Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320671
Won-Bin Kim, Imyeong Lee, Jaecheol Ryou
Data deduplication technology used to enhance Cloud Storage space efficiency is a method of comparing data stored in the Cloud with new data to be uploaded. However, there are various security threats in deduplication process. In addition, there are various efficiency problems in solving these problems. Therefore, in this study, the research was conducted to solve this problem.
{"title":"Improving dynamic ownership scheme for data deduplication","authors":"Won-Bin Kim, Imyeong Lee, Jaecheol Ryou","doi":"10.1109/CAIPT.2017.8320671","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320671","url":null,"abstract":"Data deduplication technology used to enhance Cloud Storage space efficiency is a method of comparing data stored in the Cloud with new data to be uploaded. However, there are various security threats in deduplication process. In addition, there are various efficiency problems in solving these problems. Therefore, in this study, the research was conducted to solve this problem.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320712
A. Pramono, Betty Dewi Puspasari, S. Kom
First aid has been taught in schools and related institutions, but most people are reluctant or even afraid to take this action, due to lack of knowledge, doubts, or even the inability to perform first aid measures. Handling information of First Aid in Accidents (P3K) is indispensable for the people in the right media. APJII and Puskakom UI survey revealed that most of internet users in Indonesia are using smartphone with an amount of 85 percent. These explanations are the motivations for developing the research. Development of Android-based mobile learning media is using a model of procedural development. The result of this research is in the form of instructional media using Android platform about handling P3K. Applications developed, designed as a companion media to deliver information so that the community as a user no longer need to spend the cost to access it so it can be used repeatedly. This research produced first aid instructional media with android platform. This medium can be run on the minimum android version of jelly bean 4.1.
{"title":"First aid instructional media using Android platform","authors":"A. Pramono, Betty Dewi Puspasari, S. Kom","doi":"10.1109/CAIPT.2017.8320712","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320712","url":null,"abstract":"First aid has been taught in schools and related institutions, but most people are reluctant or even afraid to take this action, due to lack of knowledge, doubts, or even the inability to perform first aid measures. Handling information of First Aid in Accidents (P3K) is indispensable for the people in the right media. APJII and Puskakom UI survey revealed that most of internet users in Indonesia are using smartphone with an amount of 85 percent. These explanations are the motivations for developing the research. Development of Android-based mobile learning media is using a model of procedural development. The result of this research is in the form of instructional media using Android platform about handling P3K. Applications developed, designed as a companion media to deliver information so that the community as a user no longer need to spend the cost to access it so it can be used repeatedly. This research produced first aid instructional media with android platform. This medium can be run on the minimum android version of jelly bean 4.1.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121632449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320693
M. Andriansyah, M. Subali, I. Purwanto, S. Irianto, Rizky Agung Pramono
The combination of technological advances in hardware and software brought new innovations. One of them is the application in home security system for the community. Electronic Identity Card (e-KTP), began to be applied as part of the vision of a Single Identity Number in Indonesia. The use of e-KTP provides many opportunities, one of which is used as the basis of residential security systems. Arduino UNO technology and Radio Frequency Identification (RFID) are utilized as part of the prototype of the security system to be built. This security system has the advantage of storing inbound access databases and is scalable in displaying databases using a browser. With the design of e-KTP based security system would give users awareness of the benefical of government-promoted e-KTP program.
{"title":"e-KTP as the basis of home security system using arduino UNO","authors":"M. Andriansyah, M. Subali, I. Purwanto, S. Irianto, Rizky Agung Pramono","doi":"10.1109/CAIPT.2017.8320693","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320693","url":null,"abstract":"The combination of technological advances in hardware and software brought new innovations. One of them is the application in home security system for the community. Electronic Identity Card (e-KTP), began to be applied as part of the vision of a Single Identity Number in Indonesia. The use of e-KTP provides many opportunities, one of which is used as the basis of residential security systems. Arduino UNO technology and Radio Frequency Identification (RFID) are utilized as part of the prototype of the security system to be built. This security system has the advantage of storing inbound access databases and is scalable in displaying databases using a browser. With the design of e-KTP based security system would give users awareness of the benefical of government-promoted e-KTP program.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320679
Emi Iryanti, Ridwan Pandiya
This paper analyzes the process in measuring the level of satisfaction of students of ST3 Telkom. All aspects previously applied are calculated based on the same weighting. Since some aspects are not too important for students, institution should recalculated the weights for each aspect. Based on the fact, this paper implements one of the multi criteria decision making problems method called Logarithmic Fuzzy Preference Programming (LFPP). This method allows respondents to compare the level of importance of each aspects which is then formed into a pairwise comparison matrix. After obtaining pairwise comparison matrix, the weights will be obtained by optimizing by the formula contained in LFPP. The obtained weights will be used by the institution as a basis especially in the determination of the aspects that should be given more attention. At the future, for the recommendation in this research that the formula used to calculate student satisfaction is average of criteria multiplied by weighting.
{"title":"Application of logarithmic fuzzy preference programming for determining priority as an institutional development strategy","authors":"Emi Iryanti, Ridwan Pandiya","doi":"10.1109/CAIPT.2017.8320679","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320679","url":null,"abstract":"This paper analyzes the process in measuring the level of satisfaction of students of ST3 Telkom. All aspects previously applied are calculated based on the same weighting. Since some aspects are not too important for students, institution should recalculated the weights for each aspect. Based on the fact, this paper implements one of the multi criteria decision making problems method called Logarithmic Fuzzy Preference Programming (LFPP). This method allows respondents to compare the level of importance of each aspects which is then formed into a pairwise comparison matrix. After obtaining pairwise comparison matrix, the weights will be obtained by optimizing by the formula contained in LFPP. The obtained weights will be used by the institution as a basis especially in the determination of the aspects that should be given more attention. At the future, for the recommendation in this research that the formula used to calculate student satisfaction is average of criteria multiplied by weighting.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130769639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320689
Ransug Seo
Modern society has a tendency to judge a person based on the person's appearance, and color is a key factor for better image making. This research used Personal Color Analysis through which each person can identify one's own unique color and applies the color into image making in order to give positive impression to others. In the first research, fabric draping was performed based on individual's body colors such as skin color, hair color, and eye color to categorize the body colors into spring, summer, autumn, and winter types depending on the degree of contrast of the body colors. In the second set of research, makeup was performed based on the matching colors from the four season types. In the third set of research, the matching hair color and design were applied to subjects. In conclusion, when we used make-up and hair colors based on the colors that match to colors of body parts, we would be able to produce effective image that is characterful and matching to individuals.
{"title":"A study of image-making by personal color analysis: A focus on autumn type make-up and hair","authors":"Ransug Seo","doi":"10.1109/CAIPT.2017.8320689","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320689","url":null,"abstract":"Modern society has a tendency to judge a person based on the person's appearance, and color is a key factor for better image making. This research used Personal Color Analysis through which each person can identify one's own unique color and applies the color into image making in order to give positive impression to others. In the first research, fabric draping was performed based on individual's body colors such as skin color, hair color, and eye color to categorize the body colors into spring, summer, autumn, and winter types depending on the degree of contrast of the body colors. In the second set of research, makeup was performed based on the matching colors from the four season types. In the third set of research, the matching hair color and design were applied to subjects. In conclusion, when we used make-up and hair colors based on the colors that match to colors of body parts, we would be able to produce effective image that is characterful and matching to individuals.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320690
Seong Bin Jeong, Hyun Ju Jo, Sung Hwan Cho, B. Lee
The purpose of this study aims to propose WAVE spectrum of communication system for autonomous vehicle in Korea. Automobile industry have tried to overcome industrial stagnation by converging ICT into vehicle driving technology. Vehicular communication system enables vehicle to provide innovative development in services such as autonomous driving. Recently, V2X communication systems raised as a core technology for future vehicle technology. Along with automobile manufacturer, fields in IT industrial enterprises have collaborated to develop vehicular communication systems focusing on WAVE. The study researched WAVE of communication system viewed in the environment of Korea and proposed suitable spectrum for V2X.
{"title":"Analysis on spectrum policy of WAVE for V2X communication system in automobile industry","authors":"Seong Bin Jeong, Hyun Ju Jo, Sung Hwan Cho, B. Lee","doi":"10.1109/CAIPT.2017.8320690","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320690","url":null,"abstract":"The purpose of this study aims to propose WAVE spectrum of communication system for autonomous vehicle in Korea. Automobile industry have tried to overcome industrial stagnation by converging ICT into vehicle driving technology. Vehicular communication system enables vehicle to provide innovative development in services such as autonomous driving. Recently, V2X communication systems raised as a core technology for future vehicle technology. Along with automobile manufacturer, fields in IT industrial enterprises have collaborated to develop vehicular communication systems focusing on WAVE. The study researched WAVE of communication system viewed in the environment of Korea and proposed suitable spectrum for V2X.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122813325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320667
T. Herlambang
This paper is the study on the development of navigation and guidance system for a missile. The development begins by determining the trajectory of missile which is the basic need to know where the missile shall be directed. Then the trajectory is used as a guidance so that the missile can reach the targets according to the given trajectory. The Ensemble Kalman Filter with a square root scheme (EnKF-SR) for the estimation of missile trajectory are applied to keep the missile on the trajectory track. The implementation of EnKF-SR algorithm on the Missile model is carried out by establishing two simulations, namely by generating 150 and 250 ensembles, respectively. The simulations exhibit that the generation of 250 ensembles will give more accurate results in comparison to the generation of 150 ensembles. Furthermore, the best simulation yields the tracking accuracy between the real and simulated trajectories is in the order of 99 %.
{"title":"Design of a navigation and guidance system of missile with trajectory estimation using ensemble Kalman Filter square root (EnKF-SR)","authors":"T. Herlambang","doi":"10.1109/CAIPT.2017.8320667","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320667","url":null,"abstract":"This paper is the study on the development of navigation and guidance system for a missile. The development begins by determining the trajectory of missile which is the basic need to know where the missile shall be directed. Then the trajectory is used as a guidance so that the missile can reach the targets according to the given trajectory. The Ensemble Kalman Filter with a square root scheme (EnKF-SR) for the estimation of missile trajectory are applied to keep the missile on the trajectory track. The implementation of EnKF-SR algorithm on the Missile model is carried out by establishing two simulations, namely by generating 150 and 250 ensembles, respectively. The simulations exhibit that the generation of 250 ensembles will give more accurate results in comparison to the generation of 150 ensembles. Furthermore, the best simulation yields the tracking accuracy between the real and simulated trajectories is in the order of 99 %.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320741
Jae-Hoon Lee, Chan-Kuk Jang, Okyeon Yi
In this paper, we analyze the radio based train control system using LTE-R to construct a secure communication environment, and examine the necessity of security by analyzing the risk of attack. In addition, we define the security requirements considering characteristics of the radio train control system and propose a security model by comparing with the security model in similar environment.
{"title":"Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system","authors":"Jae-Hoon Lee, Chan-Kuk Jang, Okyeon Yi","doi":"10.1109/CAIPT.2017.8320741","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320741","url":null,"abstract":"In this paper, we analyze the radio based train control system using LTE-R to construct a secure communication environment, and examine the necessity of security by analyzing the risk of attack. In addition, we define the security requirements considering characteristics of the radio train control system and propose a security model by comparing with the security model in similar environment.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320730
Tio Dharmawan, S. Rochimah
Refactoring is the method to detecting and fixing bad smells in software. Refactoring techniques that have developed is a refactoring technique that is done on the source code. Along with the development of model driven software engineering (MDSE), it also developed the method of refactoring on the model. Refactoring method in the model is considered more effective and efficient because the detection and repair of bad smell is done at the design phase. The method of refactoring on the model evolves into a variety of techniques. Due to this, the systematic literature review is done to get the development of refactoring method on the developing model.
{"title":"Systematic literature review: Model refactoring","authors":"Tio Dharmawan, S. Rochimah","doi":"10.1109/CAIPT.2017.8320730","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320730","url":null,"abstract":"Refactoring is the method to detecting and fixing bad smells in software. Refactoring techniques that have developed is a refactoring technique that is done on the source code. Along with the development of model driven software engineering (MDSE), it also developed the method of refactoring on the model. Refactoring method in the model is considered more effective and efficient because the detection and repair of bad smell is done at the design phase. The method of refactoring on the model evolves into a variety of techniques. Due to this, the systematic literature review is done to get the development of refactoring method on the developing model.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320734
A. Alsufyani
We compare six methods for classifying low signal-to-noise Event Related Potential (ERP) data into deceiving and nondeceiving. Three methods perform poorly: Correlation Coefficient (CD), Support Vector Machine with linear Kernel (LSVM) and SVM with radial basis kernel (RBSVM), while another, Amplitude Difference (AD), performs satisfactorily. However, a simple by-individual weight template method performs better still.
{"title":"A comparison of classification algorithms for Event Related Potentials","authors":"A. Alsufyani","doi":"10.1109/CAIPT.2017.8320734","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320734","url":null,"abstract":"We compare six methods for classifying low signal-to-noise Event Related Potential (ERP) data into deceiving and nondeceiving. Three methods perform poorly: Correlation Coefficient (CD), Support Vector Machine with linear Kernel (LSVM) and SVM with radial basis kernel (RBSVM), while another, Amplitude Difference (AD), performs satisfactorily. However, a simple by-individual weight template method performs better still.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}