首页 > 最新文献

2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)最新文献

英文 中文
Mobile-based Network Monitoring System Using Zabbix and Telegram 基于Zabbix和Telegram的移动网络监控系统
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274582
Anggi Mardiyono, W. Sholihah, F. Hakim
Network monitoring system is a system that works to observe and monitor the situation on a running computer network. Network monitoring is very important to keep the network running well and to know the current condition of the network. Generally, network monitoring requires the administrator to stay and to keep an eye in front of the monitor screen to find out any problems that occur. The administrator or the operator also need network notification problem in real time. This makes the network supervision process very dependent on time and place. This research develops a system for helping administrator or network operator to monitor the network using mobile phone at any time and any place. This monitoring process in this paper using Zabbix. In monitoring the computer network is also needed a notification. The notification of the problem in the network will be sent using Telegram Messenger. This research was conducted in Indonesian Internet Service Provider Association (APJII). The method used in this research is Network Development Life Cycle (NDLC).
网络监控系统是对运行中的计算机网络进行观察和监控的系统。网络监控对于保证网络的正常运行和了解网络的现状是非常重要的。通常,网络监控需要管理员呆在监视器屏幕前,以便发现发生的任何问题。管理员或运营商也需要实时的网络通知问题。这使得网络监管过程非常依赖于时间和地点。本研究开发了一种可以帮助管理员或网络运营商随时随地使用手机进行网络监控的系统。本文采用Zabbix进行监控过程。在监控计算机网络时还需要通知。网络中的问题通知将使用Telegram Messenger发送。这项研究是在印度尼西亚互联网服务提供商协会(APJII)进行的。本研究使用的方法是网络开发生命周期(NDLC)。
{"title":"Mobile-based Network Monitoring System Using Zabbix and Telegram","authors":"Anggi Mardiyono, W. Sholihah, F. Hakim","doi":"10.1109/IC2IE50715.2020.9274582","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274582","url":null,"abstract":"Network monitoring system is a system that works to observe and monitor the situation on a running computer network. Network monitoring is very important to keep the network running well and to know the current condition of the network. Generally, network monitoring requires the administrator to stay and to keep an eye in front of the monitor screen to find out any problems that occur. The administrator or the operator also need network notification problem in real time. This makes the network supervision process very dependent on time and place. This research develops a system for helping administrator or network operator to monitor the network using mobile phone at any time and any place. This monitoring process in this paper using Zabbix. In monitoring the computer network is also needed a notification. The notification of the problem in the network will be sent using Telegram Messenger. This research was conducted in Indonesian Internet Service Provider Association (APJII). The method used in this research is Network Development Life Cycle (NDLC).","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Brain-Computer Interface of Motor Imagery Using ICA and Recurrent Neural Networks 基于ICA和递归神经网络的运动图像脑机接口
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274681
Anita Safitri, E. C. Djamal, Fikri Nugraha
Brain-Computer Interface (BCI) is a device that can connect brain commands without the need for movement, gesture, or voice. Usually, BCI uses the Electroencephalogram (EEG) signal as an intermediate device. EEG signals need to be extracted into waves that represent the action in mind. In this study used Wavelet transformation to obtain the imagery motor component from the EEG signal. However, the problem also arises in the considerable channel redundancy in EEG signal recording. Therefore, it requires a signal reduction process. This paper proposed the problem using Independent Component Analysis (ICA). Then ICA components are features of Recurrent Neural Networks (RNN) to classify BCI information into four classes. The experimental results showed that using ICA improved accuracy by up to 99.06%, compared to Wavelet and RNN only, which is only 94.06%. We examined three optimization models, particularly Adam, AdaDelta, and AdaGrad. However, two optimization models provided the best recognition capabilities, i.e., AdaDelta, and AdaGrad.
脑机接口(BCI)是一种无需动作、手势或声音就能连接大脑指令的设备。脑机接口通常使用脑电图(EEG)信号作为中间设备。脑电图信号需要被提取成代表大脑动作的波。本研究采用小波变换从脑电信号中提取图像运动分量。然而,在脑电信号的记录中也存在着大量的信道冗余的问题。因此,需要进行信号降阶处理。本文利用独立分量分析(ICA)提出了该问题。然后将ICA分量作为递归神经网络(RNN)的特征,将脑机接口信息分为四类。实验结果表明,与仅使用小波和RNN的准确率仅为94.06%相比,使用ICA的准确率提高了99.06%。我们研究了三种优化模型,特别是Adam、AdaDelta和AdaGrad。然而,两种优化模型提供了最好的识别能力,即AdaDelta和AdaGrad。
{"title":"Brain-Computer Interface of Motor Imagery Using ICA and Recurrent Neural Networks","authors":"Anita Safitri, E. C. Djamal, Fikri Nugraha","doi":"10.1109/IC2IE50715.2020.9274681","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274681","url":null,"abstract":"Brain-Computer Interface (BCI) is a device that can connect brain commands without the need for movement, gesture, or voice. Usually, BCI uses the Electroencephalogram (EEG) signal as an intermediate device. EEG signals need to be extracted into waves that represent the action in mind. In this study used Wavelet transformation to obtain the imagery motor component from the EEG signal. However, the problem also arises in the considerable channel redundancy in EEG signal recording. Therefore, it requires a signal reduction process. This paper proposed the problem using Independent Component Analysis (ICA). Then ICA components are features of Recurrent Neural Networks (RNN) to classify BCI information into four classes. The experimental results showed that using ICA improved accuracy by up to 99.06%, compared to Wavelet and RNN only, which is only 94.06%. We examined three optimization models, particularly Adam, AdaDelta, and AdaGrad. However, two optimization models provided the best recognition capabilities, i.e., AdaDelta, and AdaGrad.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Importance Ranking for Increasing Performance of Intrusion Detection System 特征重要性排序提高入侵检测系统性能
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274570
Achmad Akbar Megantara, T. Ahmad
The performance of the Intrusion Detection System (IDS) depends on the quality of the model generated in the training process. An appropriate process positively affects not only the performance but also computational time for detecting intrusions. Reliable training data can be obtained by preprocessing the dataset, which can be feature extraction, reduction, and transformation. Generally, feature selection has become the main problem. In this research, we work on that issue by developing a new method based on Feature Importance Ranking Classification. We propose to reduce the size of the dimension by combining Feature Importance Ranking to calculate the importance of each feature and Recursive Features Elimination (RFE). The results of the experiment show that the proposed method raises the performance over the existing methods. It can be proven by evaluating some metrics: accuracy, sensitivity, specificity, and false alarm rate.
入侵检测系统(IDS)的性能取决于训练过程中生成的模型的质量。适当的处理过程不仅对检测性能有积极的影响,而且对检测入侵的计算时间也有积极的影响。通过对数据集进行预处理,可以得到可靠的训练数据,包括特征提取、约简和变换。一般来说,特征选择已成为主要问题。在本研究中,我们通过开发一种基于特征重要性排序分类的新方法来解决这个问题。我们提出结合特征重要性排序来计算每个特征的重要性和递归特征消除(RFE)来减少维度的大小。实验结果表明,与现有的方法相比,该方法的性能得到了提高。它可以通过评估一些指标来证明:准确性、灵敏度、特异性和误报率。
{"title":"Feature Importance Ranking for Increasing Performance of Intrusion Detection System","authors":"Achmad Akbar Megantara, T. Ahmad","doi":"10.1109/IC2IE50715.2020.9274570","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274570","url":null,"abstract":"The performance of the Intrusion Detection System (IDS) depends on the quality of the model generated in the training process. An appropriate process positively affects not only the performance but also computational time for detecting intrusions. Reliable training data can be obtained by preprocessing the dataset, which can be feature extraction, reduction, and transformation. Generally, feature selection has become the main problem. In this research, we work on that issue by developing a new method based on Feature Importance Ranking Classification. We propose to reduce the size of the dimension by combining Feature Importance Ranking to calculate the importance of each feature and Recursive Features Elimination (RFE). The results of the experiment show that the proposed method raises the performance over the existing methods. It can be proven by evaluating some metrics: accuracy, sensitivity, specificity, and false alarm rate.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System 基于USB设备的Windows操作系统键盘注入攻击的实现与分析
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274631
Annisa Dwiayu Ramadhanty, Avon Budiono, A. Almaarif
Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) is one of the mechanisms used by many people with practical plug and play functions. USB has long been used as a vector of attacks on computers. One method of attack is Keylogger. The Keylogger can take advantage of existing vulnerabilities in the Windows 10 operating system attacks carried out in the form of recording computer keystroke activity without the victim knowing. In this research, an attack will be carried out by running a Powershell Script using BadUSB to be able to activate the Keylogger program. The script is embedded in the Arduino Pro Micro device. The results obtained in the Keyboard Injection Attack research using Arduino Pro Micro were successfully carried out with an average time needed to run the keylogger is 7.474 seconds with a computer connected to the internet. The results of the keylogger will be sent to the attacker via email.
Windows是当今最流行的操作系统之一,而通用串行总线(USB)是许多人使用的具有实际即插即用功能的机制之一。长期以来,USB一直被用作攻击计算机的载体。一种攻击方法是键盘记录器。Keylogger可以利用Windows 10操作系统中现有的漏洞,在受害者不知情的情况下以记录计算机击键活动的形式进行攻击。在本研究中,攻击将通过使用BadUSB运行Powershell脚本来激活Keylogger程序。该脚本嵌入在Arduino Pro Micro设备中。在使用Arduino Pro Micro的键盘注入攻击研究中获得的结果成功进行,在连接到互联网的计算机上运行键盘记录程序的平均时间为7.474秒。键盘记录器的结果将通过电子邮件发送给攻击者。
{"title":"Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System","authors":"Annisa Dwiayu Ramadhanty, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274631","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274631","url":null,"abstract":"Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) is one of the mechanisms used by many people with practical plug and play functions. USB has long been used as a vector of attacks on computers. One method of attack is Keylogger. The Keylogger can take advantage of existing vulnerabilities in the Windows 10 operating system attacks carried out in the form of recording computer keystroke activity without the victim knowing. In this research, an attack will be carried out by running a Powershell Script using BadUSB to be able to activate the Keylogger program. The script is embedded in the Arduino Pro Micro device. The results obtained in the Keyboard Injection Attack research using Arduino Pro Micro were successfully carried out with an average time needed to run the keylogger is 7.474 seconds with a computer connected to the internet. The results of the keylogger will be sent to the attacker via email.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Multi-class Classification of Indonesian Traditional Food using Convolutional Neural Networks 基于卷积神经网络的印尼传统食品自动多类分类
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274636
Devvi Sarwinda, Terry Argyadiva, Saragih Leonardo B. S., Mahesa Oktareza, P. Handi Bagus, Feraldi Fauzan, Billy Erickson
The culinary industry in Indonesia is growing fast in this era of globalization. With the increasing trend in fast food and other foreign culinary, Indonesia is threatening its local culinary existential. A lack of database about local culinary causing a lack of information in its people. Therefore, there is a need for a system model that can identify a local culinary. Hence, it can provide easy access to information to Indonesian and provide a database. This database can also help the government to promote Indonesian food and a chance to keep their existence. This research proposes to make a model that can identify Indonesian food with deep learning techniques. Convolutional Neural Network is chosen as a deep learning technique to recognize ten types of Indonesian food, namely kue rangi, kue putu, bika ambon, ayam taliwang, putu mayang, kerak telor, kue ape, papeda, gudeg, and sate bandeng. We used ResNet50 architecture to classify multi-class labeling. Datasets will consist of 200 images and will be duplicated into three models of separating datasets. In the first model, the dataset has a composition of 75% training dataset and a 25% testing dataset. Similarly, the second model, the dataset has 80:20 of composition, and the third model has 85:15 of composition for training and testing dataset. The experimental results show the third model has the best accuracy of 100%, with 30/30 images predicted correctly.
在这个全球化的时代,印尼的烹饪产业发展迅速。随着快餐和其他外国烹饪的增长趋势,印度尼西亚正在威胁其本土烹饪的生存。缺乏关于当地烹饪的数据库导致缺乏关于其人民的信息。因此,需要一个能够识别当地烹饪的系统模型。因此,它可以方便地向印尼语提供信息,并提供一个数据库。这个数据库还可以帮助政府推广印尼食品,并有机会保持它们的存在。本研究提出用深度学习技术制作一个可以识别印尼食物的模型。选择卷积神经网络作为深度学习技术来识别十种印度尼西亚食物,分别是kue rangi, kue putu, bika ambon, ayam taliwang, putu mayang, kerak telor, kue ape, papeda, gudeg和secure bandeng。我们使用ResNet50架构对多类标注进行分类。数据集将由200张图像组成,并将复制到三个分离数据集的模型中。在第一个模型中,数据集由75%的训练数据集和25%的测试数据集组成。同样,第二个模型的数据集的组成比为80:20,第三个模型的训练和测试数据集的组成比为85:15。实验结果表明,第三种模型的准确率最高,达到100%,其中30/30的图像预测正确。
{"title":"Automatic Multi-class Classification of Indonesian Traditional Food using Convolutional Neural Networks","authors":"Devvi Sarwinda, Terry Argyadiva, Saragih Leonardo B. S., Mahesa Oktareza, P. Handi Bagus, Feraldi Fauzan, Billy Erickson","doi":"10.1109/IC2IE50715.2020.9274636","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274636","url":null,"abstract":"The culinary industry in Indonesia is growing fast in this era of globalization. With the increasing trend in fast food and other foreign culinary, Indonesia is threatening its local culinary existential. A lack of database about local culinary causing a lack of information in its people. Therefore, there is a need for a system model that can identify a local culinary. Hence, it can provide easy access to information to Indonesian and provide a database. This database can also help the government to promote Indonesian food and a chance to keep their existence. This research proposes to make a model that can identify Indonesian food with deep learning techniques. Convolutional Neural Network is chosen as a deep learning technique to recognize ten types of Indonesian food, namely kue rangi, kue putu, bika ambon, ayam taliwang, putu mayang, kerak telor, kue ape, papeda, gudeg, and sate bandeng. We used ResNet50 architecture to classify multi-class labeling. Datasets will consist of 200 images and will be duplicated into three models of separating datasets. In the first model, the dataset has a composition of 75% training dataset and a 25% testing dataset. Similarly, the second model, the dataset has 80:20 of composition, and the third model has 85:15 of composition for training and testing dataset. The experimental results show the third model has the best accuracy of 100%, with 30/30 images predicted correctly.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face Recognition Based on Phase Only Correlation (POC) 基于相位相关的人脸识别
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274633
E. S. Wahyuni, Faiz Khairul Isbat, Anggara Jatu Kusumawati
Face recognition is a technology that is widely used in the field of security and biometrics. Every human face has unique features such as the shape of the jaw and the contours of the face. In this study, face detection was carried out using the Phase Only Correlation (POC) method. POC is a face detection method based on the highest correlation value from the calculation of the phase and magnitude of an image. The data used in this study is in the form of facial images in RGB format. Stages of the study were divided into two, namely preprocessing and processing. The pre-processing stage includes the Region of Interest (ROI), image segmentation, grayscale transformation, and Discrete Fourier Transform (DFT). The processing phase includes Cross Spectrum, Inverse Cross Spectrum values, and correlation calculation. There are three testing schemes carried out in this study, namely testing of variations in lighting levels, expressions, and facial positions. From the results of the study, different face positions produce incorrect detection results because changes in the position of the image being tested make changes in the frequency distribution of the phase and magnitude values.
人脸识别是一项广泛应用于安全和生物识别领域的技术。每个人的脸都有独特的特征,比如下巴的形状和脸部的轮廓。本研究采用纯相位相关(POC)方法进行人脸检测。POC是一种基于图像相位和幅值计算得出的最高相关值的人脸检测方法。本研究使用的数据为RGB格式的面部图像。研究阶段分为预处理和处理两个阶段。预处理阶段包括感兴趣区域(ROI)、图像分割、灰度变换和离散傅立叶变换(DFT)。处理阶段包括交叉谱、逆交叉谱值和相关计算。在本研究中有三种测试方案,即测试光照水平、表情和面部位置的变化。从研究结果来看,不同的人脸位置会产生不正确的检测结果,因为被测图像位置的变化会导致相位和幅度值的频率分布发生变化。
{"title":"Face Recognition Based on Phase Only Correlation (POC)","authors":"E. S. Wahyuni, Faiz Khairul Isbat, Anggara Jatu Kusumawati","doi":"10.1109/IC2IE50715.2020.9274633","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274633","url":null,"abstract":"Face recognition is a technology that is widely used in the field of security and biometrics. Every human face has unique features such as the shape of the jaw and the contours of the face. In this study, face detection was carried out using the Phase Only Correlation (POC) method. POC is a face detection method based on the highest correlation value from the calculation of the phase and magnitude of an image. The data used in this study is in the form of facial images in RGB format. Stages of the study were divided into two, namely preprocessing and processing. The pre-processing stage includes the Region of Interest (ROI), image segmentation, grayscale transformation, and Discrete Fourier Transform (DFT). The processing phase includes Cross Spectrum, Inverse Cross Spectrum values, and correlation calculation. There are three testing schemes carried out in this study, namely testing of variations in lighting levels, expressions, and facial positions. From the results of the study, different face positions produce incorrect detection results because changes in the position of the image being tested make changes in the frequency distribution of the phase and magnitude values.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geofencing Technology in Monitoring of Geriatric Patients Suffering from Dementia and Alzheimer 地理围栏技术在老年痴呆和阿尔茨海默病患者监测中的应用
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274637
Ernes Randika Pratama, F. Renaldi, Fajri Rachmat Umbara, E. C. Djamal
In this day and age, many technologies are used to easily track the whereabouts of others, as in this study, Geofencing technology is used to track or monitor the existence of geriatric patients. This is done because geriatric patients who have dementia and Alzheimer’s have impaired brain memory that can potentially get lost somewhere and cannot go home. Therefore, with the Geofencing technology, the movement of patients can be virtually restricted without disturbing real activities by creating boundaries in the patient’s area. By utilizing GPS technology, the signal of a patient’s cellular device can be tracked or monitored. If one day, the patient crosses the Geofencing area, the supervisor will receive a notification from the system and handle the patient so as not to get lost or lost. The patient’s movements can be monitored by the system simply by utilizing the GPS that is on the patient’s device to stay on, and unnoticed by the patient. By utilizing Geofencing technology to monitor patients who are in the room, you can minimize things that can make patients get lost or lost. To fulfill all of that, several things must be done, such as Geofencing area analysis, performing calculations with formula Haversine, and making messages or notifications that are stored on the FCM server. From all of that will produce a system that can supervise patients and get the closest distance between patients and caregiver, as in the results of calculations between patients and caregiver that produce a distance of Ill meters. This system will also receive notifications automatically with the patient out of the Geofencing area. So it can be concluded that by getting the closest distance between the patient and the caregiver, it can speed up the caregiver in handling the patient beyond the Geofencing area boundary and increasing patient safety.
在这个时代,许多技术被用来很容易地跟踪其他人的下落,正如在这项研究中,地理围栏技术被用来跟踪或监测老年患者的存在。这样做是因为患有痴呆症和阿尔茨海默氏症的老年患者的大脑记忆受损,可能会在某个地方迷路,无法回家。因此,使用地理围栏技术,通过在患者区域创建边界,可以在不干扰实际活动的情况下限制患者的活动。通过利用GPS技术,可以跟踪或监控患者手机设备的信号。如果有一天,患者穿过地理围栏区域,主管将收到系统的通知,并对患者进行处理,以免丢失或丢失。系统可以简单地利用病人设备上的GPS来监测病人的运动,而不被病人注意到。通过使用地理围栏技术来监控房间里的病人,你可以最大限度地减少可能使病人迷路或迷路的事情。为了实现所有这些,必须完成一些事情,例如地理围栏区域分析,使用公式Haversine执行计算,以及生成存储在FCM服务器上的消息或通知。所有这些都将产生一个系统,它可以监督病人,并获得病人和护理人员之间的最近距离,就像病人和护理人员之间的计算结果一样,产生1米的距离。该系统还将自动接收患者离开地理围栏区域的通知。因此可以得出结论,通过患者与护理人员之间的最近距离,可以加快护理人员对超出地理围栏区域边界的患者的处理速度,提高患者的安全性。
{"title":"Geofencing Technology in Monitoring of Geriatric Patients Suffering from Dementia and Alzheimer","authors":"Ernes Randika Pratama, F. Renaldi, Fajri Rachmat Umbara, E. C. Djamal","doi":"10.1109/IC2IE50715.2020.9274637","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274637","url":null,"abstract":"In this day and age, many technologies are used to easily track the whereabouts of others, as in this study, Geofencing technology is used to track or monitor the existence of geriatric patients. This is done because geriatric patients who have dementia and Alzheimer’s have impaired brain memory that can potentially get lost somewhere and cannot go home. Therefore, with the Geofencing technology, the movement of patients can be virtually restricted without disturbing real activities by creating boundaries in the patient’s area. By utilizing GPS technology, the signal of a patient’s cellular device can be tracked or monitored. If one day, the patient crosses the Geofencing area, the supervisor will receive a notification from the system and handle the patient so as not to get lost or lost. The patient’s movements can be monitored by the system simply by utilizing the GPS that is on the patient’s device to stay on, and unnoticed by the patient. By utilizing Geofencing technology to monitor patients who are in the room, you can minimize things that can make patients get lost or lost. To fulfill all of that, several things must be done, such as Geofencing area analysis, performing calculations with formula Haversine, and making messages or notifications that are stored on the FCM server. From all of that will produce a system that can supervise patients and get the closest distance between patients and caregiver, as in the results of calculations between patients and caregiver that produce a distance of Ill meters. This system will also receive notifications automatically with the patient out of the Geofencing area. So it can be concluded that by getting the closest distance between the patient and the caregiver, it can speed up the caregiver in handling the patient beyond the Geofencing area boundary and increasing patient safety.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116890396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
E-Service and Logistics Service Quality in E-Commerce, Study Case: Shopee Indonesia 电子商务中的电子服务和物流服务质量,研究案例:Shopee Indonesia
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274597
Dezenia Zain Rachmawati, A. Agus
E-commerce in Indonesia is growing fast. Nowadays, people tend to purchase things through e-commerce. However, the players within the e-commerce business not only e-commerce platform itself, but there are also logistics providers and customers. Both e-commerce and logistics services have service quality that plays an important role for the customer. This study uses descriptive research to analyses the impact of e-commerce service quality and logistics service quality on customer satisfaction and customer loyalty. This research used purposive sampling form Shopee Indonesia, as top 2 market leader in Indonesia Market. Data collected through online questionnaires with total respondents consisted of 546 Shopee users. Data is processed with Structural Equation Modelling method and for data analysis using LISREL software version 8.8. The results conclude that the e-service quality and logistics services quality both has a direct and positive impact on customer satisfaction and customer loyalty. This study helps e-commerce and logistics services to understand their customer so they can improve their service quality to keep existing customer and attract the new customer.
印尼的电子商务发展迅速。如今,人们倾向于通过电子商务购买东西。然而,电子商务业务内部的参与者不仅仅是电子商务平台本身,还有物流供应商和客户。电子商务和物流服务都有服务质量,服务质量对顾客起着重要的作用。本研究采用描述性研究分析电子商务服务质量和物流服务质量对顾客满意和顾客忠诚的影响。本研究采用有目的的抽样,从Shopee印尼,作为前2名市场领导者在印尼市场。通过在线问卷收集数据,调查对象包括546名Shopee用户。数据处理采用结构方程建模方法,使用LISREL 8.8版软件进行数据分析。结果表明,电子服务质量和物流服务质量对顾客满意度和顾客忠诚度都有直接的正向影响。本研究有助于电子商务和物流服务了解他们的客户,从而提高他们的服务质量,以保持现有的客户和吸引新客户。
{"title":"E-Service and Logistics Service Quality in E-Commerce, Study Case: Shopee Indonesia","authors":"Dezenia Zain Rachmawati, A. Agus","doi":"10.1109/IC2IE50715.2020.9274597","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274597","url":null,"abstract":"E-commerce in Indonesia is growing fast. Nowadays, people tend to purchase things through e-commerce. However, the players within the e-commerce business not only e-commerce platform itself, but there are also logistics providers and customers. Both e-commerce and logistics services have service quality that plays an important role for the customer. This study uses descriptive research to analyses the impact of e-commerce service quality and logistics service quality on customer satisfaction and customer loyalty. This research used purposive sampling form Shopee Indonesia, as top 2 market leader in Indonesia Market. Data collected through online questionnaires with total respondents consisted of 546 Shopee users. Data is processed with Structural Equation Modelling method and for data analysis using LISREL software version 8.8. The results conclude that the e-service quality and logistics services quality both has a direct and positive impact on customer satisfaction and customer loyalty. This study helps e-commerce and logistics services to understand their customer so they can improve their service quality to keep existing customer and attract the new customer.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124344480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Compiler-based Approach for Natural Language to Code Conversion 基于编译器的自然语言到代码转换方法
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274674
S. Sridhar, Sowmya Sanagavarapu
There is a gap observed between the natural language (NL) of speech and writing a program to generate code. Programmers should know the syntax of the programming language in order to code. The aim of the proposed model is to do away with the syntactic structure of a programming language and the user can specify the instructions in human interactive form, using either text or speech. The designed solution is an application based on speech recognition and user interaction to make coding faster and efficient. Lexical, syntax and semantic analysis is performed on the user’s instructions and then the code is generated. C is used as the programming language in the proposed model. The code editor is a web page and the user instructions are sent to a Flask server for processing. Using Python libraries NLTK and ply libraries, conversion of human language data to programmable C codes is done and the code is returned to the client. Lex is used for tokenization and the LALR parser of Yacc processes the syntax specifications to generate an output procedure. The results are recorded and analyzed for time taken to convert the NL commands to code and the efficiency of the implementation is measured with accuracy, precision and recall.
在语音的自然语言(NL)和编写程序生成代码之间存在着差距。程序员应该了解编程语言的语法,以便编写代码。提出的模型的目的是消除编程语言的语法结构,用户可以使用文本或语音以人类交互的形式指定指令。设计的解决方案是一个基于语音识别和用户交互的应用程序,使编码更快、更高效。根据用户的指令进行词法、语法和语义分析,然后生成代码。在提出的模型中使用C作为编程语言。代码编辑器是一个网页,用户指令被发送到Flask服务器进行处理。使用Python库NLTK和ply库,将人类语言数据转换为可编程的C代码,并将代码返回给客户端。Lex用于标记化,Yacc的LALR解析器处理语法规范以生成输出过程。记录并分析将NL命令转换为代码所需的时间,并通过准确性、精密度和召回率来衡量执行效率。
{"title":"A Compiler-based Approach for Natural Language to Code Conversion","authors":"S. Sridhar, Sowmya Sanagavarapu","doi":"10.1109/IC2IE50715.2020.9274674","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274674","url":null,"abstract":"There is a gap observed between the natural language (NL) of speech and writing a program to generate code. Programmers should know the syntax of the programming language in order to code. The aim of the proposed model is to do away with the syntactic structure of a programming language and the user can specify the instructions in human interactive form, using either text or speech. The designed solution is an application based on speech recognition and user interaction to make coding faster and efficient. Lexical, syntax and semantic analysis is performed on the user’s instructions and then the code is generated. C is used as the programming language in the proposed model. The code editor is a web page and the user instructions are sent to a Flask server for processing. Using Python libraries NLTK and ply libraries, conversion of human language data to programmable C codes is done and the code is returned to the client. Lex is used for tokenization and the LALR parser of Yacc processes the syntax specifications to generate an output procedure. The results are recorded and analyzed for time taken to convert the NL commands to code and the efficiency of the implementation is measured with accuracy, precision and recall.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Barriers of IT Utilization: A Case Study of Indonesian Audit Organisation 信息技术应用的障碍:以印尼审计机构为例
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274664
Aslon Damanik, P. W. Handayani, A. Pinem
The Indonesian government has sought to implement good governance by issuing a series of laws and regulations in governing the management of state finances. The State Audit Agency (BPK) has the responsibility to conduct finance audit of the government institution based on established auditing standards. One of the strategies that has become the focus of BPK in encouraging auditors to utilize IT services optimally in the audit process. However, based on the performance accountability report IT utilization only reach 80.84% with original target of 97.87%. Thus, this study aims to analyze the factors that become the obstacles in the use of IT in the audit process. The factor was categorized in four dimensions which are technological, organization, environment and human. The data was collected using questionnaire and 115 valid data were analyzed using entropy method to assess the weight of each factors. The results shown that human dimension is the most importance factor to be considered by BPK in IT utilization. However, based on current condition the technological factor need to be improvement urgently since it is the most cited barrier by the respondents.
印尼政府通过颁布一系列管理国家财政的法律法规,力求实施善政。国家审计署(BPK)有责任根据既定的审计标准对政府机构进行财务审计。BPK鼓励审核员在审计过程中最佳地利用IT服务,这已成为BPK关注的策略之一。然而,基于绩效问责报告,IT利用率仅达到80.84%,而原目标为97.87%。因此,本研究旨在分析在审计过程中使用IT的障碍因素。从技术、组织、环境和人四个维度对影响因素进行了分类。采用问卷调查法收集资料,采用熵值法对115份有效资料进行分析,评估各因素的权重。结果表明,人的维度是BPK在IT利用中最需要考虑的因素。然而,从目前的情况来看,技术因素迫切需要改进,因为它是受访者提到的最多的障碍。
{"title":"The Barriers of IT Utilization: A Case Study of Indonesian Audit Organisation","authors":"Aslon Damanik, P. W. Handayani, A. Pinem","doi":"10.1109/IC2IE50715.2020.9274664","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274664","url":null,"abstract":"The Indonesian government has sought to implement good governance by issuing a series of laws and regulations in governing the management of state finances. The State Audit Agency (BPK) has the responsibility to conduct finance audit of the government institution based on established auditing standards. One of the strategies that has become the focus of BPK in encouraging auditors to utilize IT services optimally in the audit process. However, based on the performance accountability report IT utilization only reach 80.84% with original target of 97.87%. Thus, this study aims to analyze the factors that become the obstacles in the use of IT in the audit process. The factor was categorized in four dimensions which are technological, organization, environment and human. The data was collected using questionnaire and 115 valid data were analyzed using entropy method to assess the weight of each factors. The results shown that human dimension is the most importance factor to be considered by BPK in IT utilization. However, based on current condition the technological factor need to be improvement urgently since it is the most cited barrier by the respondents.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121666790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1