首页 > 最新文献

2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

英文 中文
Mongoloid and Non-Mongoloid Race Classification from Face Image Using Local Binary Pattern Feature Extractions 利用局部二值模式特征提取人脸图像进行蒙古人种和非蒙古人种分类
Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie
One of the areas on the human body that has the most dominant racial trait is the face. This research build the classification system for Mongoloid and non-Mongoloid race based on the area in the periorbital area of facial image. We use Local Binary Pattern to extract texture features on periorbital facial area. To classify the LBP features, we use Support Vector Machine classifier. The accuracy obtained from the system is 99.38%.
人类身体上最具种族特征的区域之一是面部。本研究基于人脸图像眶周区域的面积,构建了蒙古人种和非蒙古人种的分类系统。采用局部二值模式提取眶周面部纹理特征。为了对LBP特征进行分类,我们使用了支持向量机分类器。系统得到的精度为99.38%。
{"title":"Mongoloid and Non-Mongoloid Race Classification from Face Image Using Local Binary Pattern Feature Extractions","authors":"Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie","doi":"10.1109/ICOICT.2018.8528783","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528783","url":null,"abstract":"One of the areas on the human body that has the most dominant racial trait is the face. This research build the classification system for Mongoloid and non-Mongoloid race based on the area in the periorbital area of facial image. We use Local Binary Pattern to extract texture features on periorbital facial area. To classify the LBP features, we use Support Vector Machine classifier. The accuracy obtained from the system is 99.38%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Preliminary Study on Detection System for Assessing Children and Foster Parents Suitability 儿童及养父母适宜性评估检测系统初步研究
R. Andreswari, I. Darmawan, Warih Puspitasari
The adoption process is conducted in society aiming to give the right of foster children to get parents who can guarantee the welfare of children's life in the future. In Indonesia, the adoption process is regulated by law binding both from the side of foster parents and children. In fact, there are still some instances of adoption that are carried out outside of the provisions of the law and cause violations that harm foster children. Based on these problems, it is necessary to build a system that accommodates the needs both psychologically and materially from the side of children and parents. The existence of a detection system to assess the suitability between the two is to reduce the risk of violence in foster children. To build the system, it needs an algorithm capable of formulating several related factors. In this case, CARTs algorithm is an algorithm capable of predicting an optimal match that supports successful adoption of foster children.
收养过程是在社会上进行的,目的是将被收养儿童的权利交给能够保障儿童未来生活福利的父母。在印度尼西亚,收养过程受到法律的管制,对养父母和儿童双方都有约束力。事实上,仍有一些收养是在法律规定之外进行的,造成了伤害寄养儿童的违法行为。基于这些问题,有必要从儿童和家长的角度建立一个既能满足心理需求又能满足物质需求的制度。建立一个监测系统来评估两者之间的适宜性,是为了减少寄养儿童遭受暴力的风险。为了构建这个系统,它需要一个能够表述几个相关因素的算法。在这种情况下,cart算法是一种能够预测支持寄养儿童成功收养的最佳匹配的算法。
{"title":"A Preliminary Study on Detection System for Assessing Children and Foster Parents Suitability","authors":"R. Andreswari, I. Darmawan, Warih Puspitasari","doi":"10.1109/ICOICT.2018.8528785","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528785","url":null,"abstract":"The adoption process is conducted in society aiming to give the right of foster children to get parents who can guarantee the welfare of children's life in the future. In Indonesia, the adoption process is regulated by law binding both from the side of foster parents and children. In fact, there are still some instances of adoption that are carried out outside of the provisions of the law and cause violations that harm foster children. Based on these problems, it is necessary to build a system that accommodates the needs both psychologically and materially from the side of children and parents. The existence of a detection system to assess the suitability between the two is to reduce the risk of violence in foster children. To build the system, it needs an algorithm capable of formulating several related factors. In this case, CARTs algorithm is an algorithm capable of predicting an optimal match that supports successful adoption of foster children.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Cyber-Physical System-Based Automation on Plant Chemical Process: Study Case Mini Batch Distillation Column 基于信息物理系统的工厂化工过程自动化设计与实现——以小型间歇精馏塔为例
Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief
Nowadays network application system (internet) is widely used not only for information system but also for automation system. This technology brings new paradigm in managing manufacture that we know as industry 4.0 or Smart Manufacture System (SMS). One of the architecture of SMS is Cyber-Physical System (CPS). Applying CPS on automation system becomes a challenge because there are not standard for integrating this architecture yet. Existing automation system today uses pyramid architecture for integration system from field level (level 0) to business level (level 4). CPS-based automation can replace the pyramid architecture, where on the CPS-based automation each layer on pyramid architecture seems to be able to communicate directly using network from field level through business level. In this paper, CPS-based automation is proposed using MQTT protocol on mini batch distillation column to separate mix liquid between alcohol and water. To apply CPS-based automation, it necessary develops embedded systems that meet the three disciplines of communication, computer, and control. To implement CPS-based automation, MQTT protocol is used for communication system. Modification on sensors and actuators are necessary to connect physical and cyber system over MQTT protocol. Database system is also required for data acquisition in a form of historian data. In terms of controlling, a local automation system is built for system startup.
如今,网络应用系统(internet)不仅广泛应用于信息系统,也广泛应用于自动化系统。这项技术为管理制造带来了新的范例,我们称之为工业4.0或智能制造系统(SMS)。SMS的体系结构之一是信息物理系统(CPS)。由于目前还没有集成这种体系结构的标准,因此在自动化系统中应用CPS成为一个挑战。现有的自动化系统目前使用金字塔架构作为集成系统,从现场级(0级)到业务级(4级)。基于cps的自动化可以取代金字塔架构,在基于cps的自动化中,金字塔架构的每一层似乎都可以直接使用网络从现场级到业务级进行通信。本文采用MQTT协议,在小型间歇精馏塔上实现基于cps的醇水混合液分离自动化。为了实现基于cps的自动化,必须开发满足通信、计算机和控制三个学科的嵌入式系统。为了实现基于cps的自动化,通信系统采用MQTT协议。通过MQTT协议连接物理系统和网络系统需要对传感器和执行器进行修改。数据库系统还需要以历史数据的形式进行数据采集。在控制方面,建立了系统启动的局部自动化系统。
{"title":"Design and Implementation of Cyber-Physical System-Based Automation on Plant Chemical Process: Study Case Mini Batch Distillation Column","authors":"Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief","doi":"10.1109/ICOICT.2018.8528798","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528798","url":null,"abstract":"Nowadays network application system (internet) is widely used not only for information system but also for automation system. This technology brings new paradigm in managing manufacture that we know as industry 4.0 or Smart Manufacture System (SMS). One of the architecture of SMS is Cyber-Physical System (CPS). Applying CPS on automation system becomes a challenge because there are not standard for integrating this architecture yet. Existing automation system today uses pyramid architecture for integration system from field level (level 0) to business level (level 4). CPS-based automation can replace the pyramid architecture, where on the CPS-based automation each layer on pyramid architecture seems to be able to communicate directly using network from field level through business level. In this paper, CPS-based automation is proposed using MQTT protocol on mini batch distillation column to separate mix liquid between alcohol and water. To apply CPS-based automation, it necessary develops embedded systems that meet the three disciplines of communication, computer, and control. To implement CPS-based automation, MQTT protocol is used for communication system. Modification on sensors and actuators are necessary to connect physical and cyber system over MQTT protocol. Database system is also required for data acquisition in a form of historian data. In terms of controlling, a local automation system is built for system startup.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of Vehicle Traffic Analysis Using Background Subtraction in the Internet of Things (IoT) Architecture 物联网(IoT)架构中基于背景减法的车辆交通分析实现
A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda
Vehicle traffic analysis is one of the features that are provided in a smart city application. A camera is used to capture vehicles that are moving through on the road. Background subtraction is applied in order to detect the moving object, i.e., Gaussian Mixture Model. The system is developed under the Internet of Things (IoT) architecture, which all devices are associated using Internet connection. The calculated value is transmitted into cloud and received at the virtual server. Data are saved to a database and are able to be accessed through a web interface. We observe the applied system provides a good performance in terms of average accuracy exceeds 95.64%.
车辆交通分析是智慧城市应用程序提供的功能之一。摄像机用来捕捉在道路上行驶的车辆。采用背景减法检测运动目标,即高斯混合模型。该系统是在物联网(IoT)架构下开发的,所有设备都通过互联网连接相关联。计算值被传输到云中,并在虚拟服务器上接收。数据被保存到数据库中,并可以通过web界面访问。实验结果表明,应用系统具有良好的性能,平均准确率超过95.64%。
{"title":"Implementation of Vehicle Traffic Analysis Using Background Subtraction in the Internet of Things (IoT) Architecture","authors":"A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda","doi":"10.1109/ICOICT.2018.8528739","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528739","url":null,"abstract":"Vehicle traffic analysis is one of the features that are provided in a smart city application. A camera is used to capture vehicles that are moving through on the road. Background subtraction is applied in order to detect the moving object, i.e., Gaussian Mixture Model. The system is developed under the Internet of Things (IoT) architecture, which all devices are associated using Internet connection. The calculated value is transmitted into cloud and received at the virtual server. Data are saved to a database and are able to be accessed through a web interface. We observe the applied system provides a good performance in terms of average accuracy exceeds 95.64%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Visual Based Fire Detection System Using Speeded Up Robust Feature and Support Vector Machine 基于加速鲁棒特征和支持向量机的视觉火灾探测系统
Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani
This paper proposed a fire detection system using video captured from camera. We built the system using Speeded Up Robust Feature (SURF) feature extraction on three orthogonal plane to obtain the spatial and temporal features. We used Support Vector Machine (SVM) algorithm to classify the features as the fire or non-fire object. Using SURF threshold value 0, number of cluster 5 and gaussian SVM kernel, the system generated accuracy 81,25%.
本文提出了一种利用摄像机拍摄的视频进行火灾探测的系统。在三个正交平面上采用加速鲁棒特征(SURF)提取特征来获取图像的时空特征。我们使用支持向量机(SVM)算法将特征分类为火或非火对象。采用SURF阈值0、聚类数5和高斯SVM核,系统生成准确率为81.25%。
{"title":"Visual Based Fire Detection System Using Speeded Up Robust Feature and Support Vector Machine","authors":"Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani","doi":"10.1109/ICOICT.2018.8528752","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528752","url":null,"abstract":"This paper proposed a fire detection system using video captured from camera. We built the system using Speeded Up Robust Feature (SURF) feature extraction on three orthogonal plane to obtain the spatial and temporal features. We used Support Vector Machine (SVM) algorithm to classify the features as the fire or non-fire object. Using SURF threshold value 0, number of cluster 5 and gaussian SVM kernel, the system generated accuracy 81,25%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127781114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System 基于端口敲门和入侵检测的SSH蜜罐体系结构
Ridho Maulana Arifianto, Parman Sukarno, E. Jadied
This paper proposes an architecture of Secure Shell (SSH) honeypot using port knocking and Intrusion Detection System (IDS) to learn the information about attacks on SSH service and determine proper security mechanisms to deal with the attacks. Rapid development of information technology is directly proportional to the number of attacks, destruction, and data theft of a system. SSH service has become one of the popular targets from the whole vulnerabilities which is existed. Attacks on SSH service have various characteristics. Therefore, it is required to learn these characteristics by typically utilizing honeypots so that proper mechanisms can be applied in the real servers. Various attempts to learn the attacks and mitigate them have been proposed, however, attacks on SSH service are kept occurring. This research proposes a different and effective strategy to deal with the SSH service attack. This is done by combining port knocking and IDS to make the server keeps the service on a closed port and open it under user demand by sending predefined port sequence as an authentication process to control the access to the server. In doing so, it is evident that port knocking is effective in protecting SSH service. The number of login attempts obtained by using our proposed method is zero.
本文提出了一种基于端口敲门和入侵检测系统(IDS)的SSH蜜罐体系结构,以了解针对SSH服务的攻击信息,并确定适当的安全机制来应对攻击。信息技术的快速发展与系统遭受攻击、破坏和数据盗窃的次数成正比。从存在的各种漏洞来看,SSH服务已成为受欢迎的攻击目标之一。针对SSH服务的攻击有多种特点。因此,需要通过典型地使用蜜罐来了解这些特征,以便在实际服务器中应用适当的机制。已经提出了各种尝试来了解攻击并减轻攻击,但是,对SSH服务的攻击仍然不断发生。本研究提出了一种不同的、有效的策略来应对SSH服务攻击。这是通过结合端口敲门和IDS来实现的,通过发送预定义的端口序列作为身份验证过程来控制对服务器的访问,使服务器将服务保持在一个关闭的端口上,并在用户需要时打开它。由此可见,端口敲门在保护SSH服务方面是有效的。使用我们提出的方法获得的登录尝试次数为零。
{"title":"An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System","authors":"Ridho Maulana Arifianto, Parman Sukarno, E. Jadied","doi":"10.1109/ICOICT.2018.8528787","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528787","url":null,"abstract":"This paper proposes an architecture of Secure Shell (SSH) honeypot using port knocking and Intrusion Detection System (IDS) to learn the information about attacks on SSH service and determine proper security mechanisms to deal with the attacks. Rapid development of information technology is directly proportional to the number of attacks, destruction, and data theft of a system. SSH service has become one of the popular targets from the whole vulnerabilities which is existed. Attacks on SSH service have various characteristics. Therefore, it is required to learn these characteristics by typically utilizing honeypots so that proper mechanisms can be applied in the real servers. Various attempts to learn the attacks and mitigate them have been proposed, however, attacks on SSH service are kept occurring. This research proposes a different and effective strategy to deal with the SSH service attack. This is done by combining port knocking and IDS to make the server keeps the service on a closed port and open it under user demand by sending predefined port sequence as an authentication process to control the access to the server. In doing so, it is evident that port knocking is effective in protecting SSH service. The number of login attempts obtained by using our proposed method is zero.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling User Interface of First-Aid Application Game Using User Centered Design (UCD) Method 基于用户中心设计(UCD)方法的急救应用游戏用户界面建模
Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan
Children aged 10–12 years old are considered able to know and do first-aid. At those ages, children have been exposed to various learning medias. One of learning medias is game applications. Based on preliminary observations, by testing usability of existing game apps, User Interface is considered not good. Therefore, the users cannot use the application properly. This is caused by several factors. They are effectiveness, productivity, accessibility and universality. Applications that have low usability can be caused by the imperfection or insufficient of the application suitability with the needs of the user. In order to fit the user interface to the needs of the user, it is necessary to model the user interface of the first-aid application game using User Centered Design (UCD) method. Using UCD is used to generate a User Interface model that fits to the needs of the user. The modeling of the game application is formed in a prototype. After that, a test is conducted to the user to measure the usability of the game by using Quality in Use Integrated Measurement (QUIM). The results of usability testing is 81.05%.
10-12岁的儿童被认为能够知道和做急救。在这些年龄段,孩子们接触过各种各样的学习媒介。其中一种学习媒介便是游戏应用。根据初步观察,通过测试现有游戏应用的可用性,用户界面被认为不太好。用户将无法正常使用应用程序。这是由几个因素造成的。它们是有效性、生产力、可及性和普遍性。可用性较低的应用程序可能是由于应用程序与用户需求的不完美或不充分的适用性造成的。为了使用户界面符合用户需求,有必要采用以用户为中心的设计方法对急救应用游戏的用户界面进行建模。使用UCD可以生成适合用户需求的用户界面模型。游戏应用的建模是在原型中形成的。之后,对用户进行测试,使用Quality in Use Integrated Measurement (QUIM)来衡量游戏的可用性。可用性测试结果为81.05%。
{"title":"Modeling User Interface of First-Aid Application Game Using User Centered Design (UCD) Method","authors":"Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan","doi":"10.1109/ICOICT.2018.8528747","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528747","url":null,"abstract":"Children aged 10–12 years old are considered able to know and do first-aid. At those ages, children have been exposed to various learning medias. One of learning medias is game applications. Based on preliminary observations, by testing usability of existing game apps, User Interface is considered not good. Therefore, the users cannot use the application properly. This is caused by several factors. They are effectiveness, productivity, accessibility and universality. Applications that have low usability can be caused by the imperfection or insufficient of the application suitability with the needs of the user. In order to fit the user interface to the needs of the user, it is necessary to model the user interface of the first-aid application game using User Centered Design (UCD) method. Using UCD is used to generate a User Interface model that fits to the needs of the user. The modeling of the game application is formed in a prototype. After that, a test is conducted to the user to measure the usability of the game by using Quality in Use Integrated Measurement (QUIM). The results of usability testing is 81.05%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empowering Wearable Sensor Generated Data to Predict Changes in Individual's Sleep Quality 赋予可穿戴传感器生成的数据以预测个人睡眠质量的变化
W. Hidayat, Toufan D. Tambunan, Reza Budiawan
Wearable sensors found in popular wrist wearable device are both generating sales profit and constantly generating vast amount of data. Some of these wearable sensors are able to record physical activity and sleep trends, both are being mainly used to give insight to its users about their current and past health and well-being. We proposed a method of data preprocessing and machine learning using simple k-nearest neighbor classifier to furthermore empower the usage of such data to predict changes in one's sleep quality based on his or her current physical activity level. Our method were challenged to predict changes in five medically-approved sleep quality indicators, using data generated by commercially available consumer-grade wrist wearable device. The experiment result shows that the successful prediction of changes in sleep quality using wearable sensor generated data can be achieved by successfully selecting and sometimes combining the right input parameter(s). Each sleep quality indicators calls for different input parameter or combined parameters. By selecting and combining the right parameter(s), our method had successfully predict changes in both sleep duration and sleep efficiency with accuracy of 68% and 64%, respectively.
流行的腕式可穿戴设备中的可穿戴传感器在产生销售利润的同时,也不断产生大量的数据。其中一些可穿戴传感器能够记录身体活动和睡眠趋势,这两项主要用于向用户提供他们当前和过去的健康和福祉信息。我们提出了一种数据预处理和机器学习的方法,使用简单的k近邻分类器,进一步授权这些数据的使用,根据他或她当前的身体活动水平来预测一个人的睡眠质量变化。我们的方法面临着挑战,即使用市售的消费级手腕可穿戴设备生成的数据来预测五项医学认可的睡眠质量指标的变化。实验结果表明,利用可穿戴传感器生成的数据成功预测睡眠质量的变化,可以通过成功选择和有时组合正确的输入参数来实现。每个睡眠质量指标需要不同的输入参数或组合参数。通过选择和组合正确的参数,我们的方法成功地预测了睡眠持续时间和睡眠效率的变化,准确率分别为68%和64%。
{"title":"Empowering Wearable Sensor Generated Data to Predict Changes in Individual's Sleep Quality","authors":"W. Hidayat, Toufan D. Tambunan, Reza Budiawan","doi":"10.1109/ICOICT.2018.8528750","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528750","url":null,"abstract":"Wearable sensors found in popular wrist wearable device are both generating sales profit and constantly generating vast amount of data. Some of these wearable sensors are able to record physical activity and sleep trends, both are being mainly used to give insight to its users about their current and past health and well-being. We proposed a method of data preprocessing and machine learning using simple k-nearest neighbor classifier to furthermore empower the usage of such data to predict changes in one's sleep quality based on his or her current physical activity level. Our method were challenged to predict changes in five medically-approved sleep quality indicators, using data generated by commercially available consumer-grade wrist wearable device. The experiment result shows that the successful prediction of changes in sleep quality using wearable sensor generated data can be achieved by successfully selecting and sometimes combining the right input parameter(s). Each sleep quality indicators calls for different input parameter or combined parameters. By selecting and combining the right parameter(s), our method had successfully predict changes in both sleep duration and sleep efficiency with accuracy of 68% and 64%, respectively.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Evaluation of E-Readiness Cloud Computing Service Model Adoption on Indonesian Higher Education 印尼高等教育采用E-Readiness云计算服务模式的评估
Fajar Surya G Soni, Heru Nugroho
The adoption rate of cloud computing technology in Indonesia is still low. In fact, Indonesia is still considered in the early stages of adopting (early adopter). One of the requirements for a successful digital transformation program can be seen in the cloud adoption rate. Already many industries, businesses and government institutions that adopt cloud technology, but higher education are not optimal in utilizing it. Higher Education known the potential benefits of using cloud computing. This allows higher education to avoid providing excessive Information Technology (IT) infrastructure and reduce maintenance costs. With the development of technology and services in cloud computing, higher education must be ready and courageous in utilizing this technology. The previous research mentions that the factors that determine the adoption of IT in higher education are the Impact and Benefits of IT Products for Higher Education, Infrastructure Availability, Intercultural Competition, IT Knowledge Academic Civitas, Civitas Academic Participation, IT Leadership, Technology Trend, and the existence of Blue Print IT. Another study related to e-readiness of Cloud Computing Service states that the factors that greatly affect the process of readiness of cloud computing adoption in higher education are the availability of IT Infrastructure and good IT Planning. The problem arises when the concept of e-readiness is combined with the adoption of information technology in this case cloud computing. This paper will present the results of the evaluation of the e-readiness cloud computing adoption service model at higher education. The research method used is Design Science Research Method (DSRM) from Peffers with statistical data processing using SPSS software tools. The result of data processing shows that the measurement of e-readiness adoption of cloud computing service model in higher education is influenced by the availability and competence of IT staff, Infrastructure Availability, and the existence of good IT planning.
云计算技术在印尼的采用率仍然很低。事实上,印度尼西亚仍被认为处于采用(早期采用者)的早期阶段。成功的数字化转型计划的要求之一可以从云采用率中看出。已经有许多行业、企业和政府机构采用了云技术,但高等教育在利用它方面并不是最佳的。高等教育知道使用云计算的潜在好处。这使得高等教育可以避免提供过多的信息技术(IT)基础设施,并降低维护成本。随着云计算技术和服务的发展,高等教育必须做好利用云计算技术的准备和勇气。先前的研究提到,决定高等教育采用IT的因素是IT产品对高等教育的影响和效益、基础设施的可用性、跨文化竞争、IT知识学术文明、文明学术参与、IT领导、技术趋势和蓝图IT的存在。另一项与云计算服务的电子就绪度相关的研究表明,影响高等教育采用云计算准备过程的因素是IT基础设施的可用性和良好的IT规划。当电子准备的概念与信息技术(这里指云计算)的采用结合在一起时,问题就出现了。本文将介绍高等教育中电子就绪云计算采用服务模型的评估结果。研究方法采用Peffers的设计科学研究方法(Design Science research method, DSRM),使用SPSS软件工具对统计数据进行处理。数据处理的结果表明,高等教育采用云计算服务模式的电子准备程度受IT人员的可用性和能力、基础设施的可用性和良好的IT规划的存在的影响。
{"title":"An Evaluation of E-Readiness Cloud Computing Service Model Adoption on Indonesian Higher Education","authors":"Fajar Surya G Soni, Heru Nugroho","doi":"10.1109/ICOICT.2018.8528766","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528766","url":null,"abstract":"The adoption rate of cloud computing technology in Indonesia is still low. In fact, Indonesia is still considered in the early stages of adopting (early adopter). One of the requirements for a successful digital transformation program can be seen in the cloud adoption rate. Already many industries, businesses and government institutions that adopt cloud technology, but higher education are not optimal in utilizing it. Higher Education known the potential benefits of using cloud computing. This allows higher education to avoid providing excessive Information Technology (IT) infrastructure and reduce maintenance costs. With the development of technology and services in cloud computing, higher education must be ready and courageous in utilizing this technology. The previous research mentions that the factors that determine the adoption of IT in higher education are the Impact and Benefits of IT Products for Higher Education, Infrastructure Availability, Intercultural Competition, IT Knowledge Academic Civitas, Civitas Academic Participation, IT Leadership, Technology Trend, and the existence of Blue Print IT. Another study related to e-readiness of Cloud Computing Service states that the factors that greatly affect the process of readiness of cloud computing adoption in higher education are the availability of IT Infrastructure and good IT Planning. The problem arises when the concept of e-readiness is combined with the adoption of information technology in this case cloud computing. This paper will present the results of the evaluation of the e-readiness cloud computing adoption service model at higher education. The research method used is Design Science Research Method (DSRM) from Peffers with statistical data processing using SPSS software tools. The result of data processing shows that the measurement of e-readiness adoption of cloud computing service model in higher education is influenced by the availability and competence of IT staff, Infrastructure Availability, and the existence of good IT planning.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology) 软件定义网络体系结构中Dijkstra和Bellman-Ford算法的链路故障仿真(以电信大学拓扑为例)
Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho
In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined Network (SDN) that can overcome the link failure by configuring the controller in order to move to alternative links that have been provided with OpenFlow. This architecture separates the control plane and data plane, so it is centralized and programmable. To look for alternative links when a link failure occurs, the shortest path algorithm is Dijkstra and Bellman-Ford algorithms. The test parameters performed in this research are functionality to determine whether the two algorithms can determine the path or not, and convergence time to find out how long it takes to form the path from source to destination. Scenario of the test is done before and after the link failure occurs by using Ryu as controller and Mininet as emulator. Based on the results of the tests conducted, it was found that Dijkstra and Bellman-Ford algorithm can be applied well on link failure emulation in accordance with the scenario and topology used in the test. In addition to convergence time parameters obtained that Dijkstra algorithm is superior compared to Bellman-Ford algorithm. The difference gained in both scenarios has a value that is not so great the difference.
在Telkom大学,所使用的拓扑结构仍然是基于interVLAN的,每台交换机只有一条路径到交换核心,因此没有校园内部网络的备份链路,以防链路故障。如果路径上出现链路故障,数据包将无法从源端发送到目的端。针对这一问题,提出了一种新的体系结构,即软件定义网络(SDN),它可以通过配置控制器来克服链路故障,从而移动到OpenFlow提供的替代链路上。该体系结构将控制平面和数据平面分离,具有集中化和可编程性。为了在链路发生故障时寻找替代链路,最短路径算法是Dijkstra和Bellman-Ford算法。在本研究中进行的测试参数是功能性,以确定两种算法是否能够确定路径,收敛时间,以确定从源到目的形成路径需要多长时间。以Ryu为控制器,Mininet为仿真器,分别在链路发生故障前后进行测试。根据测试的结果,发现Dijkstra和Bellman-Ford算法可以很好地应用于测试场景和拓扑结构的链路故障仿真。除了得到的收敛时间参数外,Dijkstra算法优于Bellman-Ford算法。在这两种情况下获得的差异值都不是那么大。
{"title":"Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology)","authors":"Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho","doi":"10.1109/ICOICT.2018.8528809","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528809","url":null,"abstract":"In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined Network (SDN) that can overcome the link failure by configuring the controller in order to move to alternative links that have been provided with OpenFlow. This architecture separates the control plane and data plane, so it is centralized and programmable. To look for alternative links when a link failure occurs, the shortest path algorithm is Dijkstra and Bellman-Ford algorithms. The test parameters performed in this research are functionality to determine whether the two algorithms can determine the path or not, and convergence time to find out how long it takes to form the path from source to destination. Scenario of the test is done before and after the link failure occurs by using Ryu as controller and Mininet as emulator. Based on the results of the tests conducted, it was found that Dijkstra and Bellman-Ford algorithm can be applied well on link failure emulation in accordance with the scenario and topology used in the test. In addition to convergence time parameters obtained that Dijkstra algorithm is superior compared to Bellman-Ford algorithm. The difference gained in both scenarios has a value that is not so great the difference.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 6th International Conference on Information and Communication Technology (ICoICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1