Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010594
H. Shokrzadeh, Nazanin Bazyar, Seyed Mohammad Yousefi Limanjoobi, S. Khorsandi
One of the major problem in wireless sensor networks is query-driven routing, which especially arises when Sink searches for data for which the location in the network is unknown. Event information is propagated by Rumor Routing in some selected paths in the network, and as a result, an event trace is created. A route to the location of the event is established when a query agent crosses an event trace. The main objective of all Rumor-based algorithms is to increase the cross over rate for the query-agents. In Appointment-based Rumor Routing, contrary to other query-driven algorithms, agents' cross over occurs in a predetermined location called appointment point. In previous works, the appointment point is centrally calculated at the base station. In this paper, a distributed algorithm is proposed for appointment point selection. In order to estimate the parameters and the rank of a Gaussian Mixture used to model event locations, a Distributed Expectation-Maximization algorithm is designed to estimate the rank and parameters. In this case, a data fusion algorithm as well as a novel approach called Active Gaussian Mean is employed to determine the appointment point. The results of simulation under multiple scenarios provide a comparison of the proposed algorithms with the ones in the literature. The results show that the proposed algorithms are nearly optimal.
{"title":"Distributed expectation maximization in Appointment Rumor Routing in WSN","authors":"H. Shokrzadeh, Nazanin Bazyar, Seyed Mohammad Yousefi Limanjoobi, S. Khorsandi","doi":"10.1109/ICTS.2014.7010594","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010594","url":null,"abstract":"One of the major problem in wireless sensor networks is query-driven routing, which especially arises when Sink searches for data for which the location in the network is unknown. Event information is propagated by Rumor Routing in some selected paths in the network, and as a result, an event trace is created. A route to the location of the event is established when a query agent crosses an event trace. The main objective of all Rumor-based algorithms is to increase the cross over rate for the query-agents. In Appointment-based Rumor Routing, contrary to other query-driven algorithms, agents' cross over occurs in a predetermined location called appointment point. In previous works, the appointment point is centrally calculated at the base station. In this paper, a distributed algorithm is proposed for appointment point selection. In order to estimate the parameters and the rank of a Gaussian Mixture used to model event locations, a Distributed Expectation-Maximization algorithm is designed to estimate the rank and parameters. In this case, a data fusion algorithm as well as a novel approach called Active Gaussian Mean is employed to determine the appointment point. The results of simulation under multiple scenarios provide a comparison of the proposed algorithms with the ones in the literature. The results show that the proposed algorithms are nearly optimal.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121063675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010585
S. Paturusi, Y. Chisaki, T. Usagawa
Nowadays, the advancement in educational technology accelerated by the dissemination of Internet has a potential opportunity to improve the quality of education by encouraging participation and collaboration between lecturers and students. In education, quizzing and testing have typically been used as evaluative tools to assess student performance. This orientation may change, however, with the increasing use of online quiz and its facilities through tools available at universities. This study presents the development and evaluation of online quizzes and investigates whether they could be useful tools to assist students' learning in university. Moreover this research examines students' achievement in e-learning courses at Faculty of Engineering, Sam Ratulangi University (UNSRAT), Manado, Indonesia, especially through online quizzes, which are available in learning management system. In addition, when developing quizzes, there are necessary features in order to maximize it potential as a powerful learning tool, which will be discussed in this paper.
{"title":"Development and evaluation of online quizzes to enhance learning performance: A survey of student assessment through MOODLE in Indonesian National University","authors":"S. Paturusi, Y. Chisaki, T. Usagawa","doi":"10.1109/ICTS.2014.7010585","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010585","url":null,"abstract":"Nowadays, the advancement in educational technology accelerated by the dissemination of Internet has a potential opportunity to improve the quality of education by encouraging participation and collaboration between lecturers and students. In education, quizzing and testing have typically been used as evaluative tools to assess student performance. This orientation may change, however, with the increasing use of online quiz and its facilities through tools available at universities. This study presents the development and evaluation of online quizzes and investigates whether they could be useful tools to assist students' learning in university. Moreover this research examines students' achievement in e-learning courses at Faculty of Engineering, Sam Ratulangi University (UNSRAT), Manado, Indonesia, especially through online quizzes, which are available in learning management system. In addition, when developing quizzes, there are necessary features in order to maximize it potential as a powerful learning tool, which will be discussed in this paper.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116514343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010588
I. Pranata, G. Skinner
In today's online environment, ratings and trust are paramount to the validity of transactions. Many consider the trustworthiness of an online entity prior to engaging in a transaction or collaboration activity. To derive entity's trustworthiness, feedbacks and ratings about this entity must first be collected electronically from other entities (i.e. raters) in the environment. As with any electronic transmission, security always becomes a crucial issue. The tampered feedback and rating values would result in an invalid measurement of an entity's trustworthiness. Thus, this issue needs to be addressed to ensure the accuracy of the trustworthiness computation. In this paper, we propose a security extension to our TIDE (Trust In Digital Environment) framework. This security extension upholds the integrity of feedback and ratings value during its electronic transmissions. The inclusivity of this method further maintains the accuracy of TIDE trustworthiness computation. In addition, this security extension can be universally applied in other trust and reputation systems.
{"title":"A security extension for securing the feedback & rating values in TIDE framework","authors":"I. Pranata, G. Skinner","doi":"10.1109/ICTS.2014.7010588","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010588","url":null,"abstract":"In today's online environment, ratings and trust are paramount to the validity of transactions. Many consider the trustworthiness of an online entity prior to engaging in a transaction or collaboration activity. To derive entity's trustworthiness, feedbacks and ratings about this entity must first be collected electronically from other entities (i.e. raters) in the environment. As with any electronic transmission, security always becomes a crucial issue. The tampered feedback and rating values would result in an invalid measurement of an entity's trustworthiness. Thus, this issue needs to be addressed to ensure the accuracy of the trustworthiness computation. In this paper, we propose a security extension to our TIDE (Trust In Digital Environment) framework. This security extension upholds the integrity of feedback and ratings value during its electronic transmissions. The inclusivity of this method further maintains the accuracy of TIDE trustworthiness computation. In addition, this security extension can be universally applied in other trust and reputation systems.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010580
Heba A. Fasihuddin, G. Skinner, R. Athauda
Open learning represents a new form of online learning. It is based on providing courses, learning materials for free to be taken by any interested learner. The current model of open learning has certain limitations which provide potential for improvement. One such area is personalization in learning environments. One avenue to enhance learning experience in open learning environments is giving consideration to learning principles and cognitive science. This paper aims to introduce a proposal for an adaptive model to personalize the open learning environments based on the theory of learning styles and particularly the Felder and Silverman Learning Style Model (FSLSM). This model consists of two main agents to perform its functionalities. First, the identification agent which is responsible of identifying the learners' learning styles by monitoring certain determined patterns of learners' behaviors with learning objects while the learner interact with learning materials. Second, the recommender agent which is responsible of providing an adaptable navigational support based on the identified learning styles and preferences. The paper presents a description of the model and its functionalities including the patterns that can be monitored in open learning environments to identify the learning styles and also how the adaptation support can be provided based on the identified styles. Future implementation will test and verify this proposed model.
{"title":"Towards an adaptive model to personalise open learning environments using learning styles","authors":"Heba A. Fasihuddin, G. Skinner, R. Athauda","doi":"10.1109/ICTS.2014.7010580","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010580","url":null,"abstract":"Open learning represents a new form of online learning. It is based on providing courses, learning materials for free to be taken by any interested learner. The current model of open learning has certain limitations which provide potential for improvement. One such area is personalization in learning environments. One avenue to enhance learning experience in open learning environments is giving consideration to learning principles and cognitive science. This paper aims to introduce a proposal for an adaptive model to personalize the open learning environments based on the theory of learning styles and particularly the Felder and Silverman Learning Style Model (FSLSM). This model consists of two main agents to perform its functionalities. First, the identification agent which is responsible of identifying the learners' learning styles by monitoring certain determined patterns of learners' behaviors with learning objects while the learner interact with learning materials. Second, the recommender agent which is responsible of providing an adaptable navigational support based on the identified learning styles and preferences. The paper presents a description of the model and its functionalities including the patterns that can be monitored in open learning environments to identify the learning styles and also how the adaptation support can be provided based on the identified styles. Future implementation will test and verify this proposed model.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010569
A. F. Isnawati, Risanuri Hidayat, S. Sulistyo, I. Mustika
Scarcity of bandwidth and usage inefficiency of frequency band encourage of using cognitive radio technology. Being motivated by green wireless communication makes us enthusiasm to utilize femtocell as a network with low power consumption. Power control scheme is one of what we need in cognitive femtocell network to improve network performance. This paper implement a non cooperative power control algorithm using game theoretical approach in cognitive femtocell network to enhance the network performance in systems throughput, interference mitigation, and optimal power allocation while reducing inefficient transmit power. Feasible system is absolutely necessary in wireless communication, especially cognitive femtocell network. The results of the feasibility test, a nonnegative power vector, will be used as the reference for implementation of the next process related cost function in game theory.
{"title":"Preliminary study: Non cooperative power control game model for cognitive femtocell network","authors":"A. F. Isnawati, Risanuri Hidayat, S. Sulistyo, I. Mustika","doi":"10.1109/ICTS.2014.7010569","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010569","url":null,"abstract":"Scarcity of bandwidth and usage inefficiency of frequency band encourage of using cognitive radio technology. Being motivated by green wireless communication makes us enthusiasm to utilize femtocell as a network with low power consumption. Power control scheme is one of what we need in cognitive femtocell network to improve network performance. This paper implement a non cooperative power control algorithm using game theoretical approach in cognitive femtocell network to enhance the network performance in systems throughput, interference mitigation, and optimal power allocation while reducing inefficient transmit power. Feasible system is absolutely necessary in wireless communication, especially cognitive femtocell network. The results of the feasibility test, a nonnegative power vector, will be used as the reference for implementation of the next process related cost function in game theory.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010559
B. Bengherbia, A. Toubal, Aboubakre Leboukh, Madani Amine Saidi
Localization is one of the most complex issues in wireless sensor networks (WSN) domain, particularly, when the network is in indoor environments where the effect of multipath propagation is more pronounced. In this paper we have focused on several factors that effect on the localization accuracy, including the target environment itself, as well as the various parameters of the program proposed in this paper, which is basically based on fingerprinting method, which uses the k nearest neighbor's technique (k-NN) to estimate target positions. The parameters discussed is the number k of neighbors around the target, the choice of the method to calculate the distance between the target and the various neighboring (Euclidean or Manhattan distance), and Wt the weight function.
{"title":"The influence of k-NN parameters on the localization accuracy of WSNs in indoor environment","authors":"B. Bengherbia, A. Toubal, Aboubakre Leboukh, Madani Amine Saidi","doi":"10.1109/ICTS.2014.7010559","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010559","url":null,"abstract":"Localization is one of the most complex issues in wireless sensor networks (WSN) domain, particularly, when the network is in indoor environments where the effect of multipath propagation is more pronounced. In this paper we have focused on several factors that effect on the localization accuracy, including the target environment itself, as well as the various parameters of the program proposed in this paper, which is basically based on fingerprinting method, which uses the k nearest neighbor's technique (k-NN) to estimate target positions. The parameters discussed is the number k of neighbors around the target, the choice of the method to calculate the distance between the target and the various neighboring (Euclidean or Manhattan distance), and Wt the weight function.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010574
N. Jawas, A. Arifin, Arya Yudhi Wijaya, A. Yuniarti, Wijayanti Nurul Khotimah
Directional Filter Banks (DFB) is a method for directional decomposition. It has been used in image enhancement procedure that involved image with many edges. The design of Decimation-Free Directional Filter Bank (DDFB) is made to give a better result for enhancement. However, the design cannot give an adaptive directional decomposition based on input image. In this paper, we proposed a Non-Uniform Decimation-Free Directional Filter Bank (NUDDFB) using Histogram Analysis for Image Enhancement. NUDDFB can build an adaptive directional filter depends on the input image. The result shows that NUDDFB can separate each directional image better than DDFB. The use of this method in image enhancement helps to retain the image from over enhancement.
{"title":"Non-uniform decimation-free directional filter bank using histogram analysis for image enhancement","authors":"N. Jawas, A. Arifin, Arya Yudhi Wijaya, A. Yuniarti, Wijayanti Nurul Khotimah","doi":"10.1109/ICTS.2014.7010574","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010574","url":null,"abstract":"Directional Filter Banks (DFB) is a method for directional decomposition. It has been used in image enhancement procedure that involved image with many edges. The design of Decimation-Free Directional Filter Bank (DDFB) is made to give a better result for enhancement. However, the design cannot give an adaptive directional decomposition based on input image. In this paper, we proposed a Non-Uniform Decimation-Free Directional Filter Bank (NUDDFB) using Histogram Analysis for Image Enhancement. NUDDFB can build an adaptive directional filter depends on the input image. The result shows that NUDDFB can separate each directional image better than DDFB. The use of this method in image enhancement helps to retain the image from over enhancement.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010472
M. Rivai, K. Sambodho, H. Purnomo
There are still much potency of levee breaches in Indonesia. The levee strength is mostly influenced by the changing of its constituents. One of the key parameter of this phenomenon is the changing of soil water content in levee body. The increasing of soil water content will loosen the bonds among soil granules that may increase the potential of the levee breaches. The sequence of the changing parameter before levee breach is a crucial data. In this research, a monitoring system have been designed to collect the changing of soil water content using moisture sensor and to examine the changing of water level using ultrasonic sensor. These data will be further processed using fuzzy logic to identify the dangerous state describing the real of levee strength as an early warning system.
{"title":"Identification of levee strenght for early warning system using fuzzy logic","authors":"M. Rivai, K. Sambodho, H. Purnomo","doi":"10.1109/ICTS.2014.7010472","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010472","url":null,"abstract":"There are still much potency of levee breaches in Indonesia. The levee strength is mostly influenced by the changing of its constituents. One of the key parameter of this phenomenon is the changing of soil water content in levee body. The increasing of soil water content will loosen the bonds among soil granules that may increase the potential of the levee breaches. The sequence of the changing parameter before levee breach is a crucial data. In this research, a monitoring system have been designed to collect the changing of soil water content using moisture sensor and to examine the changing of water level using ultrasonic sensor. These data will be further processed using fuzzy logic to identify the dangerous state describing the real of levee strength as an early warning system.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010560
H. Mesra, H. Tjandrasa, C. Fatichah
This research introduces a new concept of compression with a different approach on lossless image compression that has been commonly known. The concept uses Reversible Contrast Mapping (RCM) which is a function of a simple integer transform developed for reversible watermarking method. The use of RCM in image compression is done similarly with the watermarking method. In this method, an image is divided into fixed-size blocks, the blocks are divided into two groups based on the data storage capacity. Blocks with smaller storage capacities are used as watermarks for the other blocks. The compression ratio of this method is similar to the Huffman compression. This method can also be used together with the Huffman compression technique to increase the overall compression ratio.
{"title":"A new approach for lossless image compression using Reversible Contrast Mapping (RCM)","authors":"H. Mesra, H. Tjandrasa, C. Fatichah","doi":"10.1109/ICTS.2014.7010560","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010560","url":null,"abstract":"This research introduces a new concept of compression with a different approach on lossless image compression that has been commonly known. The concept uses Reversible Contrast Mapping (RCM) which is a function of a simple integer transform developed for reversible watermarking method. The use of RCM in image compression is done similarly with the watermarking method. In this method, an image is divided into fixed-size blocks, the blocks are divided into two groups based on the data storage capacity. Blocks with smaller storage capacities are used as watermarks for the other blocks. The compression ratio of this method is similar to the Huffman compression. This method can also be used together with the Huffman compression technique to increase the overall compression ratio.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126230806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010578
Agastia Cestyakara, K. Surendro
A concept of smart society emphasizes the importance of ICT infrastructures investments to improve the quality of life and competitiveness of the society member. In order to implement this concept, it is necessary to assess the progress of the cities in effort towards Smart City. A research is held to 28 SMEs in Bandung to gather information about this topic. The main question of this research is to identify determinant factors which influence the social media adoption and to analyze adopters category based on their innovativeness. This research is based on a theory about diffusion of innovation and TOE Framework. The research result shows that most of the SMEs in Bandung are categorized as Early Majority. This research also depicts the social media usage by SMEs in Bandung and identifies some factors which influence is divided into 3 scales; high, medium, and low.
{"title":"Bandung towards Smart City — A study in SMEs for social media adoption and determinant factors","authors":"Agastia Cestyakara, K. Surendro","doi":"10.1109/ICTS.2014.7010578","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010578","url":null,"abstract":"A concept of smart society emphasizes the importance of ICT infrastructures investments to improve the quality of life and competitiveness of the society member. In order to implement this concept, it is necessary to assess the progress of the cities in effort towards Smart City. A research is held to 28 SMEs in Bandung to gather information about this topic. The main question of this research is to identify determinant factors which influence the social media adoption and to analyze adopters category based on their innovativeness. This research is based on a theory about diffusion of innovation and TOE Framework. The research result shows that most of the SMEs in Bandung are categorized as Early Majority. This research also depicts the social media usage by SMEs in Bandung and identifies some factors which influence is divided into 3 scales; high, medium, and low.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}