首页 > 最新文献

2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)最新文献

英文 中文
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox 基于USB的密码窃取器在b谷歌Chrome和Mozilla Firefox中使用PowerShell实现与分析
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274566
Abdul Azies Muslim, Avon Budiono, A. Almaarif
Along with the development of the Windows operating system, browser applications to surf the internet are also growing rapidly. The most widely used browsers today are Google Chrome and Mozilla Firefox. Both browsers have a username and password management feature that makes users login to a website easily, but saving usernames and passwords in the browser is quite dangerous because the stored data can be hacked using brute force attacks or read through a program. One way to get a username and password in the browser is to use a program that can read Google Chrome and Mozilla Firefox login data from the computer’s internal storage and then show those data. In this study, an attack will be carried out by implementing Rubber Ducky using BadUSB to run the ChromePass and PasswordFox program and the PowerShell script using the Arduino Pro Micro Leonardo device as a USB Password Stealer. The results obtained from this study are the username and password on Google Chrome and Mozilla Firefox successfully obtained when the USB is connected to the target device, the average time of the attack is 14 seconds then sending it to the author’s email.
随着Windows操作系统的发展,用于上网的浏览器应用程序也在迅速增长。目前使用最广泛的浏览器是Google Chrome和Mozilla Firefox。这两款浏览器都有用户名和密码管理功能,使用户可以轻松登录网站,但将用户名和密码保存在浏览器中是相当危险的,因为存储的数据可能被暴力破解或通过程序读取。在浏览器中获取用户名和密码的一种方法是使用一个程序,该程序可以从计算机的内部存储读取谷歌Chrome和Mozilla Firefox登录数据,然后显示这些数据。在本研究中,将通过使用BadUSB实现Rubber Ducky来运行ChromePass和PasswordFox程序以及使用Arduino Pro Micro Leonardo设备作为USB密码窃取器的PowerShell脚本来进行攻击。从这项研究中获得的结果是,当USB连接到目标设备时,成功获得了Google Chrome和Mozilla Firefox上的用户名和密码,攻击的平均时间为14秒,然后将其发送到作者的电子邮件。
{"title":"Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox","authors":"Abdul Azies Muslim, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274566","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274566","url":null,"abstract":"Along with the development of the Windows operating system, browser applications to surf the internet are also growing rapidly. The most widely used browsers today are Google Chrome and Mozilla Firefox. Both browsers have a username and password management feature that makes users login to a website easily, but saving usernames and passwords in the browser is quite dangerous because the stored data can be hacked using brute force attacks or read through a program. One way to get a username and password in the browser is to use a program that can read Google Chrome and Mozilla Firefox login data from the computer’s internal storage and then show those data. In this study, an attack will be carried out by implementing Rubber Ducky using BadUSB to run the ChromePass and PasswordFox program and the PowerShell script using the Arduino Pro Micro Leonardo device as a USB Password Stealer. The results obtained from this study are the username and password on Google Chrome and Mozilla Firefox successfully obtained when the USB is connected to the target device, the average time of the attack is 14 seconds then sending it to the author’s email.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124177835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Information Security Management System: A Case Study of Data Recovery Center in Ministry XYZ 信息安全管理体系评估——以某部数据恢复中心为例
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274574
Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal
The DRC of the Ministry XYZ has suffered from a system breach. The DRC's problem will lead to a lack of system information security, availability, and an increasing threat to the whole system of Ministry XYZ. In 2019, the KAMI Index assessment of the Ministry XYZ stated that the level of maturity and completeness of the application of ISO 27001 standards of the XYZ Ministry were at the level of fulfillment of the basic framework. There is a gap between the assessment result and the operational problem within the DRC of Ministry XYZ due to the lack of an information security management system. Therefore, this study conducts the same KAMI Index assessment within the scope of the DRC only and aims to offer a recommendation based on ISO 27001 as the basis of the KAMI Index assessment. This study used discussion, observation, and KAMI Index assessment tools for collecting data and analyze the result. The assessment result of the DRC showed that the maturity level of the ISO 27001 standard on the DRC is on the application of the basic framework. The suggested recommendations to improve the information security management system of the DRC were mostly in the aspect of the information security framework and assets management.
XYZ部的DRC遭受了系统入侵。DRC的问题将导致系统信息安全性和可用性的缺乏,并对部XYZ的整个系统造成越来越大的威胁。2019年,XYZ部的KAMI指数评估表明,XYZ部ISO 27001标准应用的成熟度和完整性处于基本框架的实现水平。由于缺乏信息安全管理系统,评估结果与XYZ部DRC内部的操作问题之间存在差距。因此,本研究仅在DRC范围内进行相同的KAMI指数评估,旨在提供基于ISO 27001的建议,作为KAMI指数评估的基础。本研究采用讨论法、观察法和KAMI指数评估工具收集数据并分析结果。刚果民主共和国的评估结果表明,ISO 27001标准对刚果民主共和国的成熟度水平是在基本框架的应用上。建议改善刚果民主共和国信息安全管理制度的建议主要集中在信息安全框架和资产管理方面。
{"title":"Assessment of Information Security Management System: A Case Study of Data Recovery Center in Ministry XYZ","authors":"Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal","doi":"10.1109/IC2IE50715.2020.9274574","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274574","url":null,"abstract":"The DRC of the Ministry XYZ has suffered from a system breach. The DRC's problem will lead to a lack of system information security, availability, and an increasing threat to the whole system of Ministry XYZ. In 2019, the KAMI Index assessment of the Ministry XYZ stated that the level of maturity and completeness of the application of ISO 27001 standards of the XYZ Ministry were at the level of fulfillment of the basic framework. There is a gap between the assessment result and the operational problem within the DRC of Ministry XYZ due to the lack of an information security management system. Therefore, this study conducts the same KAMI Index assessment within the scope of the DRC only and aims to offer a recommendation based on ISO 27001 as the basis of the KAMI Index assessment. This study used discussion, observation, and KAMI Index assessment tools for collecting data and analyze the result. The assessment result of the DRC showed that the maturity level of the ISO 27001 standard on the DRC is on the application of the basic framework. The suggested recommendations to improve the information security management system of the DRC were mostly in the aspect of the information security framework and assets management.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"115 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accidental Prone Area Detection in Bangladesh using Machine Learning Model 使用机器学习模型检测孟加拉国的意外易发区域
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274581
Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das
Nowadays road accident in Bangladesh is a buzzword due to its lack of carefulness of the driver of the vehicle where some parameter exists. The traffic safety of the roadway is an essential concern not only for transportation governing agencies but also for citizens of our country. For safe driving suggestions, the important thing is to find the variables that are tensed to relate to the fatal accidents that are occurring often. In this paper, we create a model using a machine learning approach on the countrywide traffic accident dataset of Bangladesh as an aim to address this problem. The model also helps out to find the diversity of the data by grouping similar objects together to find the accident-prone areas in the country concerning different accident factors as well as detects the cooperation between these factors and causalities.
如今,孟加拉国的交通事故是一个流行语,因为它缺乏司机的细心,其中一些参数存在。道路交通安全不仅是交通管理部门关心的问题,也是我国公民关心的问题。对于安全驾驶的建议,重要的是找到与经常发生的致命事故有关的变量。在本文中,我们使用机器学习方法在孟加拉国的全国交通事故数据集上创建了一个模型,以解决这个问题。该模型还通过将相似的对象分组在一起,找到全国不同事故因素下的事故易发区域,并检测这些因素与伤亡之间的合作关系,从而发现数据的多样性。
{"title":"Accidental Prone Area Detection in Bangladesh using Machine Learning Model","authors":"Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das","doi":"10.1109/IC2IE50715.2020.9274581","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274581","url":null,"abstract":"Nowadays road accident in Bangladesh is a buzzword due to its lack of carefulness of the driver of the vehicle where some parameter exists. The traffic safety of the roadway is an essential concern not only for transportation governing agencies but also for citizens of our country. For safe driving suggestions, the important thing is to find the variables that are tensed to relate to the fatal accidents that are occurring often. In this paper, we create a model using a machine learning approach on the countrywide traffic accident dataset of Bangladesh as an aim to address this problem. The model also helps out to find the diversity of the data by grouping similar objects together to find the accident-prone areas in the country concerning different accident factors as well as detects the cooperation between these factors and causalities.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Time-Series Outliers Detection Algorithm with Clustering Approach on Non-Linear Trends 非线性趋势聚类方法的时间序列异常点检测算法
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274644
H. Widiputra, Adele Mailangkay, Elliana Gautama
It has been found that the existence of outliers, particularly in time-series data, can be significantly influenced the modelling and analysis results that are conducted on the data, which is further may lead to improper decision making. Nevertheless, the task of time-series outlier detection can be quite challenging when dealing with collection of data that retain non-linear trends over time as the progression of series may shifted and would be infer as possible outliers. In this study, an algorithm for time-series outlier detection that makes use of a clustering approach on time-series data to construct a set of localized trend models that is capable to identify anomalous data in a collection of non-linear trends is proposed. Decisively, results from conducted experiments confirm that the procedure performs prompt, incremental valuation of information as soon as it becomes accessible, able to handle significant amount of data, and does not need any pre-classification of anomalies. Furthermore, trials with real-world data from insurance field confirm that the proposed method is able to correctly identify abnormal data and can be of help to increase decision making process.
研究发现,异常值的存在,特别是在时间序列数据中,会显著影响对数据进行建模和分析的结果,进而可能导致决策不当。然而,当处理随着时间的推移保持非线性趋势的数据集时,时间序列异常值检测的任务可能相当具有挑战性,因为序列的进展可能会发生变化,并可能被推断为可能的异常值。在本研究中,提出了一种时间序列离群值检测算法,该算法利用时间序列数据的聚类方法构建一组局部趋势模型,该模型能够识别非线性趋势集合中的异常数据。可以肯定的是,实验结果证实,该程序可以在信息可访问时立即执行增量评估,能够处理大量数据,并且不需要对异常进行任何预分类。此外,通过保险领域的实际数据试验,证实了该方法能够正确识别异常数据,有助于提高决策过程。
{"title":"Time-Series Outliers Detection Algorithm with Clustering Approach on Non-Linear Trends","authors":"H. Widiputra, Adele Mailangkay, Elliana Gautama","doi":"10.1109/IC2IE50715.2020.9274644","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274644","url":null,"abstract":"It has been found that the existence of outliers, particularly in time-series data, can be significantly influenced the modelling and analysis results that are conducted on the data, which is further may lead to improper decision making. Nevertheless, the task of time-series outlier detection can be quite challenging when dealing with collection of data that retain non-linear trends over time as the progression of series may shifted and would be infer as possible outliers. In this study, an algorithm for time-series outlier detection that makes use of a clustering approach on time-series data to construct a set of localized trend models that is capable to identify anomalous data in a collection of non-linear trends is proposed. Decisively, results from conducted experiments confirm that the procedure performs prompt, incremental valuation of information as soon as it becomes accessible, able to handle significant amount of data, and does not need any pre-classification of anomalies. Furthermore, trials with real-world data from insurance field confirm that the proposed method is able to correctly identify abnormal data and can be of help to increase decision making process.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IC2IE 2020 TOC
Pub Date : 2020-09-15 DOI: 10.1109/ic2ie50715.2020.9274611
{"title":"IC2IE 2020 TOC","authors":"","doi":"10.1109/ic2ie50715.2020.9274611","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274611","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114478850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban Area Change Detection with Combining CNN and RNN from Sentinel-2 Multispectral Remote Sensing Data 基于CNN和RNN的Sentinel-2多光谱遥感城市面积变化检测
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274617
Uus Khusni, H. I. Dewangkoro, A. M. Arymurthy
Change detection is one of the hot issues related to world observation and has been extensively studied in recent decades. The application of remote sensing technology provides inputs to systems for urban change detection primarily focus on the urban data user environment. Urban change detection refers to the general problem of monitoring the urban system and discerning changes that are occurring within that system that use to urban planners, managers, and researchers. Current methods based on a simple mechanism for independently encoding bi-temporal images to get their representation vectors. In fact, these methods do not make full use of the rich information between bi-temporal images. We propose to combine deep learning methods such as Convolutional Neural Network (U-Net) for feature extraction and Recurrent Neural Network (BiLSTM) temporal modeling. Our developed model while the validation phase gets 97.418% overall accuracy on the Onera Satellite Change Detection (OSCD) Sentinel-2 bi-temporal dataset.
变化检测是世界观测领域的热点问题之一,近几十年来得到了广泛的研究。遥感技术的应用为城市变化检测系统提供了输入,主要侧重于城市数据用户环境。城市变化检测是指监测城市系统和识别系统内发生的变化的一般问题,这些变化适用于城市规划者、管理者和研究人员。目前的方法是基于一种简单的机制,对双时相图像进行独立编码以获得它们的表示向量。事实上,这些方法并没有充分利用双时相图像之间丰富的信息。我们建议结合深度学习方法,如卷积神经网络(U-Net)的特征提取和递归神经网络(BiLSTM)的时间建模。在Onera卫星变化检测(OSCD) Sentinel-2双时态数据集上,我们开发的模型在验证阶段的总体精度为97.418%。
{"title":"Urban Area Change Detection with Combining CNN and RNN from Sentinel-2 Multispectral Remote Sensing Data","authors":"Uus Khusni, H. I. Dewangkoro, A. M. Arymurthy","doi":"10.1109/IC2IE50715.2020.9274617","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274617","url":null,"abstract":"Change detection is one of the hot issues related to world observation and has been extensively studied in recent decades. The application of remote sensing technology provides inputs to systems for urban change detection primarily focus on the urban data user environment. Urban change detection refers to the general problem of monitoring the urban system and discerning changes that are occurring within that system that use to urban planners, managers, and researchers. Current methods based on a simple mechanism for independently encoding bi-temporal images to get their representation vectors. In fact, these methods do not make full use of the rich information between bi-temporal images. We propose to combine deep learning methods such as Convolutional Neural Network (U-Net) for feature extraction and Recurrent Neural Network (BiLSTM) temporal modeling. Our developed model while the validation phase gets 97.418% overall accuracy on the Onera Satellite Change Detection (OSCD) Sentinel-2 bi-temporal dataset.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Speech Emotion Identification Using Linear Predictive Coding and Recurrent Neural 基于线性预测编码和递归神经网络的语音情绪识别
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274629
Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
Social, affective communication in recent years shows significant developments, especially in the verbal understanding of emotions. Human connection naturally adjusts to their responses based on the actions of their interlocutor in a particular matter. Previous research has shown that the use of neural network architecture can identify emotions based on speech, but the results of accuracy are not good due to the imbalance of data and problems with the design of the classification system. This study uses Linear Predictive Coding (LPC). LPC can represent the pronunciation of one’s dialogue. From 16 coefficient LPC is used as a vector feature as input for voice emotion identification using Recurrent Neural Network (RNN). Long Short Term Memory (LSTM) or Gated Recurrent Unit (GRU) architecture is used to overcome vanishing or exploding gradient. At the identification stage, that uses forward propagation with a softmax activation function. We have conducted a simulation using RNN as a method for making emotional identification. The results of this study RNNGRU using Adam optimization model with a learning rate of 0.001 get an accuracy of 90.93% and a losses value of 0.216. In comparison, the RNN-LSTM got an accuracy of 87.50% and losses value of 0.262. The experimental results show that the best model is achieved when using the RNN-GRU with the Adam optimization method. The F-Measure value obtained is 0.91.
社会情感交流近年来有了显著的发展,尤其是在情感的言语理解方面。人际关系自然会根据对话者在特定问题上的行为来调整他们的反应。以往的研究表明,利用神经网络架构可以基于语音识别情绪,但由于数据的不平衡和分类系统设计的问题,准确率的结果并不理想。本研究采用线性预测编码(LPC)。LPC可以代表对话的发音。从16个系数中,将LPC作为向量特征作为输入,使用递归神经网络(RNN)进行语音情绪识别。采用长短期记忆(LSTM)或门控循环单元(GRU)结构克服梯度消失或爆炸。在识别阶段,使用前向传播和softmax激活函数。我们已经进行了一个模拟,使用RNN作为进行情感识别的方法。本研究结果RNNGRU采用Adam优化模型,学习率为0.001,准确率为90.93%,损失值为0.216。相比之下,RNN-LSTM的准确率为87.50%,损失值为0.262。实验结果表明,基于Adam优化方法的RNN-GRU模型得到了最佳模型。得到的F-Measure值为0.91。
{"title":"Speech Emotion Identification Using Linear Predictive Coding and Recurrent Neural","authors":"Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.1109/IC2IE50715.2020.9274629","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274629","url":null,"abstract":"Social, affective communication in recent years shows significant developments, especially in the verbal understanding of emotions. Human connection naturally adjusts to their responses based on the actions of their interlocutor in a particular matter. Previous research has shown that the use of neural network architecture can identify emotions based on speech, but the results of accuracy are not good due to the imbalance of data and problems with the design of the classification system. This study uses Linear Predictive Coding (LPC). LPC can represent the pronunciation of one’s dialogue. From 16 coefficient LPC is used as a vector feature as input for voice emotion identification using Recurrent Neural Network (RNN). Long Short Term Memory (LSTM) or Gated Recurrent Unit (GRU) architecture is used to overcome vanishing or exploding gradient. At the identification stage, that uses forward propagation with a softmax activation function. We have conducted a simulation using RNN as a method for making emotional identification. The results of this study RNNGRU using Adam optimization model with a learning rate of 0.001 get an accuracy of 90.93% and a losses value of 0.216. In comparison, the RNN-LSTM got an accuracy of 87.50% and losses value of 0.262. The experimental results show that the best model is achieved when using the RNN-GRU with the Adam optimization method. The F-Measure value obtained is 0.91.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Design of Internet of Things LoRa to Determine Radio Refractivity in Real-Time 物联网LoRa实时确定无线电折射率的创新设计
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274626
Kevin Fitzgerald Senewe, M. Suryanegara
This paper aims to propose an Internet of Things (IoT)LoRa based system that determines radio refractivity in real-time. Our system consists of temperature and humidity sensor, LoRa gateway, LoRa shield, and Arduino UNO. ThingSpeak IoT platform is used to aggregate, visualize, and analyze live data streams using a numerical computing platform in the cloud. Real-time radio refractivity measurements will help network engineers when designing communication systems because the data obtained by this system are data specifically for that location, not the overall area. We have conducted the testing of our system for two days in the city of Sawangan, Indonesia and it succeded in obtaining real-time refractivity data.
本文旨在提出一种基于物联网(IoT)LoRa的实时确定无线电折射率的系统。我们的系统由温湿度传感器、LoRa网关、LoRa屏蔽和Arduino UNO组成。ThingSpeak物联网平台使用云中的数值计算平台来聚合、可视化和分析实时数据流。实时无线电折射测量将有助于网络工程师设计通信系统,因为该系统获得的数据是特定位置的数据,而不是整个区域的数据。我们已经在印度尼西亚的Sawangan市对我们的系统进行了两天的测试,成功地获得了实时折射数据。
{"title":"Innovative Design of Internet of Things LoRa to Determine Radio Refractivity in Real-Time","authors":"Kevin Fitzgerald Senewe, M. Suryanegara","doi":"10.1109/IC2IE50715.2020.9274626","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274626","url":null,"abstract":"This paper aims to propose an Internet of Things (IoT)LoRa based system that determines radio refractivity in real-time. Our system consists of temperature and humidity sensor, LoRa gateway, LoRa shield, and Arduino UNO. ThingSpeak IoT platform is used to aggregate, visualize, and analyze live data streams using a numerical computing platform in the cloud. Real-time radio refractivity measurements will help network engineers when designing communication systems because the data obtained by this system are data specifically for that location, not the overall area. We have conducted the testing of our system for two days in the city of Sawangan, Indonesia and it succeded in obtaining real-time refractivity data.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126505737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Augmented Reality For The Depth Of An Object Using The Model-Based Occlusion Method 使用基于模型的遮挡方法实现对象深度的交互式增强现实
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274565
Tonny Hidayat, Ika Asti Astuti
The general concept in marker-based Augmented Reality is to add virtual objects in the real world using markers as object tracking. In its development AR devices can detect 3D real objects as object tracking (3D Object Tracking) so as to allow interaction between virtual objects and real objects. However, the application of AR for general devices such as Android smartphones that do not have depth sensors, virtual objects are added without having depth information from the real world so that virtual content is always displayed in front of or on top of real objects and causes Occlusion problems. Occlusion refers to the problem when real objects that are closer to the user are covered by more distant virtual objects. This research formulates the handling of the Occlusion problem using the Model-Based Occlusion method in which the geometry information of the model from real objects must be known and registered in advance to the system. To maintain the suitability of the model’s geometry information with its real object, Tracking is needed. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application.
基于标记的增强现实的一般概念是使用标记作为对象跟踪在现实世界中添加虚拟对象。在其发展过程中,AR设备可以检测三维真实物体进行物体跟踪(3D object tracking),从而实现虚拟物体与真实物体的交互。然而,AR应用于一般设备,如Android智能手机,没有深度传感器,虚拟物体被添加,没有来自现实世界的深度信息,虚拟内容总是显示在真实物体的前面或上面,造成遮挡问题。遮挡是指距离用户较近的真实物体被较远的虚拟物体覆盖的问题。本研究提出了基于模型的遮挡(model - based Occlusion)方法处理遮挡问题,该方法必须事先知道来自真实物体的模型几何信息并将其注册到系统中。为了保持模型的几何信息与其真实对象的适用性,需要进行跟踪。在这种情况下,使用3D对象跟踪,利用已经在基于模型的遮挡中注册的真实对象。研究结果表明,在增强现实应用中出现的虚拟物体能够占据正确的位置。在这种情况下,使用3D对象跟踪,利用已经在基于模型的遮挡中注册的真实对象。研究结果表明,在增强现实应用中出现的虚拟物体能够占据正确的位置。在这种情况下,使用3D对象跟踪,利用已经在基于模型的遮挡中注册的真实对象。研究结果表明,在增强现实应用中出现的虚拟物体能够占据正确的位置。
{"title":"Interactive Augmented Reality For The Depth Of An Object Using The Model-Based Occlusion Method","authors":"Tonny Hidayat, Ika Asti Astuti","doi":"10.1109/IC2IE50715.2020.9274565","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274565","url":null,"abstract":"The general concept in marker-based Augmented Reality is to add virtual objects in the real world using markers as object tracking. In its development AR devices can detect 3D real objects as object tracking (3D Object Tracking) so as to allow interaction between virtual objects and real objects. However, the application of AR for general devices such as Android smartphones that do not have depth sensors, virtual objects are added without having depth information from the real world so that virtual content is always displayed in front of or on top of real objects and causes Occlusion problems. Occlusion refers to the problem when real objects that are closer to the user are covered by more distant virtual objects. This research formulates the handling of the Occlusion problem using the Model-Based Occlusion method in which the geometry information of the model from real objects must be known and registered in advance to the system. To maintain the suitability of the model’s geometry information with its real object, Tracking is needed. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IC2IE 2020 List Reviewer Page IC2IE 2020列表审查页面
Pub Date : 2020-09-15 DOI: 10.1109/ic2ie50715.2020.9274584
{"title":"IC2IE 2020 List Reviewer Page","authors":"","doi":"10.1109/ic2ie50715.2020.9274584","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274584","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127674190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1