首页 > 最新文献

2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering最新文献

英文 中文
Comparison of distance and dissimilarity measures for clustering data with mix attribute types 混合属性类型聚类数据的距离和不相似度量比较
Hermawan Prasetyo, A. Purwarianti
Clustering is one of the most popular methods in data mining. Many algorithms can be applied for data clustering with numeric or categorical attributes. However, most of data in the real world contain both numeric and categorical attributes. A clustering method which can be applied on attributes in mix types become important to handle the problem. K-prototypes algorithm is one of the algorithms which can deal for clustering data with mix attribute types. However, it has a drawback on its dissimilarity measure between categorical data. The selection of proper dissimilarity measure between categorical data is thus important to increase its performance. This paper compares distance and dissimilarity measures for clustering data with mix attribute types. We used the k-prototypes algorithm on UCI datasets, i.e. Echocardiogram, Hepatitis, and Zoo, to assign cluster membership of the objects. Silhouette index was employed to evaluate clustering results. The results show that Euclidean distance and Ratio on Mismatches dissimilarity are the best combination for clustering data with numeric and categorical attribute types, as it shown with average Silhouette index towards 1. As a result, to cluster data with mix attribute types, we propose to employ Euclidean distance and Ratio on Mismatches dissimilarity to be applied on k-prototypes algorithm.
聚类是数据挖掘中最流行的方法之一。许多算法可以应用于具有数字或分类属性的数据聚类。然而,现实世界中的大多数数据都包含数值属性和分类属性。一种适用于混合类型属性的聚类方法对于解决这一问题至关重要。k -原型算法是一种处理混合属性类型数据聚类的算法。然而,它在分类数据之间的不相似度量上有一个缺点。因此,在分类数据之间选择合适的不相似度量对于提高分类数据的性能具有重要意义。本文比较了混合属性类型数据聚类的距离度量和不相似度量。我们在UCI数据集(即Echocardiogram, Hepatitis, and Zoo)上使用k-prototype算法来分配对象的聚类隶属度。采用剪影指数评价聚类结果。结果表明,对于数值和分类属性类型的聚类数据,欧几里得距离和错配不相似度比是最佳组合,剪影指数平均趋近于1。因此,为了对混合属性类型的数据进行聚类,我们提出将欧几里得距离和错配不相似率应用于k-原型算法。
{"title":"Comparison of distance and dissimilarity measures for clustering data with mix attribute types","authors":"Hermawan Prasetyo, A. Purwarianti","doi":"10.1109/ICITACEE.2014.7065756","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065756","url":null,"abstract":"Clustering is one of the most popular methods in data mining. Many algorithms can be applied for data clustering with numeric or categorical attributes. However, most of data in the real world contain both numeric and categorical attributes. A clustering method which can be applied on attributes in mix types become important to handle the problem. K-prototypes algorithm is one of the algorithms which can deal for clustering data with mix attribute types. However, it has a drawback on its dissimilarity measure between categorical data. The selection of proper dissimilarity measure between categorical data is thus important to increase its performance. This paper compares distance and dissimilarity measures for clustering data with mix attribute types. We used the k-prototypes algorithm on UCI datasets, i.e. Echocardiogram, Hepatitis, and Zoo, to assign cluster membership of the objects. Silhouette index was employed to evaluate clustering results. The results show that Euclidean distance and Ratio on Mismatches dissimilarity are the best combination for clustering data with numeric and categorical attribute types, as it shown with average Silhouette index towards 1. As a result, to cluster data with mix attribute types, we propose to employ Euclidean distance and Ratio on Mismatches dissimilarity to be applied on k-prototypes algorithm.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128214618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extreme learning machine approach to estimate hourly solar radiation on horizontal surface (PV) in Surabaya -East java 极值学习机方法估算泗水-东爪哇地区每小时水平太阳辐射
I. Abadi, A. Soeprijanto, A. Musyafa
Solar radiation is a source of alternative energy that is very influential on the photovoltaic performance in generating energy. The need for solar radiation estimation has become a significant feature in the design of photovoltaic (PV) systems. Recently, the most popular method used to estimate solar radiation is artificial neural network (ANN). However, a new approach, called the extreme learning machine (ELM) algorithm is a new learning method of feed forward neural network with one hidden layer or known as Single Hidden Layer Feed Forward Neural Network (SLFN). In this research, ELM and a multilayer feed-forward network with back propagation are implemented to estimate hourly solar radiation on horizontal surface in Surabaya. In contrast to previous researches, this study has emphasized the use of meteorological data such as temperature, humidity, wind speed, and direction of speed as inputs for ANN and ELM model in estimating solar radiation. The MSE and learning rate has been used to measure the performance of two methods. The simulation results showed that the ELM model built had best performance for 400 nodes in which MSE and learning rate achieved were 5,88e-14 and 0,0156 second, respectively. The values were much smaller compared with the results of ANN. Overall, the ELM provided a better performance.
太阳辐射是一种替代能源,对光伏发电的性能影响很大。太阳辐射估算的需求已成为光伏系统设计中的一个重要特征。目前,最常用的估算太阳辐射的方法是人工神经网络(ANN)。然而,一种新的方法,称为极限学习机(ELM)算法,是一种新的前馈神经网络学习方法,具有一个隐藏层或称为单隐藏层前馈神经网络(SLFN)。在本研究中,采用ELM和多层前馈反向传播网络来估计泗水地区水平地面的每小时太阳辐射。与以往的研究相比,本研究强调将温度、湿度、风速和风速方向等气象数据作为人工神经网络和ELM模型估算太阳辐射的输入。用MSE和学习率来衡量两种方法的性能。仿真结果表明,所构建的ELM模型在400个节点上性能最佳,MSE为5 88e-14秒,学习率为0 0156秒。与人工神经网络的结果相比,这些值要小得多。总体而言,ELM提供了更好的性能。
{"title":"Extreme learning machine approach to estimate hourly solar radiation on horizontal surface (PV) in Surabaya -East java","authors":"I. Abadi, A. Soeprijanto, A. Musyafa","doi":"10.1109/ICITACEE.2014.7065774","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065774","url":null,"abstract":"Solar radiation is a source of alternative energy that is very influential on the photovoltaic performance in generating energy. The need for solar radiation estimation has become a significant feature in the design of photovoltaic (PV) systems. Recently, the most popular method used to estimate solar radiation is artificial neural network (ANN). However, a new approach, called the extreme learning machine (ELM) algorithm is a new learning method of feed forward neural network with one hidden layer or known as Single Hidden Layer Feed Forward Neural Network (SLFN). In this research, ELM and a multilayer feed-forward network with back propagation are implemented to estimate hourly solar radiation on horizontal surface in Surabaya. In contrast to previous researches, this study has emphasized the use of meteorological data such as temperature, humidity, wind speed, and direction of speed as inputs for ANN and ELM model in estimating solar radiation. The MSE and learning rate has been used to measure the performance of two methods. The simulation results showed that the ELM model built had best performance for 400 nodes in which MSE and learning rate achieved were 5,88e-14 and 0,0156 second, respectively. The values were much smaller compared with the results of ANN. Overall, the ELM provided a better performance.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Visual object tracking using particle clustering 使用粒子聚类的视觉目标跟踪
Harindra Wisnu Pradhana
Computer vision been used to estimate object location relatively from observer on many applications. High definition sensor often used to gain accuracy of the object tracking which resulting high processing complexity. Lower resolution sensor simplifies the process with significant accuracy lost. Particle clustering method estimates the object location by grouping several detection data with certain similarity. Instead of detecting edges and corner on the visual data, this paper uses clustering method to group pixels with certain similarity and measure its element. The cluster measured both height and width to estimate the distance of the object from the observer. New color features introduced in this research promising a better detection approach even with low resolution sensor. The proposed approach successfully provides 30fps image analysis with significant color extraction improvement.
在许多应用中,计算机视觉被用于相对于观察者估计物体的位置。高清晰度传感器通常用于获得精确的目标跟踪,这导致了高处理复杂度。较低分辨率的传感器简化了过程,但显著降低了精度。粒子聚类方法通过对若干具有一定相似性的检测数据进行分组来估计目标位置。本文采用聚类方法对具有一定相似性的像素点进行分组并测量其元素,而不是对视觉数据进行边角检测。聚类测量高度和宽度来估计物体到观察者的距离。本研究引入了新的颜色特征,即使在低分辨率传感器下,也有望实现更好的检测方法。该方法成功地提供了30fps的图像分析,并显著改善了颜色提取。
{"title":"Visual object tracking using particle clustering","authors":"Harindra Wisnu Pradhana","doi":"10.1109/ICITACEE.2014.7065726","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065726","url":null,"abstract":"Computer vision been used to estimate object location relatively from observer on many applications. High definition sensor often used to gain accuracy of the object tracking which resulting high processing complexity. Lower resolution sensor simplifies the process with significant accuracy lost. Particle clustering method estimates the object location by grouping several detection data with certain similarity. Instead of detecting edges and corner on the visual data, this paper uses clustering method to group pixels with certain similarity and measure its element. The cluster measured both height and width to estimate the distance of the object from the observer. New color features introduced in this research promising a better detection approach even with low resolution sensor. The proposed approach successfully provides 30fps image analysis with significant color extraction improvement.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"75 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Palmprint identification for user verification based on line detection and local standard deviation 基于线检测和局部标准差的用户验证掌纹识别
Bagas Sakamulia Prakoso, Ivanna K. Timotius, Iwan Setyawan
Human palmprints contain biometric features that can be used to identify an individual. These features can be used for example in user verification applications. This paper presents a user verification system using palmprint identification. The image of the palm is captured using a web camera. Then the features used for palmprint identification is extracted using line detection and local standard deviation. The proposed system is evaluated by asking 40 subjects to act as users (10 subject as registered users and 30 non-registered users). Our experiments show that the system can achieve accuracy rate of up to 98% with no false acceptance and 2% false rejection rate. The average time required to perform a user verification is 340 ms.
人类掌纹包含生物特征,可用于识别个人。这些特性可以在用户验证应用程序中使用。提出了一种基于掌纹识别的用户验证系统。手掌的图像是用网络摄像头拍摄的。然后利用线检测和局部标准差提取掌纹识别特征;该系统将邀请40名受试者作为用户(10名注册用户和30名非注册用户)进行评估。实验表明,该系统在无误接受和2%误拒的情况下,准确率高达98%。执行用户验证所需的平均时间为340毫秒。
{"title":"Palmprint identification for user verification based on line detection and local standard deviation","authors":"Bagas Sakamulia Prakoso, Ivanna K. Timotius, Iwan Setyawan","doi":"10.1109/ICITACEE.2014.7065733","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065733","url":null,"abstract":"Human palmprints contain biometric features that can be used to identify an individual. These features can be used for example in user verification applications. This paper presents a user verification system using palmprint identification. The image of the palm is captured using a web camera. Then the features used for palmprint identification is extracted using line detection and local standard deviation. The proposed system is evaluated by asking 40 subjects to act as users (10 subject as registered users and 30 non-registered users). Our experiments show that the system can achieve accuracy rate of up to 98% with no false acceptance and 2% false rejection rate. The average time required to perform a user verification is 340 ms.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114602900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal distribution network reconfiguration with penetration of distributed energy resources 分布式能源渗透下配电网最优重构
R. Syahputra, I. Robandi, M. Ashari
This paper presents an optimal distribution network reconfiguration with penetration of distributed energy resources (DER). The reconfiguration is done to achieve the minimum active power loss of radial distribution networks with DER penetration. As a further matter, the presence of DER to the distribution systems has become some problems such the increase of the voltage at which there are many DER. In this study, the technique of network reconfiguration is based on an extended fuzzy multi-objective. Multi-objective function are considered for the power loss minimization, deviation of bus voltage, and load balancing among the feeders, while subject to a radial network structure in which all loads must be energized. The extended fuzzy multi-objective for reconfiguration of distribution network has been tested on Yogyakarta 60-bus distribution network data. The test results show that a 3.83% of Yogyakarta 60-bus network power loss reduction is achieved by the method. Also, the improvement of the voltage profile at each bus is also achieved with this method.
提出了一种具有分布式能源渗透的配电网优化重构方法。为了使DER渗透下的径向配电网的有功损耗最小,对其进行了重构。此外,谐波的存在给配电系统带来了一些问题,如谐波过多时电压的升高。本文提出了一种基于扩展模糊多目标的网络重构技术。在满足所有负载都必须通电的径向网络结构的基础上,考虑了功率损耗最小化、母线电压偏差和馈线间负载均衡的多目标函数。在日惹市60条配电网数据上对配电网重构的扩展模糊多目标进行了测试。测试结果表明,该方法可使日惹60总线网络的功率损耗降低3.83%。此外,该方法还实现了各母线电压分布的改善。
{"title":"Optimal distribution network reconfiguration with penetration of distributed energy resources","authors":"R. Syahputra, I. Robandi, M. Ashari","doi":"10.1109/ICITACEE.2014.7065777","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065777","url":null,"abstract":"This paper presents an optimal distribution network reconfiguration with penetration of distributed energy resources (DER). The reconfiguration is done to achieve the minimum active power loss of radial distribution networks with DER penetration. As a further matter, the presence of DER to the distribution systems has become some problems such the increase of the voltage at which there are many DER. In this study, the technique of network reconfiguration is based on an extended fuzzy multi-objective. Multi-objective function are considered for the power loss minimization, deviation of bus voltage, and load balancing among the feeders, while subject to a radial network structure in which all loads must be energized. The extended fuzzy multi-objective for reconfiguration of distribution network has been tested on Yogyakarta 60-bus distribution network data. The test results show that a 3.83% of Yogyakarta 60-bus network power loss reduction is achieved by the method. Also, the improvement of the voltage profile at each bus is also achieved with this method.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129278935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An integrated framework for measuring information system success considering the impact of culture in Indonesia 考虑到印尼文化的影响,一个衡量信息系统成功的综合框架
S. Mardiana
This paper aims to propose a framework for assessing information system (IS) success considering the impact of culture. Previous frameworks for assessing information system (IS) success, such as DeLone and McLean model, only concern about the status of IS implementation itself. But none of the models have included the dimensions for assessing culture even though researchers have shown the strong relationship between culture and the success (or failure) of the IS. The inclusion of culture in the IS success model is very important, especially in Indonesia, since culture plays as a dominant part in almost all aspects of citizen's lives. This paper is expected to make a contribution on providing a framework for assessing IS success considering the impact of culture. To validate the proposed model, a mixed-method research design is proposed.
本文旨在提出一个考虑文化影响的评估信息系统(IS)成功的框架。以前评估信息系统(IS)成功的框架,如DeLone和McLean模型,只关注IS实施本身的状态。但是这些模型都没有包括评估文化的维度,尽管研究人员已经证明了文化与信息系统的成功(或失败)之间的密切关系。将文化纳入IS的成功模式是非常重要的,特别是在印度尼西亚,因为文化在公民生活的几乎所有方面都起着主导作用。本文预计将在提供一个考虑文化影响的评估信息系统成功的框架方面做出贡献。为了验证所提出的模型,提出了一种混合方法的研究设计。
{"title":"An integrated framework for measuring information system success considering the impact of culture in Indonesia","authors":"S. Mardiana","doi":"10.1109/ICITACEE.2014.7065747","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065747","url":null,"abstract":"This paper aims to propose a framework for assessing information system (IS) success considering the impact of culture. Previous frameworks for assessing information system (IS) success, such as DeLone and McLean model, only concern about the status of IS implementation itself. But none of the models have included the dimensions for assessing culture even though researchers have shown the strong relationship between culture and the success (or failure) of the IS. The inclusion of culture in the IS success model is very important, especially in Indonesia, since culture plays as a dominant part in almost all aspects of citizen's lives. This paper is expected to make a contribution on providing a framework for assessing IS success considering the impact of culture. To validate the proposed model, a mixed-method research design is proposed.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reconfigurable floating point adder 可重构浮点加法器
Vipin Gemini
Decimal floating point arithmetic is gaining importance because of its higher accuracy for financial, commercial and Web based applications. However, the binary floating point arithmetic is needed for scientific applications. Both these applications require general purpose processors (GPPs) for their execution. GPPs have separate hardware for decimal and binary floating point operations and therefore need a large area for their implementation. In this paper, we present a runtime reconfigurable floating point adder which targets both decimal and binary floating point addition on same hardware. The proposed design is 24.53% area efficient and approximately 7.6% faster than the previously reported designs. However, it is 6.3% slower for binary inputs.
小数浮点运算由于在金融、商业和基于Web的应用程序中具有更高的精度而变得越来越重要。然而,科学应用需要二进制浮点运算。这两个应用程序的执行都需要通用处理器(gpp)。gpp有用于十进制和二进制浮点运算的单独硬件,因此需要很大的实现空间。在本文中,我们提出了一个运行时可重构的浮点加法器,它的目标是在同一硬件上实现十进制和二进制浮点数的加法。该设计的面积效率为24.53%,比先前报道的设计快约7.6%。然而,对于二进制输入,它要慢6.3%。
{"title":"Reconfigurable floating point adder","authors":"Vipin Gemini","doi":"10.1109/ICITACEE.2014.7065719","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065719","url":null,"abstract":"Decimal floating point arithmetic is gaining importance because of its higher accuracy for financial, commercial and Web based applications. However, the binary floating point arithmetic is needed for scientific applications. Both these applications require general purpose processors (GPPs) for their execution. GPPs have separate hardware for decimal and binary floating point operations and therefore need a large area for their implementation. In this paper, we present a runtime reconfigurable floating point adder which targets both decimal and binary floating point addition on same hardware. The proposed design is 24.53% area efficient and approximately 7.6% faster than the previously reported designs. However, it is 6.3% slower for binary inputs.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective encryption of video MPEG use RSA algorithm 视频MPEG的选择性加密采用RSA算法
Prati Hutari Gani, M. Abdurohman
Selective encryption is a technique to encrypt a portion of the video data. In this case, it is encrypted by RSA algorithm. It is one of the public - key cryptosystem that is used to provide privacy and authentication of digital data. Security of this algorithm lies in the difficulty of factoring very large modulus n. In this project, the video format are MPEG - 1 and MPEG - 2, because they have almost the same bit stream structure, so the processing by using an algorithm. In this final project will be built a software using the Java platform. Testing on this project to encrypt and decrypt video formats, MPEG-1 and MPEG-2, so the security of video can be realized by using the method of selective encryption. Other parameters are the key length in the RSA algorithm which has been adapted and Brute Force Attacks.
选择性加密是一种对部分视频数据进行加密的技术。在这种情况下,使用RSA算法进行加密。它是一种用于提供数字数据的隐私和认证的公钥密码系统。该算法的安全性在于难以因式分解非常大的模数n。在本项目中,视频格式为MPEG - 1和MPEG - 2,由于它们具有几乎相同的比特流结构,因此使用了一种算法进行处理。在这个最后的项目中将构建一个使用Java平台的软件。本课题对视频格式MPEG-1和MPEG-2进行了加密和解密测试,采用选择性加密的方法可以实现视频的安全性。其他参数是RSA算法中的密钥长度,它已被改编和暴力破解攻击。
{"title":"Selective encryption of video MPEG use RSA algorithm","authors":"Prati Hutari Gani, M. Abdurohman","doi":"10.1109/ICITACEE.2014.7065727","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065727","url":null,"abstract":"Selective encryption is a technique to encrypt a portion of the video data. In this case, it is encrypted by RSA algorithm. It is one of the public - key cryptosystem that is used to provide privacy and authentication of digital data. Security of this algorithm lies in the difficulty of factoring very large modulus n. In this project, the video format are MPEG - 1 and MPEG - 2, because they have almost the same bit stream structure, so the processing by using an algorithm. In this final project will be built a software using the Java platform. Testing on this project to encrypt and decrypt video formats, MPEG-1 and MPEG-2, so the security of video can be realized by using the method of selective encryption. Other parameters are the key length in the RSA algorithm which has been adapted and Brute Force Attacks.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining e-commerce adoption level by SMEs in Indonesia based on customer-oriented benefits 基于以客户为导向的利益,确定印尼中小企业采用电子商务的水平
Evi Triandini, A. Djunaidy, D. Siahaan
Small and Medium Enterprises (SMEs) in Indonesia need to enhance their ability to face a global market. E-commerce provides potential benefits for SMEs. This study proposed a number of Indonesian SMEs' e-commerce adoption levels and their ranks based on customer-oriented benefits. The levels and ranks are determined based k-means clustering. Analysis result shows that Indonesian SMEs can be classified into four levels of e-commerce adoption based on customer-oriented benefits. The result of this study will be used as a metric in Indonesian SMEs' e-commerce adoption framework.
印尼的中小企业需要提高面对全球市场的能力。电子商务为中小企业提供了潜在的好处。本研究提出了若干印尼中小企业的电子商务采用水平和他们的排名基于客户导向的利益。水平和排名是基于k-均值聚类确定的。分析结果表明,印尼中小企业采用电子商务的程度可以根据客户导向的利益分为四个层次。这项研究的结果将被用作印尼中小企业电子商务采用框架的衡量标准。
{"title":"Determining e-commerce adoption level by SMEs in Indonesia based on customer-oriented benefits","authors":"Evi Triandini, A. Djunaidy, D. Siahaan","doi":"10.1109/ICITACEE.2014.7065757","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065757","url":null,"abstract":"Small and Medium Enterprises (SMEs) in Indonesia need to enhance their ability to face a global market. E-commerce provides potential benefits for SMEs. This study proposed a number of Indonesian SMEs' e-commerce adoption levels and their ranks based on customer-oriented benefits. The levels and ranks are determined based k-means clustering. Analysis result shows that Indonesian SMEs can be classified into four levels of e-commerce adoption based on customer-oriented benefits. The result of this study will be used as a metric in Indonesian SMEs' e-commerce adoption framework.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129263407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Iris recognition analysis using biorthogonal wavelets tranform for feature extraction 虹膜识别分析采用双正交小波变换进行特征提取
R. Isnanto
Human iris has a very unique pattern which is possible to be used as a biometric recognition. To identify texture in an image, texture analysis method can be used. One of method is wavelet that extract the image feature based on energy. Wavelet transforms used are biothogonal types, i.e. Haar and Daubechies. In this research, iris recognition based on Haar and Daubechies was done and then comparison analysis was conducted for which some conclusions taken. Some steps have to be done in the research. First, the iris image is segmented from eye image then enhanced with histogram equalization. The method used for extracting features are Haar and Daubechies (i.e. db5) wavelets transform. The features obtained is energy value. The next step is recognition using normalized Euclidean distance. Comparison analysis is done based on recognition rate percentage with two samples stored in database for reference images. As the result, the highest recognition rate is achieved using Haar with decomposition level 3 i.e. 84.375%, for which the highest recognition rate of db5 is 68.75% with decomposition level 2. The lowest recognition is achieved when db5 used with decomposition level 1, i.e. 38.231%, whereas the lowest recognition rate using Haar is 68.75% with decomposition level 1.
人类虹膜具有一种非常独特的模式,可以用作生物特征识别。为了识别图像中的纹理,可以使用纹理分析方法。其中一种方法是基于能量提取图像特征的小波变换。所使用的小波变换是生物正交型,即哈尔变换和多贝变换。本研究首先对Haar和Daubechies进行虹膜识别,然后进行对比分析,得出一些结论。研究中还需要做一些步骤。首先对虹膜图像进行分割,然后对虹膜图像进行直方图均衡化增强。提取特征的方法是Haar和Daubechies(即db5)小波变换。得到的特征为能量值。下一步是使用归一化欧氏距离进行识别。基于识别率百分比与数据库中存储的两个样本作为参考图像进行对比分析。结果表明,分解等级3的Haar的识别率最高,为84.375%,分解等级2的db5的识别率最高,为68.75%。db5在分解等级1下的识别率最低,为38.231%;Haar在分解等级1下的识别率最低,为68.75%。
{"title":"Iris recognition analysis using biorthogonal wavelets tranform for feature extraction","authors":"R. Isnanto","doi":"10.1109/ICITACEE.2014.7065738","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065738","url":null,"abstract":"Human iris has a very unique pattern which is possible to be used as a biometric recognition. To identify texture in an image, texture analysis method can be used. One of method is wavelet that extract the image feature based on energy. Wavelet transforms used are biothogonal types, i.e. Haar and Daubechies. In this research, iris recognition based on Haar and Daubechies was done and then comparison analysis was conducted for which some conclusions taken. Some steps have to be done in the research. First, the iris image is segmented from eye image then enhanced with histogram equalization. The method used for extracting features are Haar and Daubechies (i.e. db5) wavelets transform. The features obtained is energy value. The next step is recognition using normalized Euclidean distance. Comparison analysis is done based on recognition rate percentage with two samples stored in database for reference images. As the result, the highest recognition rate is achieved using Haar with decomposition level 3 i.e. 84.375%, for which the highest recognition rate of db5 is 68.75% with decomposition level 2. The lowest recognition is achieved when db5 used with decomposition level 1, i.e. 38.231%, whereas the lowest recognition rate using Haar is 68.75% with decomposition level 1.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1