypted with DES algorithm and further hidden in image cover using DCT algorithm. The results showed that the quality of the image that has been inserted (stego-image) is still in a good category with an average PSNR value of 46.9 dB. Also, the experiment results show that the average computational time of 0.75 millisecond/byte, an average size increase of 4.79 times and a success rate of 58%. This research can help solve the problem of data and information security that will be sent through a public network like the internet.
数据传输的安全性和保密性是Internet网络信息交换的一个重要方面。密码学和隐写术是两种最常用的数字数据安全技术。在本研究中,我们提出了结合数据加密标准(DES)算法的加密方法和结合离散余弦变换(DCT)的隐写方法来开发数字数据安全应用。该应用程序可用于保护Word, Excel, Powerpoint或PDF格式的文档数据。数据采用DES算法加密,并采用DCT算法进一步隐藏在图像覆盖层中。结果表明,插入图像(隐写图像)的质量仍然处于良好的类别,平均PSNR值为46.9 dB。实验结果表明,平均计算时间为0.75毫秒/字节,平均大小增加4.79倍,成功率为58%。这项研究可以帮助解决数据和信息的安全问题,将通过一个公共网络,如互联网发送。
{"title":"Enhancing data security using DES-based cryptography and DCT-based steganography","authors":"Achmad Solichin, Erwin Wahyu Ramadhan","doi":"10.1109/ICSITECH.2017.8257187","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257187","url":null,"abstract":"The security and privacy of the data transmitted is an important aspect of the exchange of information on the Internet network. Cryptography and Steganography are two of the most commonly used digital data security techniques. In this research, we proposed the combination of the cryptographic method with Data Encryption Standard (DES) algorithm and the steganographic method with Discrete Cosine Transform (DCT) to develop a digital data security application. The application can be used to secure document data in Word, Excel, Powerpoint or PDF format. Data encrypted with DES algorithm and further hidden in image cover using DCT algorithm. The results showed that the quality of the image that has been inserted (stego-image) is still in a good category with an average PSNR value of 46.9 dB. Also, the experiment results show that the average computational time of 0.75 millisecond/byte, an average size increase of 4.79 times and a success rate of 58%. This research can help solve the problem of data and information security that will be sent through a public network like the internet.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Knowledge-based graph compression using graph property on Yago 基于Yago的基于知识的图压缩
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257097
Wahyudi, M. L. Khodra, A. Prihatmanto, C. Machbub
It is common to find graphs with millions of nodes and edges in social networks, computer network, and knowledge bases. A number of edges and nodes that make the computational complexity becomes large beside it the number of nodes and edges that are not important difficult for us to make the process of patterning graph. We propose a compression method to eliminate unimportant nodes and edges becomes a property of the important nodes. We developed an algorithm graph property compression (GPC) to compress the compression property on the yago knowledge-based. The results of research conducted on yago compression can reduce a 42.45 % node and 47.66% edge. It is effective to reduce the size of the graph primarily unimportant node and edge.
在社交网络、计算机网络和知识库中发现具有数百万个节点和边的图是很常见的。大量的边和节点使得计算复杂度变得越来越大,而这些并不重要的边和节点的数量也给图的图案化过程带来了困难。我们提出了一种消除不重要节点的压缩方法,使边缘成为重要节点的属性。本文提出了一种基于图形属性压缩的图形属性压缩算法(GPC)。研究结果表明,yago压缩可以减少42.45%的节点和47.66%的边缘。它可以有效地减少图中主要不重要的节点和边的大小。
{"title":"Knowledge-based graph compression using graph property on Yago","authors":"Wahyudi, M. L. Khodra, A. Prihatmanto, C. Machbub","doi":"10.1109/ICSITECH.2017.8257097","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257097","url":null,"abstract":"It is common to find graphs with millions of nodes and edges in social networks, computer network, and knowledge bases. A number of edges and nodes that make the computational complexity becomes large beside it the number of nodes and edges that are not important difficult for us to make the process of patterning graph. We propose a compression method to eliminate unimportant nodes and edges becomes a property of the important nodes. We developed an algorithm graph property compression (GPC) to compress the compression property on the yago knowledge-based. The results of research conducted on yago compression can reduce a 42.45 % node and 47.66% edge. It is effective to reduce the size of the graph primarily unimportant node and edge.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Student graduation time prediction using intelligent K-Medoids Algorithm 基于智能k - mediids算法的学生毕业时间预测
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257122
Leonardo Cahaya, Lely Hiryanto, Teny Handhayani
We proposed unsupervised learning, the Intelligent K-Medoids Algorithm to predict, the length of a study time of universitys students. This algorithm automatically clusters all students based on their 25 weighted scores from 25 different subject as the features. We tested the implementation of the algorithm using 240 students scores. These 240 students have graduated and their graduation time is considered for labeling the cluster. The result is 7 clusters with silhouette value of 0.2416. Each cluster is labeled according to the range of student graduation time. The range in each cluster exists due to the existence of students whose majority of scores are similar, but their graduation times are different. Academic leaving or extending the completion of thesis are the other factors contributing the range graduation time in each cluster. The prediction by k-folding 240 data to 5 subsets results average prediction accuracy of 99.58.
我们提出了无监督学习,智能k - mediids算法来预测大学生学习时间的长短。该算法根据25个不同学科的25个加权分数自动聚类所有学生作为特征。我们使用240名学生的分数测试了算法的实现。这240名学生已经毕业,他们的毕业时间被用来标记聚类。结果为7个聚类,剪影值为0.2416。每个聚类根据学生毕业时间的范围进行标记。每个聚类的范围之所以存在,是因为存在着大多数分数相似,但毕业时间不同的学生。离校或延长毕业时间是影响各集群毕业时间范围的其他因素。将240个数据k折叠到5个子集进行预测,平均预测准确率为99.58。
{"title":"Student graduation time prediction using intelligent K-Medoids Algorithm","authors":"Leonardo Cahaya, Lely Hiryanto, Teny Handhayani","doi":"10.1109/ICSITECH.2017.8257122","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257122","url":null,"abstract":"We proposed unsupervised learning, the Intelligent K-Medoids Algorithm to predict, the length of a study time of universitys students. This algorithm automatically clusters all students based on their 25 weighted scores from 25 different subject as the features. We tested the implementation of the algorithm using 240 students scores. These 240 students have graduated and their graduation time is considered for labeling the cluster. The result is 7 clusters with silhouette value of 0.2416. Each cluster is labeled according to the range of student graduation time. The range in each cluster exists due to the existence of students whose majority of scores are similar, but their graduation times are different. Academic leaving or extending the completion of thesis are the other factors contributing the range graduation time in each cluster. The prediction by k-folding 240 data to 5 subsets results average prediction accuracy of 99.58.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127919777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analogy mapping for different learning style of learners in programming 编程学习者不同学习风格的类比映射
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257189
R. A. Sukamto, R. Megasari
Programming logic is often hard to understand for novice, but in the other side, programming is one of the most important subjects in computer science program. Analogy Mapping is a media which converts source code to analogies images using state machine in order to help students understanding programming logic easily. Therefore this paper reports our work about the effectivity of Analogy Mapping in learning process for basic programming subject students with different learning style.
编程逻辑通常对新手来说很难理解,但另一方面,编程是计算机科学程序中最重要的学科之一。类比映射是一种利用状态机将源代码转换为类比图像的媒介,目的是帮助学生更容易地理解编程逻辑。因此,本文就类比映射在不同学习风格的编程基础专业学生学习过程中的有效性进行了研究。
{"title":"Analogy mapping for different learning style of learners in programming","authors":"R. A. Sukamto, R. Megasari","doi":"10.1109/ICSITECH.2017.8257189","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257189","url":null,"abstract":"Programming logic is often hard to understand for novice, but in the other side, programming is one of the most important subjects in computer science program. Analogy Mapping is a media which converts source code to analogies images using state machine in order to help students understanding programming logic easily. Therefore this paper reports our work about the effectivity of Analogy Mapping in learning process for basic programming subject students with different learning style.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A secure data sharing using identity-based encryption scheme for e-healthcare system 电子医疗保健系统中使用基于身份的加密方案的安全数据共享
Pub Date : 2017-10-01 DOI: 10.1109/ICSITECH.2017.8257151
Amang Sudarsono, Mike Yuliana, Haryadi Amran Darwito
Data sharing information regarding health status in the e-healthcare systems becomes one of private and very sensitive information that should be kept from exposure by illegal activities. However, since the information are exchanged across public networks (i.e., Internet and wireless networks), the information become vulnerable. Due to the participating users in the network can not be trusted, a secure data sharing process in the e-healthcare system would be mandatory. In this paper, we propose a secure data sharing in the e-healthcare system using Identity-Based Encryption (IBE) with signature to provide: (1) data sharing can be accessed by only authorized users based on unique public identity (ID) and kept its integrity from alteration during transmission simultaneously, and (2) data sharing are encrypted and authenticated such that the data can only be exchanged by authorized users. Meanwhile, experimental results are able to show the practicality of proposed system.
电子医疗保健系统中有关健康状况的数据共享信息成为隐私和非常敏感的信息之一,应防止非法活动暴露这些信息。然而,由于信息是通过公共网络(即Internet和无线网络)交换的,因此信息变得容易受到攻击。由于网络中的参与用户是不可信的,因此在电子医疗系统中必须有一个安全的数据共享过程。本文提出了一种基于签名的身份加密(IBE)的电子医疗保健系统数据安全共享方案,以提供:(1)数据共享只能由基于唯一公共身份(ID)的授权用户访问,并且在传输过程中保持其完整性不被更改;(2)数据共享经过加密和认证,使得数据只能由授权用户交换。同时,实验结果也证明了系统的实用性。
{"title":"A secure data sharing using identity-based encryption scheme for e-healthcare system","authors":"Amang Sudarsono, Mike Yuliana, Haryadi Amran Darwito","doi":"10.1109/ICSITECH.2017.8257151","DOIUrl":"https://doi.org/10.1109/ICSITECH.2017.8257151","url":null,"abstract":"Data sharing information regarding health status in the e-healthcare systems becomes one of private and very sensitive information that should be kept from exposure by illegal activities. However, since the information are exchanged across public networks (i.e., Internet and wireless networks), the information become vulnerable. Due to the participating users in the network can not be trusted, a secure data sharing process in the e-healthcare system would be mandatory. In this paper, we propose a secure data sharing in the e-healthcare system using Identity-Based Encryption (IBE) with signature to provide: (1) data sharing can be accessed by only authorized users based on unique public identity (ID) and kept its integrity from alteration during transmission simultaneously, and (2) data sharing are encrypted and authenticated such that the data can only be exchanged by authorized users. Meanwhile, experimental results are able to show the practicality of proposed system.","PeriodicalId":165045,"journal":{"name":"2017 3rd International Conference on Science in Information Technology (ICSITech)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2017 3rd International Conference on Science in Information Technology (ICSITech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1