Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320749
Chi-Sung Ahn, Bong-Gyou Lee, Seung-Su Yang, Seok-Cheon Park
The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. However, detection errors occur in existing edge-based license plate detection technology due to a low license plate area recognition rate. Therefore, in this paper we have designed a car license plate area detection algorithm which improves the recognition rate through an operation which combines canny and Laplacian edges in order to improve the license plate recognition rate.
{"title":"Design of car license plate area detection algorithm for enhanced recognition plate","authors":"Chi-Sung Ahn, Bong-Gyou Lee, Seung-Su Yang, Seok-Cheon Park","doi":"10.1109/CAIPT.2017.8320749","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320749","url":null,"abstract":"The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. However, detection errors occur in existing edge-based license plate detection technology due to a low license plate area recognition rate. Therefore, in this paper we have designed a car license plate area detection algorithm which improves the recognition rate through an operation which combines canny and Laplacian edges in order to improve the license plate recognition rate.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123557728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320715
S. Oh, T. Whangbo
In this study, an effective interaction method for the elements that may maximize inter-user presence in social VR game that plays a role of social relation extension space is intended to be suggested. Relevant research on presence, immersion, interaction, social VR game required for this method including particularly effective player movement based on function of controller and HMD that is a system of connecting reality with virtual environment, haptic and correlation with audio will be progressed.
{"title":"A study on the effective interaction method to improve the presence in social virtual reality game","authors":"S. Oh, T. Whangbo","doi":"10.1109/CAIPT.2017.8320715","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320715","url":null,"abstract":"In this study, an effective interaction method for the elements that may maximize inter-user presence in social VR game that plays a role of social relation extension space is intended to be suggested. Relevant research on presence, immersion, interaction, social VR game required for this method including particularly effective player movement based on function of controller and HMD that is a system of connecting reality with virtual environment, haptic and correlation with audio will be progressed.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320716
Adnan, A. A. Ilham, S. Usman
Data analytics has become a key element of the business decision process over the last decade. ETL is Process to migrate the data from the source to the required database, Store and process the huge amount of structured and unstructured data for complex analysis business. Standard ETL tools don't efficiently handle it. Improving it can provide a better return on company's investment. Become interesting to find an opportunity to construct computing-storage devices low-cost, low-power components to perform ETL Process. In this paper, we proposed Hadoop on iSCSI over Ethernet adapted Network Attached Storage (NAS) to process ETL, investigate the benefits of running Hadoop over NAS storage as compared with normal HDFS using a benchmark about extract performance, transform performance and load performance. This research used 1 NameNode, 4 DataNodes, NAS Storage, and dataset to examine the proposed architecture. The result showed that the proposed architecture is ability to use low-cost components to deliver scalable performance and could become storage solution in the Big Data space.
在过去十年中,数据分析已成为业务决策过程的关键要素。ETL是将数据从数据源迁移到所需数据库的过程,存储和处理大量的结构化和非结构化数据,用于复杂的分析业务。标准的ETL工具不能有效地处理它。改进它可以为公司的投资提供更好的回报。寻找一个构建低成本、低功耗组件来执行ETL Process的计算存储设备的机会变得很有趣。在本文中,我们提出了基于iSCSI over Ethernet的Hadoop,采用网络附加存储(NAS)来处理ETL,并使用关于提取性能、转换性能和加载性能的基准测试来研究在NAS存储上运行Hadoop与普通HDFS相比的好处。本研究使用了1个NameNode、4个datanode、NAS Storage和数据集来检验提议的架构。结果表明,所提出的架构能够使用低成本的组件来提供可扩展的性能,并且可以成为大数据领域的存储解决方案。
{"title":"Performance analysis of extract, transform, load (ETL) in apache Hadoop atop NAS storage using ISCSI","authors":"Adnan, A. A. Ilham, S. Usman","doi":"10.1109/CAIPT.2017.8320716","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320716","url":null,"abstract":"Data analytics has become a key element of the business decision process over the last decade. ETL is Process to migrate the data from the source to the required database, Store and process the huge amount of structured and unstructured data for complex analysis business. Standard ETL tools don't efficiently handle it. Improving it can provide a better return on company's investment. Become interesting to find an opportunity to construct computing-storage devices low-cost, low-power components to perform ETL Process. In this paper, we proposed Hadoop on iSCSI over Ethernet adapted Network Attached Storage (NAS) to process ETL, investigate the benefits of running Hadoop over NAS storage as compared with normal HDFS using a benchmark about extract performance, transform performance and load performance. This research used 1 NameNode, 4 DataNodes, NAS Storage, and dataset to examine the proposed architecture. The result showed that the proposed architecture is ability to use low-cost components to deliver scalable performance and could become storage solution in the Big Data space.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320674
Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi
In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.
{"title":"Encryption scheme in portable electric vehicle charging infrastructure: Encryption scheme using symmetric key","authors":"Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi","doi":"10.1109/CAIPT.2017.8320674","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320674","url":null,"abstract":"In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320700
A. Lawi, F. Aziz, S. Syarif
The method for Credit Scoring has been developed to select a better model in predicting credit risk. Data mining methods are superior to the statistical methods of dealing with Credit Scoring issues, especially for nonlinear relationships between variables. By flashing the ensemble method with statistical methods, proven to achieve a higher level of accuracy than the method of data mining. This paper proposes a credit scoring algorithm using Ensemble Logistic Regression by boosting the method using the GradientBoost algorithm. Two datasets for implementing the algorithm, i.e., German and Australian Dataset. The results showed that GradientBoost Ensemble managed to improve the performance of a single classification Logistic Regression and achieve the highest level of accuracy in both datasets. The proposed method produces accuracy of 81% for German datasets and 88.4% for Australian datasets.
{"title":"Ensemble GradientBoost for increasing classification accuracy of credit scoring","authors":"A. Lawi, F. Aziz, S. Syarif","doi":"10.1109/CAIPT.2017.8320700","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320700","url":null,"abstract":"The method for Credit Scoring has been developed to select a better model in predicting credit risk. Data mining methods are superior to the statistical methods of dealing with Credit Scoring issues, especially for nonlinear relationships between variables. By flashing the ensemble method with statistical methods, proven to achieve a higher level of accuracy than the method of data mining. This paper proposes a credit scoring algorithm using Ensemble Logistic Regression by boosting the method using the GradientBoost algorithm. Two datasets for implementing the algorithm, i.e., German and Australian Dataset. The results showed that GradientBoost Ensemble managed to improve the performance of a single classification Logistic Regression and achieve the highest level of accuracy in both datasets. The proposed method produces accuracy of 81% for German datasets and 88.4% for Australian datasets.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320709
Sungsuk Kim, Kwang-Sik Chung, Heonchang Yu, S. Yang
3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. It is needed conversion process from 3D model data to G-code to print by 3D printer. 3D model data generally can be stored in STL file format, which is composed of lots of facet data. If the file contains much more facets, the conversion time will also increase. In this paper, we try to develop a software to converse in Hadoop to cope with the problem. Our main motivation is that the conversion from a facet does not affect the other sets of facets. Thus, our algorithm proceeds to step 4: preprocessing, mapping, shuffling, and reducing. Finally, performance evaluation was performed using the developed software.
{"title":"G-code conversion from 3D model data for 3D printers on Hadoop systems","authors":"Sungsuk Kim, Kwang-Sik Chung, Heonchang Yu, S. Yang","doi":"10.1109/CAIPT.2017.8320709","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320709","url":null,"abstract":"3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. It is needed conversion process from 3D model data to G-code to print by 3D printer. 3D model data generally can be stored in STL file format, which is composed of lots of facet data. If the file contains much more facets, the conversion time will also increase. In this paper, we try to develop a software to converse in Hadoop to cope with the problem. Our main motivation is that the conversion from a facet does not affect the other sets of facets. Thus, our algorithm proceeds to step 4: preprocessing, mapping, shuffling, and reducing. Finally, performance evaluation was performed using the developed software.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320713
I. Nuritha, Vandha Widartha, S. Bukhori
Social Agriculture (SociAg) application is a web based social media application prototype which is used for providing active, interactive, and persuasive communication among farmers, farmer communities and professionals as space for sharing information each other to improve science and technology knowledge in agriculture. SociAg application is developed by implementing gamification concept for increasing user interest within using this application. Gamification is used as one of strategy end-user engagement to attract enthusiastic farmers, farmer communities, and professionals in utilizing SociAg applications to interact with useful information sharing especially in agriculture. Through gamification concept, the active SociAg application user will earn reward be in the form of point in each the use of SociAg application activities. The achievement of these points are able to be used either by government or by policy maker as one of reference to grant the agriculture assistance, in order the assistance is able to be provided on the right target.
{"title":"Designing gamification on Social Agriculture (SociAg) application to increase end-user engagement","authors":"I. Nuritha, Vandha Widartha, S. Bukhori","doi":"10.1109/CAIPT.2017.8320713","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320713","url":null,"abstract":"Social Agriculture (SociAg) application is a web based social media application prototype which is used for providing active, interactive, and persuasive communication among farmers, farmer communities and professionals as space for sharing information each other to improve science and technology knowledge in agriculture. SociAg application is developed by implementing gamification concept for increasing user interest within using this application. Gamification is used as one of strategy end-user engagement to attract enthusiastic farmers, farmer communities, and professionals in utilizing SociAg applications to interact with useful information sharing especially in agriculture. Through gamification concept, the active SociAg application user will earn reward be in the form of point in each the use of SociAg application activities. The achievement of these points are able to be used either by government or by policy maker as one of reference to grant the agriculture assistance, in order the assistance is able to be provided on the right target.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320729
Mihui Kim
With expanding of Internet of Things (IoT) devices with various sensors, mobile crowdsourcing services (or called cloud-based sensing-as-a-service (CSaaS)) are popularly growing. The participation of many users in sensing activities is very important for successful service realization. Thus, a proper incentive mechanism is necessary. However, the data sensed by personal equipment are usually sensitive to privacy, a problem that can constrain data sharing. In this paper, we propose a privacy preserved incentive mechanism for mobile crowdsourcing services, and apply it to intelligent parking system, an example of crowdsourcing service. This mechanism protects location and identity privacy for users by utilizing an on-demand incentive payment method and group signatures. We also plan to evaluate our mechanism on systems with several specifications.
{"title":"Incentive mechanism with privacy-preservation on intelligent parking system utilizing mobile crowdsourcing","authors":"Mihui Kim","doi":"10.1109/CAIPT.2017.8320729","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320729","url":null,"abstract":"With expanding of Internet of Things (IoT) devices with various sensors, mobile crowdsourcing services (or called cloud-based sensing-as-a-service (CSaaS)) are popularly growing. The participation of many users in sensing activities is very important for successful service realization. Thus, a proper incentive mechanism is necessary. However, the data sensed by personal equipment are usually sensitive to privacy, a problem that can constrain data sharing. In this paper, we propose a privacy preserved incentive mechanism for mobile crowdsourcing services, and apply it to intelligent parking system, an example of crowdsourcing service. This mechanism protects location and identity privacy for users by utilizing an on-demand incentive payment method and group signatures. We also plan to evaluate our mechanism on systems with several specifications.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320697
F. Mandita, H. M. Abdullah, T. Anwar
Sign language has shown advancement indication results in the last decade of years. Research in the area of sign language has been done but mostly focuses in signer independent schemas consists of sign language and video. Unfortunately, research of sign language to translate one sign language to another sign language is infrequently. The research contributes to Malaysian to German sign language statistical machine translation for hearing impaired people. Markov chain and search algorithms are used to apply the process of translation from Malaysian to German sign language and vice versa. The corpus data are used for testing statistical machine translation around 10.000. A binary search and linear search algorithm in cooperation with a Markov chain are used to apply the process of translation. An output of execution time between 2 models of algorithms has been explored. The accuracy of the binary search algorithm is better than linear search algorithm when using for translation.
{"title":"Malaysian to German sign language statistical machine translation using Markov chain and search algorithms","authors":"F. Mandita, H. M. Abdullah, T. Anwar","doi":"10.1109/CAIPT.2017.8320697","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320697","url":null,"abstract":"Sign language has shown advancement indication results in the last decade of years. Research in the area of sign language has been done but mostly focuses in signer independent schemas consists of sign language and video. Unfortunately, research of sign language to translate one sign language to another sign language is infrequently. The research contributes to Malaysian to German sign language statistical machine translation for hearing impaired people. Markov chain and search algorithms are used to apply the process of translation from Malaysian to German sign language and vice versa. The corpus data are used for testing statistical machine translation around 10.000. A binary search and linear search algorithm in cooperation with a Markov chain are used to apply the process of translation. An output of execution time between 2 models of algorithms has been explored. The accuracy of the binary search algorithm is better than linear search algorithm when using for translation.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320737
D. Rachmawati, M. A. Budiman
Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.
{"title":"New approach toward data hiding by using affine cipher and least significant bit algorithm","authors":"D. Rachmawati, M. A. Budiman","doi":"10.1109/CAIPT.2017.8320737","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320737","url":null,"abstract":"Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}