首页 > 最新文献

2021 Sixth International Conference on Informatics and Computing (ICIC)最新文献

英文 中文
Processing Speed Comparison of the Least Significant Bit (LSB) Steganography Algorithm on FPGA and Matlab 基于FPGA和Matlab的LSB隐写算法的处理速度比较
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632978
Bayu Kumoro Yakti, S. Madenda, S. Sudiro, Purnamawan Musa
Digital images are images in digital formats or digital media such as hard drives. Digital images consist of bits (0 or 1) called pixels and have a high capacity for storing data and information. Steganography techniques try to hide the existence of confidential data. The Steganography technique perfectly closes secret messages in carrier images with high level security. Information and data will be manipulated so that it can be detected by human eyes. Least Significant Bit (LSB) is the method used in this study. The embedding and extracting processes in the proposed algorithms are performed using Matlab software and FPGA-based hardware simulation using Xilinx ISE. The purpose of this study is to compare the process speed of the LSB steganography algorithm in the two implementations. The input data on the encryption used is data in binary form and Red Green Blue (RGB) images and output data in stego images. Meanwhile, the input data in the decryption is a stego image and the output data is in the form of binary data. The experimental results showed that the steganography algorithm had been successfully performed on FPGA and Matlab. However, the process on FPGA is faster than the process on Matlab. The result of the encryption process is 696000 times faster than Matlab. Meanwhile, the decryption process is 236000 times faster than Matlab.
数字图像是数字格式或数字媒体(如硬盘驱动器)的图像。数字图像由称为像素的位(0或1)组成,具有存储数据和信息的高容量。隐写技术试图隐藏机密数据的存在。隐写技术完美地封闭了载体图像中的秘密信息,具有很高的安全性。信息和数据将被操纵,使其可以被人眼检测到。本研究采用的是最低有效位(LSB)方法。采用Matlab软件和基于fpga的Xilinx ISE硬件仿真,完成了算法中的嵌入和提取过程。本研究的目的是比较LSB隐写算法在两种实现中的处理速度。所使用的加密的输入数据是二进制形式的数据和红绿蓝(RGB)图像,输出数据是隐写图像。同时,解密时输入数据为隐写图像,输出数据为二进制数据。实验结果表明,该隐写算法已在FPGA和Matlab上成功实现。然而,在FPGA上的处理速度比在Matlab上的处理速度快。加密过程的结果比Matlab快696000倍。同时,其解密速度比Matlab快236000倍。
{"title":"Processing Speed Comparison of the Least Significant Bit (LSB) Steganography Algorithm on FPGA and Matlab","authors":"Bayu Kumoro Yakti, S. Madenda, S. Sudiro, Purnamawan Musa","doi":"10.1109/ICIC54025.2021.9632978","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632978","url":null,"abstract":"Digital images are images in digital formats or digital media such as hard drives. Digital images consist of bits (0 or 1) called pixels and have a high capacity for storing data and information. Steganography techniques try to hide the existence of confidential data. The Steganography technique perfectly closes secret messages in carrier images with high level security. Information and data will be manipulated so that it can be detected by human eyes. Least Significant Bit (LSB) is the method used in this study. The embedding and extracting processes in the proposed algorithms are performed using Matlab software and FPGA-based hardware simulation using Xilinx ISE. The purpose of this study is to compare the process speed of the LSB steganography algorithm in the two implementations. The input data on the encryption used is data in binary form and Red Green Blue (RGB) images and output data in stego images. Meanwhile, the input data in the decryption is a stego image and the output data is in the form of binary data. The experimental results showed that the steganography algorithm had been successfully performed on FPGA and Matlab. However, the process on FPGA is faster than the process on Matlab. The result of the encryption process is 696000 times faster than Matlab. Meanwhile, the decryption process is 236000 times faster than Matlab.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"27 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapting The User-Centered Cognitive Walkthrough (UC-CW) for Assessing the User Experience of Smart Regency Mobile-Apps Service in Indonesia 采用以用户为中心的认知演练(UC-CW)来评估印度尼西亚智能摄制移动应用服务的用户体验
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632930
Aang Kisnu Darmawan, Daniel Oranova Siahaan, Tony Dwi Susanto, Achmad Nizar Hidayanto, A'ang. Subiyakto, Tony Yulianto
Because the number of districts in Indonesia is four times that of cities, regency development requires serious consideration. However, very few studies are still available to explore districts from an ICT utility management perspective. This study aims to evaluate the user experience of a mobile-based smart regency application used in regencies. The method used is the User-Centered Cognitive Walkthrough (UC-CW), an enhanced Cognitive Walkthrough (CW) method. In this user experience evaluation method, the evaluator gives scenario-based tasks and several questions to mobile-app users to find problems that interfere with the learning process. This method is suitable for use on systems that have just been released because it can explore users' cognitive processes when using the system. Respondents in the study were ten users of mobile-based smart regency applications. The results show that many problematic features or functions cannot be used, or the data is still empty. This study contributes to the evaluation recommendations of user experience and provides input for application developers and policymakers to pay more attention to the factors that affect the user experience of smart regency application users in the regions.
由于印度尼西亚的地区数量是城市数量的四倍,因此需要认真考虑摄政发展。然而,从信息通信技术公用事业管理的角度来探讨地区的研究仍然很少。本研究旨在评估在摄政中使用的基于移动的智能摄政应用程序的用户体验。使用的方法是以用户为中心的认知演练(UC-CW),一种增强的认知演练(CW)方法。在这种用户体验评估方法中,评估者给移动应用程序用户提供基于场景的任务和几个问题,以发现干扰学习过程的问题。这种方法适合在刚刚发布的系统上使用,因为它可以探索用户在使用系统时的认知过程。该研究的受访者是10个使用移动智能应急应用程序的用户。结果表明,许多有问题的特征或功能无法使用,或者数据仍然是空的。本研究为用户体验评价提供建议,为应用开发者和政策制定者关注影响区域内智能应急应用用户体验的因素提供参考。
{"title":"Adapting The User-Centered Cognitive Walkthrough (UC-CW) for Assessing the User Experience of Smart Regency Mobile-Apps Service in Indonesia","authors":"Aang Kisnu Darmawan, Daniel Oranova Siahaan, Tony Dwi Susanto, Achmad Nizar Hidayanto, A'ang. Subiyakto, Tony Yulianto","doi":"10.1109/ICIC54025.2021.9632930","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632930","url":null,"abstract":"Because the number of districts in Indonesia is four times that of cities, regency development requires serious consideration. However, very few studies are still available to explore districts from an ICT utility management perspective. This study aims to evaluate the user experience of a mobile-based smart regency application used in regencies. The method used is the User-Centered Cognitive Walkthrough (UC-CW), an enhanced Cognitive Walkthrough (CW) method. In this user experience evaluation method, the evaluator gives scenario-based tasks and several questions to mobile-app users to find problems that interfere with the learning process. This method is suitable for use on systems that have just been released because it can explore users' cognitive processes when using the system. Respondents in the study were ten users of mobile-based smart regency applications. The results show that many problematic features or functions cannot be used, or the data is still empty. This study contributes to the evaluation recommendations of user experience and provides input for application developers and policymakers to pay more attention to the factors that affect the user experience of smart regency application users in the regions.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Internet of Things-based Analysis of Factory Production Machine Damage Detection System Model Using Case-Based Reasoning Method 基于物联网的工厂生产机器损伤检测系统模型的案例推理分析
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632963
Marisa Marisa, Suhadi Suhadi, M. Nur, Prima Dina Atika, Sugiyatno Sugiyatno, Davi Afandi
Computers are very important in industrial processes because they play a role in the life cycle of the product systems that companies manufacture. Damage to production equipment often occurs due to lack of detailed periodic maintenance, making it difficult for operators and technicians to maintain production machines. Because it still uses a manual approach, the repair time is long and accurate at a high cost. Case-Based Reasoning (CBR), a problem solving technique based on previous experience and applied in the present, is one of the computer science disciplines commonly used by humans to help and facilitate work. CBR is used to find solutions by utilizing or analyzing case data collected previously. In this study to solve the problem by using the CBR method. Case representation, case indexing, case retrieval, case adaptation, and case maintenance are the five goals of CBR in knowledge formation. The process of finding and measuring cases with the greatest closeness is known as case retrieval. The purpose of this research is to create a way to automatically detect system failures on machines, so that if a malfunction occurs with a CBR-based system, it will be easier to detect early, repair faster, and be more accurate. The results of the research using the CBR method are that the accuracy of the system used is 90%, in accordance with the results of testing the tools produced, and effective for managing production machine repairs. While the test error is twenty times with the highest result of 33.33% and the lowest 0% according to the level of accuracy of the sensor on the object. The purpose of this research is to provide analysis for companies to detect damage to production machines for operators and management to follow up on existing damage. Recommendations from the research are used to improve production machines for companies that need a comprehensive repair treatment from the existing system to a system that has computer-based reasoning for cost efficiency and economics of repairing machine tools.
计算机在工业过程中非常重要,因为它们在公司制造的产品系统的生命周期中发挥着重要作用。由于缺乏详细的定期维护,经常发生生产设备的损坏,使操作人员和技术人员难以维护生产机器。由于它仍然采用人工方法,维修时间长,精度高,成本高。基于案例的推理(Case-Based Reasoning, CBR)是一种基于以往经验并应用于当前的问题解决技术,是人类常用来帮助和促进工作的计算机科学学科之一。CBR用于通过利用或分析先前收集的案例数据来找到解决方案。本研究采用CBR方法来解决这一问题。案例表示、案例索引、案例检索、案例适应和案例维护是案例推理在知识形成中的五大目标。寻找和测量最接近病例的过程称为病例检索。本研究的目的是创建一种在机器上自动检测系统故障的方法,这样,如果基于cbr的系统发生故障,将更容易早期发现,更快地修复,更准确。利用CBR方法进行的研究结果表明,该系统的精度达到90%,与生产工具的测试结果一致,对生产机器的维修管理有效。根据传感器对目标的精度高低,测试误差为20次,最高误差为33.33%,最低误差为0%。本研究的目的是为公司提供分析,以发现生产机器的损坏,为操作员和管理人员提供跟踪现有的损坏。该研究的建议被用于改进生产机器的公司,这些公司需要从现有系统到一个基于计算机的系统进行全面的维修处理,以提高维修机床的成本效率和经济性。
{"title":"Internet of Things-based Analysis of Factory Production Machine Damage Detection System Model Using Case-Based Reasoning Method","authors":"Marisa Marisa, Suhadi Suhadi, M. Nur, Prima Dina Atika, Sugiyatno Sugiyatno, Davi Afandi","doi":"10.1109/ICIC54025.2021.9632963","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632963","url":null,"abstract":"Computers are very important in industrial processes because they play a role in the life cycle of the product systems that companies manufacture. Damage to production equipment often occurs due to lack of detailed periodic maintenance, making it difficult for operators and technicians to maintain production machines. Because it still uses a manual approach, the repair time is long and accurate at a high cost. Case-Based Reasoning (CBR), a problem solving technique based on previous experience and applied in the present, is one of the computer science disciplines commonly used by humans to help and facilitate work. CBR is used to find solutions by utilizing or analyzing case data collected previously. In this study to solve the problem by using the CBR method. Case representation, case indexing, case retrieval, case adaptation, and case maintenance are the five goals of CBR in knowledge formation. The process of finding and measuring cases with the greatest closeness is known as case retrieval. The purpose of this research is to create a way to automatically detect system failures on machines, so that if a malfunction occurs with a CBR-based system, it will be easier to detect early, repair faster, and be more accurate. The results of the research using the CBR method are that the accuracy of the system used is 90%, in accordance with the results of testing the tools produced, and effective for managing production machine repairs. While the test error is twenty times with the highest result of 33.33% and the lowest 0% according to the level of accuracy of the sensor on the object. The purpose of this research is to provide analysis for companies to detect damage to production machines for operators and management to follow up on existing damage. Recommendations from the research are used to improve production machines for companies that need a comprehensive repair treatment from the existing system to a system that has computer-based reasoning for cost efficiency and economics of repairing machine tools.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Rule from the Philosophy of Science Viewpoint 科学哲学视域下的适应规律
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632962
Erna Hikmawati, K. Surendro
Adaptive rule is a proposed development model of the association rule that answers the weaknesses of previous research and takes an inventory of current needs. In the adaptive rule the minimum support value is determined automatically by the system. In addition, it can generate rules that come from several different databases and rank the rules based on the specified criteria. In order not to become trapped into pseudo-science, this adaptive rule needs to be studied from the philosophy of science. According to the philosophy of science, science must fulfill three aspects, namely ontology, epistemology, and axiology. This paper contains a study conducted on the Adaptive rule starting from determining the side of ontology, epistemology, and axiology in accordance with the theory of the Philosophy of Science. In addition, the position of the adaptive rule on the scientific revolutions proposed by Thomas Kuhn was also analyzed to find out the position and opportunities in the future. If it is related to Thomas Kuhn's scientific revolutions theory, the Adaptive rule is currently in a crisis phase. To ensure that the adaptive rule is not pseudo-science, it is also reviewed the deductive testing phase proposed by Karl Popper. From the discussion and analysis carried out, it can be concluded that adaptive rules are not included in pseudo-science.
自适应规则是一种针对关联规则的发展模型,它弥补了前人研究的不足,并对当前的需求进行了分析。在自适应规则中,最小支持值由系统自动确定。此外,它还可以生成来自多个不同数据库的规则,并根据指定的标准对规则进行排序。为了不陷入伪科学的陷阱,需要从科学哲学的角度来研究这种适应规律。科学哲学认为,科学必须具备三个方面,即本体论、认识论和价值论。本文根据科学哲学的理论,从确定本体论、认识论和价值论的立场出发,对适应规律进行了研究。此外,还分析了Thomas Kuhn提出的适应性规则在科学革命中的地位,以找出未来的地位和机会。如果将其与库恩的科学革命理论联系起来,那么适应性规则目前正处于危机阶段。为了确保适应性规则不是伪科学,本文还回顾了卡尔·波普尔提出的演绎检验阶段。从所进行的讨论和分析中可以得出结论,伪科学不包含自适应规则。
{"title":"Adaptive Rule from the Philosophy of Science Viewpoint","authors":"Erna Hikmawati, K. Surendro","doi":"10.1109/ICIC54025.2021.9632962","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632962","url":null,"abstract":"Adaptive rule is a proposed development model of the association rule that answers the weaknesses of previous research and takes an inventory of current needs. In the adaptive rule the minimum support value is determined automatically by the system. In addition, it can generate rules that come from several different databases and rank the rules based on the specified criteria. In order not to become trapped into pseudo-science, this adaptive rule needs to be studied from the philosophy of science. According to the philosophy of science, science must fulfill three aspects, namely ontology, epistemology, and axiology. This paper contains a study conducted on the Adaptive rule starting from determining the side of ontology, epistemology, and axiology in accordance with the theory of the Philosophy of Science. In addition, the position of the adaptive rule on the scientific revolutions proposed by Thomas Kuhn was also analyzed to find out the position and opportunities in the future. If it is related to Thomas Kuhn's scientific revolutions theory, the Adaptive rule is currently in a crisis phase. To ensure that the adaptive rule is not pseudo-science, it is also reviewed the deductive testing phase proposed by Karl Popper. From the discussion and analysis carried out, it can be concluded that adaptive rules are not included in pseudo-science.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicles Position Tracking in Parking lots Using K-Nearest Neighbor and Fingerprinting Based on RSSI Bluetooth 基于k近邻和RSSI蓝牙指纹的停车场车辆位置跟踪
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632905
A. Suheryadi, W. P. Putra, Muhammad Anis Al Hilmi, Kurnia Adi Cahyanto, Firdaus
Location-based services have become very popular in recent years, among these services are navigation and location determination both indoor and outdoor. Determining an object location is often an interesting topic for study, various studies have been carried to determine the position of the object using several methods using either GPS, CCTV, Wireless or Bluetooth. One of the interesting cases to study is determine vehicle position in the indoor parking lots. It is important to record the parking location because it will make it easier for newcomers to locate their vehicles in the parking area. Various studies have suggested that Bluetooth is a promising wireless technology in indoor positioning system because of its cost-effectiveness and user-friendly features. In this study, We use several methods to record parking positions, including the K-Nearest Neighbor and Fingerprinting techniques based on the RSSI Bluetooth (Received Signal Strength Indicator) with distance calculation parameters using Manhattan Distance. The results of our study, it was found that the accuracy about 77% with Precision, Recall and F1-Score pessimistic approach reaching 87%, 85% and 85%.
基于位置的服务近年来变得非常流行,其中包括室内和室外的导航和位置确定。确定物体的位置通常是一个有趣的研究课题,已经进行了各种研究,以确定物体的位置,使用几种方法,使用GPS, CCTV,无线或蓝牙。其中一个有趣的研究案例是确定室内停车场的车辆位置。记录停车位置很重要,因为这将使新来者更容易在停车区域找到他们的车辆。各种研究表明,蓝牙技术具有成本效益高、使用方便等特点,是一种很有前途的室内定位无线技术。在本研究中,我们使用了几种方法来记录停车位置,包括k近邻和基于RSSI蓝牙(接收信号强度指示器)的指纹技术,并使用曼哈顿距离计算参数。我们的研究结果发现,准确率约为77%,其中Precision, Recall和F1-Score悲观方法分别达到87%,85%和85%。
{"title":"Vehicles Position Tracking in Parking lots Using K-Nearest Neighbor and Fingerprinting Based on RSSI Bluetooth","authors":"A. Suheryadi, W. P. Putra, Muhammad Anis Al Hilmi, Kurnia Adi Cahyanto, Firdaus","doi":"10.1109/ICIC54025.2021.9632905","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632905","url":null,"abstract":"Location-based services have become very popular in recent years, among these services are navigation and location determination both indoor and outdoor. Determining an object location is often an interesting topic for study, various studies have been carried to determine the position of the object using several methods using either GPS, CCTV, Wireless or Bluetooth. One of the interesting cases to study is determine vehicle position in the indoor parking lots. It is important to record the parking location because it will make it easier for newcomers to locate their vehicles in the parking area. Various studies have suggested that Bluetooth is a promising wireless technology in indoor positioning system because of its cost-effectiveness and user-friendly features. In this study, We use several methods to record parking positions, including the K-Nearest Neighbor and Fingerprinting techniques based on the RSSI Bluetooth (Received Signal Strength Indicator) with distance calculation parameters using Manhattan Distance. The results of our study, it was found that the accuracy about 77% with Precision, Recall and F1-Score pessimistic approach reaching 87%, 85% and 85%.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factors Impact E-Learning System in Higher Education in Indonesia 影响印尼高等教育电子学习系统的因素
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632976
Inayatulloh, Enggal Sriwardiningsih, Novingky Ferdinand, Maisyarah Rahmi Hasan, Ni Luh Ariningsih Sari, Y. Desnelita
Preceding research on e-learning quality of service were showed mostly in established countries; nevertheless, slight work has been made in emergent countries. This research observes the relations amongst electronic learning quality, electronic learning teacher, course material excellence and student satisfaction of electronic learning, in Indonesia. Analysis data composed from several higher education students in Indonesia. The research method uses a quantitative approach by distributing questionnaires to several universities in Indonesia through G-form and processing data using SMART PLS. The result show e-learning quality of service has a progressive effect on electronic learning teacher and material, electronic learning service quality has a positive influence on e-learning student satisfaction and electronic learning instructor and material has an optimistic influence on electronic learning student satisfaction.
以往对网络学习服务质量的研究多集中在发达国家;然而,在新兴国家,这方面的工作做得很少。本研究观察印尼的电子学习品质、电子学习师资、教材品质与学生对电子学习的满意度之间的关系。分析数据来自印度尼西亚的几名高等教育学生。研究方法采用定量方法,通过g表格向印度尼西亚的几所大学发放问卷,并使用SMART PLS处理数据。结果表明,电子学习服务质量对电子学习教师和材料具有递进效应。电子学习服务质量对电子学习学生满意度有正向影响,电子学习教师和教材对电子学习学生满意度有正向影响。
{"title":"Factors Impact E-Learning System in Higher Education in Indonesia","authors":"Inayatulloh, Enggal Sriwardiningsih, Novingky Ferdinand, Maisyarah Rahmi Hasan, Ni Luh Ariningsih Sari, Y. Desnelita","doi":"10.1109/ICIC54025.2021.9632976","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632976","url":null,"abstract":"Preceding research on e-learning quality of service were showed mostly in established countries; nevertheless, slight work has been made in emergent countries. This research observes the relations amongst electronic learning quality, electronic learning teacher, course material excellence and student satisfaction of electronic learning, in Indonesia. Analysis data composed from several higher education students in Indonesia. The research method uses a quantitative approach by distributing questionnaires to several universities in Indonesia through G-form and processing data using SMART PLS. The result show e-learning quality of service has a progressive effect on electronic learning teacher and material, electronic learning service quality has a positive influence on e-learning student satisfaction and electronic learning instructor and material has an optimistic influence on electronic learning student satisfaction.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Development Hands-On Vulnerable Web Application as a Software Security Educational Media 设计和开发易受攻击的Web应用程序作为软件安全教育媒体
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632902
Riama Kristallia, Hermawan Setiawan, Siti Manayra Sabiya
Lack of developer knowledge of software security is one of the vulnerability factors in applications, especially the web, so it is necessary to have educational media that can provide an understanding of software security awareness with competencies measurement. In this study, a hands-on vulnerable web application was designed as a media for software security education. The application is developed using a design research methodology with a prototyping development method that produces two parts: the vulnerable and public applications. Both applications were tested using functional testing, security testing, and achievement measurement. Functional and security test results show that the application can run according to the designed functionality and the security case used. The measure of achievement shows that the mean value of the user’s score is 3.86 out of 20, the achievement total being 58 out of 300, with a standard deviation of 3.24. It is influenced by the diversity of basic competencies possessed by the user.
开发人员缺乏软件安全知识是应用程序,特别是web的脆弱性因素之一,因此有必要有教育媒体,可以提供对软件安全意识的理解和能力测量。本研究设计了一个易受攻击的web应用程序,作为软件安全教育的媒介。应用程序的开发采用设计研究方法和原型开发方法,产生两部分:易受攻击的应用程序和公共应用程序。这两个应用程序都使用功能测试、安全性测试和成就度量进行了测试。功能和安全测试结果表明,该应用程序可以按照设计的功能和使用的安全案例运行。成就度量显示,用户得分的平均值为3.86分(满分20分),成就总数为58分(满分300分),标准差为3.24。它受用户所拥有的基本能力的多样性的影响。
{"title":"Design and Development Hands-On Vulnerable Web Application as a Software Security Educational Media","authors":"Riama Kristallia, Hermawan Setiawan, Siti Manayra Sabiya","doi":"10.1109/ICIC54025.2021.9632902","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632902","url":null,"abstract":"Lack of developer knowledge of software security is one of the vulnerability factors in applications, especially the web, so it is necessary to have educational media that can provide an understanding of software security awareness with competencies measurement. In this study, a hands-on vulnerable web application was designed as a media for software security education. The application is developed using a design research methodology with a prototyping development method that produces two parts: the vulnerable and public applications. Both applications were tested using functional testing, security testing, and achievement measurement. Functional and security test results show that the application can run according to the designed functionality and the security case used. The measure of achievement shows that the mean value of the user’s score is 3.86 out of 20, the achievement total being 58 out of 300, with a standard deviation of 3.24. It is influenced by the diversity of basic competencies possessed by the user.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133387163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICIC 2021 Table of Contents icic2021目录
Pub Date : 2021-11-03 DOI: 10.1109/icic54025.2021.9633013
{"title":"ICIC 2021 Table of Contents","authors":"","doi":"10.1109/icic54025.2021.9633013","DOIUrl":"https://doi.org/10.1109/icic54025.2021.9633013","url":null,"abstract":"","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM-based Deep Learning Architecture of Tourist Review in Tripadvisor 基于lstm的Tripadvisor旅游评论深度学习架构
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632967
Afina Ramadhani, E. Sutoyo, Vandha Widartha
Information technology has become an essential component in various fields, one of which is in the world of tourism. This can be seen with the emergence of websites in the tourism sector, such as TripAdvisor. Bali, as a tourist destination that is well known to foreign countries, can use TripAdvisor as a place to promote tourist attractions in Bali, such as beaches. This study will conduct a sentiment analysis of tourist reviews on the five most favorite beaches in Bali, namely Double Six Beach, Seminyak, Nusa Dua, Delinking, and Cangue, on the TripAdvisor Website. The analysis results determine how tourists' opinions of the five beaches are using the Long Short-Term Memory (LSTM) architecture with sentiment classified in the form of positive and negative labels. This study uses a training and testing ratio of 80:20 with the undersampling method because it has the highest overall accuracy with Double Six Beach 83%, Seminyak 81%, Nusa Dua 84%, Kelingking 81%, and Canggu 84%. The prediction results obtained from the classification results are more dominant on the positive label. In addition to classifying for sentiment analysis, this study also measures the model’s performance created by calculating the value of precision, recall, F1-Score, macro average, and weight average for each beach classification result.
信息技术已成为各个领域的重要组成部分,其中之一就是旅游业。这可以从旅游领域网站的出现中看出,比如TripAdvisor。巴厘岛作为一个被国外熟知的旅游目的地,可以使用TripAdvisor作为推广巴厘岛旅游景点的地方,比如海滩。本研究将对巴厘岛最受欢迎的五个海滩的游客评论进行情感分析,即Double Six Beach, Seminyak, Nusa Dua, Delinking和Cangue,在TripAdvisor网站上。分析结果确定游客对五个海滩的看法是如何使用长短期记忆(LSTM)架构,并以积极和消极标签的形式对情绪进行分类。本研究采用欠采样的训练和测试比例为80:20,因为它的整体准确率最高,双六滩83%,水明漾81%,努沙杜瓦84%,柯灵京81%,仓谷84%。从分类结果中得到的预测结果在正标签上更占优势。除了对情感分析进行分类外,本研究还通过计算每个海滩分类结果的精度、召回率、F1-Score、宏观平均值和权重平均值的值来衡量模型的性能。
{"title":"LSTM-based Deep Learning Architecture of Tourist Review in Tripadvisor","authors":"Afina Ramadhani, E. Sutoyo, Vandha Widartha","doi":"10.1109/ICIC54025.2021.9632967","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632967","url":null,"abstract":"Information technology has become an essential component in various fields, one of which is in the world of tourism. This can be seen with the emergence of websites in the tourism sector, such as TripAdvisor. Bali, as a tourist destination that is well known to foreign countries, can use TripAdvisor as a place to promote tourist attractions in Bali, such as beaches. This study will conduct a sentiment analysis of tourist reviews on the five most favorite beaches in Bali, namely Double Six Beach, Seminyak, Nusa Dua, Delinking, and Cangue, on the TripAdvisor Website. The analysis results determine how tourists' opinions of the five beaches are using the Long Short-Term Memory (LSTM) architecture with sentiment classified in the form of positive and negative labels. This study uses a training and testing ratio of 80:20 with the undersampling method because it has the highest overall accuracy with Double Six Beach 83%, Seminyak 81%, Nusa Dua 84%, Kelingking 81%, and Canggu 84%. The prediction results obtained from the classification results are more dominant on the positive label. In addition to classifying for sentiment analysis, this study also measures the model’s performance created by calculating the value of precision, recall, F1-Score, macro average, and weight average for each beach classification result.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Development of Information Sharing and Analysis Center (ISAC) as an Information Sharing Platform 信息共享与分析中心(ISAC)作为信息共享平台的设计与开发
Pub Date : 2021-11-03 DOI: 10.1109/ICIC54025.2021.9632989
Intan Maratus Sholihah, Hermawan Setiawan, Olga Geby Nabila
Cyber attacks are the main focus highlighted in all countries globally, both private and public sectors. It is undeniable that every private and public sector has a significant role in the digital world and cybersecurity. It is a reason for every country to improve and develop everything in cyber technology behind defense or attack. One of the solutions offered is to build a platform that can be used to share information to improve a coordinated and structured cybersecurity defense strategy. Data information, a list of attacks and threats can help stakeholders in each sector identify threats, attacks, and incidents in the cyber world. Therefore, this research will develop a web-based Information Sharing and Analysis Center (ISAC) platform to collect information and view a list of attacks and threats in the cyber world. The list of attacks and threats will be obtained through the Malware Information Sharing Platform (MISP). A two-factor authentication method will be implemented on the login form in the development of the ISAC platform. Two-factor authentication is a method used to secure user data from attackers. The research method used in building this platform is Design Research Methodology (DRM) with a prototyping development method. The results of this study obtained an ISAC portal that can be used to share information and display a list of threats and attacks received from the MISP platform.
网络攻击是全球各国(包括私营部门和公共部门)关注的主要焦点。不可否认的是,每个私营和公共部门都在数字世界和网络安全中发挥着重要作用。这是每个国家在防御或攻击背后改进和发展一切网络技术的理由。提供的解决方案之一是建立一个可用于共享信息的平台,以改进协调和结构化的网络安全防御战略。数据信息、攻击和威胁列表可以帮助每个部门的利益相关者识别网络世界中的威胁、攻击和事件。因此,本研究将开发一个基于web的信息共享和分析中心(ISAC)平台,以收集信息并查看网络世界中的攻击和威胁列表。攻击和威胁列表将通过恶意软件信息共享平台(MISP)获得。在ISAC平台的开发中,将在登录表单上实现双因素认证方法。双因素身份验证是一种用于保护用户数据免受攻击者攻击的方法。构建该平台所采用的研究方法是设计研究方法论(DRM)和原型开发方法。这项研究的结果获得了一个ISAC门户,可用于共享信息并显示从MISP平台收到的威胁和攻击列表。
{"title":"Design and Development of Information Sharing and Analysis Center (ISAC) as an Information Sharing Platform","authors":"Intan Maratus Sholihah, Hermawan Setiawan, Olga Geby Nabila","doi":"10.1109/ICIC54025.2021.9632989","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632989","url":null,"abstract":"Cyber attacks are the main focus highlighted in all countries globally, both private and public sectors. It is undeniable that every private and public sector has a significant role in the digital world and cybersecurity. It is a reason for every country to improve and develop everything in cyber technology behind defense or attack. One of the solutions offered is to build a platform that can be used to share information to improve a coordinated and structured cybersecurity defense strategy. Data information, a list of attacks and threats can help stakeholders in each sector identify threats, attacks, and incidents in the cyber world. Therefore, this research will develop a web-based Information Sharing and Analysis Center (ISAC) platform to collect information and view a list of attacks and threats in the cyber world. The list of attacks and threats will be obtained through the Malware Information Sharing Platform (MISP). A two-factor authentication method will be implemented on the login form in the development of the ISAC platform. Two-factor authentication is a method used to secure user data from attackers. The research method used in building this platform is Design Research Methodology (DRM) with a prototyping development method. The results of this study obtained an ISAC portal that can be used to share information and display a list of threats and attacks received from the MISP platform.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122197675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 Sixth International Conference on Informatics and Computing (ICIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1