首页 > 最新文献

2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

英文 中文
Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks 基于卡尔曼滤波的机会移动社交网络节点人气计算改进
B. Soelistijanto
Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry messages to the destinations. Routing algorithms in these networks typically favour the most popular individuals (nodes) as optimal carriers for message transfers to achieve high delivery performance. The state-of-the-art routing protocol BubbleRap uses a cumulative moving average technique (called C-Window) to identify a node's popularity level, measured in node degree, in a time window. However, our study found that node degree in real-life OMSNs varies quickly and significantly in time, and C-Window moreover slowly adapts to this node degree changes. To tackle this problem, we propose a new method of node degree computation based on the Kalman-filter theory. Using simulation, driven by real human contact traces, we showed that our approach can increase BubbleRap's performance, in terms of delivery ratio and traffic (load) distribution fairness.
机会主义移动社交网络(OMSNs)利用人类的移动性将信息物理地传递到目的地。这些网络中的路由算法通常倾向于将最受欢迎的个体(节点)作为消息传输的最佳载体,以实现高交付性能。最先进的路由协议BubbleRap使用累积移动平均技术(称为C-Window)来识别节点的受欢迎程度,以节点度为单位,在一个时间窗口内测量。然而,我们的研究发现,现实生活中OMSNs的节点度随时间变化迅速而显著,C-Window对这种节点度变化的适应速度也较慢。针对这一问题,提出了一种基于卡尔曼滤波理论的节点度计算新方法。通过模拟,由真实的人类接触痕迹驱动,我们表明我们的方法可以提高BubbleRap的性能,在交付率和流量(负载)分配公平性方面。
{"title":"Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks","authors":"B. Soelistijanto","doi":"10.1109/ICOICT.2018.8528780","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528780","url":null,"abstract":"Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry messages to the destinations. Routing algorithms in these networks typically favour the most popular individuals (nodes) as optimal carriers for message transfers to achieve high delivery performance. The state-of-the-art routing protocol BubbleRap uses a cumulative moving average technique (called C-Window) to identify a node's popularity level, measured in node degree, in a time window. However, our study found that node degree in real-life OMSNs varies quickly and significantly in time, and C-Window moreover slowly adapts to this node degree changes. To tackle this problem, we propose a new method of node degree computation based on the Kalman-filter theory. Using simulation, driven by real human contact traces, we showed that our approach can increase BubbleRap's performance, in terms of delivery ratio and traffic (load) distribution fairness.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Protection Profile on Smart Card System Using ISO 15408 Case Study: Indonesia Health Insurance Agency 使用ISO 15408智能卡系统的安全保护概况案例研究:印度尼西亚健康保险局
Yoso Adi Setyoko, Rahmat Yasirandi
Indonesia Health Assurance Agency also called BPJS is the most important part of the Indonesian people as a health insurance agency. BPJS want to improve the quality of healthcare by applying information technology. One way to improve the quality of service BPJS is implementing smart card technology. this new system, BPJS smart card system, is consisted of two part, there are a smart card and smart card reader. Beside it can be searching BPJS members faster and easier than before (offline system), every card member has a temporary storage enough to save nominal of their own insurance premium. Therefore, smart card system needs security requirements to make sure data in every card member is still secure and confidential when implementing this smart card technology. With that problem, this research creates security design proposal from Protection Profile document by evaluating smart card system of BPJS using Common Criteria Framework (ISO 15408). And then this methodology research is using (ISO 15446) to guide the development of Protection Profile document. Common Criteria Framework for the security of smart card make security design becomes more systematic. This research is consisting of 3 steps, first analyzing threats, second designing security objectives, the last designing security function requirements. Threats assessment and analysis in this research has result 10 threats. From previous step then designed 12 points security objectives. At third step, the security functional requirements need to be analyzed and founded, has 36 security functional requirements from 12 points security objectives before. Prototype has built based on all of security functional requirements that already recommended. The evaluate result shows that all of system use case has been tested according system functional requirement.
印度尼西亚健康保险机构也称为BPJS,是印尼人民最重要的健康保险机构。BPJS希望通过应用信息技术来提高医疗保健质量。提高BPJS服务质量的一种方法是实施智能卡技术。这个新的系统,BPJS智能卡系统,由两部分组成,有智能卡和智能卡读卡器。除了可以比以前更快更容易地搜索BPJS会员(离线系统)之外,每个卡会员都有足够的临时存储空间来节省他们自己的保险费。因此,智能卡系统在实施这种智能卡技术时,需要对安全性进行要求,以确保每个卡成员中的数据仍然是安全和机密的。针对这个问题,本研究通过使用通用标准框架(ISO 15408)对BPJS智能卡系统进行评估,从保护配置文件中创建安全设计方案。然后,本文的方法论研究是采用ISO 15446标准来指导保护概要文件的制定。智能卡安全通用准则框架使安全设计更加系统化。本研究分为三个步骤,首先分析威胁,其次设计安全目标,最后设计安全功能需求。本研究对威胁进行了评估和分析,得出了10个威胁。从上一步出发,设计了12点安全目标。第三步,需要对安全功能需求进行分析和建立,从之前的12点安全目标中得出36个安全功能需求。原型是基于已经推荐的所有安全功能需求构建的。评估结果表明,所有的系统用例都按照系统功能需求进行了测试。
{"title":"Security Protection Profile on Smart Card System Using ISO 15408 Case Study: Indonesia Health Insurance Agency","authors":"Yoso Adi Setyoko, Rahmat Yasirandi","doi":"10.1109/ICOICT.2018.8528804","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528804","url":null,"abstract":"Indonesia Health Assurance Agency also called BPJS is the most important part of the Indonesian people as a health insurance agency. BPJS want to improve the quality of healthcare by applying information technology. One way to improve the quality of service BPJS is implementing smart card technology. this new system, BPJS smart card system, is consisted of two part, there are a smart card and smart card reader. Beside it can be searching BPJS members faster and easier than before (offline system), every card member has a temporary storage enough to save nominal of their own insurance premium. Therefore, smart card system needs security requirements to make sure data in every card member is still secure and confidential when implementing this smart card technology. With that problem, this research creates security design proposal from Protection Profile document by evaluating smart card system of BPJS using Common Criteria Framework (ISO 15408). And then this methodology research is using (ISO 15446) to guide the development of Protection Profile document. Common Criteria Framework for the security of smart card make security design becomes more systematic. This research is consisting of 3 steps, first analyzing threats, second designing security objectives, the last designing security function requirements. Threats assessment and analysis in this research has result 10 threats. From previous step then designed 12 points security objectives. At third step, the security functional requirements need to be analyzed and founded, has 36 security functional requirements from 12 points security objectives before. Prototype has built based on all of security functional requirements that already recommended. The evaluate result shows that all of system use case has been tested according system functional requirement.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Capacitive Model of Water Salinity Wireless Sensor System Based on WIFI-Microcontroller 基于wifi单片机的水盐度无线传感器系统电容式模型
S. Suryono, S. Putro, W. Widowati, S. Sunarno
Monitoring for water salinity is very important in many industries, especially fishery and farming. Therefore, it is necessary to build a wireless water salinity sensor system capable of tackling obstacles in the field. This research proposes a low-cost wireless water salinity sensor system using parallel capacitive plate model. Capacitance effect that is proportional to salinity value is transformed into digital pulses using a circuit of an a-stable multivibrator. Frequency of these pulses is counted using a WIFI-microcontroller and inverse transform is carried out according to the relationship characteristics of salinity and frequency. Water Salinity data acquired by the WIFI-microcontroller are then transmitted to the Control Station Unit (CSU) via gateway WIFI. Testing results show maximum coverage range of 30 meters to the gateway. Nonetheless, the use gateway WIFI can increase the coverage range of this wireless water salinity sensor. Calibration tests also indicate an error of 2.3% in water salinity measurement by the instrument developed here.
水盐度监测在许多行业,特别是渔业和农业中非常重要。因此,有必要建立一个能够解决现场障碍的无线水盐度传感器系统。本研究提出一种采用并联电容板模型的低成本无线水盐度传感器系统。利用非稳态多谐振荡器电路将与盐度成正比的电容效应转换为数字脉冲。利用wifi微控制器对这些脉冲的频率进行计数,并根据盐度与频率的关系特征进行逆变换。WIFI微控制器采集的水盐度数据通过网关WIFI传输到控制站单元(CSU)。测试结果表明,最大覆盖范围为30米的网关。尽管如此,使用网关WIFI可以增加无线水盐度传感器的覆盖范围。校正试验也表明,本仪器在测量水的盐度时误差为2.3%。
{"title":"A Capacitive Model of Water Salinity Wireless Sensor System Based on WIFI-Microcontroller","authors":"S. Suryono, S. Putro, W. Widowati, S. Sunarno","doi":"10.1109/ICOICT.2018.8528796","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528796","url":null,"abstract":"Monitoring for water salinity is very important in many industries, especially fishery and farming. Therefore, it is necessary to build a wireless water salinity sensor system capable of tackling obstacles in the field. This research proposes a low-cost wireless water salinity sensor system using parallel capacitive plate model. Capacitance effect that is proportional to salinity value is transformed into digital pulses using a circuit of an a-stable multivibrator. Frequency of these pulses is counted using a WIFI-microcontroller and inverse transform is carried out according to the relationship characteristics of salinity and frequency. Water Salinity data acquired by the WIFI-microcontroller are then transmitted to the Control Station Unit (CSU) via gateway WIFI. Testing results show maximum coverage range of 30 meters to the gateway. Nonetheless, the use gateway WIFI can increase the coverage range of this wireless water salinity sensor. Calibration tests also indicate an error of 2.3% in water salinity measurement by the instrument developed here.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework of Wireless Maintenance System Monitoring: A Case Study of an Automatic Filling Machine at SB Company 无线维护系统监控框架——以SB公司自动灌装机为例
Fransiskus Tatas Dwi Atmaji, J. Alhilman
This paper proposes a framework for wireless maintenance system monitoring for manufacturing machine and equipment using several sensor and cloud-based technology. The aim is to minimize the full wire connection and monitoring process where the access will be more convenient and efficient. A proposed scheme of wireless maintenance monitoring for the SR125 automatic filling machine at SB Company introduced. By utilization of this proposed framework, the current condition of manufacturing machine and equipment could be monitored for 24 hours and accessed anywhere and anytime even though we are not in local area network of machine or equipment. This system is beneficial as an early warning for the maintenance department to prevent the sudden breakdown as well as minimize the worst case like as explosion. Therefore, the maintenance team would be possible to make a quick decision and action, whether it need a corrective, preventive or other special maintenance action. By this concept, it does not only increase the reliability, availability, and maintainability of the manufacturing machine and equipment; but also will decrease the maintenance cost in overall as well.
本文提出了一种利用多种传感器和云技术实现制造机器设备无线维护系统监控的框架。其目的是最大限度地减少全线连接和监控过程,从而使访问更加方便和高效。介绍了一种针对SB公司SR125自动灌装机的无线维护监控方案。利用该框架,即使不在机器或设备的局域网中,也可以24小时监控制造机器和设备的当前状态,随时随地进行访问。该系统有利于对维修部门进行预警,防止突然故障的发生,最大限度地减少爆炸等最坏情况的发生。因此,维护团队可以做出快速的决策和行动,无论它是否需要纠正,预防或其他特殊的维护行动。通过这个概念,它不仅增加了制造机器和设备的可靠性、可用性和可维护性;同时也会降低整体的维护成本。
{"title":"A Framework of Wireless Maintenance System Monitoring: A Case Study of an Automatic Filling Machine at SB Company","authors":"Fransiskus Tatas Dwi Atmaji, J. Alhilman","doi":"10.1109/ICOICT.2018.8528722","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528722","url":null,"abstract":"This paper proposes a framework for wireless maintenance system monitoring for manufacturing machine and equipment using several sensor and cloud-based technology. The aim is to minimize the full wire connection and monitoring process where the access will be more convenient and efficient. A proposed scheme of wireless maintenance monitoring for the SR125 automatic filling machine at SB Company introduced. By utilization of this proposed framework, the current condition of manufacturing machine and equipment could be monitored for 24 hours and accessed anywhere and anytime even though we are not in local area network of machine or equipment. This system is beneficial as an early warning for the maintenance department to prevent the sudden breakdown as well as minimize the worst case like as explosion. Therefore, the maintenance team would be possible to make a quick decision and action, whether it need a corrective, preventive or other special maintenance action. By this concept, it does not only increase the reliability, availability, and maintainability of the manufacturing machine and equipment; but also will decrease the maintenance cost in overall as well.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Online Classroom Towards Personalized Learning Environment 强化网络课堂,打造个性化学习环境
D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri
E-Learning is a process of learning combines self-motivation, communication, efficiency, and technology. One of the first innovations in practicing the concept of e-learning is by implementing Learning Management System (LMS) to place courses online so students' progress is trackable and discussions in real-time manner is possible. However, LMS has some drawbacks particularly in presenting and selecting learning materials or resources. On LMS, students are given only learning materials or learning resources that have been structured by the facilitator. On the other side, the idea of Personal Learning Environment (PLE) arises. PLE represents a different perspective on how students decide where are they going to learn, because they act as subjects and owners of their own learning process, not as objects. PLE enables students to collaborate through service or learning resources outside their predefined online classroom page. This research proposes the idea to embed the concept of PLE into LMS. The objective is to provide online learning environment that combines structured learning that is identical to the LMS with the flexibility and personalization that PLE offers.
E-Learning是一个结合自我激励、沟通、效率和技术的学习过程。实践电子学习概念的首批创新之一是通过实施学习管理系统(LMS)将课程放在网上,以便跟踪学生的进度,并以实时方式进行讨论。然而,LMS在呈现和选择学习材料或资源方面存在一些不足。在LMS中,学生只获得由引导者组织的学习材料或学习资源。另一方面,个人学习环境(PLE)的概念出现了。PLE代表了学生如何决定去哪里学习的不同观点,因为他们是自己学习过程的主体和所有者,而不是客体。PLE允许学生通过预定义的在线课堂页面之外的服务或学习资源进行协作。本研究提出了在LMS中嵌入PLE概念的思路。目标是提供在线学习环境,将与LMS相同的结构化学习与PLE提供的灵活性和个性化相结合。
{"title":"Enhancing Online Classroom Towards Personalized Learning Environment","authors":"D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri","doi":"10.1109/ICOICT.2018.8528728","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528728","url":null,"abstract":"E-Learning is a process of learning combines self-motivation, communication, efficiency, and technology. One of the first innovations in practicing the concept of e-learning is by implementing Learning Management System (LMS) to place courses online so students' progress is trackable and discussions in real-time manner is possible. However, LMS has some drawbacks particularly in presenting and selecting learning materials or resources. On LMS, students are given only learning materials or learning resources that have been structured by the facilitator. On the other side, the idea of Personal Learning Environment (PLE) arises. PLE represents a different perspective on how students decide where are they going to learn, because they act as subjects and owners of their own learning process, not as objects. PLE enables students to collaborate through service or learning resources outside their predefined online classroom page. This research proposes the idea to embed the concept of PLE into LMS. The objective is to provide online learning environment that combines structured learning that is identical to the LMS with the flexibility and personalization that PLE offers.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing SDN Network Performance Using Load Balancing Scheme on Web Server 通过Web服务器负载均衡方案提高SDN网络性能
I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman
In this paper, we propose to test Least Connection and IP Hash load balancing algorithm to be applied to web servers over SDN networks. The use of load balancing on web servers over SDN networks began to attract many researchers. The problem of using appropriate load balancing algorithms for this case is still debatable. One of the problems is determining the correct algorithm for web server which has bound function (session). Load balancing algorithm that can provide stable performance is a static algorithm. However, this algorithm does not have a function bound to a server, so it is not possible to apply to a web server with bound functions, such as login session function. Therefore, a possible algorithm was developed for the function Two examples of algorithms that have the potential to be an effective algorithm for the case of this web server is the Hash and Least Connection IP algorithm. We have implemented and tested the load balancing performance using Least Connection and IP Hash algorithm. In this test, both algorithms will be tested with some crucial parameters for a web server. These parameters are Response Time, Throughput and Resource Utilization. The result of the test with the parameters is IP Hash algorithm gives performance response time 17% more optimal, 10% more optimal throughput and 8% usage memory more efficient than Least Connection algorithm.
在本文中,我们建议测试最小连接和IP哈希负载平衡算法应用于SDN网络上的web服务器。基于SDN网络的web服务器负载均衡技术的应用开始引起众多研究者的关注。在这种情况下使用适当的负载平衡算法的问题仍然存在争议。其中一个问题是确定具有绑定功能(会话)的web服务器的正确算法。负载均衡算法是一种静态算法,能够提供稳定的性能。但是,该算法没有绑定到服务器上的函数,因此无法应用于绑定了函数的web服务器,例如登录会话函数。因此,为该功能开发了一种可能的算法。对于该web服务器,有可能成为有效算法的两个算法示例是哈希和最小连接IP算法。我们使用最小连接和IP哈希算法实现并测试了负载均衡性能。在这个测试中,这两种算法将使用web服务器的一些关键参数进行测试。这些参数是响应时间、吞吐量和资源利用率。使用这些参数进行测试的结果是,IP哈希算法的性能响应时间比最小连接算法优化17%,最优吞吐量提高10%,内存使用效率提高8%。
{"title":"Increasing SDN Network Performance Using Load Balancing Scheme on Web Server","authors":"I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman","doi":"10.1109/ICOICT.2018.8528803","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528803","url":null,"abstract":"In this paper, we propose to test Least Connection and IP Hash load balancing algorithm to be applied to web servers over SDN networks. The use of load balancing on web servers over SDN networks began to attract many researchers. The problem of using appropriate load balancing algorithms for this case is still debatable. One of the problems is determining the correct algorithm for web server which has bound function (session). Load balancing algorithm that can provide stable performance is a static algorithm. However, this algorithm does not have a function bound to a server, so it is not possible to apply to a web server with bound functions, such as login session function. Therefore, a possible algorithm was developed for the function Two examples of algorithms that have the potential to be an effective algorithm for the case of this web server is the Hash and Least Connection IP algorithm. We have implemented and tested the load balancing performance using Least Connection and IP Hash algorithm. In this test, both algorithms will be tested with some crucial parameters for a web server. These parameters are Response Time, Throughput and Resource Utilization. The result of the test with the parameters is IP Hash algorithm gives performance response time 17% more optimal, 10% more optimal throughput and 8% usage memory more efficient than Least Connection algorithm.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fatigue Monitoring Based on Yawning and Head Movement 基于打哈欠和头部运动的疲劳监测
K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu
Driver fatigue is one of the main reasons causing traffic accidents. Yawning is an important character of driver fatigue. Mouth geometric character represents state of driver. So driver's mouth detection and information extraction is especially important. This paper proposes to locate and track driver's yawning based on mouth using camera to detect driver's fatigue in driving environment. Then contour algorithm features to detect driver's yawning and track it according to historical position. At last, yawning is detected by the ratio of mouth in the name of dark region as when he mouth is widely open. Through this method the resolution ratios which are transferred to percentage of driver's mouth is higher than one camera and the feature information to be more accuracy. The head movement is partially a phase where the fatigue would be detected by using face detection itself to detect the head movement. In order to get a clear vision of driver's fatigue, yawning and head movement activity will be the best to detect in a driving environment since it provides a better basis for driver fatigue judging.
驾驶员疲劳是造成交通事故的主要原因之一。打哈欠是驾驶员疲劳的一个重要特征。嘴部几何特征表征驾驶员的状态。因此驾驶员的口腔检测和信息提取就显得尤为重要。本文提出了一种基于嘴部定位和跟踪驾驶员打哈欠的方法,用于检测驾驶员在驾驶环境中的疲劳程度。然后利用轮廓特征对驾驶员的哈欠进行检测,并根据历史位置进行跟踪。最后,通过张大嘴巴时在黑暗区域的嘴巴比例来检测打哈欠。通过该方法,驾驶员嘴部比例的分辨率比单个摄像机高,特征信息更准确。头部运动部分是疲劳的阶段,使用人脸检测本身来检测头部运动。为了清晰地看到驾驶员的疲劳情况,在驾驶环境中最好检测到驾驶员的打哈欠和头部运动活动,因为这为驾驶员疲劳判断提供了更好的依据。
{"title":"Fatigue Monitoring Based on Yawning and Head Movement","authors":"K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu","doi":"10.1109/ICOICT.2018.8528759","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528759","url":null,"abstract":"Driver fatigue is one of the main reasons causing traffic accidents. Yawning is an important character of driver fatigue. Mouth geometric character represents state of driver. So driver's mouth detection and information extraction is especially important. This paper proposes to locate and track driver's yawning based on mouth using camera to detect driver's fatigue in driving environment. Then contour algorithm features to detect driver's yawning and track it according to historical position. At last, yawning is detected by the ratio of mouth in the name of dark region as when he mouth is widely open. Through this method the resolution ratios which are transferred to percentage of driver's mouth is higher than one camera and the feature information to be more accuracy. The head movement is partially a phase where the fatigue would be detected by using face detection itself to detect the head movement. In order to get a clear vision of driver's fatigue, yawning and head movement activity will be the best to detect in a driving environment since it provides a better basis for driver fatigue judging.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123606550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm 乒乓协议安全检测算法的反例生成
Erwin Eko Wahyudi, Reza Pulungan
An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform some operations to obtain the original message. Dolev et al. proposed an algorithm to check the security of ping-pong protocols using nondeterministic finite automata. In this paper, we propose an algorithm for generating counterexamples of unsecure protocols by storing the counterexamples using dynamic programming technique.
设计不当的发送消息协议可能容易受到主动攻击者的攻击。如果攻击者无法获得原始消息,则发送消息的协议称为安全协议。如果协议不安全,攻击者可能会执行一些操作来获取原始消息。Dolev等人提出了一种使用不确定性有限自动机检查乒乓协议安全性的算法。本文提出了一种利用动态规划技术存储反例来生成不安全协议反例的算法。
{"title":"Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm","authors":"Erwin Eko Wahyudi, Reza Pulungan","doi":"10.1109/ICOICT.2018.8528754","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528754","url":null,"abstract":"An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform some operations to obtain the original message. Dolev et al. proposed an algorithm to check the security of ping-pong protocols using nondeterministic finite automata. In this paper, we propose an algorithm for generating counterexamples of unsecure protocols by storing the counterexamples using dynamic programming technique.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototype 车载诊断II (OBD-II)在四轮汽车数据记录仪样机中的应用
Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah
The government has required public transport provider to equip their fleets with information tools if their fleets get in an accident. Currently, the collection of evidence of motor vehicle accidents by the authorities has not included data on the condition of the vehicle before the occurrence of the accident. Unlike an aircraft accident investigation that includes aircraft condition data derived from various sensors recorded in Flight Data Recorder (FDR). The recording data in FDR can be the evidence of the accident and it is expected to add to the accuracy of an accident investigation. Car Data Recorder Prototype is a system capable of recording the condition of four-wheeled vehicles and notify if there has been an accident. Vehicle condition recording utilizes Onboard Diagnostic-II (OBD-II) feature with parameter recording: gas pedal position, engine speed, vehicle speed, and engine temperature. Accident detection utilizes the ADXL345 accelerometer sensor and the condition of open or non-open airbag vehicles monitored by Diagnostic Trouble Code (DTC). If there is an indication of an accident, notification in the form of SMS will be sent by using GSM SIM800L module. Testing the data recording feature prototype car data recorder performed on city car is able to take advantage of features OBD-II to record the parameters that have been determined. Recorded data is processed into graphical information showing the position of the gas pedal, engine speed, vehicle speed, and engine temperature within a specified time range. There is a 5-second delay in recording data of engine speed and speed of the vehicle, but the data pattern of recording engine rotation is identical with 84.8% accuracy while the data of vehicle speed recording is also synonymous with 74.4% accuracy. Based on the accident simulation results, the ADXL345 and DTC accelerometer can detect frontal collisions and airbag conditions, which triggers GSM SIM800L to send SMS notification.
政府要求公共交通供应商在他们的车队发生事故时为他们的车队配备信息工具。目前,当局收集的机动车事故证据还没有包括事故发生前车辆状况的数据。与飞机事故调查不同,飞机事故调查包括从飞行数据记录仪(FDR)中记录的各种传感器获得的飞机状况数据。FDR中的记录数据可以作为事故的证据,并有望提高事故调查的准确性。汽车数据记录仪原型是一个能够记录四轮车辆状况并通知是否发生事故的系统。车辆状态记录利用车载诊断ii (OBD-II)功能,参数记录:油门踏板位置,发动机转速,车速和发动机温度。事故检测使用ADXL345加速度计传感器,并通过诊断故障代码(DTC)监测打开或未打开安全气囊车辆的状况。如果有事故迹象,将通过GSM SIM800L模块发送短信形式的通知。在城市汽车上测试数据记录功能原型车数据记录仪能够利用OBD-II功能记录已确定的参数。记录的数据被处理成图形信息,显示油门踏板的位置,发动机转速,车速和发动机温度在指定的时间范围内。记录发动机转速和车辆速度的数据有5秒的延迟,但记录发动机转速的数据模式相同,准确率为84.8%,记录车速的数据模式也相同,准确率为74.4%。根据事故仿真结果,ADXL345和DTC加速度计可以检测到前方碰撞和安全气囊状况,触发GSM SIM800L发送短信通知。
{"title":"Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototype","authors":"Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah","doi":"10.1109/ICOICT.2018.8528741","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528741","url":null,"abstract":"The government has required public transport provider to equip their fleets with information tools if their fleets get in an accident. Currently, the collection of evidence of motor vehicle accidents by the authorities has not included data on the condition of the vehicle before the occurrence of the accident. Unlike an aircraft accident investigation that includes aircraft condition data derived from various sensors recorded in Flight Data Recorder (FDR). The recording data in FDR can be the evidence of the accident and it is expected to add to the accuracy of an accident investigation. Car Data Recorder Prototype is a system capable of recording the condition of four-wheeled vehicles and notify if there has been an accident. Vehicle condition recording utilizes Onboard Diagnostic-II (OBD-II) feature with parameter recording: gas pedal position, engine speed, vehicle speed, and engine temperature. Accident detection utilizes the ADXL345 accelerometer sensor and the condition of open or non-open airbag vehicles monitored by Diagnostic Trouble Code (DTC). If there is an indication of an accident, notification in the form of SMS will be sent by using GSM SIM800L module. Testing the data recording feature prototype car data recorder performed on city car is able to take advantage of features OBD-II to record the parameters that have been determined. Recorded data is processed into graphical information showing the position of the gas pedal, engine speed, vehicle speed, and engine temperature within a specified time range. There is a 5-second delay in recording data of engine speed and speed of the vehicle, but the data pattern of recording engine rotation is identical with 84.8% accuracy while the data of vehicle speed recording is also synonymous with 74.4% accuracy. Based on the accident simulation results, the ADXL345 and DTC accelerometer can detect frontal collisions and airbag conditions, which triggers GSM SIM800L to send SMS notification.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132460023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting Indonesian Spammer on Twitter 检测印尼垃圾邮件在Twitter上
E. B. Setiawan, D. H. Widyantoro, K. Surendro
Nowadays, Twitter is one of the most popular social media today. However, Twitter has several problems that have negative impacts to the users, one of which is spam. We introduce a different approach compared to previous research are the scope of Indonesian-language Twitter, crawling automatically for user and tweets data, as well as the addition of new features. We use two features dimension, i.e., user-based and tweet-based. In this paper, we detect Indonesian spammers on Twitter using four classification algorithms, namely Naïve Bayes (NB), Support Vector Machine (SVM), Logistic Regression (Logit), and J48. The results are confirmed for having better accuracy that of the existing. The highest accuracy of 93,67% is achieved using Logistic Regression (Logit).
如今,Twitter是当今最受欢迎的社交媒体之一。然而,Twitter有几个对用户有负面影响的问题,其中一个是垃圾邮件。与之前的研究相比,我们引入了一种不同的方法,即印尼语Twitter的范围,自动抓取用户和推文数据,以及添加新功能。我们使用两个特征维度,即基于用户和基于tweet。本文使用Naïve贝叶斯(NB)、支持向量机(SVM)、逻辑回归(Logit)和J48四种分类算法检测Twitter上的印尼垃圾邮件发送者。结果表明,该方法具有较好的精度。使用逻辑回归(Logit)达到了93.67%的最高准确率。
{"title":"Detecting Indonesian Spammer on Twitter","authors":"E. B. Setiawan, D. H. Widyantoro, K. Surendro","doi":"10.1109/ICOICT.2018.8528773","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528773","url":null,"abstract":"Nowadays, Twitter is one of the most popular social media today. However, Twitter has several problems that have negative impacts to the users, one of which is spam. We introduce a different approach compared to previous research are the scope of Indonesian-language Twitter, crawling automatically for user and tweets data, as well as the addition of new features. We use two features dimension, i.e., user-based and tweet-based. In this paper, we detect Indonesian spammers on Twitter using four classification algorithms, namely Naïve Bayes (NB), Support Vector Machine (SVM), Logistic Regression (Logit), and J48. The results are confirmed for having better accuracy that of the existing. The highest accuracy of 93,67% is achieved using Logistic Regression (Logit).","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 6th International Conference on Information and Communication Technology (ICoICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1