首页 > 最新文献

2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)最新文献

英文 中文
ICITISEE 2018 Author Index icitissee 2018作者索引
{"title":"ICITISEE 2018 Author Index","authors":"","doi":"10.1109/icitisee.2018.8721004","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8721004","url":null,"abstract":"","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Implementation of External Lightning Protection System: Case Study on the Military Radar Tower 外部防雷系统实施评估——以军事雷达塔为例
Zendra Mawan Leksana, Suhariyanto, F. D. Wijaya
A military radar unit is an operating unit that has the duty and responsibility to maintain the sovereignty of national airspace throughout the year. Considering that the installation area of military radar installations is in the mountainous, coastal, and marine areas, of course, this makes its own vulnerability to radar systems and their supporting electronic equipment from the threat of lightning strikes. The purpose of this study was to analyze the external protection system on radar towers based on the placement of installed air terminations. The analysis was carried out by applying the protection angle, rolling sphere, and collection volume method. From the results of research using the protection angle, it is found that using 1 air termination, increasing the air termination height to 38 m from the ground surface can protect all tower buildings and radar antenna from direct lightning strikes. The application of the rolling sphere on 4 air terminations on the radar tower is able to protect all tower buildings and radar antenna with a protection radius of each air termination as far as 45 m. By increasing the antenna height to 38 m from the ground surface, an analysis of the external lightning protection system using collection volume can protect all tower buildings and radar antenna from direct lightning strikes.
军事雷达部队是全年有义务和责任维护国家空域主权的作战单位。考虑到军用雷达装置的安装区域在山区、沿海和海洋地区,这当然使其自身容易受到雷达系统及其配套电子设备的雷击威胁。本研究的目的是分析雷达塔的外部保护系统基于安装的空中终端的位置。采用保护角法、滚动球法和收集体积法进行了分析。从使用保护角的研究结果来看,使用1个空端,将空端高度增加到离地面38 m,可以保护所有塔建筑和雷达天线免受直击雷击。滚动球应用于雷达塔上的4个空端,能够保护所有塔架建筑和雷达天线,每个空端保护半径可达45 m。通过将天线高度增加到离地面38米,分析采用集体积的外部防雷系统可以保护所有塔楼和雷达天线免受直接雷击。
{"title":"Evaluation of Implementation of External Lightning Protection System: Case Study on the Military Radar Tower","authors":"Zendra Mawan Leksana, Suhariyanto, F. D. Wijaya","doi":"10.1109/ICITISEE.2018.8721025","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8721025","url":null,"abstract":"A military radar unit is an operating unit that has the duty and responsibility to maintain the sovereignty of national airspace throughout the year. Considering that the installation area of military radar installations is in the mountainous, coastal, and marine areas, of course, this makes its own vulnerability to radar systems and their supporting electronic equipment from the threat of lightning strikes. The purpose of this study was to analyze the external protection system on radar towers based on the placement of installed air terminations. The analysis was carried out by applying the protection angle, rolling sphere, and collection volume method. From the results of research using the protection angle, it is found that using 1 air termination, increasing the air termination height to 38 m from the ground surface can protect all tower buildings and radar antenna from direct lightning strikes. The application of the rolling sphere on 4 air terminations on the radar tower is able to protect all tower buildings and radar antenna with a protection radius of each air termination as far as 45 m. By increasing the antenna height to 38 m from the ground surface, an analysis of the external lightning protection system using collection volume can protect all tower buildings and radar antenna from direct lightning strikes.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm Evaluation for Classification “Phishing Website” Using Several Classification Algorithms 几种分类算法对“钓鱼网站”分类的算法评价
R. Wahyudi, Hendra Marcos, U. Hasanah, Bambang Pilu Hartato, Tri Astuti, Rizal Anjas Prasetyo
Phishing websites are a fooling technique by making victims as if they are accessing legitimate sites. Data mining is a technique for extracting hidden information in order to benefit more from existing data. Data mining is the process of discovering regularity, patterns, and relationships in large datasets. In this study, data mining will be used to determine the effect of feature selection on algorithm C4.5 and CART on phishing website dataset. From the tests that have been done the effect of feature selection on the phishing website, dataset proved to overcome the longer computational time. From the performance measurement of both algorithms that have been done, CART algorithm has a higher accuracy value than the algorithm C4.5 with an accuracy of 94.4%, while the algorithm C4.5 has an accuracy of 94.3%, so it can be concluded that CART algorithm has better performance value compared with the C4.5 algorithm.
网络钓鱼网站是一种欺骗技术,使受害者仿佛正在访问合法网站。数据挖掘是一种从现有数据中提取隐藏信息的技术。数据挖掘是在大型数据集中发现规律、模式和关系的过程。在本研究中,将使用数据挖掘来确定特征选择对C4.5算法和CART对钓鱼网站数据集的影响。从对钓鱼网站特征选择效果的测试来看,数据集克服了较长的计算时间。从已经完成的两种算法的性能测量来看,CART算法的精度值高于C4.5算法,准确率为94.4%,而C4.5算法的准确率为94.3%,因此可以得出CART算法比C4.5算法具有更好的性能价值。
{"title":"Algorithm Evaluation for Classification “Phishing Website” Using Several Classification Algorithms","authors":"R. Wahyudi, Hendra Marcos, U. Hasanah, Bambang Pilu Hartato, Tri Astuti, Rizal Anjas Prasetyo","doi":"10.1109/ICITISEE.2018.8720975","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720975","url":null,"abstract":"Phishing websites are a fooling technique by making victims as if they are accessing legitimate sites. Data mining is a technique for extracting hidden information in order to benefit more from existing data. Data mining is the process of discovering regularity, patterns, and relationships in large datasets. In this study, data mining will be used to determine the effect of feature selection on algorithm C4.5 and CART on phishing website dataset. From the tests that have been done the effect of feature selection on the phishing website, dataset proved to overcome the longer computational time. From the performance measurement of both algorithms that have been done, CART algorithm has a higher accuracy value than the algorithm C4.5 with an accuracy of 94.4%, while the algorithm C4.5 has an accuracy of 94.3%, so it can be concluded that CART algorithm has better performance value compared with the C4.5 algorithm.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Backpropagation Neural Network for Tuning PID Pan-Tilt Face Tracking 反向传播神经网络整定PID泛倾斜人脸跟踪
D. Permatasari, D. Maharani
This paper presents a method for solving tuning PID Pan-Tilt Face Tracking. PID conventional method is developed to self-tuning gain of PID using Backpropagation Neural Network (BPNN) during the process (online) then achieves the desired target of human face which has more robust and minimal error. This plant uses three input neuros (references input), five hidden neuros, and three output neuros (Kp, Ki, and Kd). For initialization learning rate (alpha) and momentum (gamma) using 0.1 and 0.3 with random initialization weight. The pan system result has a fast response with overshoot 0.68%, peak time 0.65s, and rise time 0.48s with Kp = 2.9416, Ki = 0.393, Kd = 8.647 and for tilt system with overshoot 1.59%, rise time 0.49 s, and peak time 0.7 s. PID controller by Backpropagation Neural Network, it is obtained better reference output results with faster and fewer responses overshoot.
提出了一种求解PID泛倾斜人脸跟踪整定的方法。将传统的PID方法发展为利用反向传播神经网络(BPNN)在过程(在线)中自整定PID的增益,从而达到人脸的期望目标,具有更强的鲁棒性和最小的误差。该植物使用三个输入神经(参考输入),五个隐藏神经和三个输出神经(Kp, Ki和Kd)。对于初始化学习率(alpha)和动量(gamma)使用0.1和0.3随机初始化权值。平移系统响应速度快,超调0.68%,峰值时间0.65s,上升时间0.48s, Kp = 2.9416, Ki = 0.393, Kd = 8.647;倾斜系统响应速度快,超调1.59%,上升时间0.49 s,峰值时间0.7 s。PID控制器采用反向传播神经网络,以更快、更少的响应超调获得更好的参考输出结果。
{"title":"Backpropagation Neural Network for Tuning PID Pan-Tilt Face Tracking","authors":"D. Permatasari, D. Maharani","doi":"10.1109/ICITISEE.2018.8720968","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720968","url":null,"abstract":"This paper presents a method for solving tuning PID Pan-Tilt Face Tracking. PID conventional method is developed to self-tuning gain of PID using Backpropagation Neural Network (BPNN) during the process (online) then achieves the desired target of human face which has more robust and minimal error. This plant uses three input neuros (references input), five hidden neuros, and three output neuros (Kp, Ki, and Kd). For initialization learning rate (alpha) and momentum (gamma) using 0.1 and 0.3 with random initialization weight. The pan system result has a fast response with overshoot 0.68%, peak time 0.65s, and rise time 0.48s with Kp = 2.9416, Ki = 0.393, Kd = 8.647 and for tilt system with overshoot 1.59%, rise time 0.49 s, and peak time 0.7 s. PID controller by Backpropagation Neural Network, it is obtained better reference output results with faster and fewer responses overshoot.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vehicle Tracking using Kalman Filter based on Smart Video Sensor Architecture 基于智能视频传感器架构的卡尔曼滤波车辆跟踪
I. Imelda, A. Harjoko, P. Nurwantoro
Traffic information is needed to determine the cause of the accident. Problems arise when many traffic accidents or violations co-occur. Technical failures in delivering important frames also hinder the process of analyzing the video, which occurs due to disconnected network, limited bandwidth and CPU processing power. Besides, the size of the video to be processed at the same time slow the CPU down preventing the video from being treated. In this research, we propose Smart Video Sensor (SVS) resolve the missing frame issues. SVS is a video sensor recording images streaming frames for the frame. SVS extract only features of traffic objects and compress the video so that the data will be received faster and lighter. SVS also processes the primary data, so the other system is ready to use the features needed for further data processing. To demonstrate how well SVS works, we experimented it by tracking vehicles by type. This study uses 3 locations and 1000 frames in each area. The contribution of this paper is to produce a vehicle tracking model by type using Kalman Filter based SVS Architecture. The highest accuracy found for motorcycles is in Galeria (90.71%).
要确定事故的原因需要交通信息。当许多交通事故或违规行为同时发生时,问题就出现了。传输重要帧的技术故障也阻碍了视频分析过程,这是由于网络断开,带宽和CPU处理能力有限造成的。此外,同时要处理的视频的大小减慢了CPU的速度,从而阻止了视频的处理。在这项研究中,我们提出了智能视频传感器(SVS)来解决缺帧问题。SVS是一种记录图像流帧的视频传感器。SVS仅提取交通对象的特征,并对视频进行压缩,使数据接收更快、更轻。SVS还处理主要数据,因此其他系统已准备好使用进一步数据处理所需的特性。为了演示SVS的工作效果,我们通过按类型跟踪车辆进行了实验。本研究使用3个位置,每个区域1000帧。本文的贡献在于利用基于卡尔曼滤波的SVS体系结构建立了一个按类型的车辆跟踪模型。在Galeria发现的摩托车准确率最高(90.71%)。
{"title":"Vehicle Tracking using Kalman Filter based on Smart Video Sensor Architecture","authors":"I. Imelda, A. Harjoko, P. Nurwantoro","doi":"10.1109/ICITISEE.2018.8720947","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720947","url":null,"abstract":"Traffic information is needed to determine the cause of the accident. Problems arise when many traffic accidents or violations co-occur. Technical failures in delivering important frames also hinder the process of analyzing the video, which occurs due to disconnected network, limited bandwidth and CPU processing power. Besides, the size of the video to be processed at the same time slow the CPU down preventing the video from being treated. In this research, we propose Smart Video Sensor (SVS) resolve the missing frame issues. SVS is a video sensor recording images streaming frames for the frame. SVS extract only features of traffic objects and compress the video so that the data will be received faster and lighter. SVS also processes the primary data, so the other system is ready to use the features needed for further data processing. To demonstrate how well SVS works, we experimented it by tracking vehicles by type. This study uses 3 locations and 1000 frames in each area. The contribution of this paper is to produce a vehicle tracking model by type using Kalman Filter based SVS Architecture. The highest accuracy found for motorcycles is in Galeria (90.71%).","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134028584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of The Needs of Industrial Oil Fuels with The Implementation of Distribution Requirement Planning (DRP)
Delpiah Wahyuningsih, H. Pradana, Hamidah
Currently, oil fuels are a primary need for the community for motorized, such as vehicles. Fuels in Indonesia, which is held by PT. Pertamina, many companies which are covered by Pertamina to diesel oil fuels. The demand for diesel fuels are very large. That is, from several entrepreneurs’ such as palm oil, supermarket, and others level of stores. The companies sometimes cannot meet the customer needs. So, for the ordering the diesel fuel is limited, especially oil orders that make by branch companies who had a limited oil distribution stock. Here, we need a system that can analyze the needs of diesel oil distribution for companies or their branch using the Distribution Requirement Planning (DRP) method. DRP is an application to determine the calculation of the need for distribution of diesel oil each period (especially for one year). Companies and their branches benefit can get from DRP application where DRP itself makes predictions or measurements for the needs of diesel fuel for one period, namely the distribution of diesel oil over the next year, the need for distribution of diesel oil every month can be seen in detail. DRP will show the calculation of Planned Order Receipt and Planned Orders Release (POR), Gross Requirements (GR), Projected on Hand (PoH), and Net Requirements (NR). So, that they do not experience delays in the request process from customers.
目前,石油燃料是社会对机动车辆等的主要需求。印尼国家石油公司(PT. Pertamina)持有的燃料,印尼国家石油公司(PT. Pertamina)旗下的许多公司都是柴油燃料。对柴油的需求非常大。也就是从几个企业家的棕榈油、超市等层次的店铺做起。公司有时不能满足客户的需求。因此,对于柴油的订购是有限的,特别是分公司的石油订单,这些分公司的石油分销库存有限。在此,我们需要一个能够运用配送需求规划(DRP)方法分析企业或分公司柴油配送需求的系统。DRP是一种应用程序,用于确定每个时期(特别是一年)柴油分配需求的计算。公司及其分支机构可以从DRP应用中受益,DRP本身对一个时期的柴油需求进行预测或测量,即下一年的柴油分配,每个月的柴油分配需求可以详细看到。DRP将显示计划订单接收和计划订单释放(POR)、总需求(GR)、预计库存(PoH)和净需求(NR)的计算。这样,他们就不会在客户的请求过程中遇到延迟。
{"title":"Prediction of The Needs of Industrial Oil Fuels with The Implementation of Distribution Requirement Planning (DRP)","authors":"Delpiah Wahyuningsih, H. Pradana, Hamidah","doi":"10.1109/icitisee.2018.8721002","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8721002","url":null,"abstract":"Currently, oil fuels are a primary need for the community for motorized, such as vehicles. Fuels in Indonesia, which is held by PT. Pertamina, many companies which are covered by Pertamina to diesel oil fuels. The demand for diesel fuels are very large. That is, from several entrepreneurs’ such as palm oil, supermarket, and others level of stores. The companies sometimes cannot meet the customer needs. So, for the ordering the diesel fuel is limited, especially oil orders that make by branch companies who had a limited oil distribution stock. Here, we need a system that can analyze the needs of diesel oil distribution for companies or their branch using the Distribution Requirement Planning (DRP) method. DRP is an application to determine the calculation of the need for distribution of diesel oil each period (especially for one year). Companies and their branches benefit can get from DRP application where DRP itself makes predictions or measurements for the needs of diesel fuel for one period, namely the distribution of diesel oil over the next year, the need for distribution of diesel oil every month can be seen in detail. DRP will show the calculation of Planned Order Receipt and Planned Orders Release (POR), Gross Requirements (GR), Projected on Hand (PoH), and Net Requirements (NR). So, that they do not experience delays in the request process from customers.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131108982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Double Morphological Segmentation for Increasing Performance of Signature Classification Using Machine Learning Technique 基于机器学习技术的双形态分割提高签名分类性能
Chyntia Raras Ajeng Widiawati, Kuat Indartono
Signatures are one of the important characteristics that security needs to be considered. Some cases related to signature forgery often occur, this is certainly dangerous especially if the signature forgery can be misused. So there needs to be a verification process on the authenticity of signatures related to this. Several studies related to signature verification have been carried out, one of them using digital image processing techniques. However, some studies only propose a method without comparison of results. This study aims to compare methods and development of signature verification methods based on digital image processing with machine learning techniques. The final results of this research can later be used as a design module that can be used in system development or signature verification applications. The data used is the image of the digitization of the signature of the Lecturer in the STMIK AMIKOM Purwokerto environment. The segmentation method used in this study is adaptive maximum minimum thresholding with double morphological operation. Good segmentation results are expected to provide good classification results. Comparison of several different classifiers in the classification stage is carried out, including Linear Regression, Naïve Bayes (NB), Support Vector Machine (SVM), Multilayer Perceptron (MLP) and K-Nearest Neighbor (K-NN).
签名是需要考虑安全性的重要特征之一。一些与签名伪造有关的情况经常发生,这当然是危险的,特别是如果签名伪造可以被滥用。因此,需要对与此相关的签名的真实性进行验证。已经进行了几项与签名核查有关的研究,其中一项研究使用了数字图像处理技术。然而,一些研究只是提出了一种方法,而没有对结果进行比较。本研究旨在比较基于数字图像处理和机器学习技术的签名验证方法的方法和发展。本研究的最终结果可以作为设计模块用于系统开发或签名验证应用。所使用的数据是STMIK AMIKOM purokerto环境中讲师签名的数字化图像。本研究采用的分割方法是自适应最大最小阈值分割和双重形态学操作。良好的分割结果有望提供良好的分类结果。在分类阶段对几种不同的分类器进行了比较,包括线性回归、Naïve贝叶斯(NB)、支持向量机(SVM)、多层感知器(MLP)和k -近邻(K-NN)。
{"title":"Double Morphological Segmentation for Increasing Performance of Signature Classification Using Machine Learning Technique","authors":"Chyntia Raras Ajeng Widiawati, Kuat Indartono","doi":"10.1109/ICITISEE.2018.8720985","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720985","url":null,"abstract":"Signatures are one of the important characteristics that security needs to be considered. Some cases related to signature forgery often occur, this is certainly dangerous especially if the signature forgery can be misused. So there needs to be a verification process on the authenticity of signatures related to this. Several studies related to signature verification have been carried out, one of them using digital image processing techniques. However, some studies only propose a method without comparison of results. This study aims to compare methods and development of signature verification methods based on digital image processing with machine learning techniques. The final results of this research can later be used as a design module that can be used in system development or signature verification applications. The data used is the image of the digitization of the signature of the Lecturer in the STMIK AMIKOM Purwokerto environment. The segmentation method used in this study is adaptive maximum minimum thresholding with double morphological operation. Good segmentation results are expected to provide good classification results. Comparison of several different classifiers in the classification stage is carried out, including Linear Regression, Naïve Bayes (NB), Support Vector Machine (SVM), Multilayer Perceptron (MLP) and K-Nearest Neighbor (K-NN).","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123573700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet Huffman Coding Image Watermarking in the Presence of Compressive Sensing 基于压缩感知的小波霍夫曼编码图像水印
Irma Safitri, Ratri Dwi Atmaja, Azharudin Hidayat
In this study, we propose Huffman coding and compressive sensing (CS) for medical image watermarking. The methods used are Huffman coding, CS, discrete wavelet transform (DWT) and singular value decomposition (SVD). Experiment results show that images can be compressed generally above 50% and are lossless at the time of decompression by having the SSIM value of 1. Our system have the best MSE value of 0.172686 and the best PSNR value of 55.7582 dB.
在这项研究中,我们提出了霍夫曼编码和压缩感知(CS)的医学图像水印。使用的方法有霍夫曼编码、CS、离散小波变换和奇异值分解。实验结果表明,当SSIM值为1时,图像一般可以压缩50%以上,并且在解压缩时是无损的。系统的最佳MSE值为0.172686,最佳PSNR值为55.7582 dB。
{"title":"Wavelet Huffman Coding Image Watermarking in the Presence of Compressive Sensing","authors":"Irma Safitri, Ratri Dwi Atmaja, Azharudin Hidayat","doi":"10.1109/ICITISEE.2018.8720980","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720980","url":null,"abstract":"In this study, we propose Huffman coding and compressive sensing (CS) for medical image watermarking. The methods used are Huffman coding, CS, discrete wavelet transform (DWT) and singular value decomposition (SVD). Experiment results show that images can be compressed generally above 50% and are lossless at the time of decompression by having the SSIM value of 1. Our system have the best MSE value of 0.172686 and the best PSNR value of 55.7582 dB.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilevel Clustering Comparison using Self-Organizing Map and K-Means for MIR Score Clustering 基于自组织映射和K-Means的MIR分数聚类多级聚类比较
Ade Nurhopipah, B. Kusuma
The theory of Multiple Intelligences has been widely applied in exchange of intelligence test approach with the single score (IQ). One of the applications of MI-based learning strategies is to group students based on Multiple Intelligence Research (MIR) scores. In this study, students are grouped based on MIR scores using multilevel clustering techniques. Multiple clustering is applied to meet the needs of the equal number of students and gender. Several models of multilevel clustering using Self-Organizing Map (SOM) and K-Means algorithms are carried out. The evaluation results show that the smallest error is generated by the multilevel SOM. This method can facilitate students grouping based on MIR scores by maintaining the similarity of student features and class heterogeneity. This clustering method is expected to be an efficient way to group students automatically and effectively according to MI-based learning strategies.
多元智能理论在取代单一分数(IQ)的智力测试方法中得到了广泛的应用。基于多元智能的学习策略的应用之一是根据多元智能研究(MIR)分数对学生进行分组。本研究采用多层次聚类技术,根据MIR分数对学生进行分组。采用多重聚类来满足学生人数和性别相等的需求。采用自组织映射(SOM)和K-Means算法建立了多层聚类模型。评价结果表明,多层SOM产生的误差最小。该方法在保持学生特征相似性和班级异质性的前提下,便于基于MIR分数对学生进行分组。这种聚类方法有望成为一种根据基于mi的学习策略对学生进行自动有效分组的有效方法。
{"title":"Multilevel Clustering Comparison using Self-Organizing Map and K-Means for MIR Score Clustering","authors":"Ade Nurhopipah, B. Kusuma","doi":"10.1109/ICITISEE.2018.8720977","DOIUrl":"https://doi.org/10.1109/ICITISEE.2018.8720977","url":null,"abstract":"The theory of Multiple Intelligences has been widely applied in exchange of intelligence test approach with the single score (IQ). One of the applications of MI-based learning strategies is to group students based on Multiple Intelligence Research (MIR) scores. In this study, students are grouped based on MIR scores using multilevel clustering techniques. Multiple clustering is applied to meet the needs of the equal number of students and gender. Several models of multilevel clustering using Self-Organizing Map (SOM) and K-Means algorithms are carried out. The evaluation results show that the smallest error is generated by the multilevel SOM. This method can facilitate students grouping based on MIR scores by maintaining the similarity of student features and class heterogeneity. This clustering method is expected to be an efficient way to group students automatically and effectively according to MI-based learning strategies.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of Exponential Smoothing Method Using Genetic Algorithm to Predict E-Report Service 利用遗传算法优化指数平滑法预测电子报表服务
Ahmad Chusyairi, Ramadar N.S. Pelsri, Estu Handayani
Exponential Smoothing methods are proposed in this research to predict the number of loss reports in the E-Report contained on “One-Click Service Police Resort” for Banyuwangi society. The best prediction is obtained based on smallest value of the Mean Absolut Deviation (MAD), the Mean Square Error (MSE), and the Mean Absolute Percentage Error (MAPE) to select an appropriate forecasting model using Single ES (Exponential Smoothing), Double ES, and Triple ES. However, the determination of α, β and γ parameter is still manual. Genetic Algorithm method is used to set the values optimally to overcome these problems. The result from this experience show that the Single ES is determined as the best prediction method as a result of the prediction of loss report on E-Report Police Resort based on the alpha value obtained from the genetic algorithm method.
本研究提出指数平滑法预测半渔旺吉社“一键服务警察度假村”电子报告的挂失数量。利用单ES(指数平滑)、双ES和三重ES,根据平均绝对偏差(MAD)、均方误差(MSE)和平均绝对百分比误差(MAPE)的最小值来选择合适的预测模型,从而获得最佳预测结果。然而,α, β和γ参数的测定仍然是手工的。采用遗传算法对数值进行优化设置,克服了这些问题。实验结果表明,基于遗传算法得到的alpha值对电子报警警区的挂失情况进行预测,确定Single ES为最佳预测方法。
{"title":"Optimization of Exponential Smoothing Method Using Genetic Algorithm to Predict E-Report Service","authors":"Ahmad Chusyairi, Ramadar N.S. Pelsri, Estu Handayani","doi":"10.1109/icitisee.2018.8721008","DOIUrl":"https://doi.org/10.1109/icitisee.2018.8721008","url":null,"abstract":"Exponential Smoothing methods are proposed in this research to predict the number of loss reports in the E-Report contained on “One-Click Service Police Resort” for Banyuwangi society. The best prediction is obtained based on smallest value of the Mean Absolut Deviation (MAD), the Mean Square Error (MSE), and the Mean Absolute Percentage Error (MAPE) to select an appropriate forecasting model using Single ES (Exponential Smoothing), Double ES, and Triple ES. However, the determination of α, β and γ parameter is still manual. Genetic Algorithm method is used to set the values optimally to overcome these problems. The result from this experience show that the Single ES is determined as the best prediction method as a result of the prediction of loss report on E-Report Police Resort based on the alpha value obtained from the genetic algorithm method.","PeriodicalId":180051,"journal":{"name":"2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1