首页 > 最新文献

Proceedings of the 2020 2nd Asia Pacific Information Technology Conference最新文献

英文 中文
Appraising Personal Data Protection in Startup Companies in Financial Technology: A Case Study of ABC Corp 金融科技创业公司个人数据保护评估——以ABC公司为例
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379322
M. Rozi, Y. G. Sucahyo, Arfive Gandhi, Y. Ruldeviyani
Financial Technology (fintech) has been immerged extensively in the last decade. In the realm of disruptive world, there are many areas in which startup companies are developing their business. There is always contradiction when dealing with innovation as core of digital disruption and how privacy remains as hot issues at the edge of everybody's talks. Internet plays important roles to sustain the trends. As rapidly growing country, 68% of Indonesian has access to the Internet. It drives startup companies on financial technology to innovate more and besides that they must comply to regulation in regard with personal data protection. This research aims to appraise how startup company on financial technology protect users' personal data. Personal data protection principles from international organization and Indonesian regulation regarding personal data protection are used to appraise how ABC Corp as a startup company that deliver financial technology service in Indonesian society. To ensure that its service is qualified and trustable, ABC Corp should be appraised using relevant criteria and qualitative approach. The results showed that most of regulations from sectorial supervising agency have been adhered by ABC Corp. The results bring meaningful insight to improve performance on personal data protection. They can became lessons for similar emerging startup companies in financial technology when acquiring their qualifications to protect users' personal data and keep their sustainability.
金融科技(fintech)在过去十年中得到了广泛的应用。在这个颠覆性的世界里,有许多领域是初创公司发展业务的领域。将创新视为数字颠覆的核心,与隐私仍然是每个人谈论的边缘热点问题,两者之间总是存在矛盾。互联网在维持这一趋势方面发挥着重要作用。作为一个快速发展的国家,68%的印尼人可以上网。它推动金融科技创业公司进行更多的创新,除此之外,他们必须遵守有关个人数据保护的规定。本研究旨在评估金融科技创业公司如何保护用户的个人数据。利用国际组织的个人数据保护原则和印尼的个人数据保护法规来评估ABC公司作为一家创业公司如何在印尼社会提供金融技术服务。为确保ABC公司的服务质量和可信赖性,应采用相关标准和定性方法对其进行评价。研究结果显示,农行公司对行业监管机构的大部分监管规定都得到了遵守,这对提高个人数据保护绩效具有重要的启示意义。在获得保护用户个人数据和保持可持续性的资格时,它们可以成为金融科技领域类似新兴初创公司的经验教训。
{"title":"Appraising Personal Data Protection in Startup Companies in Financial Technology: A Case Study of ABC Corp","authors":"M. Rozi, Y. G. Sucahyo, Arfive Gandhi, Y. Ruldeviyani","doi":"10.1145/3379310.3379322","DOIUrl":"https://doi.org/10.1145/3379310.3379322","url":null,"abstract":"Financial Technology (fintech) has been immerged extensively in the last decade. In the realm of disruptive world, there are many areas in which startup companies are developing their business. There is always contradiction when dealing with innovation as core of digital disruption and how privacy remains as hot issues at the edge of everybody's talks. Internet plays important roles to sustain the trends. As rapidly growing country, 68% of Indonesian has access to the Internet. It drives startup companies on financial technology to innovate more and besides that they must comply to regulation in regard with personal data protection. This research aims to appraise how startup company on financial technology protect users' personal data. Personal data protection principles from international organization and Indonesian regulation regarding personal data protection are used to appraise how ABC Corp as a startup company that deliver financial technology service in Indonesian society. To ensure that its service is qualified and trustable, ABC Corp should be appraised using relevant criteria and qualitative approach. The results showed that most of regulations from sectorial supervising agency have been adhered by ABC Corp. The results bring meaningful insight to improve performance on personal data protection. They can became lessons for similar emerging startup companies in financial technology when acquiring their qualifications to protect users' personal data and keep their sustainability.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fast Particle Swarm Optimization Algorithm by Refining the Global Best Solution 基于全局最优解的快速粒子群优化算法
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379328
Wang Hu, Yu Zhang, Junjie Hu, Yan Qi, Guoming Lu
A Fast Particle Swarm Optimization (FPSO) is proposed to improve the convergence response speed for some potential application scenarios such as the online or dynamical optimization environment which requires the fast convergence ability of an optimizer. Classical gradient-based optimization methods are good at finding the local optimal value of a convex region yet usually failure in searching the global optimal value of a multimodal problem. To further develop the characteristics of PSO with respect to the fast convergence and the global optimization, a pseudo-gradient method is proposed for calculating the approximate gradient at the location of the global best solution (gBest) of a swarm to refine the convergence accuracy of the gBest so as to accelerate the local convergence speed. The experimental results show that the performance of the proposed algorithm is significantly better than those of the five chosen competitive algorithms on a series of benchmark test functions with different characteristics. Furthermore, the sensitivity of the new introduced parameter in the proposed algorithm is empirically analyzed by a special experiment for recommending its best range of value.
针对在线或动态优化环境等对优化器的快速收敛能力有要求的应用场景,提出了一种快速粒子群优化算法(FPSO),提高了算法的收敛响应速度。经典的基于梯度的优化方法善于寻找凸区域的局部最优值,但在寻找多模态问题的全局最优值时往往失败。为了进一步发挥粒子群优化算法快速收敛和全局寻优的特点,提出了一种伪梯度法计算群全局最优解(gBest)位置的近似梯度,以提高gBest的收敛精度,从而加快局部收敛速度。实验结果表明,在一系列具有不同特征的基准测试函数上,所提算法的性能明显优于所选的5种竞争算法。此外,通过一个专门的实验,对算法中引入的新参数的灵敏度进行了实证分析,并推荐了其最佳取值范围。
{"title":"A Fast Particle Swarm Optimization Algorithm by Refining the Global Best Solution","authors":"Wang Hu, Yu Zhang, Junjie Hu, Yan Qi, Guoming Lu","doi":"10.1145/3379310.3379328","DOIUrl":"https://doi.org/10.1145/3379310.3379328","url":null,"abstract":"A Fast Particle Swarm Optimization (FPSO) is proposed to improve the convergence response speed for some potential application scenarios such as the online or dynamical optimization environment which requires the fast convergence ability of an optimizer. Classical gradient-based optimization methods are good at finding the local optimal value of a convex region yet usually failure in searching the global optimal value of a multimodal problem. To further develop the characteristics of PSO with respect to the fast convergence and the global optimization, a pseudo-gradient method is proposed for calculating the approximate gradient at the location of the global best solution (gBest) of a swarm to refine the convergence accuracy of the gBest so as to accelerate the local convergence speed. The experimental results show that the performance of the proposed algorithm is significantly better than those of the five chosen competitive algorithms on a series of benchmark test functions with different characteristics. Furthermore, the sensitivity of the new introduced parameter in the proposed algorithm is empirically analyzed by a special experiment for recommending its best range of value.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wearable Device Equipped with Door Alert and Mobile App for Security and Supervision 可穿戴设备,配备门报警和移动App,用于安全监管
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379314
Justin Daniel G. Baugbog, Mhir John Paul Manalo, Jose Mari M. Salonga, Elizabeth P. Naval, Eugenia R. Zhuo
Nowadays the percentage of old aged people that have Alzheimer's disease has increased over the years. Alzheimer's disease is one of the most crucial diseases that our loved ones might acquire. In this study, a device for patients with Alzheimer's disease and a mobile application for the guardian/s to lessen their stress and worries when taking care of the patient were developed. It is called Patient Security & Supervision Equipment(PS & SE), which has a 3-layer security, mainly: [1] The door alert that is equipped with modules like UHF RFID reader which is used as an identifier for the patient, and an activator for the PIR sensor, a motion detector and, a Wi-Fi module for the connection of the door alert to send notifications to the mobile application; [2] The wearable device that is equipped with modules, such as a GPS tracker to know the location of the patient, a GSM module used by the GPS module in sending coordinates to the Firebase database, and a UHF RFID tag. [3] Lastly, the mobile application, named as PSSE, is used by the guardian/s to check the location of the patient. Passcode security is required before accessing the application. Based on a series of testing, the device's accuracy and efficiency for locating the patient depend on the signal/speed of the internet on a certain location. Hence, the system is said to be viable and feasible in the medial industry for its application of Alzheimer's patients and the other mentally challenged patients after the evaluation and validation of a specialist doctor.
如今,老年痴呆症患者的比例逐年上升。阿尔茨海默病是我们所爱的人可能患上的最严重的疾病之一。在这项研究中,我们开发了一款针对阿尔茨海默病患者的设备和一款针对监护人的移动应用程序,以减轻他们在照顾患者时的压力和担忧。它被称为病人安全与监督设备(PS & SE),它有三层安全,主要是:b[1]门报警,它配备了UHF RFID读取器等模块,作为病人的标识符,PIR传感器的激活器,运动检测器和连接门报警的Wi-Fi模块,用于向移动应用程序发送通知;[2]可穿戴设备,配备了模块,如GPS跟踪器,知道病人的位置,GSM模块用于GPS模块发送坐标到Firebase数据库,和超高频RFID标签。[3]最后,监护人使用名为PSSE的移动应用程序来检查患者的位置。在访问应用程序之前需要密码安全性。经过一系列测试,该设备定位病人的准确性和效率取决于某一地点的网络信号/速度。因此,经过专科医生的评估和验证,该系统在医疗行业中应用于阿尔茨海默病患者和其他智障患者是可行的和可行的。
{"title":"Wearable Device Equipped with Door Alert and Mobile App for Security and Supervision","authors":"Justin Daniel G. Baugbog, Mhir John Paul Manalo, Jose Mari M. Salonga, Elizabeth P. Naval, Eugenia R. Zhuo","doi":"10.1145/3379310.3379314","DOIUrl":"https://doi.org/10.1145/3379310.3379314","url":null,"abstract":"Nowadays the percentage of old aged people that have Alzheimer's disease has increased over the years. Alzheimer's disease is one of the most crucial diseases that our loved ones might acquire. In this study, a device for patients with Alzheimer's disease and a mobile application for the guardian/s to lessen their stress and worries when taking care of the patient were developed. It is called Patient Security & Supervision Equipment(PS & SE), which has a 3-layer security, mainly: [1] The door alert that is equipped with modules like UHF RFID reader which is used as an identifier for the patient, and an activator for the PIR sensor, a motion detector and, a Wi-Fi module for the connection of the door alert to send notifications to the mobile application; [2] The wearable device that is equipped with modules, such as a GPS tracker to know the location of the patient, a GSM module used by the GPS module in sending coordinates to the Firebase database, and a UHF RFID tag. [3] Lastly, the mobile application, named as PSSE, is used by the guardian/s to check the location of the patient. Passcode security is required before accessing the application. Based on a series of testing, the device's accuracy and efficiency for locating the patient depend on the signal/speed of the internet on a certain location. Hence, the system is said to be viable and feasible in the medial industry for its application of Alzheimer's patients and the other mentally challenged patients after the evaluation and validation of a specialist doctor.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5 基于SHA256和MD5的云计算患者数据安全
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3381043
D. Jatikusumo, Ida Nurhaida
Patient data archiving in a medical institution is a relatively critical asset. If the data are managed by irresponsible parties, it will be risky both for the patients and the institutions. Therefore, data securing of patients are required to prevent negative impacts. The method in this study uses a prototype cycle, in making patient registration applications online. The technique used in this study is a combination of MD5 and SHA256 to be optimized for the data sent from database to the users, so that the encryption results in concise filing and timing.
在医疗机构中,患者数据存档是一项相对重要的资产。如果数据由不负责任的方管理,对患者和机构来说都是有风险的。因此,需要对患者进行数据保护,以防止负面影响。本研究中的方法使用了一个原型周期,使患者在线注册申请。本研究中使用的技术是MD5和SHA256的组合,对从数据库发送给用户的数据进行优化,使加密结果简洁归档和定时。
{"title":"Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5","authors":"D. Jatikusumo, Ida Nurhaida","doi":"10.1145/3379310.3381043","DOIUrl":"https://doi.org/10.1145/3379310.3381043","url":null,"abstract":"Patient data archiving in a medical institution is a relatively critical asset. If the data are managed by irresponsible parties, it will be risky both for the patients and the institutions. Therefore, data securing of patients are required to prevent negative impacts. The method in this study uses a prototype cycle, in making patient registration applications online. The technique used in this study is a combination of MD5 and SHA256 to be optimized for the data sent from database to the users, so that the encryption results in concise filing and timing.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stock Price Movement Prediction Using Technical Analysis and Sentiment Analysis 利用技术分析和情绪分析预测股价走势
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3381045
Tommy Wijaya Sagala, M. Saputri, Rahmad Mahendra, I. Budi
This study aims to predict stock price movement using combination of technical analysis and sentiment analysis. When conducting stock transactions, the traders consider not only market activities but also the sentiments expressed within information reported in media. We build the classifier to categorize the price quotes into one of three classes: "up", "down", and "constant". We conduct the experiment with several algorithms, i.e. Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Naïve Bayes. The results of our empirical study is that the highest accuracy achieved from the method combining features from historical data and online media sentiment, on 5 days trading window using the SVM algorithm.
本研究旨在运用技术分析与情绪分析相结合的方法来预测股价走势。在进行股票交易时,交易者不仅要考虑市场活动,还要考虑媒体报道的信息所表达的情绪。我们构建分类器将价格报价分为三类:“上涨”、“下跌”和“不变”。我们使用支持向量机(SVM)、k近邻(KNN)和Naïve贝叶斯等算法进行实验。我们的实证研究结果表明,结合历史数据和网络媒体情绪特征的方法在使用SVM算法的5天交易窗口上取得了最高的准确性。
{"title":"Stock Price Movement Prediction Using Technical Analysis and Sentiment Analysis","authors":"Tommy Wijaya Sagala, M. Saputri, Rahmad Mahendra, I. Budi","doi":"10.1145/3379310.3381045","DOIUrl":"https://doi.org/10.1145/3379310.3381045","url":null,"abstract":"This study aims to predict stock price movement using combination of technical analysis and sentiment analysis. When conducting stock transactions, the traders consider not only market activities but also the sentiments expressed within information reported in media. We build the classifier to categorize the price quotes into one of three classes: \"up\", \"down\", and \"constant\". We conduct the experiment with several algorithms, i.e. Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Naïve Bayes. The results of our empirical study is that the highest accuracy achieved from the method combining features from historical data and online media sentiment, on 5 days trading window using the SVM algorithm.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
D-Loc Apps: A Location Detection Application Based on Social Media Platform in the Event of A Flood Disaster D-Loc Apps:一款基于社交媒体平台的洪水灾害定位应用
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3381041
D. Fitrianah, D. Jatikusumo, Ida Nurhaida
The purpose of this research is to develop a disaster location detector application, specifically about flood that happens in the area of Jakarta, Indonesia. According to social media data updated by the users of twitter, search inquiry is done by its users with the keyword 'seputaran banjir' (in Bahasa Indonesia) which is combined with the Location Based Service function of the determined word search. The method in creating this application is Extreme Programming that uses repetitive and incremental development process approach. By using twitter status data about Jakarta's area, this application has been successfully developed and the result can be shown in the form of twitter status updates from its users that contain words about flood. The search results of flood location validation are coordinates, which are done by checking the availability of the geospatial information from each update of the data. The average accuracy of the search result is 83.7% out of all the location search results.
本研究的目的是开发一种灾害定位探测器应用程序,特别是发生在印度尼西亚雅加达地区的洪水。根据twitter用户更新的社交媒体数据,搜索查询是由其用户使用关键字“seputaran banjir”(印尼语)与确定词搜索的基于位置的服务功能相结合进行的。创建此应用程序的方法是使用重复和增量开发过程方法的极限编程。通过使用有关雅加达地区的twitter状态数据,这款应用程序已经成功开发,结果可以以twitter状态更新的形式显示,其中包含有关洪水的单词。洪水位置验证的搜索结果是坐标,这是通过检查每次更新数据的地理空间信息的可用性来完成的。在所有位置搜索结果中,搜索结果的平均准确率为83.7%。
{"title":"D-Loc Apps: A Location Detection Application Based on Social Media Platform in the Event of A Flood Disaster","authors":"D. Fitrianah, D. Jatikusumo, Ida Nurhaida","doi":"10.1145/3379310.3381041","DOIUrl":"https://doi.org/10.1145/3379310.3381041","url":null,"abstract":"The purpose of this research is to develop a disaster location detector application, specifically about flood that happens in the area of Jakarta, Indonesia. According to social media data updated by the users of twitter, search inquiry is done by its users with the keyword 'seputaran banjir' (in Bahasa Indonesia) which is combined with the Location Based Service function of the determined word search. The method in creating this application is Extreme Programming that uses repetitive and incremental development process approach. By using twitter status data about Jakarta's area, this application has been successfully developed and the result can be shown in the form of twitter status updates from its users that contain words about flood. The search results of flood location validation are coordinates, which are done by checking the availability of the geospatial information from each update of the data. The average accuracy of the search result is 83.7% out of all the location search results.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identifying Social Network Delusion to Investigate Addiction Ratio using Data Mining 利用数据挖掘识别社交网络错觉以调查成瘾率
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379321
K. Thakre, Deepali Dawande, Vaidehi S. Thakre
Mining social media is the process of defining, analyzing, and extracting applicative patterns and trends from row social media data. Social media are very popular way of expressing opinions and interacting with many individual in the online world. However growing number of social network delusion among various age categories are recently noted. Mental sickness can have a deep influence on person, families, and society as well. Hence, we propose a framework that analyzes Social Network Delusion (SND) and investigates the addiction ratio. This work first defines the framework for analyzing the social network delusion based on mining online social behavior that provides an early stage opportunity to identify SNDs (Social Network Delusion). The proposed system mainly works in three phases. Feature extraction and analysis of the various posts posted by the users on Facebook, Instagram and Twitter is performed by using mining algorithm in the first step. The SND prediction using the extracted features is done in the second phase; Third phase uses the predicted results as an input for investigating the addiction ratio. We investigate the addiction ratio among different genders and age groups for analyzing the prevention strategies against growing number of SND.
挖掘社交媒体是指从社交媒体数据中定义、分析和提取应用模式和趋势的过程。社交媒体是一种非常流行的表达观点和与网络世界中许多人互动的方式。但是,最近在各年龄层中出现了越来越多的社交网络妄想症。精神疾病会对个人、家庭和社会产生深远的影响。因此,我们提出了一个分析社交网络妄想(SND)并调查成瘾比率的框架。这项工作首先定义了分析社交网络妄想的框架,该框架基于挖掘在线社交行为,为识别SNDs(社交网络妄想)提供了早期机会。本系统主要分为三个阶段。第一步使用挖掘算法对用户在Facebook、Instagram和Twitter上发布的各种帖子进行特征提取和分析。在第二阶段使用提取的特征进行SND预测;第三阶段使用预测结果作为调查成瘾比率的输入。我们调查了不同性别和年龄组的成瘾比例,以分析针对日益增长的SND的预防策略。
{"title":"Identifying Social Network Delusion to Investigate Addiction Ratio using Data Mining","authors":"K. Thakre, Deepali Dawande, Vaidehi S. Thakre","doi":"10.1145/3379310.3379321","DOIUrl":"https://doi.org/10.1145/3379310.3379321","url":null,"abstract":"Mining social media is the process of defining, analyzing, and extracting applicative patterns and trends from row social media data. Social media are very popular way of expressing opinions and interacting with many individual in the online world. However growing number of social network delusion among various age categories are recently noted. Mental sickness can have a deep influence on person, families, and society as well. Hence, we propose a framework that analyzes Social Network Delusion (SND) and investigates the addiction ratio. This work first defines the framework for analyzing the social network delusion based on mining online social behavior that provides an early stage opportunity to identify SNDs (Social Network Delusion). The proposed system mainly works in three phases. Feature extraction and analysis of the various posts posted by the users on Facebook, Instagram and Twitter is performed by using mining algorithm in the first step. The SND prediction using the extracted features is done in the second phase; Third phase uses the predicted results as an input for investigating the addiction ratio. We investigate the addiction ratio among different genders and age groups for analyzing the prevention strategies against growing number of SND.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Classification of Sashimi Food Using Multispectral Technology 刺身食品的多光谱识别与分类
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379317
Ismail Parewai, M. As, Tsunenori Mine, Mario Koeppen
?Food quality inspection is an essential factor in our daily lives. Food inspection is analyzing heterogeneous food data from different sources for perception, recognition, judgment, and monitoring. This study aims to provide an accurate system in image processing techniques for the inspection and classification of sashimi food damage based on detecting external data. The external texture was identified based on the visible and invisible system that was acquired using multispectral technology. We proposed the Grey Level Co-occurrence Matrix (GLCM) model for analysis of the texture features of images and the classification process was performed using Artificial Neural Network (ANN) method. This study showed that multispectral technology is a useful system for the assessment of sashimi food and the experimental also indicates that the invisible channels have the potential in the classification model, since the hidden texture features that are not clearly visible to the human eye.
食品质量检验是我们日常生活中必不可少的因素。食品检验是对来自不同来源的异质食品数据进行分析,以进行感知、识别、判断和监控。本研究旨在为基于外部数据检测的刺身食品损伤检测与分类提供一套准确的图像处理技术系统。基于多光谱技术获取的可见和不可见系统,对外部纹理进行识别。提出了灰度共生矩阵(GLCM)模型对图像纹理特征进行分析,并采用人工神经网络(ANN)方法对图像进行分类。本研究表明,多光谱技术是一种有用的刺身食品评估系统,实验也表明,不可见通道在分类模型中具有潜力,因为它隐藏了人眼不清楚可见的纹理特征。
{"title":"Identification and Classification of Sashimi Food Using Multispectral Technology","authors":"Ismail Parewai, M. As, Tsunenori Mine, Mario Koeppen","doi":"10.1145/3379310.3379317","DOIUrl":"https://doi.org/10.1145/3379310.3379317","url":null,"abstract":"?Food quality inspection is an essential factor in our daily lives. Food inspection is analyzing heterogeneous food data from different sources for perception, recognition, judgment, and monitoring. This study aims to provide an accurate system in image processing techniques for the inspection and classification of sashimi food damage based on detecting external data. The external texture was identified based on the visible and invisible system that was acquired using multispectral technology. We proposed the Grey Level Co-occurrence Matrix (GLCM) model for analysis of the texture features of images and the classification process was performed using Artificial Neural Network (ANN) method. This study showed that multispectral technology is a useful system for the assessment of sashimi food and the experimental also indicates that the invisible channels have the potential in the classification model, since the hidden texture features that are not clearly visible to the human eye.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Lecturer Performance Report in Indonesia with Model View Controller (MVC) Architecture 基于模型-视图-控制器(MVC)架构的讲师绩效报告在印尼的应用
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379320
Ester Lumba, Alexander Waworuntu
Lecturers in Indonesia have a fundamental obligation to conduct Tri Dharma activities consisting of teaching, research and community service. Most higher education institutions use Tri Dharma as a measure of lecturer's performance. In addition, lecturer activity data related to Tri Dharma is needed by the head of study program and department related to research, publication and community service to be stored which will be used as a source of data during the accreditation process. This paper discusses the application development of lecturer performance reports using the Model View Controller (MVC) architecture with Java programming language. The result is a desktop-based application that will be used by the head of the study program and the lecturers.
印尼的讲师有进行三法活动的基本义务,包括教学、研究和社区服务。大多数高等教育机构使用三法作为衡量讲师表现的标准。此外,与三法相关的讲师活动数据需要由研究项目负责人和与研究、出版和社区服务相关的部门存储,这些数据将在认证过程中用作数据来源。本文讨论了采用模型-视图-控制器(Model - View - Controller, MVC)架构和Java编程语言开发讲师绩效报告的应用程序。其结果是一个基于桌面的应用程序,将由学习项目的负责人和讲师使用。
{"title":"Application of Lecturer Performance Report in Indonesia with Model View Controller (MVC) Architecture","authors":"Ester Lumba, Alexander Waworuntu","doi":"10.1145/3379310.3379320","DOIUrl":"https://doi.org/10.1145/3379310.3379320","url":null,"abstract":"Lecturers in Indonesia have a fundamental obligation to conduct Tri Dharma activities consisting of teaching, research and community service. Most higher education institutions use Tri Dharma as a measure of lecturer's performance. In addition, lecturer activity data related to Tri Dharma is needed by the head of study program and department related to research, publication and community service to be stored which will be used as a source of data during the accreditation process. This paper discusses the application development of lecturer performance reports using the Model View Controller (MVC) architecture with Java programming language. The result is a desktop-based application that will be used by the head of the study program and the lecturers.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure 针对云基础设施的加密劫持攻击实例研究
Pub Date : 2020-01-17 DOI: 10.1145/3379310.3379323
K.P.K.C. Jayasinghe, Guhanathan Poravi
Cryptojacking is the act of using an individual's or an organization's computational power in order to mine cryptocurrency. In some scenarios, this can be considered as a monetization strategy, very much similar to advertisements. But to do so without the explicit consent of the computer owners is considered illegitimate. During previous years, attackers' focus was heavily laid on browser-based cryptojacking. However, it was noted that the attackers are now shifting their attention to more robust, more superior targets, such as cloud servers and cloud infrastructure. This paper analyses 11 forms of practical scenarios of cryptojacking attacks that are targeted towards cloud infrastructure. We carefully look at their similarities and properties, comparing those features with the limitations of existing literature regarding the detection systems. In this paper, we survey the attack forms, and we also survey the limitations of existing literature as an attempt to outline the research gap between the practical scenarios and existing work.
加密劫持是利用个人或组织的计算能力来挖掘加密货币的行为。在某些情况下,这可以被视为一种盈利策略,与广告非常相似。但是,在没有得到电脑所有者明确同意的情况下这样做被认为是非法的。在前几年,攻击者的重点主要放在基于浏览器的加密劫持上。然而,值得注意的是,攻击者现在正将注意力转移到更强大、更优越的目标上,比如云服务器和云基础设施。本文分析了针对云基础设施的11种加密劫持攻击的实际场景。我们仔细研究了它们的相似之处和特性,并将这些特征与现有文献中有关检测系统的局限性进行了比较。在本文中,我们调查了攻击形式,并调查了现有文献的局限性,试图概述实际场景与现有工作之间的研究差距。
{"title":"A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure","authors":"K.P.K.C. Jayasinghe, Guhanathan Poravi","doi":"10.1145/3379310.3379323","DOIUrl":"https://doi.org/10.1145/3379310.3379323","url":null,"abstract":"Cryptojacking is the act of using an individual's or an organization's computational power in order to mine cryptocurrency. In some scenarios, this can be considered as a monetization strategy, very much similar to advertisements. But to do so without the explicit consent of the computer owners is considered illegitimate. During previous years, attackers' focus was heavily laid on browser-based cryptojacking. However, it was noted that the attackers are now shifting their attention to more robust, more superior targets, such as cloud servers and cloud infrastructure. This paper analyses 11 forms of practical scenarios of cryptojacking attacks that are targeted towards cloud infrastructure. We carefully look at their similarities and properties, comparing those features with the limitations of existing literature regarding the detection systems. In this paper, we survey the attack forms, and we also survey the limitations of existing literature as an attempt to outline the research gap between the practical scenarios and existing work.","PeriodicalId":348326,"journal":{"name":"Proceedings of the 2020 2nd Asia Pacific Information Technology Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126744332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
Proceedings of the 2020 2nd Asia Pacific Information Technology Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1