Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320739
M. F. Syahputra, Anita Ratna Sari, R. Rahmat
When diagnosing a disease, besides the physical examination, blood analysis is a reliable method. This because blood has components that contains a lot of key informations. Morphogical examination of peripheral blood smears is one of important lab examinations and has to be evaluated properly. But abnormal red blood cell shapes that found by a health analyst is not always the same as other analyst because of precision factor, concentration, and lack of knowledge. Besides that, morphogical examination of peripheral blood smears still done manually by health anaylists and they considered less efficient because they took a lot of time. To solve that problem, a method to classify red blood cell types that detects abnormal shapes of cells from certain disease. In this paper, radial basis function network is used as method to classify abnormal red blood cell types. Several stage before executing classification process is input image, pre-processing, feature extract with canny edge detection. Research result shows that by using this method, the accuracy to classify abnormal red blood cell types is 83.3%.
{"title":"Abnormality classification on the shape of red blood cells using radial basis function network","authors":"M. F. Syahputra, Anita Ratna Sari, R. Rahmat","doi":"10.1109/CAIPT.2017.8320739","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320739","url":null,"abstract":"When diagnosing a disease, besides the physical examination, blood analysis is a reliable method. This because blood has components that contains a lot of key informations. Morphogical examination of peripheral blood smears is one of important lab examinations and has to be evaluated properly. But abnormal red blood cell shapes that found by a health analyst is not always the same as other analyst because of precision factor, concentration, and lack of knowledge. Besides that, morphogical examination of peripheral blood smears still done manually by health anaylists and they considered less efficient because they took a lot of time. To solve that problem, a method to classify red blood cell types that detects abnormal shapes of cells from certain disease. In this paper, radial basis function network is used as method to classify abnormal red blood cell types. Several stage before executing classification process is input image, pre-processing, feature extract with canny edge detection. Research result shows that by using this method, the accuracy to classify abnormal red blood cell types is 83.3%.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320742
Jong-Hwan Beck, Sang Hoon Kim
In future world, mobile robots for home services are expected to solve productivity problem. Especially, vision based mobile robots will be able to perform many tasks due to their characteristics of using camera. In this regard, landmark detection methods using a camera have been used in many robots because it is easy to measure the position. In this paper, we propose a distance measurement system by detecting two-dimensional barcode which can be used landmark for unmanned ground robot. In experiments, the position of the camera is expressed as (x, y) through the 2D barcode recognition in the 4∗4 grid map.
{"title":"Vision based distance measurement system using two-dimensional barcode for mobile robot","authors":"Jong-Hwan Beck, Sang Hoon Kim","doi":"10.1109/CAIPT.2017.8320742","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320742","url":null,"abstract":"In future world, mobile robots for home services are expected to solve productivity problem. Especially, vision based mobile robots will be able to perform many tasks due to their characteristics of using camera. In this regard, landmark detection methods using a camera have been used in many robots because it is easy to measure the position. In this paper, we propose a distance measurement system by detecting two-dimensional barcode which can be used landmark for unmanned ground robot. In experiments, the position of the camera is expressed as (x, y) through the 2D barcode recognition in the 4∗4 grid map.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320726
JungHyen Ahn, Young B. Park
As the network and hardware technology development, IoT devices that have sensors and communication functions on various objects are increasing rapidly. As result IoT management software that manages various IoT devices in system is becoming important. However, most management systems are designed to perform only limited functions for the registered devices. In this paper, we propose a framework of Adaptive Internet Things EcoSystem that control behavior by changing software module adaptively to environment change of IoT devices. This system is composed two parts. One is the software adaption part defined to adapt IoT environmental change for each Internet things. And the conducting part is defined to construct IT Ecosystem, so that each software adaption part interact others. We show the functions and execution behavior of the Framework to achieve controlling device behavior adaptively upon environmental changes of IoT.
{"title":"AiTES: The self-adaptive framework for environment change of IoT","authors":"JungHyen Ahn, Young B. Park","doi":"10.1109/CAIPT.2017.8320726","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320726","url":null,"abstract":"As the network and hardware technology development, IoT devices that have sensors and communication functions on various objects are increasing rapidly. As result IoT management software that manages various IoT devices in system is becoming important. However, most management systems are designed to perform only limited functions for the registered devices. In this paper, we propose a framework of Adaptive Internet Things EcoSystem that control behavior by changing software module adaptively to environment change of IoT devices. This system is composed two parts. One is the software adaption part defined to adapt IoT environmental change for each Internet things. And the conducting part is defined to construct IT Ecosystem, so that each software adaption part interact others. We show the functions and execution behavior of the Framework to achieve controlling device behavior adaptively upon environmental changes of IoT.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320696
F. Yudianto, Sistem Informasi, Fak. Teknik
In order the distribution process of electricity to customers run properly, the distribution transformer should be noticed. But there are some obstacles such as the amount of the transformer is not proportional to the number of officers and the location of transformers are scattered in various places. These problem make officer hard to measure development of peak loads on old customers and new customers. Currently the growth of the transformer load is still not monitored properly. Therefore electric company need technology that is able to monitor transformer load. This research produces a tool that enables officers easier to monitor distribution transformers load in real time and throughout 24 hours. The output is visual data in the form of indicator lights that facilitate monitoring transformer load and data will sent periodically to the office server. If transformer is overload, tool will send warning message to officer so officer can take safety action in short time and can decreasing the risk of fire due to damage of transformer.
{"title":"Design monitoring of distribution transformer load by messenger based on microcontroller atmega 128","authors":"F. Yudianto, Sistem Informasi, Fak. Teknik","doi":"10.1109/CAIPT.2017.8320696","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320696","url":null,"abstract":"In order the distribution process of electricity to customers run properly, the distribution transformer should be noticed. But there are some obstacles such as the amount of the transformer is not proportional to the number of officers and the location of transformers are scattered in various places. These problem make officer hard to measure development of peak loads on old customers and new customers. Currently the growth of the transformer load is still not monitored properly. Therefore electric company need technology that is able to monitor transformer load. This research produces a tool that enables officers easier to monitor distribution transformers load in real time and throughout 24 hours. The output is visual data in the form of indicator lights that facilitate monitoring transformer load and data will sent periodically to the office server. If transformer is overload, tool will send warning message to officer so officer can take safety action in short time and can decreasing the risk of fire due to damage of transformer.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320728
Seong-Hyeon Han, Kwang-Yeob Lee
This paper proposes the use of OpenMP for random parameter filtering. The use of large numbers of samples during ray tracing rendering results in high quality images yet requires long processing times. On the other hand, the use of a small number of samples results in noise. For the purposes of reducing processing time and removing noise, this study undertook rendering using a small number of samples and subsequently undertook random parameter filtering. In order to speed up the process of random parameter filtering, this study applied OpenMP. The use of OpenMP resulted in a 5.8 times greater improvement in performance.
{"title":"Implementation of random parameter filtering using OpenMP","authors":"Seong-Hyeon Han, Kwang-Yeob Lee","doi":"10.1109/CAIPT.2017.8320728","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320728","url":null,"abstract":"This paper proposes the use of OpenMP for random parameter filtering. The use of large numbers of samples during ray tracing rendering results in high quality images yet requires long processing times. On the other hand, the use of a small number of samples results in noise. For the purposes of reducing processing time and removing noise, this study undertook rendering using a small number of samples and subsequently undertook random parameter filtering. In order to speed up the process of random parameter filtering, this study applied OpenMP. The use of OpenMP resulted in a 5.8 times greater improvement in performance.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122329964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320669
S. Jang
This paper presents the schemes to solve problems when k-anonymity and l-diversity are applied to Big-Data anonymization. The first problem is that information loss and distortion are unavoidable by anonymization job. To reduce the distortion, this paper presents an efficient method that is based on deep anonymization detection. In the method, data publishers analyze the anonymization work, and determine if it is deep or light. If it is thought as deep anonymization, high information distortion is allowed when being distributed to a third party after anonymization. Otherwise, information distortion is kept as low as possible when anonymizing Big-Data to provide the receivers with more meaningful data. The decision for deep anonymization is done by considering a domain data characteristic, data receiver's purpose, and data criticality. The second problem is that it takes much time and requires large buffer space to process the anonymization. To solve the problem, this paper present enhanced read/write schemes.
{"title":"A study of performance enhancement in big data anonymization","authors":"S. Jang","doi":"10.1109/CAIPT.2017.8320669","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320669","url":null,"abstract":"This paper presents the schemes to solve problems when k-anonymity and l-diversity are applied to Big-Data anonymization. The first problem is that information loss and distortion are unavoidable by anonymization job. To reduce the distortion, this paper presents an efficient method that is based on deep anonymization detection. In the method, data publishers analyze the anonymization work, and determine if it is deep or light. If it is thought as deep anonymization, high information distortion is allowed when being distributed to a third party after anonymization. Otherwise, information distortion is kept as low as possible when anonymizing Big-Data to provide the receivers with more meaningful data. The decision for deep anonymization is done by considering a domain data characteristic, data receiver's purpose, and data criticality. The second problem is that it takes much time and requires large buffer space to process the anonymization. To solve the problem, this paper present enhanced read/write schemes.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320707
Si-Jae Woo, Jin Kwak
In the IoT environment, many protocols are used such as CoAP, MQTT, XMPP. Especially, CoAP supports lightweight for many IoT environment. CoAP is used with DTLS and the security of CoAP depends on the DTLS's. DTLS also supports multicast, but there is some problem with absence of authentication, such as not verifying mutual authentication at the registration phase. This leads to indiscreet group participation, which is a security problem and can cause performance decreasing. In this paper, therefore, we propose a secure multicast authentication scheme using DTLS and solve the existing security problem.
{"title":"Secure multicast authentication scheme using DTLS","authors":"Si-Jae Woo, Jin Kwak","doi":"10.1109/CAIPT.2017.8320707","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320707","url":null,"abstract":"In the IoT environment, many protocols are used such as CoAP, MQTT, XMPP. Especially, CoAP supports lightweight for many IoT environment. CoAP is used with DTLS and the security of CoAP depends on the DTLS's. DTLS also supports multicast, but there is some problem with absence of authentication, such as not verifying mutual authentication at the registration phase. This leads to indiscreet group participation, which is a security problem and can cause performance decreasing. In this paper, therefore, we propose a secure multicast authentication scheme using DTLS and solve the existing security problem.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320722
Gun-Wook Choi, Imyeong Lee
Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.
{"title":"A key distribution system for user authentication using pairing-based in a WSN","authors":"Gun-Wook Choi, Imyeong Lee","doi":"10.1109/CAIPT.2017.8320722","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320722","url":null,"abstract":"Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320744
Hyeri Rhee, Moon-Ryul Jung, Sook-Jin Kim
We present a computer generated artwork called Live Colors implemented by using two dimensional Cellular Automata. Each cell of the automata encodes a color. The main goal of this artwork is to generate color patterns starting from the initial images. This paper discusses the concepts, design, and implementation of the system. The basic idea of color pattern generation rules is growing regions around each cell. Three automata are presented. The rules of each automaton consist of two steps. Given each given cell, the first step chooses a neighbor cell for region growing, that is, a neighbor that would belong to the same region as the given cell. The second step determines the color of the given cell out of the color of the chosen neighbor. The first and second automata tend to generate soft regions and boundaries. The third automaton tends to generate sharp regions and boundaries. The images generated by the cell transition rules create various colors and patterns difficult to imagine when mixing colors and drawing patterns by hands. Our automata are examples of cellular automata cleverly designed for growing color regions in the style of colorfield painting and hard-edge painting.
{"title":"Live colors: Visualizing celluar automata","authors":"Hyeri Rhee, Moon-Ryul Jung, Sook-Jin Kim","doi":"10.1109/CAIPT.2017.8320744","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320744","url":null,"abstract":"We present a computer generated artwork called Live Colors implemented by using two dimensional Cellular Automata. Each cell of the automata encodes a color. The main goal of this artwork is to generate color patterns starting from the initial images. This paper discusses the concepts, design, and implementation of the system. The basic idea of color pattern generation rules is growing regions around each cell. Three automata are presented. The rules of each automaton consist of two steps. Given each given cell, the first step chooses a neighbor cell for region growing, that is, a neighbor that would belong to the same region as the given cell. The second step determines the color of the given cell out of the color of the chosen neighbor. The first and second automata tend to generate soft regions and boundaries. The third automaton tends to generate sharp regions and boundaries. The images generated by the cell transition rules create various colors and patterns difficult to imagine when mixing colors and drawing patterns by hands. Our automata are examples of cellular automata cleverly designed for growing color regions in the style of colorfield painting and hard-edge painting.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320676
Supangat, Ery Sadewa Yudha
The process of developing e-learning is quite rapidly along with the development of information technology itself. The use of e-learning to enhance participants' learning abilities in previous periods focused on features with static and similar interfaces. The next thing to keep in mind is ensuring that learning through e-learning programs should be a priority in designing instruction for e-learning itself. In this connection, constructivism learning theory, which focuses on building knowledge based on past participants' experience, is highly applicable to e-learning because of the certainty of the learning process among the participants. In this study, researchers developed an interface design for e-learning applications tailored to the characteristics of user groups. The results of the study with case studies involving class participants basic programming concepts, shows there are two groups of user characteristics e-learning, namely introvert and extrovert. From the results of the training process and the homogeneous population testing of 338 (three hundred and thirty eight) data sets consisting of 233 training datasets and 105 test datasets, introverted groups, has a composition of values, namely: {Times New Roman, Blue, White} and {White, Black, Calibri}, while the extrovert group, there is no dominant combination favored by this type, and the results are identical to the result of the testing process, i.e Blue as the foreground color and White as the background color.
随着信息技术本身的发展,电子学习的发展进程也十分迅速。在之前的阶段,使用电子学习来提高参与者的学习能力主要集中在静态和类似界面的特征上。要记住的下一件事是确保通过电子学习程序学习应该是设计电子学习本身的指导的优先事项。在这方面,建构主义学习理论侧重于根据过去参与者的经验构建知识,由于参与者之间的学习过程具有确定性,因此它非常适用于电子学习。在这项研究中,研究人员开发了一种针对用户群体特征的电子学习应用程序界面设计。本研究以个案研究的方式,涉及课堂参与者的基本程式设计概念,结果显示电子学习有两组使用者特征,即内向型与外向型。由233个训练数据集和105个测试数据集组成的338(三百三十八)个数据集的训练过程和同质总体检验结果来看,内向群体具有一个组成值,即:{Times New Roman, Blue, White}和{White, Black, Calibri},而外向组,没有优势组合青睐该类型,结果与测试过程的结果相同,即蓝色为前景色,白色为背景色。
{"title":"Determination of interface design attributes on e-learning based on user personality characteristics","authors":"Supangat, Ery Sadewa Yudha","doi":"10.1109/CAIPT.2017.8320676","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320676","url":null,"abstract":"The process of developing e-learning is quite rapidly along with the development of information technology itself. The use of e-learning to enhance participants' learning abilities in previous periods focused on features with static and similar interfaces. The next thing to keep in mind is ensuring that learning through e-learning programs should be a priority in designing instruction for e-learning itself. In this connection, constructivism learning theory, which focuses on building knowledge based on past participants' experience, is highly applicable to e-learning because of the certainty of the learning process among the participants. In this study, researchers developed an interface design for e-learning applications tailored to the characteristics of user groups. The results of the study with case studies involving class participants basic programming concepts, shows there are two groups of user characteristics e-learning, namely introvert and extrovert. From the results of the training process and the homogeneous population testing of 338 (three hundred and thirty eight) data sets consisting of 233 training datasets and 105 test datasets, introverted groups, has a composition of values, namely: {Times New Roman, Blue, White} and {White, Black, Calibri}, while the extrovert group, there is no dominant combination favored by this type, and the results are identical to the result of the testing process, i.e Blue as the foreground color and White as the background color.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}