Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528738
Nuzulul Aulia Perdana Putra, K. Lhaksmana, Bambang Ari Wahyudi
Traffic congestion is often a problem in major cities causing economic and social harm, air and sound pollution, as well as delays in daily activities. Existing traffic assistant applications usually provide traffic prediction based on real-time traffic condition and typical traffic record during weekdays. Such a traffic prediction is not applicable to predict traffic for special moments, e.g. long weekends and national holidays, on which the number of vehicle is very much different compared to that on weekdays. To tackle this issue, this paper proposes a method for traffic prediction by combining poll, traffic records, and linear regression. The proposed method is evaluated by conducting a poll to traffic users on one of the roads nearby Telkom University, collecting the traffic record, estimating the future traffic condition using linear regression, and then comparing the predicted traffic condition with that of the actual traffic condition. The level of congestion is measured as the road's level of service. The experiment result shows that the proposed method successfully predicts the traffic condition within the same class of level of service with the actual traffic condition. This confirms that the method is applicable for predicting traffic condition. In this research, the proposed method is also implemented in an android-based mobile application.
{"title":"An Android Application for Predicting Traffic Congestion Using Polling Method","authors":"Nuzulul Aulia Perdana Putra, K. Lhaksmana, Bambang Ari Wahyudi","doi":"10.1109/ICOICT.2018.8528738","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528738","url":null,"abstract":"Traffic congestion is often a problem in major cities causing economic and social harm, air and sound pollution, as well as delays in daily activities. Existing traffic assistant applications usually provide traffic prediction based on real-time traffic condition and typical traffic record during weekdays. Such a traffic prediction is not applicable to predict traffic for special moments, e.g. long weekends and national holidays, on which the number of vehicle is very much different compared to that on weekdays. To tackle this issue, this paper proposes a method for traffic prediction by combining poll, traffic records, and linear regression. The proposed method is evaluated by conducting a poll to traffic users on one of the roads nearby Telkom University, collecting the traffic record, estimating the future traffic condition using linear regression, and then comparing the predicted traffic condition with that of the actual traffic condition. The level of congestion is measured as the road's level of service. The experiment result shows that the proposed method successfully predicts the traffic condition within the same class of level of service with the actual traffic condition. This confirms that the method is applicable for predicting traffic condition. In this research, the proposed method is also implemented in an android-based mobile application.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528771
Sony Adan Kalamsyah, A. Barmawi, Muhammad Arzaki
Recently, a contract agreement or contract document was used as a legal requirement of the business deal. For securing the contract, authentication and encryption is necessary. In conventional contract, the contract owner (the sender) is authenticated by the client (the receiver). The authentication is conducted by verifying the owner's signature using human vision. It is shown that the conventional contract has drawback when it was used to conduct long distance business. Since conventional agreement is using only digital signatures, the sender of the contract documents can be authenticated but there is still problem because both parties cannot perform mutual authentication and it cannot resolve legal dispute. Therefore, a witness was required, to overcome the problems when legal dispute was occurred. For implementing the witness, block chaining is proposed. There are several works that have been proposed for realizing authentication, and one of them is using RSA proposed by Raji et al. Since RSA needs large complexity, then in this research, ECC and ECDSA is proposed. ECC and ECDSA is proposed because it has less complexity than RSA. Based on the experiment result, it is shown that legal dispute can be resolved and the security level of the proposed method is greater than RSA. Meanwhile, the complexity of ECDSA is less than digital signature based on RSA.
{"title":"Digital Contract Using Block Chaining and Elliptic Curve Based Digital Signature","authors":"Sony Adan Kalamsyah, A. Barmawi, Muhammad Arzaki","doi":"10.1109/ICOICT.2018.8528771","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528771","url":null,"abstract":"Recently, a contract agreement or contract document was used as a legal requirement of the business deal. For securing the contract, authentication and encryption is necessary. In conventional contract, the contract owner (the sender) is authenticated by the client (the receiver). The authentication is conducted by verifying the owner's signature using human vision. It is shown that the conventional contract has drawback when it was used to conduct long distance business. Since conventional agreement is using only digital signatures, the sender of the contract documents can be authenticated but there is still problem because both parties cannot perform mutual authentication and it cannot resolve legal dispute. Therefore, a witness was required, to overcome the problems when legal dispute was occurred. For implementing the witness, block chaining is proposed. There are several works that have been proposed for realizing authentication, and one of them is using RSA proposed by Raji et al. Since RSA needs large complexity, then in this research, ECC and ECDSA is proposed. ECC and ECDSA is proposed because it has less complexity than RSA. Based on the experiment result, it is shown that legal dispute can be resolved and the security level of the proposed method is greater than RSA. Meanwhile, the complexity of ECDSA is less than digital signature based on RSA.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528726
Andhika Cahya Pratama, R. Sarno
There are many kind of electronic appliances around us such as microwave, lamp, television, and air conditioner around us. Sometimes many people are confuse and do not know how to manage those electronic appliances. It is hard to manage whenever they aren't at home or go to another places. By using electronic appliance in our daily life, it always need our electrical resources and some electronic devices consume more electrical energy such as Air Conditioner, Microwave and also a computer. Those devices are makes our electricity bill can be increased and makes some people surprised when they looked on their bill, they don't know how to reduce the power consumption all those electronic parts since they don't understand how to maintain those parts some people often forgot to turn off the electronic devices when they leave for working, school and any other activities, so this is make that electronic devices would be turn on all day long then makes our electricity resources provide more energy for those electronic devices so automatically your electronic bill will be increase as long as it used. In this paper, we provide some method and tools to maintain those electrical component can be controlled and measureable, by using IoT devices like adruino and artificial intelligence such as Fuzzy Logic. Based on research, Fuzzy logic can save around 40% energy saving.
{"title":"Android Application for Controlling Air Conditioner Using Fuzzy Logic","authors":"Andhika Cahya Pratama, R. Sarno","doi":"10.1109/ICOICT.2018.8528726","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528726","url":null,"abstract":"There are many kind of electronic appliances around us such as microwave, lamp, television, and air conditioner around us. Sometimes many people are confuse and do not know how to manage those electronic appliances. It is hard to manage whenever they aren't at home or go to another places. By using electronic appliance in our daily life, it always need our electrical resources and some electronic devices consume more electrical energy such as Air Conditioner, Microwave and also a computer. Those devices are makes our electricity bill can be increased and makes some people surprised when they looked on their bill, they don't know how to reduce the power consumption all those electronic parts since they don't understand how to maintain those parts some people often forgot to turn off the electronic devices when they leave for working, school and any other activities, so this is make that electronic devices would be turn on all day long then makes our electricity resources provide more energy for those electronic devices so automatically your electronic bill will be increase as long as it used. In this paper, we provide some method and tools to maintain those electrical component can be controlled and measureable, by using IoT devices like adruino and artificial intelligence such as Fuzzy Logic. Based on research, Fuzzy logic can save around 40% energy saving.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528770
Anif Nurrohman, M. Abdurohman
This paper proposes a framework of video communication in smartphone with android-based operating system technology. The technology that used for encoding and decoding is compression standard H264 with data transmission protocol of Real Time Messaging Protocol (RTMP) and media server Red5. This framework is proposed as improvement of the used H263-based system with Real Time Streaming Protocol (RTSP). The case study was made in live video streaming mode in android-based smartphone device. The result shows that the proposed system has better quality for live video streaming service, producing delay that is ranged between 137.48ms to 146.02ms, jitter is ranged between 22.917 to 27.695ms and packet loss is ranged between 0 to 0.4%. The performance of the proposed framework has met the standard of live video streaming that was defined by ITU-T. The ITU-T standard of delay in real time category for one-way communication which is less than 10s. The standard value of jitter is less than 30ms and packet loss less than 5%.
本文提出了一种基于android操作系统技术的智能手机视频通信框架。编解码采用的技术是压缩标准H264,数据传输协议为RTMP (Real Time Messaging protocol),媒体服务器为Red5。该框架是对现有基于h263的实时流协议(RTSP)系统的改进。案例研究是在基于android的智能手机设备上以实时视频流模式进行的。结果表明,该系统具有较好的视频流直播服务质量,延迟在137.48ms ~ 146.02ms之间,抖动在22.917 ms ~ 27.695ms之间,丢包在0 ~ 0.4%之间。拟议框架的性能已达到ITU-T定义的实时视频流标准。ITU-T单向通信实时类延迟小于10s的标准。抖动标准值小于30ms,丢包小于5%。
{"title":"High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP)","authors":"Anif Nurrohman, M. Abdurohman","doi":"10.1109/ICOICT.2018.8528770","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528770","url":null,"abstract":"This paper proposes a framework of video communication in smartphone with android-based operating system technology. The technology that used for encoding and decoding is compression standard H264 with data transmission protocol of Real Time Messaging Protocol (RTMP) and media server Red5. This framework is proposed as improvement of the used H263-based system with Real Time Streaming Protocol (RTSP). The case study was made in live video streaming mode in android-based smartphone device. The result shows that the proposed system has better quality for live video streaming service, producing delay that is ranged between 137.48ms to 146.02ms, jitter is ranged between 22.917 to 27.695ms and packet loss is ranged between 0 to 0.4%. The performance of the proposed framework has met the standard of live video streaming that was defined by ITU-T. The ITU-T standard of delay in real time category for one-way communication which is less than 10s. The standard value of jitter is less than 30ms and packet loss less than 5%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528748
Indrawati, Dianty Anggraini Putri
Online business of Indonesia continuous to grow rapidly. This rapid growth encourages developments for electronic payment systems. Moreover, Bank Indonesia is running a program to increase the awareness of society to become cash-less. One of the e-payment that emerging in Indonesia is Go-Pay, a Go-Jek payment system. Go-Pay successfully becomes one of the fifth largest e-money in Indonesia less than a year of its operation. Therefore, Bank Indonesia awarded Go-Jek as the most active company that increase society's awareness in conducting non-cash transactions in 2017. The successful of Go-Pay creates opportunities to upgrade the positions of Go-Pay service by knowing factors that influence its customers in continuing using Go-Pay services. This study intended to analyze factors influencing continuance intention of Go-Pay adoption in Indonesia by using a Modified Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Model with Trust as a new variable. The data were gathered from 507 valid respondents in Indonesia chosen by purposive sampling technique. The result revealed that the factors influence continuance intention adoption of Go-Pay from the highest to the lowest respectively are Habit, Trust, Social Influence, Price Saving Orientation, Hedonic Motivation, and Performance Expectancy. The model can predict strongly the continuance intention of consumers towards Go-Pay services in Indonesia since the R2 is 72.8%. This model can be used by Go-Pay management in making decisions to maintain the continuance intention of consumers towards Go-Pay adoption by paying attention to those factors and their indicators.
印尼的在线业务持续快速增长。这种快速增长鼓励了电子支付系统的发展。此外,印尼银行正在开展一个项目,以提高社会对无现金的认识。印度尼西亚新兴的电子支付之一是Go-Pay,一种Go-Jek支付系统。Go-Pay在运营不到一年的时间里成功成为印尼第五大电子货币之一。因此,印尼银行将Go-Jek评为2017年提高社会非现金交易意识最活跃的公司。通过了解影响客户继续使用Go-Pay服务的因素,Go-Pay的成功创造了提升Go-Pay服务地位的机会。本研究拟以信任为新变量,采用改进的UTAUT2 (Unified Theory of Acceptance and Use of Technology)模型,分析印度尼西亚Go-Pay采用的延续意愿的影响因素。采用有目的抽样方法,从印度尼西亚的507名有效受访者中收集数据。结果显示,影响员工继续支付意愿采用的因素从高到低依次为习惯、信任、社会影响、价格节约导向、享乐动机和绩效期望。该模型可以很好地预测印度尼西亚消费者对Go-Pay服务的继续意愿,R2为72.8%。该模型可用于Go-Pay管理决策,通过关注这些因素及其指标来维持消费者对Go-Pay采用的持续意愿。
{"title":"Analyzing Factors Influencing Continuance Intention of E-Payment Adoption Using Modified UTAUT 2 Model","authors":"Indrawati, Dianty Anggraini Putri","doi":"10.1109/ICOICT.2018.8528748","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528748","url":null,"abstract":"Online business of Indonesia continuous to grow rapidly. This rapid growth encourages developments for electronic payment systems. Moreover, Bank Indonesia is running a program to increase the awareness of society to become cash-less. One of the e-payment that emerging in Indonesia is Go-Pay, a Go-Jek payment system. Go-Pay successfully becomes one of the fifth largest e-money in Indonesia less than a year of its operation. Therefore, Bank Indonesia awarded Go-Jek as the most active company that increase society's awareness in conducting non-cash transactions in 2017. The successful of Go-Pay creates opportunities to upgrade the positions of Go-Pay service by knowing factors that influence its customers in continuing using Go-Pay services. This study intended to analyze factors influencing continuance intention of Go-Pay adoption in Indonesia by using a Modified Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Model with Trust as a new variable. The data were gathered from 507 valid respondents in Indonesia chosen by purposive sampling technique. The result revealed that the factors influence continuance intention adoption of Go-Pay from the highest to the lowest respectively are Habit, Trust, Social Influence, Price Saving Orientation, Hedonic Motivation, and Performance Expectancy. The model can predict strongly the continuance intention of consumers towards Go-Pay services in Indonesia since the R2 is 72.8%. This model can be used by Go-Pay management in making decisions to maintain the continuance intention of consumers towards Go-Pay adoption by paying attention to those factors and their indicators.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528720
F. Fahmi, B. Siregar, Svlvi Evelvn, Dani Gunawan, U. Andayani
Children safety is very important for parents. Currently, more and more crimes occur against children, one that often happened is kidnapping. From year to year, the number of child abductions continues to increase. Parents should be aware of the safety and their children. In this study, we proposed a system to monitor the presence of children to anticipate the occurrence of crime against children. A person locator system that using GPS Module, GSM Shield, and Arduino can provide a solution for monitoring children. The test results showed that GPS Module, GSM Shield, and Arduino were able to work stable to detect the location of children and able to monitor the movement of children by limiting certain areas as the boundary of the allowed movement of children.
{"title":"Person Locator Using GPS Module and GSM Shield Applied for Children Protection","authors":"F. Fahmi, B. Siregar, Svlvi Evelvn, Dani Gunawan, U. Andayani","doi":"10.1109/ICOICT.2018.8528720","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528720","url":null,"abstract":"Children safety is very important for parents. Currently, more and more crimes occur against children, one that often happened is kidnapping. From year to year, the number of child abductions continues to increase. Parents should be aware of the safety and their children. In this study, we proposed a system to monitor the presence of children to anticipate the occurrence of crime against children. A person locator system that using GPS Module, GSM Shield, and Arduino can provide a solution for monitoring children. The test results showed that GPS Module, GSM Shield, and Arduino were able to work stable to detect the location of children and able to monitor the movement of children by limiting certain areas as the boundary of the allowed movement of children.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528758
Mohammad Wahiduzzaman Khan, Gaik-Yee Chain, Fang-Fang Chua, S. Haw, Muhsin Hassan, F. A. Saaid
With the huge growing amount of information continuously produced, shared and available online, finding relevant and beneficial contents or services at a single or few clicks have become almost impossible. Most of the time, we will be returned with thousands of irrelevant web links. As such, a recommender system which recommends contents or services that likely meet the user's needs is crucial, especially in the IPTV domain when the choices for program selection has no time and physical boundary restriction. The two major recommendation techniques are content based and collaborative filtering. Nevertheless, such techniques still suffer from several problems such as cold start, data sparsity and over specialization. Our proposed system namely COHRS is a context-aware recommender system based on ontological profiling under the IPTV domain. Ontological approach improves user profiling process and thus improving the accuracy of a recommendation system. Experimental evaluations indicate that COHRS is able to overcome the drawbacks such as over specialization, data sparsity and inefficiency issue of most traditional recommender systems.
{"title":"Context-Aware Ontological Hybrid Recommender System For IPTV","authors":"Mohammad Wahiduzzaman Khan, Gaik-Yee Chain, Fang-Fang Chua, S. Haw, Muhsin Hassan, F. A. Saaid","doi":"10.1109/ICOICT.2018.8528758","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528758","url":null,"abstract":"With the huge growing amount of information continuously produced, shared and available online, finding relevant and beneficial contents or services at a single or few clicks have become almost impossible. Most of the time, we will be returned with thousands of irrelevant web links. As such, a recommender system which recommends contents or services that likely meet the user's needs is crucial, especially in the IPTV domain when the choices for program selection has no time and physical boundary restriction. The two major recommendation techniques are content based and collaborative filtering. Nevertheless, such techniques still suffer from several problems such as cold start, data sparsity and over specialization. Our proposed system namely COHRS is a context-aware recommender system based on ontological profiling under the IPTV domain. Ontological approach improves user profiling process and thus improving the accuracy of a recommendation system. Experimental evaluations indicate that COHRS is able to overcome the drawbacks such as over specialization, data sparsity and inefficiency issue of most traditional recommender systems.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528781
Dhomas Hatta Fudholi, Lalu Mutawalli
Medical information is valuable for a health care professional to empower diagnosis and clinical decision process. In addition, it can also support communities with health knowledge to support healthy living. Ontology-based information retrieval supports the retrieval of such information with the semantically better result. In this paper, we propose a framework of lightweight semantic-based medical document retrieval in Bahasa Indonesia. The medical information is focused on diagnosis, etiology, epidemiology, clinical manifestation, and guidelines. The framework firstly annotates queries' by using the ontology, analyse the information networks within the ontology and extracts the context of the queries. When a query falls within one context of disease information, a modified search query will be then generated and passed to an existing keyword-based search result. The framework is evaluated using a case study in infectious tropical disease domain. The evaluation results show that the framework could perform well with precision equals or more than 0.9 to find the relevant medical document through the semantic networks and the enhancement process.
{"title":"A Lightweight Semantic-Based Medical Document Retrieval","authors":"Dhomas Hatta Fudholi, Lalu Mutawalli","doi":"10.1109/ICOICT.2018.8528781","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528781","url":null,"abstract":"Medical information is valuable for a health care professional to empower diagnosis and clinical decision process. In addition, it can also support communities with health knowledge to support healthy living. Ontology-based information retrieval supports the retrieval of such information with the semantically better result. In this paper, we propose a framework of lightweight semantic-based medical document retrieval in Bahasa Indonesia. The medical information is focused on diagnosis, etiology, epidemiology, clinical manifestation, and guidelines. The framework firstly annotates queries' by using the ontology, analyse the information networks within the ontology and extracts the context of the queries. When a query falls within one context of disease information, a modified search query will be then generated and passed to an existing keyword-based search result. The framework is evaluated using a case study in infectious tropical disease domain. The evaluation results show that the framework could perform well with precision equals or more than 0.9 to find the relevant medical document through the semantic networks and the enhancement process.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528757
Mohammad Zakie Faiz Rahiemy, Parman Sukarno, E. Jadied
Although Internet has become one of most important parts and mostly needed by societies, that does not mean Internet is a safe place to share sensitive data. One of many unsolved Internet attacks is key-logger which is used to steal victim's data such as passwords. Researchers have done a lot of research to overcome these attacks. However, the authentication system still lacks password complexities which can be compromised with short cracking time and limited generated passwords. Therefore, we proposed a virtual password method that has the following rules: i) has minimum and maximum limit of password and ii) the generated passwords are not limited only to letters, but also numbers and symbols. With those rules, by using Kaspersky Lab secure password measurement, the cracking time can be significantly increased to 9 centuries on the conficker botnet with 10 million cores of processors. Moreover, by using Password Meter the proposed method gets score of 171.
{"title":"Hardening the Virtual Password Authentication Scheme","authors":"Mohammad Zakie Faiz Rahiemy, Parman Sukarno, E. Jadied","doi":"10.1109/ICOICT.2018.8528757","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528757","url":null,"abstract":"Although Internet has become one of most important parts and mostly needed by societies, that does not mean Internet is a safe place to share sensitive data. One of many unsolved Internet attacks is key-logger which is used to steal victim's data such as passwords. Researchers have done a lot of research to overcome these attacks. However, the authentication system still lacks password complexities which can be compromised with short cracking time and limited generated passwords. Therefore, we proposed a virtual password method that has the following rules: i) has minimum and maximum limit of password and ii) the generated passwords are not limited only to letters, but also numbers and symbols. With those rules, by using Kaspersky Lab secure password measurement, the cracking time can be significantly increased to 9 centuries on the conficker botnet with 10 million cores of processors. Moreover, by using Password Meter the proposed method gets score of 171.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132996328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/ICOICT.2018.8528772
Muhammad Dio Khairunnas, Endro Ariyanto, Sidik Prabowo
The use of hot water used for bathing is one type of utilization of technology that has been developed. By using a Water Heater tool, one can get water with a higher temperature. However, to achieve the desired temperature and fill the tub for ready use, water heater takes a long time. In this system has been designed an automatic faucet that can be active in accordance with the temperature of water that is in the main tub with the help of temperature sensors, ultrasonic sensors and water pumps. Both sensors utilize a machine to machine system with MQTT protocols controlled by an Arduino Mega2560-based Android microcontroller. Based on the test, the level of accuracy of temperature obtained has a value of 97.60% with the average performance time obtained to achieve the desired temperature on the main tube is for 18 minutes 30 seconds. The test has been done using the main tub with the volume of water to be filled is ± 12.320 cm3, with the volume of hot water provided is ± 9.240 cm3, In addition, several factors affecting the time to reach the desire d temperature include the type of pump used, the power used by the water heater, and the size of the main tubing container used as a container for mixing hot water temperatures and normal water temperature.
{"title":"Design and Implementation of Smart Bath Water Heater Using Arduino","authors":"Muhammad Dio Khairunnas, Endro Ariyanto, Sidik Prabowo","doi":"10.1109/ICOICT.2018.8528772","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528772","url":null,"abstract":"The use of hot water used for bathing is one type of utilization of technology that has been developed. By using a Water Heater tool, one can get water with a higher temperature. However, to achieve the desired temperature and fill the tub for ready use, water heater takes a long time. In this system has been designed an automatic faucet that can be active in accordance with the temperature of water that is in the main tub with the help of temperature sensors, ultrasonic sensors and water pumps. Both sensors utilize a machine to machine system with MQTT protocols controlled by an Arduino Mega2560-based Android microcontroller. Based on the test, the level of accuracy of temperature obtained has a value of 97.60% with the average performance time obtained to achieve the desired temperature on the main tube is for 18 minutes 30 seconds. The test has been done using the main tub with the volume of water to be filled is ± 12.320 cm3, with the volume of hot water provided is ± 9.240 cm3, In addition, several factors affecting the time to reach the desire d temperature include the type of pump used, the power used by the water heater, and the size of the main tubing container used as a container for mixing hot water temperatures and normal water temperature.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}