首页 > 最新文献

2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

英文 中文
Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack 加强防范中间人攻击的megreishvili协议
Muhammad Arzaki
In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital signature scheme. The scheme is constructed using the hardness assumption of the Megrelishvili vector-matrix problem (MVMP)—the underlying computational problem for the security of the conventional Megrelishvili protocol. We prove the correctness of the signature scheme and argue that our proposed protocol is secure against the man-in-the-middle attack provided that the MVMP is intractable.
本文研究了Megrelishvili协议的安全性,这是一种基于线性代数的Diffie-Hellman密钥协议的变体。我们证明了该协议的传统版本容易受到中间人攻击。因此,为了避免这种攻击,我们提出了使用嵌入式数字签名方案的该协议的认证版本。该方案是利用megreishvili矢量矩阵问题(MVMP)的硬度假设构造的,MVMP是传统megreishvili协议安全性的基础计算问题。我们证明了签名方案的正确性,并论证了如果MVMP是难以处理的,我们提出的协议是安全的,可以抵御中间人攻击。
{"title":"Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack","authors":"Muhammad Arzaki","doi":"10.1109/ICOICT.2018.8528731","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528731","url":null,"abstract":"In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital signature scheme. The scheme is constructed using the hardness assumption of the Megrelishvili vector-matrix problem (MVMP)—the underlying computational problem for the security of the conventional Megrelishvili protocol. We prove the correctness of the signature scheme and argue that our proposed protocol is secure against the man-in-the-middle attack provided that the MVMP is intractable.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connectivity Control Algorithm for Autonomous Wireless Agents 自主无线代理的连通性控制算法
Syifa Mutiara Hersista
In the power-limited sensor network, it is important to optimize the power allocation while maintaining connectivity for each sensor node to guarantee reliable localization. In order to prolong lifetime of sensors, optimizing the power is very crucial while maintaining a proper number of connectivity to ensure a good localizability. In this paper, we propose a connectivity control algorithm, which consider the number of connectivity while optimizing power of sensors. We investigate the information of distribution node statistically, and formulate the relaxation method of utility function in order to get quasi-concave property. Numerically, we show our proposed algorithm gives better performance compared to the recent algorithms with target connectivity $k=7$, while the other algorithm achieves zero connection with the same trade-off parameter.
在功率有限的传感器网络中,优化功率分配的同时保持各传感器节点的连通性以保证可靠的定位是非常重要的。为了延长传感器的使用寿命,优化功率是非常重要的,同时保持适当的连接数量,以确保良好的定位能力。在本文中,我们提出了一种连接控制算法,该算法在优化传感器功率的同时考虑连接数。对分布节点的信息进行了统计研究,提出了效用函数的松弛方法,得到了拟凹性。数值计算表明,我们提出的算法与最近的目标连通性$k=7$的算法相比具有更好的性能,而另一种算法在相同的权衡参数下实现零连接。
{"title":"Connectivity Control Algorithm for Autonomous Wireless Agents","authors":"Syifa Mutiara Hersista","doi":"10.1109/ICOICT.2018.8528764","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528764","url":null,"abstract":"In the power-limited sensor network, it is important to optimize the power allocation while maintaining connectivity for each sensor node to guarantee reliable localization. In order to prolong lifetime of sensors, optimizing the power is very crucial while maintaining a proper number of connectivity to ensure a good localizability. In this paper, we propose a connectivity control algorithm, which consider the number of connectivity while optimizing power of sensors. We investigate the information of distribution node statistically, and formulate the relaxation method of utility function in order to get quasi-concave property. Numerically, we show our proposed algorithm gives better performance compared to the recent algorithms with target connectivity $k=7$, while the other algorithm achieves zero connection with the same trade-off parameter.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Campus Bike Sharing System Based-on Internet of Things (IoT) 基于物联网的分布式校园共享单车系统
Fauzan Adhi Rachman, Aji Gautama Putrada, M. Abdurohman
This paper proposes the campus distributed bike sharing system for enhancing bike service availability in Telkom University. Bike sharing has been established since 2014. But its utilization has been decreased because the flexibility of the landing system. In this paper, we propose new bike sharing system based on Internet of Thing (IoT) System using MQTT protocol. Several experiments have been evaluated. The results show performance of the system is 2.91s and 0.79 s for the response time and the average delay of the data respectively
为了提高电信大学自行车服务的可用性,本文提出了校园分布式自行车共享系统。自2014年以来,共享单车已经建立。但由于着陆系统的灵活性,降低了其利用率。本文提出了一种基于MQTT协议的物联网共享单车系统。对几个实验进行了评价。结果表明,该系统的数据响应时间为2.91s,平均时延为0.79 s
{"title":"Distributed Campus Bike Sharing System Based-on Internet of Things (IoT)","authors":"Fauzan Adhi Rachman, Aji Gautama Putrada, M. Abdurohman","doi":"10.1109/ICOICT.2018.8528778","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528778","url":null,"abstract":"This paper proposes the campus distributed bike sharing system for enhancing bike service availability in Telkom University. Bike sharing has been established since 2014. But its utilization has been decreased because the flexibility of the landing system. In this paper, we propose new bike sharing system based on Internet of Thing (IoT) System using MQTT protocol. Several experiments have been evaluated. The results show performance of the system is 2.91s and 0.79 s for the response time and the average delay of the data respectively","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125671775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Verifying Vaccine Supply Chain System in Indonesia Using Linear-Time Temporal Logic 利用线性-时间逻辑验证印尼疫苗供应链系统
Muhammad Fikri Suyudi Wikatama, Muhammad Arzaki, Yanti Rusmawati
We propose a formal approach to verify the safety of vaccine supply chain systems in Indonesia. The description of vaccine supply chain systems comes from PT. Bio Farma as the vaccine producer, and according to WHO regulation as well. Firstly, we describe the workflows of the system and model them using activity diagrams. Afterwards, we specify safety properties based on the WHO requirements as linear-time temporal logic formulas and translate the diagrams into temporal logic expressions in the form of NuSMV model. We verify them using NuSMV model checker to check whether the workflows conform to the requirements. In general, the result shows that the safety of the system is proven.
我们提出一种正式的方法来验证印度尼西亚疫苗供应链系统的安全性。疫苗供应链系统的描述来自疫苗生产商PT. Bio Farma,也符合世卫组织的规定。首先,我们描述了系统的工作流程,并使用活动图对其建模。然后,我们将基于WHO要求的安全属性指定为线性-时间逻辑公式,并将图转换为NuSMV模型形式的时间逻辑表达式。我们使用NuSMV模型检查器来检查工作流是否符合需求。总体而言,结果表明该系统的安全性得到了验证。
{"title":"Verifying Vaccine Supply Chain System in Indonesia Using Linear-Time Temporal Logic","authors":"Muhammad Fikri Suyudi Wikatama, Muhammad Arzaki, Yanti Rusmawati","doi":"10.1109/ICOICT.2018.8528743","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528743","url":null,"abstract":"We propose a formal approach to verify the safety of vaccine supply chain systems in Indonesia. The description of vaccine supply chain systems comes from PT. Bio Farma as the vaccine producer, and according to WHO regulation as well. Firstly, we describe the workflows of the system and model them using activity diagrams. Afterwards, we specify safety properties based on the WHO requirements as linear-time temporal logic formulas and translate the diagrams into temporal logic expressions in the form of NuSMV model. We verify them using NuSMV model checker to check whether the workflows conform to the requirements. In general, the result shows that the safety of the system is proven.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133796678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rainfall Forecasting in Bandung Regency Using C4.5 Algorithm 基于C4.5算法的万隆县降水预报
Joko Azhari Suyatno, F. Nhita, A. A. Rohmawati
Bandung regency is one of Indonesian city that majority of the people are farmers. Farmers need weather information to determine the planting season. Weather forecasting become an orientation in agriculture sector to determining the beginning of planting season, and also quality and quantity of their harvest. One of the factors that affecting the harvest is rainfall. In this research, we make a classification model using C4.5 algorithm for rainfall forecasting at Bandung regency. Then, the post-pruning method is used to optimize pruning on the model. We used a weather data from BMKG (Meteorological, Climatological, and Geophysical Agency) in 2005 to 2016 period. The result of average accuracy testing without pruning is 60% and using pruning is 93.33%.
万隆摄政是印度尼西亚的一个城市,大多数人是农民。农民需要天气信息来决定种植季节。天气预报成为农业部门确定种植季节开始以及收成质量和数量的一个方向。影响收成的因素之一是降雨。本研究利用C4.5算法建立了万隆地区降雨预报的分类模型。然后,采用后剪枝方法对模型进行剪枝优化。我们使用了BMKG(气象、气候和地球物理局)2005年至2016年期间的天气数据。不修剪的平均准确率测试结果为60%,使用修剪的平均准确率测试结果为93.33%。
{"title":"Rainfall Forecasting in Bandung Regency Using C4.5 Algorithm","authors":"Joko Azhari Suyatno, F. Nhita, A. A. Rohmawati","doi":"10.1109/ICOICT.2018.8528725","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528725","url":null,"abstract":"Bandung regency is one of Indonesian city that majority of the people are farmers. Farmers need weather information to determine the planting season. Weather forecasting become an orientation in agriculture sector to determining the beginning of planting season, and also quality and quantity of their harvest. One of the factors that affecting the harvest is rainfall. In this research, we make a classification model using C4.5 algorithm for rainfall forecasting at Bandung regency. Then, the post-pruning method is used to optimize pruning on the model. We used a weather data from BMKG (Meteorological, Climatological, and Geophysical Agency) in 2005 to 2016 period. The result of average accuracy testing without pruning is 60% and using pruning is 93.33%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125843304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Decision System for Reservoir Upwelling Using Fuzzy Logic Based on Internet of Things 基于物联网的模糊逻辑油藏上涌决策系统
B. Erfianto, N. Suwastika, Sidik Prabowo
The lifting of sediments at the bottom of the reservoir caused by vertical currents causes rapid mass mortality of fish. The sediment, which is mostly fish excrement and feed residue, causes the dissolved oxygen (DO) content in the water surface to drop dramatically from the normal value of 3–6 mg / L to below 1 mg / L. This vertical current condition is referred to as upwelling of the reservoir. The occurrence of upwelling in freshwater waters can be predicted from factors of difference in surface temperature and under surface temperatures, DO levels and pH levels. Upwelling will occur if the temperature difference between surface temperature and underwater temperature reaches > 5°C for more than 11 hours. The system for detecting upwelling is built on Internet of Things (IoT) communications by utilizing a fuzzy logic decision system. The reading of data from temperature, DO, and pH sensors is sent to the microcontroller device and delivered to the end user via the Internet network. Fuzzy logic implanted on microcontroller device to get the decision condition is not upwelling, potentially upwelling, and upwelling occurs. Upwelling detection systems are tested in reservoirs and in test environments. From the test results the system successfully read data, process data, and send to users without any data lost or damaged.
垂直水流导致水库底部沉积物抬升,导致鱼类大量迅速死亡。沉积物主要是鱼类粪便和饲料残渣,导致水面溶解氧(DO)含量从正常值3-6 mg / L急剧下降到1 mg / L以下,这种垂直水流状态称为水库上升流。淡水水体上升流的发生可以通过地表温度和地表下温度差异、DO水平和pH水平等因子进行预测。如果水面温度与水下温度的温差大于5℃,持续时间超过11小时,就会出现上升流。上升流检测系统基于物联网(IoT)通信,利用模糊逻辑决策系统构建。从温度、DO和pH传感器读取的数据被发送到微控制器设备,并通过Internet网络传递给最终用户。在单片机器件上植入模糊逻辑,得到不上升流、潜在上升流和发生上升流的判定条件。上升流检测系统在油藏和测试环境中进行了测试。从测试结果来看,系统读取数据、处理数据并发送给用户,没有任何数据丢失或损坏。
{"title":"Decision System for Reservoir Upwelling Using Fuzzy Logic Based on Internet of Things","authors":"B. Erfianto, N. Suwastika, Sidik Prabowo","doi":"10.1109/ICOICT.2018.8528736","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528736","url":null,"abstract":"The lifting of sediments at the bottom of the reservoir caused by vertical currents causes rapid mass mortality of fish. The sediment, which is mostly fish excrement and feed residue, causes the dissolved oxygen (DO) content in the water surface to drop dramatically from the normal value of 3–6 mg / L to below 1 mg / L. This vertical current condition is referred to as upwelling of the reservoir. The occurrence of upwelling in freshwater waters can be predicted from factors of difference in surface temperature and under surface temperatures, DO levels and pH levels. Upwelling will occur if the temperature difference between surface temperature and underwater temperature reaches > 5°C for more than 11 hours. The system for detecting upwelling is built on Internet of Things (IoT) communications by utilizing a fuzzy logic decision system. The reading of data from temperature, DO, and pH sensors is sent to the microcontroller device and delivered to the end user via the Internet network. Fuzzy logic implanted on microcontroller device to get the decision condition is not upwelling, potentially upwelling, and upwelling occurs. Upwelling detection systems are tested in reservoirs and in test environments. From the test results the system successfully read data, process data, and send to users without any data lost or damaged.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Lable Classification on Topics of Quranic Verses in English Translation Using Multinomial Naive Bayes 基于多项朴素贝叶斯的古兰经诗歌英译主题多标签分类
Reynaldi Ananda Pane, M. S. Mubarok, Nanang Saiful Huda, Adiwijaya
Al-Quran is the holy book as well as guidance for Muslims around the world. Each verse of Quran contains meaning and wisdom that can usually be classified into more than one topic of discussion. This research was conducted on the issue of classification of Quranic verses that can be classified into more than one topic as a multi-label classification problem. Multi-label classification is different from single-label classification, therefore this research provided a new model of classifier to handle multi-label classification. The system was developed using Multinomial Naïve Bayes with several stages of preprocessing data such as case folding, tokenization, and stemming. The system also used bag of words as feature extraction method. The best Hamming loss obtained from this research is 0.1247.
《古兰经》是世界各地穆斯林的圣书和指南。《古兰经》的每节经文都包含意义和智慧,通常可以分为不止一个讨论主题。本研究针对可兰经经文的分类问题进行了研究,可兰经经文可分为多个主题,是一个多标签分类问题。多标签分类不同于单标签分类,因此本研究为处理多标签分类提供了一种新的分类器模型。该系统是使用多项式Naïve贝叶斯开发的,预处理数据的几个阶段,如案例折叠,标记化和词干。系统还采用了词袋作为特征提取方法。本研究得到的最佳汉明损失为0.1247。
{"title":"A Multi-Lable Classification on Topics of Quranic Verses in English Translation Using Multinomial Naive Bayes","authors":"Reynaldi Ananda Pane, M. S. Mubarok, Nanang Saiful Huda, Adiwijaya","doi":"10.1109/ICOICT.2018.8528777","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528777","url":null,"abstract":"Al-Quran is the holy book as well as guidance for Muslims around the world. Each verse of Quran contains meaning and wisdom that can usually be classified into more than one topic of discussion. This research was conducted on the issue of classification of Quranic verses that can be classified into more than one topic as a multi-label classification problem. Multi-label classification is different from single-label classification, therefore this research provided a new model of classifier to handle multi-label classification. The system was developed using Multinomial Naïve Bayes with several stages of preprocessing data such as case folding, tokenization, and stemming. The system also used bag of words as feature extraction method. The best Hamming loss obtained from this research is 0.1247.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130278601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On Generalized Divide and Conquer Approach for Group Key Distribution: Correctness and Complexity 群密钥分发的广义分治法:正确性和复杂性
Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati
In this article we present a generalized version of divide and conquer approach for contributory group Diffie-Hellman key exchange (DHKE) scheme. In particular, we devise an efficient way to establish a mutual secret key for multiple participants that uses a quasilinear amount of exponentiations with respect to the number of participants. The correctness of our protocol is proven using mathematical induction. We also compute its complexity in terms of total exponentiations within the protocol, analyze several important computational characteristics, and analyze the security of the protocol against passive attack. Moreover, we provide a comprehensive comparison of our protocol with other existing contributory schemes. Finally, we present an adaptation of our protocol for Megrelishvili group key agreement as a variant of DHKE procedure.
在本文中,我们提出了一个通用版本的分而治之方法用于贡献群Diffie-Hellman密钥交换(DHKE)方案。特别是,我们设计了一种有效的方法来为多个参与者建立一个相互秘密密钥,该方法使用了参与者数量的拟线性幂次。利用数学归纳法证明了协议的正确性。我们还根据协议内的总指数计算了其复杂性,分析了几个重要的计算特征,并分析了协议对被动攻击的安全性。此外,我们提供了我们的协议与其他现有的缴费计划的全面比较。最后,我们提出了一个megreishvili组密钥协议的改编协议,作为DHKE过程的一个变体。
{"title":"On Generalized Divide and Conquer Approach for Group Key Distribution: Correctness and Complexity","authors":"Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati","doi":"10.1109/ICOICT.2018.8528749","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528749","url":null,"abstract":"In this article we present a generalized version of divide and conquer approach for contributory group Diffie-Hellman key exchange (DHKE) scheme. In particular, we devise an efficient way to establish a mutual secret key for multiple participants that uses a quasilinear amount of exponentiations with respect to the number of participants. The correctness of our protocol is proven using mathematical induction. We also compute its complexity in terms of total exponentiations within the protocol, analyze several important computational characteristics, and analyze the security of the protocol against passive attack. Moreover, we provide a comprehensive comparison of our protocol with other existing contributory schemes. Finally, we present an adaptation of our protocol for Megrelishvili group key agreement as a variant of DHKE procedure.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visiting Time Prediction Using Machine Learning Regression Algorithm 基于机器学习回归算法的访问时间预测
I. Hapsari, I. Surjandari, Komarudin, Reynaldi Ananda, Pane Mohamad, Syahrul Mubarok, Nanang, Mukti Ari, H. Murfi, Satrio Adi, N. Endro, Ariyanto Andrian, Rakhmatsyah, Aji Achmad, Indra Budi, Faisal Rahutomo, Rosa Andrie, Deddy Kusbianto, Purwoko Aji, Tedjo Darmanto, Fajar Hendra, Prabowo, M. Kemas, Lhaksmana Z. K Abdurahman, Baizal
Smart tourists cannot be separated with mobile technology. With the gadget, tourist can find information about the destination, or supporting information like transportation, hotel, weather and exchange rate. They need prediction of traveling and visiting time, to arrange their journey. If traveling time has predicted accurately by Google Map using the location feature, visiting time has another issue. Until today, Google detects the user's position based on crowdsourcing data from customer visits to a specific location over the last several weeks. It cannot be denied that this method will give a valid information for the tourists. However, because it needs a lot of data, there are many destinations that have no information about visiting time. From the case study that we used, there are 626 destinations in East Java, Indonesia, and from that amount only 224 destinations or 35.78% has the visiting time. To complete the information and help tourists, this research developed the prediction model for visiting time. For the first data is tested statistically to make sure the model development was using the right method. Multiple linear regression become the common model, because there are six factors that influenced the visiting time, i.e. access, government, rating, number of reviews, number of pictures, and other information. Those factors become the independent variables to predict dependent variable or visiting time. From normality test as the linear regression requirement, the significant value was less than p that means the data cannot pass the statistic test, even though we transformed the data based on the skewness. Because of three of them are ordinal data and the others are interval data, we tried to exclude and include the ordinal by transform it to interval. We also used the Ordinal Logistic Regression by transform the interval data in dependent variable into ordinal data using Expectation Maximization, one of clustering algorithm in machine learning, but the model still did not fit even though we used 5 functions. Then we used the classification algorithm in machine learning by using 5 top algorithm which are Linear Regression, k-Nearest Neighbors, Decision Tree, Support Vector Machines, and Multi-Layer Perceptron. Based on maximum correlation coefficient and minimum root mean square error, Linear Regression with 6 independent variables has the best result with the correlation coefficient 20.41% and root mean square error 48.46%. We also compared with model using 3 independent variable, the best algorithm was still the same but with less performance. Then, the model was loaded to predict the visiting time for other 402 destinations.
智能游客离不开移动技术。有了这个小工具,游客可以找到关于目的地的信息,或者像交通、酒店、天气和汇率这样的辅助信息。他们需要预测旅行和访问时间,以便安排行程。如果谷歌地图使用位置功能准确地预测了旅行时间,那么访问时间就会出现另一个问题。直到今天,谷歌还会根据用户在过去几周内访问特定地点的众包数据来检测用户的位置。不可否认,这种方法将为游客提供有效的信息。然而,由于需要大量的数据,有很多目的地没有访问时间的信息。从我们使用的案例研究中,印度尼西亚东爪哇有626个目的地,其中只有224个目的地(35.78%)有访问时间。为了完善信息,帮助游客,本研究开发了旅游时间预测模型。对于第一个数据进行统计测试,以确保模型开发使用了正确的方法。多元线性回归成为常用的模型,因为影响访问时间的因素有六个,即访问次数、政府、评分、评论数、图片数和其他信息。这些因素成为预测因变量或访问时间的自变量。从正态性检验作为线性回归的要求来看,显著性值小于p,即数据不能通过统计检验,即使我们根据偏度对数据进行了变换。由于其中三个是序数数据,其余是区间数据,我们试图通过将序数转换为区间来排除和包含序数。我们还使用了Ordinal Logistic Regression,将因变量中的区间数据使用机器学习中的聚类算法之一Expectation Maximization转换为有序数据,但即使使用了5个函数,模型仍然不适合。然后利用线性回归、k近邻、决策树、支持向量机和多层感知机这5种顶级算法,将分类算法应用到机器学习中。在相关系数最大、均方根误差最小的情况下,6自变量线性回归的结果最好,相关系数为20.41%,均方根误差为48.46%。我们还比较了使用3个自变量的模型,最佳算法仍然相同,但性能较差。然后,将该模型加载到其他402个目的地的访问时间预测中。
{"title":"Visiting Time Prediction Using Machine Learning Regression Algorithm","authors":"I. Hapsari, I. Surjandari, Komarudin, Reynaldi Ananda, Pane Mohamad, Syahrul Mubarok, Nanang, Mukti Ari, H. Murfi, Satrio Adi, N. Endro, Ariyanto Andrian, Rakhmatsyah, Aji Achmad, Indra Budi, Faisal Rahutomo, Rosa Andrie, Deddy Kusbianto, Purwoko Aji, Tedjo Darmanto, Fajar Hendra, Prabowo, M. Kemas, Lhaksmana Z. K Abdurahman, Baizal","doi":"10.1109/ICOICT.2018.8528810","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528810","url":null,"abstract":"Smart tourists cannot be separated with mobile technology. With the gadget, tourist can find information about the destination, or supporting information like transportation, hotel, weather and exchange rate. They need prediction of traveling and visiting time, to arrange their journey. If traveling time has predicted accurately by Google Map using the location feature, visiting time has another issue. Until today, Google detects the user's position based on crowdsourcing data from customer visits to a specific location over the last several weeks. It cannot be denied that this method will give a valid information for the tourists. However, because it needs a lot of data, there are many destinations that have no information about visiting time. From the case study that we used, there are 626 destinations in East Java, Indonesia, and from that amount only 224 destinations or 35.78% has the visiting time. To complete the information and help tourists, this research developed the prediction model for visiting time. For the first data is tested statistically to make sure the model development was using the right method. Multiple linear regression become the common model, because there are six factors that influenced the visiting time, i.e. access, government, rating, number of reviews, number of pictures, and other information. Those factors become the independent variables to predict dependent variable or visiting time. From normality test as the linear regression requirement, the significant value was less than p that means the data cannot pass the statistic test, even though we transformed the data based on the skewness. Because of three of them are ordinal data and the others are interval data, we tried to exclude and include the ordinal by transform it to interval. We also used the Ordinal Logistic Regression by transform the interval data in dependent variable into ordinal data using Expectation Maximization, one of clustering algorithm in machine learning, but the model still did not fit even though we used 5 functions. Then we used the classification algorithm in machine learning by using 5 top algorithm which are Linear Regression, k-Nearest Neighbors, Decision Tree, Support Vector Machines, and Multi-Layer Perceptron. Based on maximum correlation coefficient and minimum root mean square error, Linear Regression with 6 independent variables has the best result with the correlation coefficient 20.41% and root mean square error 48.46%. We also compared with model using 3 independent variable, the best algorithm was still the same but with less performance. Then, the model was loaded to predict the visiting time for other 402 destinations.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing 4G Adoption in Indonesia Using a Modified Unified Theory of Acceptance and Use of Technology 2 使用改进的技术接受和使用统一理论分析印度尼西亚的4G采用情况
I. Indrawati, Kedar Priya Utama
Growth in mobile data consumption has the potential to transform the way in which consumers and business operate and communicate, and as such increase economic growth through productivity effect. Indonesia has a potential to increase 1.5% of GDP if success to increase the number of 4G users by 10%. Unfortunately, the 4G penetration in Indonesia has only reach less than 15%. And the factors that affecting consumers on using 4G services in Indonesia are still not clearly observed. Analyzing factors that affect the behavior intention and usage behavior of customers toward the adoption of 4G services is needed. This research intends to analyze factors that affect the behavioral intention and use behavior of customers toward the adoption of 4G services in Indonesia, based on Unified Theory of Acceptance and Use of Technology 2. The results reveals, factors that influencing the Behavioral Intention on the adoption of 4G services in Indonesia are Habit, Content, Hedonic Motivation, Performance Expectancy and Social Influence. Factors that influencing Use Behavior are Habit, Facilitating Condition and Behavioral Intention. The influence of the factors on Behavioral Intention is 62%, while the influence on Use Behavior is 48%. Based on the results, the UTAUT2 model is able to determine the Behavioral Intention and Use Behavior of consumers to use 4G services in Indonesia.
移动数据消费的增长有可能改变消费者和企业运营和沟通的方式,从而通过生产力效应促进经济增长。如果成功地将4G用户数量增加10%,印尼有可能增加1.5%的GDP。不幸的是,印尼的4G普及率还不到15%。在印尼,影响消费者使用4G服务的因素还没有被清楚地观察到。需要分析影响客户采用4G服务的行为意向和使用行为的因素。本研究拟基于统一接受与使用技术理论2,分析影响印尼客户采用4G服务的行为意向和使用行为的因素。研究结果显示,影响印尼4G服务使用行为意向的因素有:习惯、内容、享乐动机、绩效预期和社会影响。影响使用行为的因素有习惯、促进条件和行为意向。各因素对行为意向的影响为62%,对使用行为的影响为48%。基于结果,UTAUT2模型能够确定印度尼西亚消费者使用4G服务的行为意图和使用行为。
{"title":"Analyzing 4G Adoption in Indonesia Using a Modified Unified Theory of Acceptance and Use of Technology 2","authors":"I. Indrawati, Kedar Priya Utama","doi":"10.1109/ICOICT.2018.8528744","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528744","url":null,"abstract":"Growth in mobile data consumption has the potential to transform the way in which consumers and business operate and communicate, and as such increase economic growth through productivity effect. Indonesia has a potential to increase 1.5% of GDP if success to increase the number of 4G users by 10%. Unfortunately, the 4G penetration in Indonesia has only reach less than 15%. And the factors that affecting consumers on using 4G services in Indonesia are still not clearly observed. Analyzing factors that affect the behavior intention and usage behavior of customers toward the adoption of 4G services is needed. This research intends to analyze factors that affect the behavioral intention and use behavior of customers toward the adoption of 4G services in Indonesia, based on Unified Theory of Acceptance and Use of Technology 2. The results reveals, factors that influencing the Behavioral Intention on the adoption of 4G services in Indonesia are Habit, Content, Hedonic Motivation, Performance Expectancy and Social Influence. Factors that influencing Use Behavior are Habit, Facilitating Condition and Behavioral Intention. The influence of the factors on Behavioral Intention is 62%, while the influence on Use Behavior is 48%. Based on the results, the UTAUT2 model is able to determine the Behavioral Intention and Use Behavior of consumers to use 4G services in Indonesia.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 6th International Conference on Information and Communication Technology (ICoICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1