首页 > 最新文献

2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)最新文献

英文 中文
Policy development of sharing economy in Korea: Case of home-sharing 韩国共享经济的政策发展:以民宿共享为例
Sanghyun Lee, B. Lee
Sharing economy companies such as Airbnb and Uber have experienced exponential growth in popularity in recent years. The sharing economy is an emergent economic-technological phenomenon fostered by the developments in Information Technology. The paper attempts to address the problem of regulation in sharing economy in the field of home-sharing. Based on the results from interviews with the regulators in the central and provincial governments of Korea and the Public Policy Managers of Airbnb, we identify and suggest policy considerations and strategies for sharing economy in Korea. Our results not only help in understanding the policy developments in the field of sharing economy, but also help in developing the required robust policy and legal framework to support and strengthen the sharing economy in Korea.
近年来,Airbnb和Uber等共享经济公司的受欢迎程度呈指数级增长。共享经济是信息技术发展催生的新兴经济技术现象。本文试图从民宿共享领域探讨共享经济的监管问题。根据对韩国中央和地方政府监管机构以及Airbnb公共政策经理的访谈结果,我们确定并建议韩国共享经济的政策考虑和策略。我们的研究结果不仅有助于了解共享经济领域的政策发展,还有助于制定必要的健全政策和法律框架,以支持和加强韩国的共享经济。
{"title":"Policy development of sharing economy in Korea: Case of home-sharing","authors":"Sanghyun Lee, B. Lee","doi":"10.1109/CAIPT.2017.8320751","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320751","url":null,"abstract":"Sharing economy companies such as Airbnb and Uber have experienced exponential growth in popularity in recent years. The sharing economy is an emergent economic-technological phenomenon fostered by the developments in Information Technology. The paper attempts to address the problem of regulation in sharing economy in the field of home-sharing. Based on the results from interviews with the regulators in the central and provincial governments of Korea and the Public Policy Managers of Airbnb, we identify and suggest policy considerations and strategies for sharing economy in Korea. Our results not only help in understanding the policy developments in the field of sharing economy, but also help in developing the required robust policy and legal framework to support and strengthen the sharing economy in Korea.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130540295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling disaster-resilient SDN with location trustiness 启用具有位置可信度的容灾SDN
Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Kyungbaek Kim
Software-Defined Networking (SDN) is promised as future of Internet which provides centralized network management. It provides detail information of underlay routers and makes a decision based on the global view of the current network. However, in the case of occurring unexpected natural disasters such as earthquakes or typhoons, the network infrastructure faces many challenges such as links and devices failures. Therefore, how to recover the network quickly under disaster situations is particularly essential for reliable SDN. In this paper, we propose a novel approach to enable disaster resilient SDN networks with location trustiness. We first present a method for calculating the trustiness of a location based on multimodal information including earthquake events and disaster sensor data. Then, we design a system to support disaster resilient SDN based on location-trustiness. To evaluate the feasibility of the proposed system, we simulate the responses to the network which affected by earthquake events. The results show that our approach reduces the recovering time significantly.
软件定义网络(SDN)是互联网的未来,它提供了集中的网络管理。它提供底层路由器的详细信息,并根据当前网络的全局视图做出决策。然而,当发生地震、台风等突发自然灾害时,网络基础设施面临着链路故障、设备故障等诸多挑战。因此,如何在灾难情况下快速恢复网络对可靠的SDN尤为重要。在本文中,我们提出了一种新的方法来实现具有位置可信度的抗灾SDN网络。我们首先提出了一种基于多模态信息(包括地震事件和灾害传感器数据)计算位置可信度的方法。然后,我们设计了一个基于位置可信的支持容灾SDN的系统。为了评估该系统的可行性,我们模拟了地震事件对网络的响应。结果表明,该方法显著缩短了恢复时间。
{"title":"Enabling disaster-resilient SDN with location trustiness","authors":"Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Kyungbaek Kim","doi":"10.1109/CAIPT.2017.8320668","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320668","url":null,"abstract":"Software-Defined Networking (SDN) is promised as future of Internet which provides centralized network management. It provides detail information of underlay routers and makes a decision based on the global view of the current network. However, in the case of occurring unexpected natural disasters such as earthquakes or typhoons, the network infrastructure faces many challenges such as links and devices failures. Therefore, how to recover the network quickly under disaster situations is particularly essential for reliable SDN. In this paper, we propose a novel approach to enable disaster resilient SDN networks with location trustiness. We first present a method for calculating the trustiness of a location based on multimodal information including earthquake events and disaster sensor data. Then, we design a system to support disaster resilient SDN based on location-trustiness. To evaluate the feasibility of the proposed system, we simulate the responses to the network which affected by earthquake events. The results show that our approach reduces the recovering time significantly.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A geographical information system design for analyzing food distribution in Indonesia 用于分析印尼食品分布的地理信息系统设计
H. Medyawati, B. Setiawan, Imam Ahmad Trinugroho, Ega Hegarini
Food distribution is one of the main problems to achieve a stable food security in Indonesia. Geographical differences and poor transportation system in Indonesia induce a high complexity challenges to implement a good food distribution system that can suitable with Indonesia characteristic. The purpose of this research is designing geographical information system (GIS) to analyze food distribution in Indonesia. GIS can visualize the entire data layer into a map which is easier to analyze. Indonesia consists of 34 provinces that spread over many island, each has specific geographical profile and transportation problems. This can be used as data layers with other instruments which related with food distribution in Indonesia. Designing GIS is part of developing food distribution system which produce prototype of the system. Prototyping approach is being used to evaluate the designing result of GIS with analyzing features for food distribution in Indonesia. Final result for this research is a set of rules that can be implemented into food distribution system that can create a stable food security in Indonesia, for all of the provinces.
粮食分配是印尼实现稳定粮食安全的主要问题之一。印度尼西亚的地理差异和落后的交通系统导致了实施适合印度尼西亚特色的良好食品分配系统的高度复杂性挑战。本研究的目的是设计地理资讯系统(GIS)来分析印尼的食物分布。GIS可以将整个数据层可视化为更易于分析的地图。印度尼西亚由34个省组成,分布在许多岛屿上,每个省都有特定的地理概况和交通问题。这可以作为数据层与其他与印度尼西亚粮食分配有关的工具一起使用。地理信息系统的设计是食品配送系统开发的一部分,并产生了系统的原型。通过对印度尼西亚粮食分布特征的分析,采用原型法对GIS设计结果进行评价。这项研究的最终结果是一套可以在食品分配系统中实施的规则,这些规则可以为印度尼西亚所有省份创造稳定的食品安全。
{"title":"A geographical information system design for analyzing food distribution in Indonesia","authors":"H. Medyawati, B. Setiawan, Imam Ahmad Trinugroho, Ega Hegarini","doi":"10.1109/CAIPT.2017.8320695","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320695","url":null,"abstract":"Food distribution is one of the main problems to achieve a stable food security in Indonesia. Geographical differences and poor transportation system in Indonesia induce a high complexity challenges to implement a good food distribution system that can suitable with Indonesia characteristic. The purpose of this research is designing geographical information system (GIS) to analyze food distribution in Indonesia. GIS can visualize the entire data layer into a map which is easier to analyze. Indonesia consists of 34 provinces that spread over many island, each has specific geographical profile and transportation problems. This can be used as data layers with other instruments which related with food distribution in Indonesia. Designing GIS is part of developing food distribution system which produce prototype of the system. Prototyping approach is being used to evaluate the designing result of GIS with analyzing features for food distribution in Indonesia. Final result for this research is a set of rules that can be implemented into food distribution system that can create a stable food security in Indonesia, for all of the provinces.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VANET routing algorithm performance comparison using ns-3 and SUMO 基于ns-3和SUMO的VANET路由算法性能比较
Seung-Seok Kang, Ye-Eun Chae, Seunguk Yeon
Self-driving car is a rapid evolving technology and becomes one of the hot research topics. Car-to-infrastructure or car-to-car communication provides many benefits to both car drivers and self-driving logics. VANET (Vehicular ad hoc networks) is classified as a special case of MANET. In order to communicate between cars and road infrastructures, VANET needs an ad hoc routing algorithm. This paper compares and analyzes the performance of the popular ad hoc routing algorithms in VANET. This paper uses ns-3 network simulator and SUMO for modeling the real traffic road and cars. The simulation results indicates that AODV provides a reasonable performance and adapts well for driving at high speed.
自动驾驶汽车是一项快速发展的技术,已成为研究热点之一。车对基础设施或车对车通信为汽车驾驶员和自动驾驶逻辑提供了许多好处。VANET (Vehicular ad hoc network)是MANET的一个特例。为了在汽车和道路基础设施之间进行通信,VANET需要一种自组织路由算法。本文比较分析了VANET中常用的自组织路由算法的性能。本文使用ns-3网络模拟器和SUMO对真实交通道路和车辆进行建模。仿真结果表明,AODV具有合理的性能,能很好地适应高速行驶。
{"title":"VANET routing algorithm performance comparison using ns-3 and SUMO","authors":"Seung-Seok Kang, Ye-Eun Chae, Seunguk Yeon","doi":"10.1109/CAIPT.2017.8320746","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320746","url":null,"abstract":"Self-driving car is a rapid evolving technology and becomes one of the hot research topics. Car-to-infrastructure or car-to-car communication provides many benefits to both car drivers and self-driving logics. VANET (Vehicular ad hoc networks) is classified as a special case of MANET. In order to communicate between cars and road infrastructures, VANET needs an ad hoc routing algorithm. This paper compares and analyzes the performance of the popular ad hoc routing algorithms in VANET. This paper uses ns-3 network simulator and SUMO for modeling the real traffic road and cars. The simulation results indicates that AODV provides a reasonable performance and adapts well for driving at high speed.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125051215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Oblivious content distribution system to advantage digital rights management 健忘的内容分发系统,有利于数字版权管理
A. C. Prihandoko, H. Ghodosi
This research aims to construct a content distribution protocol that preserves the content provider's security and users' privacy. The protocol can improve Digital Rights Management (DRM) that is required to provide balanced protection for the content provider and the users in a content distribution system. The concept of oblivious transfer (OT) is utilized to fulfill the DRM requirement. The OT concept allows a sender to securely send a set of information to a receiver in such a way that, at the end of the protocol, the receiver cannot learn more than he was supposed to learn, while the sender cannot determine what the receiver has learned. Assuming that tamper-proof device exists, the constructed protocol achieves perfect security for the content provider and privacy for the users. This oblivious content distribution ultimately enables DRM to be a privacy-aware protection system. The system does not merely focus on content providers' rights, but also seriously considers users' privacy protection.
本研究旨在建构一个既能保护内容提供者的安全又能保护使用者隐私的内容分发协议。该协议可以改进内容分发系统中为内容提供者和用户提供平衡保护所需的数字版权管理(DRM)。利用遗忘传输(OT)的概念来实现DRM需求。OT概念允许发送方以这样一种方式安全地向接收方发送一组信息,即在协议结束时,接收方不会学到比他应该学到的更多的信息,而发送方也无法确定接收方学到了什么。假设存在防篡改设备,所构建的协议对内容提供者实现了完美的安全性,对用户实现了隐私性。这种不经意的内容分发最终使DRM成为一种具有隐私意识的保护系统。该制度不仅关注内容提供者的权利,也认真考虑用户的隐私保护。
{"title":"Oblivious content distribution system to advantage digital rights management","authors":"A. C. Prihandoko, H. Ghodosi","doi":"10.1109/CAIPT.2017.8320733","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320733","url":null,"abstract":"This research aims to construct a content distribution protocol that preserves the content provider's security and users' privacy. The protocol can improve Digital Rights Management (DRM) that is required to provide balanced protection for the content provider and the users in a content distribution system. The concept of oblivious transfer (OT) is utilized to fulfill the DRM requirement. The OT concept allows a sender to securely send a set of information to a receiver in such a way that, at the end of the protocol, the receiver cannot learn more than he was supposed to learn, while the sender cannot determine what the receiver has learned. Assuming that tamper-proof device exists, the constructed protocol achieves perfect security for the content provider and privacy for the users. This oblivious content distribution ultimately enables DRM to be a privacy-aware protection system. The system does not merely focus on content providers' rights, but also seriously considers users' privacy protection.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk analysis on the development of a business continuity plan 对制定业务连续性计划进行风险分析
Alexander Setiawan, A. Wibowo, Andy Susilo
In the era of globalization increasingly advanced enterprise engaged in the sale of concrete iron will execute business processes by using software, hardware, networking, and others. Judging from the condition and the current reality of this company did not rule out the occurrence of the risk due to the problems in terms of data security, data integrity, hard disk damage, IT business continuity process. In this research conducted a risk analysis of the entire area of IT and business processes within the company. As for the area to be analyzed by means of analyzing the business continuity that is based on the Standard ISO 27002: 2005 chapter 14, and analyze IT Domain and perform risk assessment and risk mitigation. The risks are found is their dependence on outsourced programmers who acts as a consultant, so rarely do risk assessment in IT companies, the unavailability of a Disaster Recovery Plan and IT Security Plan, an evaluation of the permissions are less common, and no one specifically designated for IT management, lack of training or, and the absence of a standard or framework. The results of this risk analysis can help companies recognize and avoid the risks of what might happen and can avoid the danger of business continuity, so that the company can take action to prevent or deal with the risks that would happen.
在全球化时代,越来越先进的企业从事混凝土铁的销售将通过使用软件、硬件、网络等来执行业务流程。从该公司的情况和目前的实际情况来看,不排除由于数据安全、数据完整性、硬盘损坏、IT业务连续性流程等方面的问题而导致风险的发生。在这项研究中,对公司内整个IT领域和业务流程进行了风险分析。对于需要分析的领域,采用基于ISO 27002: 2005标准第14章的业务连续性分析方法,对IT领域进行分析,并进行风险评估和风险缓解。风险是他们依赖外包的程序员作为顾问,因此在IT公司很少做风险评估,灾难恢复计划和IT安全计划的不可用性,对权限的评估不太常见,没有专门指定的IT管理人员,缺乏培训或缺乏标准或框架。这种风险分析的结果可以帮助公司认识和避免可能发生的风险,可以避免业务连续性的危险,从而公司可以采取行动来预防或处理可能发生的风险。
{"title":"Risk analysis on the development of a business continuity plan","authors":"Alexander Setiawan, A. Wibowo, Andy Susilo","doi":"10.1109/CAIPT.2017.8320736","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320736","url":null,"abstract":"In the era of globalization increasingly advanced enterprise engaged in the sale of concrete iron will execute business processes by using software, hardware, networking, and others. Judging from the condition and the current reality of this company did not rule out the occurrence of the risk due to the problems in terms of data security, data integrity, hard disk damage, IT business continuity process. In this research conducted a risk analysis of the entire area of IT and business processes within the company. As for the area to be analyzed by means of analyzing the business continuity that is based on the Standard ISO 27002: 2005 chapter 14, and analyze IT Domain and perform risk assessment and risk mitigation. The risks are found is their dependence on outsourced programmers who acts as a consultant, so rarely do risk assessment in IT companies, the unavailability of a Disaster Recovery Plan and IT Security Plan, an evaluation of the permissions are less common, and no one specifically designated for IT management, lack of training or, and the absence of a standard or framework. The results of this risk analysis can help companies recognize and avoid the risks of what might happen and can avoid the danger of business continuity, so that the company can take action to prevent or deal with the risks that would happen.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121129655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Usability testing to evaluate the library's academic web site 可用性测试,评估图书馆的学术网站
Windi Eka Yulia Retnani, Beny Prasetyo, Yofanda Putra Prayogi, M. Nizar, R. Abdul
Usability Testing is the extent to which a product can be used by a particular user to achieve a defined target with effectiveness, efficiency and achieve satisfaction of use in a particular context. 5 Criteria possessed usability testing that is learnability, efficiency, memorability, error, and satisfaction. Library.unej.ac.id is a website owned by Jember University Library. This paper discusses the measurement of user satisfaction in accessing the library website. The process of measuring user satisfaction in this study using Guttmann method used to compile the questions that exist in the questionnaire. Respondents for each level are divided into 3 classes, ie lay users, active users, and skilled users. The results of this study obtained customer satisfaction 86.76% for answers found, and 13.34% for answers not found. There is 1 criteria that can be improved to improve the quality of the library website is the error criteria with the highest percentage of answers not found at 23%.
可用性测试是指某一特定用户能够有效、高效地使用某一产品,并在某一特定环境下实现既定目标的程度。可用性测试的标准包括易学性、效率、可记忆性、错误和满意度。Library.une .ac.id是浙江大学图书馆旗下的网站。本文探讨了图书馆网站用户满意度的测量方法。在本研究中,测量用户满意度的过程中使用Guttmann方法来编制问卷中存在的问题。每个级别的受访者分为3类,即普通用户、活跃用户和熟练用户。本研究的结果是,找到答案的顾客满意度为86.76%,没有找到答案的顾客满意度为13.34%。有1个标准可以改进以提高图书馆网站的质量,即错误标准,未找到答案的最高百分比为23%。
{"title":"Usability testing to evaluate the library's academic web site","authors":"Windi Eka Yulia Retnani, Beny Prasetyo, Yofanda Putra Prayogi, M. Nizar, R. Abdul","doi":"10.1109/CAIPT.2017.8320714","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320714","url":null,"abstract":"Usability Testing is the extent to which a product can be used by a particular user to achieve a defined target with effectiveness, efficiency and achieve satisfaction of use in a particular context. 5 Criteria possessed usability testing that is learnability, efficiency, memorability, error, and satisfaction. Library.unej.ac.id is a website owned by Jember University Library. This paper discusses the measurement of user satisfaction in accessing the library website. The process of measuring user satisfaction in this study using Guttmann method used to compile the questions that exist in the questionnaire. Respondents for each level are divided into 3 classes, ie lay users, active users, and skilled users. The results of this study obtained customer satisfaction 86.76% for answers found, and 13.34% for answers not found. There is 1 criteria that can be improved to improve the quality of the library website is the error criteria with the highest percentage of answers not found at 23%.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enabling external factors for consumption electricity forecasting using hybrid genetic algorithm and fuzzy neural system 利用混合遗传算法和模糊神经系统实现外部因素对用电量的预测
Gayatri Dwi Santika
Forecasting of the future load is important because of dramatic changes occurring in the electricity consumption lifestyle. Several algorithms have been suggested for solving this problem. This paper introduces a new modified fuzzy neural system approach for short term load forecasting. By using two phase on Fuzzy Inference system and Genetic algorithm for optimization, weight can improve the accuracy of electricity load forecasting. The relationship external factors like temperature, humidity, price load, Gross Domestic Product and load is identified with a case study for a particular region. Data for a monthly load of five years has been used. The accuracy algorithm has been validated using Root Mean Square Error (RMSE). The result RMSE is 0.78 it is shown that our proposed method is feasible.
由于电力消费生活方式的巨大变化,对未来负荷的预测非常重要。已经提出了几种算法来解决这个问题。本文介绍了一种新的改进模糊神经系统短期负荷预测方法。采用两相模糊推理系统和遗传算法对权重进行优化,可以提高负荷预测的准确性。外部因素如温度、湿度、价格负荷、国内生产总值和负荷的关系是通过一个特定地区的案例研究确定的。使用的数据是5年的月负荷数据。采用均方根误差(RMSE)对算法的精度进行了验证。结果RMSE为0.78,表明该方法是可行的。
{"title":"Enabling external factors for consumption electricity forecasting using hybrid genetic algorithm and fuzzy neural system","authors":"Gayatri Dwi Santika","doi":"10.1109/CAIPT.2017.8320708","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320708","url":null,"abstract":"Forecasting of the future load is important because of dramatic changes occurring in the electricity consumption lifestyle. Several algorithms have been suggested for solving this problem. This paper introduces a new modified fuzzy neural system approach for short term load forecasting. By using two phase on Fuzzy Inference system and Genetic algorithm for optimization, weight can improve the accuracy of electricity load forecasting. The relationship external factors like temperature, humidity, price load, Gross Domestic Product and load is identified with a case study for a particular region. Data for a monthly load of five years has been used. The accuracy algorithm has been validated using Root Mean Square Error (RMSE). The result RMSE is 0.78 it is shown that our proposed method is feasible.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A study on statistical map of air pollution in Korea using R 基于R的韩国空气污染统计图研究
J. Seo, H. Lee
Due to the development of the IoT era, the evolution of smart devices, and the proliferation of SNS, the amount of data generated is increasing. The vast amount of data generated by this is called big data. Analysis of big data is an important key to read current social trends. By finding out social issues, companies and countries can prepare to solve problems first. Statistical software should be used to analyze big data. In this paper, we use R to provide users with statistical information on air pollution, which is currently the most problematic in Korea.
由于物联网时代的发展、智能设备的演进以及SNS的普及,产生的数据量越来越大。由此产生的海量数据被称为大数据。大数据分析是解读当前社会趋势的重要关键。通过发现社会问题,企业和国家可以先做好解决问题的准备。要用统计软件分析大数据。在本文中,我们使用R为用户提供关于韩国目前最严重的空气污染的统计信息。
{"title":"A study on statistical map of air pollution in Korea using R","authors":"J. Seo, H. Lee","doi":"10.1109/CAIPT.2017.8320675","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320675","url":null,"abstract":"Due to the development of the IoT era, the evolution of smart devices, and the proliferation of SNS, the amount of data generated is increasing. The vast amount of data generated by this is called big data. Analysis of big data is an important key to read current social trends. By finding out social issues, companies and countries can prepare to solve problems first. Statistical software should be used to analyze big data. In this paper, we use R to provide users with statistical information on air pollution, which is currently the most problematic in Korea.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung 使用Yayasan Kesehatan (Yakes) Telkom万隆的网络开发生命周期方法和ISO/IEC 27000系列设计网络安全基础设施布线
Kartika Rianafirin, M. T. Kurniawan
The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.
信息技术的发展使信息技术在组织业务活动中的作用日益增强。当数据事务发生时,IT必须在安全性方面为组织业务提供最佳服务。IT基础设施安全的实现必须符合标准或最佳实践。事实上,Yayasan Kesehatan (Yakes)电信万隆现有的有线网络安全管理基础设施仍不符合有线基础设施安全作为网络服务实施的相关标准。根据ISO / IEC 27000系列标准,采用网络开发生命周期(NDLC)方法,设计了Yakes电信的安全电缆网络基础设施。使用的NDLC方法是周期性的,以支持持续开发。讨论了有线网络基础设施的安全设计,包括通信安全技术的实现、使用代理服务器的web保护优化、激活日志功能的监控应用优化以及服务器端端口优化的推荐。本研究的测试结果为Yakes Telkom提供了理想的网络安全设计。
{"title":"Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung","authors":"Kartika Rianafirin, M. T. Kurniawan","doi":"10.1109/CAIPT.2017.8320681","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320681","url":null,"abstract":"The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124351409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1