首页 > 最新文献

2020 6th International Conference on Science in Information Technology (ICSITech)最新文献

英文 中文
Route Discovery to Avoid Congestion in Software Defined Networks 软件定义网络中避免拥塞的路由发现
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392049
Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho
In computer networks, a centralized control plane model of Software Defined Network (SDN) often suffers from congestion because of this centralized characteristic. Fortunately, some congestion avoidance mechanisms have been introduced, one of which reduces the size of packets to send. However, this is considered less useful because it is longer due to the relatively small number of packets. This paper proposes a route discovery mechanism to find the best routes for packet forwarding to avoid congestion. The method explores Johnson’s algorithm because it is able to take advantage of the previous Dijkstra and Bellman-Ford algorithms. The performance of the networks measured by latency, throughput, and response time shows an improvement.
在计算机网络中,软件定义网络(SDN)的集中控制平面模型由于其集中的特点而经常出现拥塞问题。幸运的是,已经引入了一些拥塞避免机制,其中之一减少了要发送的数据包的大小。然而,这被认为不太有用,因为由于相对较少的数据包数量,它更长。本文提出了一种路由发现机制,为数据包的转发寻找最佳路由,以避免拥塞。该方法探索约翰逊算法,因为它能够利用以前的Dijkstra和Bellman-Ford算法。通过延迟、吞吐量和响应时间衡量的网络性能有所改善。
{"title":"Route Discovery to Avoid Congestion in Software Defined Networks","authors":"Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho","doi":"10.1109/ICSITech49800.2020.9392049","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392049","url":null,"abstract":"In computer networks, a centralized control plane model of Software Defined Network (SDN) often suffers from congestion because of this centralized characteristic. Fortunately, some congestion avoidance mechanisms have been introduced, one of which reduces the size of packets to send. However, this is considered less useful because it is longer due to the relatively small number of packets. This paper proposes a route discovery mechanism to find the best routes for packet forwarding to avoid congestion. The method explores Johnson’s algorithm because it is able to take advantage of the previous Dijkstra and Bellman-Ford algorithms. The performance of the networks measured by latency, throughput, and response time shows an improvement.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"74 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[ICSITech 2020 Front Cover] [ICSITech 2020年封面]
Pub Date : 2020-10-21 DOI: 10.1109/icsitech49800.2020.9392037
{"title":"[ICSITech 2020 Front Cover]","authors":"","doi":"10.1109/icsitech49800.2020.9392037","DOIUrl":"https://doi.org/10.1109/icsitech49800.2020.9392037","url":null,"abstract":"","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Tooth and Background Segmentation in Dental X-ray Using U-Net Convolution Network 基于U-Net卷积网络的牙科x射线图像中牙齿和背景的自动分割
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392039
A. Fariza, A. Arifin, E. Astuti
Tooth and background segmentation in dental X-ray is used to produce an area of a tooth by removing areas of tissue and other neighboring teeth. This presents challenges due to a large number of superimposed (overlapping) images of teeth between the adjacent teeth and the difficulty of determining the area of the tooth with other tissues automatically. This study proposes a new approach for the automatic segmentation of dental X-ray images using the U-Net convolution network. The stages used in the training process consist of data augmentation, pre-processing with Contrast Limited Adequate Histogram Equalization (CLAHE) and gamma adjustment, and training with the U-Net architecture. While the testing process consists of pre-processing, prediction, and removing small areas in the background. The experimental results show the average accuracy of the proposed U-Net convolutional network segmentation accuracy achieves excellent results, 97.61% compared to spatial Fuzzy C-means with gaussian kernel-based of 65.55%. It shows the proposed method achieves superior automatic tooth and background segmentation. The experiment result among 1907 image testing, there are 14.58% producing segmentation because of biased boundaries on the tissue at the root of the tooth and overlapping images on the enamel.
牙齿x射线中的牙齿和背景分割是通过去除组织和其他邻近牙齿的区域来产生牙齿的一个区域。由于相邻牙齿之间存在大量重叠的牙齿图像,并且难以自动确定牙齿与其他组织的区域,这就提出了挑战。本文提出了一种基于U-Net卷积网络的牙科x射线图像自动分割方法。训练过程中使用的阶段包括数据增强,对比度有限的适当直方图均衡化(CLAHE)和伽马调整的预处理,以及U-Net架构的训练。而测试过程包括预处理、预测和去除背景中的小区域。实验结果表明,所提出的U-Net卷积网络的平均分割准确率达到了97.61%,而基于高斯核的空间模糊c均值分割准确率为65.55%。实验结果表明,该方法能较好地实现牙齿和背景的自动分割。实验结果在1907个图像检测中,14.58%的图像产生分割是由于牙根组织边界偏置和牙釉质图像重叠造成的。
{"title":"Automatic Tooth and Background Segmentation in Dental X-ray Using U-Net Convolution Network","authors":"A. Fariza, A. Arifin, E. Astuti","doi":"10.1109/ICSITech49800.2020.9392039","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392039","url":null,"abstract":"Tooth and background segmentation in dental X-ray is used to produce an area of a tooth by removing areas of tissue and other neighboring teeth. This presents challenges due to a large number of superimposed (overlapping) images of teeth between the adjacent teeth and the difficulty of determining the area of the tooth with other tissues automatically. This study proposes a new approach for the automatic segmentation of dental X-ray images using the U-Net convolution network. The stages used in the training process consist of data augmentation, pre-processing with Contrast Limited Adequate Histogram Equalization (CLAHE) and gamma adjustment, and training with the U-Net architecture. While the testing process consists of pre-processing, prediction, and removing small areas in the background. The experimental results show the average accuracy of the proposed U-Net convolutional network segmentation accuracy achieves excellent results, 97.61% compared to spatial Fuzzy C-means with gaussian kernel-based of 65.55%. It shows the proposed method achieves superior automatic tooth and background segmentation. The experiment result among 1907 image testing, there are 14.58% producing segmentation because of biased boundaries on the tissue at the root of the tooth and overlapping images on the enamel.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Prototyping of a Scalable IoT Solution Based on LoRaWAN to Improve the Service of School Routes in the South West Location of Barranquilla 基于LoRaWAN的可扩展物联网解决方案的设计和原型,以改善巴兰基亚西南地区学校路线的服务
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392062
Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca
The Internet of things (IoT) has quickly been introduced into wireless networks and systems, opening several possibilities in terms of connectivity. IoT arises from the vast need to monitor, manage, and configure “things” remotely. Different industrial or residential applications can use IoT to obtain or send data, such as remote control of alarms, water meters, simple traffic, and light points. This research project focuses on the IoT implementation of devices LoRa that uses the LoRaWAN protocol. LoRaWAN is a network infrastructure that could be applied to monitor different variables in environments where IoT wireless technology is implemented. The current project involves designing a LoRaWAN network to support IoT in transporting school routes in Barranquilla’s southwest. The project incorporates a prototype that allows the vehicle monitoring, geographical location in real-time, percentage of the occupation, arrivals, and departures times, among other variables. Implementing this technology in the chosen sector will benefit families that require the school transport service because they will monitor the operation of the service provided. This paper details the devices and technology to be implemented in the final prototype, specifying their topology, application, technical specification, operating characteristics, and their configuration and work logic under different scenarios. For the development of the project, the guidelines defined in each of the Top-Down network design methodology phases are applied. Finally, two essential aspects are shown, such as analyzing the results obtained in the tests and the future work to be carried out based on the research.
物联网(IoT)已迅速引入无线网络和系统,在连接方面开辟了几种可能性。物联网源于远程监控、管理和配置“事物”的巨大需求。不同的工业或住宅应用可以使用物联网来获取或发送数据,例如远程控制报警器、水表、简单的交通和照明点。本研究项目侧重于使用LoRaWAN协议的设备LoRa的物联网实现。LoRaWAN是一种网络基础设施,可用于监控实施物联网无线技术的环境中的不同变量。目前的项目涉及设计一个LoRaWAN网络,以支持巴兰基亚西南部学校路线的物联网运输。该项目整合了一个原型,允许车辆监控,实时地理位置,占用百分比,到达和离开时间,以及其他变量。在选定的部门实施这项技术将使需要学校交通服务的家庭受益,因为他们将监测所提供服务的运作情况。本文详细介绍了最终样机中要实现的器件和技术,详细说明了它们的拓扑结构、应用、技术规格、工作特性以及不同场景下的配置和工作逻辑。对于项目的开发,在每个自上而下的网络设计方法阶段中定义的指导方针被应用。最后,对试验结果进行了分析,并在此基础上提出了今后需要开展的工作。
{"title":"Design and Prototyping of a Scalable IoT Solution Based on LoRaWAN to Improve the Service of School Routes in the South West Location of Barranquilla","authors":"Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca","doi":"10.1109/ICSITech49800.2020.9392062","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392062","url":null,"abstract":"The Internet of things (IoT) has quickly been introduced into wireless networks and systems, opening several possibilities in terms of connectivity. IoT arises from the vast need to monitor, manage, and configure “things” remotely. Different industrial or residential applications can use IoT to obtain or send data, such as remote control of alarms, water meters, simple traffic, and light points. This research project focuses on the IoT implementation of devices LoRa that uses the LoRaWAN protocol. LoRaWAN is a network infrastructure that could be applied to monitor different variables in environments where IoT wireless technology is implemented. The current project involves designing a LoRaWAN network to support IoT in transporting school routes in Barranquilla’s southwest. The project incorporates a prototype that allows the vehicle monitoring, geographical location in real-time, percentage of the occupation, arrivals, and departures times, among other variables. Implementing this technology in the chosen sector will benefit families that require the school transport service because they will monitor the operation of the service provided. This paper details the devices and technology to be implemented in the final prototype, specifying their topology, application, technical specification, operating characteristics, and their configuration and work logic under different scenarios. For the development of the project, the guidelines defined in each of the Top-Down network design methodology phases are applied. Finally, two essential aspects are shown, such as analyzing the results obtained in the tests and the future work to be carried out based on the research.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application 即时通讯应用中加密消息AES和ECDSA的实现
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392034
Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi
Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportunities, including message sabotation. The use of cryptography was one of the right methods to maintain data or information security while a communication occurred. Message security was done by combining a symmetric encryption algorithm with a digital signature algorithm. Combination of AES and ECDSA is done as a method of securing messages. AES is used for message encryption, ECDSA is used as an identifier for the sender of the message. Confidentiality and data integrity is guaranteed through encrypting messages in the database and with carrying out digital signatures.
即时通讯是大众广泛使用的通讯技术之一。移动即时通讯用户的数量可能为犯罪提供机会,包括信息破坏。在通信发生时,使用加密技术是维护数据或信息安全的正确方法之一。消息安全性通过将对称加密算法与数字签名算法相结合来实现。AES和ECDSA的组合是一种保护消息的方法。AES用于消息加密,ECDSA用作消息发送方的标识符。机密性和数据完整性是通过加密数据库中的消息和执行数字签名来保证的。
{"title":"Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application","authors":"Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi","doi":"10.1109/ICSITech49800.2020.9392034","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392034","url":null,"abstract":"Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportunities, including message sabotation. The use of cryptography was one of the right methods to maintain data or information security while a communication occurred. Message security was done by combining a symmetric encryption algorithm with a digital signature algorithm. Combination of AES and ECDSA is done as a method of securing messages. AES is used for message encryption, ECDSA is used as an identifier for the sender of the message. Confidentiality and data integrity is guaranteed through encrypting messages in the database and with carrying out digital signatures.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122105820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Comparison of Euclidean, Manhattan and Minkowski Distances in K-Means Clustering 欧氏距离、曼哈顿距离和闵可夫斯基距离在k均值聚类中的性能比较
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392053
Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred
The Indonesian police department has a role in maintaining security and law enforcement under the Republic of Indonesia Law Number 2 of 2002. In this study, data on the crime rate in the Bontang City area has been analyzed. It becomes the basis for the Police in anticipating various crimes. The K-Means algorithm is used for data analysis. Based on the test results, there are three levels of crime: high, medium, and low. According to the analysis, the high crime rate in the Bontang City area is special case theft and vehicle theft. Furthermore, it becomes the police program to maintain personal and vehicle safety.
根据2002年印度尼西亚共和国第2号法律,印度尼西亚警察部门在维护安全和执法方面发挥作用。在本研究中,分析了Bontang城市地区的犯罪率数据。它成为警察预测各种犯罪的依据。数据分析采用K-Means算法。根据测试结果,有三个级别的犯罪:高、中、低。分析认为,邦塘城区犯罪率较高的是特殊案件盗窃和车辆盗窃。此外,它还成为维护个人和车辆安全的警察程序。
{"title":"A Performance Comparison of Euclidean, Manhattan and Minkowski Distances in K-Means Clustering","authors":"Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred","doi":"10.1109/ICSITech49800.2020.9392053","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392053","url":null,"abstract":"The Indonesian police department has a role in maintaining security and law enforcement under the Republic of Indonesia Law Number 2 of 2002. In this study, data on the crime rate in the Bontang City area has been analyzed. It becomes the basis for the Police in anticipating various crimes. The K-Means algorithm is used for data analysis. Based on the test results, there are three levels of crime: high, medium, and low. According to the analysis, the high crime rate in the Bontang City area is special case theft and vehicle theft. Furthermore, it becomes the police program to maintain personal and vehicle safety.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ITaCaS: a serious game and an expert system to support the teaching of sexual-health and hygiene for youth with intellectual disability ITaCaS:一个严肃的游戏和一个专家系统,支持对智障青年进行性健康和卫生教育
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392068
Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio
In Ecuador, according to the National Council for Disability Equality (CONADIS, acronym in Spanish) there are 485,325 people with disabilities, being the intellectual disability the one with the highest incidence, with a prevalence of 108,312 people. In developing countries, there are still insufficient resources for teaching Sexual Health and Hygiene (SHH) to people with disabilities. Thus, it is essential to apply strategies that help teenagers with intellectual disabilities to learn about sexual health and self-care. Therefore, this article presents an educational game and an expert system called “I take care of myself” (ITaCaS) which aims to assist in the teaching of the SHH for young people with intellectual disabilities, with ages between 12 and 17 years old. The expert system helps to determine educational activities to be carried out by the teacher with the teenager, based on their profile and prior knowledge of 13 SHH educational topics. The pictures of the game were specially designed for disabled people. The proposal was validated through a study that was carried out in two special education centers with 30 experts in the field of special education. The obtained results are encouraging since they show great acceptance by the participants of this experiment.
根据全国残疾人平等委员会(CONADIS,西班牙语首字母缩略词)的数据,厄瓜多尔有485,325名残疾人,其中智力残疾的发病率最高,为108,312人。在发展中国家,对残疾人进行性健康和卫生教育的资源仍然不足。因此,应用策略帮助有智力障碍的青少年了解性健康和自我保健是至关重要的。因此,本文提出了一个名为“我照顾自己”(ITaCaS)的教育游戏和专家系统,旨在帮助年龄在12至17岁之间的智障青少年学习嘘。专家系统根据青少年的个人资料和对13个SHH教育主题的先验知识,帮助确定教师对青少年进行的教育活动。游戏的图片是专门为残疾人设计的。该建议通过在两个特殊教育中心与30名特殊教育领域的专家进行的一项研究得到了验证。获得的结果是令人鼓舞的,因为它们显示了这个实验参与者的高度接受。
{"title":"ITaCaS: a serious game and an expert system to support the teaching of sexual-health and hygiene for youth with intellectual disability","authors":"Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio","doi":"10.1109/ICSITech49800.2020.9392068","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392068","url":null,"abstract":"In Ecuador, according to the National Council for Disability Equality (CONADIS, acronym in Spanish) there are 485,325 people with disabilities, being the intellectual disability the one with the highest incidence, with a prevalence of 108,312 people. In developing countries, there are still insufficient resources for teaching Sexual Health and Hygiene (SHH) to people with disabilities. Thus, it is essential to apply strategies that help teenagers with intellectual disabilities to learn about sexual health and self-care. Therefore, this article presents an educational game and an expert system called “I take care of myself” (ITaCaS) which aims to assist in the teaching of the SHH for young people with intellectual disabilities, with ages between 12 and 17 years old. The expert system helps to determine educational activities to be carried out by the teacher with the teenager, based on their profile and prior knowledge of 13 SHH educational topics. The pictures of the game were specially designed for disabled people. The proposal was validated through a study that was carried out in two special education centers with 30 experts in the field of special education. The obtained results are encouraging since they show great acceptance by the participants of this experiment.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Users Want for Gig Economy Platforms: Sentiment Analysis Approach 零工经济平台的用户需求:情感分析方法
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392060
Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
Gig economy-based mobile applications are increasingly in demand by the public. An increment in the number of users rises the number of downloads and reviews. However, the number of reviews makes it difficult for developers to understand the information contained in reviews. Besides, one review can have a variety of information. This study proposes a model that can categorize content and sentiment reviews using Support Vector Machine (SVM), Multinomial Naïve Bayes, Complement Naïve Bayes classifier, and Binary Relevance, Classifier Chain, and Label Power Sets as the data transformation method. This study used the reviews contained in the Gojek, Sampingan, and Ruang Guru applications, with 10,123 reviews. This study found the review text’s length influenced accuracy based on the evaluation of Gojek application. Generally, this study results showed that the SVM algorithm (both in the classification of sentiment reviews and review categorization) and Label Power Sets as the transformation method, yielded the best accuracy.
大众对基于零工经济的移动应用程序的需求越来越大。用户数量的增加将推动下载量和评论数的增长。然而,评论的数量使得开发人员很难理解评论中包含的信息。此外,一次复习可以包含多种信息。本研究提出了一种使用支持向量机(SVM)、多项式Naïve贝叶斯、互补Naïve贝叶斯分类器以及二值关联、分类器链和标签功率集作为数据转换方法对内容和情感评论进行分类的模型。本研究使用了Gojek、Sampingan和Ruang Guru应用程序中包含的评论,共有10,123条评论。本研究通过对Gojek应用的评价,发现复习文本的长度影响准确率。总的来说,本研究结果表明,SVM算法(包括情感评论分类和评论分类)和Label Power Sets作为转换方法获得了最好的准确率。
{"title":"What Users Want for Gig Economy Platforms: Sentiment Analysis Approach","authors":"Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICSITech49800.2020.9392060","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392060","url":null,"abstract":"Gig economy-based mobile applications are increasingly in demand by the public. An increment in the number of users rises the number of downloads and reviews. However, the number of reviews makes it difficult for developers to understand the information contained in reviews. Besides, one review can have a variety of information. This study proposes a model that can categorize content and sentiment reviews using Support Vector Machine (SVM), Multinomial Naïve Bayes, Complement Naïve Bayes classifier, and Binary Relevance, Classifier Chain, and Label Power Sets as the data transformation method. This study used the reviews contained in the Gojek, Sampingan, and Ruang Guru applications, with 10,123 reviews. This study found the review text’s length influenced accuracy based on the evaluation of Gojek application. Generally, this study results showed that the SVM algorithm (both in the classification of sentiment reviews and review categorization) and Label Power Sets as the transformation method, yielded the best accuracy.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation Artificial Neural Network on Microcontroller for Student Attention Level Monitoring Device Using EEG 基于脑电图的学生注意力水平监测装置的微控制器人工神经网络实现
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392043
D. Lestari, Pradareza S.T. Muhammad, I. A. Zaini
The ability to concentrate is needed by students in the learning process. Also, the level of concentration required by each employee when they want to do various kinds of work. Monitoring and evaluating a person’s concentration conditions is not easy, one of which is obtained from the information signal Electroencephalography (EEG). This study aims to detect the condition of whether someone is concentrating when doing activities or not. The method used in this study is for Backpropagation Type Neural Networks. Inputs from Artificial Neural Networks are EEG waves with Theta, Low Beta, and High Beta types. The identification system outputs are two classes, namely the full concentration class and the low concentration class. The ANN model obtained through training is then implemented into the Arduino Microcontroller so that it can be used as portable device. So, the classification results obtained are suitable with the output.
学生在学习过程中需要有集中注意力的能力。此外,当每个员工想做各种工作时,他们所需要的集中程度。监测和评估一个人的注意力状况并不容易,其中一项指标是通过脑电图(EEG)信息信号获得的。这项研究的目的是检测一个人在做活动时是否集中注意力。本研究使用的方法是反向传播型神经网络。人工神经网络的输入是Theta、Low Beta和High Beta类型的脑电波。识别系统输出有两类,即全浓度类和低浓度类。然后将训练得到的ANN模型实现到Arduino微控制器中,使其可以作为便携式设备使用。因此,所得到的分类结果与输出是吻合的。
{"title":"Implementation Artificial Neural Network on Microcontroller for Student Attention Level Monitoring Device Using EEG","authors":"D. Lestari, Pradareza S.T. Muhammad, I. A. Zaini","doi":"10.1109/ICSITech49800.2020.9392043","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392043","url":null,"abstract":"The ability to concentrate is needed by students in the learning process. Also, the level of concentration required by each employee when they want to do various kinds of work. Monitoring and evaluating a person’s concentration conditions is not easy, one of which is obtained from the information signal Electroencephalography (EEG). This study aims to detect the condition of whether someone is concentrating when doing activities or not. The method used in this study is for Backpropagation Type Neural Networks. Inputs from Artificial Neural Networks are EEG waves with Theta, Low Beta, and High Beta types. The identification system outputs are two classes, namely the full concentration class and the low concentration class. The ANN model obtained through training is then implemented into the Arduino Microcontroller so that it can be used as portable device. So, the classification results obtained are suitable with the output.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Analysis of QoS parameters measurement applying packet scheduling algorithms on Cisco 2800 Router with Static Routing 基于静态路由的Cisco 2800路由器分组调度算法对QoS参数测量的比较分析
Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392032
Malena Castro, Luz E. Márquez, J. Márquez
This work provides some criteria that allow network administrators to measure the impact of different network configurations have on voice, data, and video applications quality of service offered to the different users. For that, this project implemented tests to measure parameters such as packet loss, delay and jitter using static routing, different packet scheduling algorithms (Custom Queuing, Priority Queuing, and Weighted First Queuing), different services (voice, data, and video), and connection speeds using Cisco 2800 Routers and D-ITG traffic generator in conjunction with the Network Time Protocol synchronizer. A comparative analysis of sensitive parameters for Quality of Service was conducted to describe network behavior for each service. The implemented services presented performances according to quality requirements, reported in the literature. Specifically, the data service presented delay and jitter within the levels considered acceptable for this application and zero packet loss. For its part, the video service presented levels of delay and jitter according to the quality requirements for streaming. Finally, the voice service presented the best configuration performance with the Priority Queuing algorithm, for all measured service quality parameters.
这项工作提供了一些标准,使网络管理员能够衡量不同网络配置对提供给不同用户的语音、数据和视频应用程序服务质量的影响。为此,本项目使用静态路由、不同的数据包调度算法(自定义排队、优先排队和加权优先排队)、不同的业务(语音、数据和视频)和使用Cisco 2800路由器和D-ITG流量生成器以及网络时间协议同步器的连接速度来实现测试,以测量诸如丢包、延迟和抖动等参数。对服务质量的敏感参数进行了比较分析,以描述每种服务的网络行为。实现的服务根据文献中报道的质量要求呈现性能。具体来说,数据服务在该应用程序可接受的级别内呈现延迟和抖动,并且没有丢包。就其本身而言,视频服务根据流媒体的质量要求呈现延迟和抖动的级别。最后,对于所有测量的业务质量参数,使用优先排队算法的语音业务表现出最佳的配置性能。
{"title":"A Comparative Analysis of QoS parameters measurement applying packet scheduling algorithms on Cisco 2800 Router with Static Routing","authors":"Malena Castro, Luz E. Márquez, J. Márquez","doi":"10.1109/ICSITech49800.2020.9392032","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392032","url":null,"abstract":"This work provides some criteria that allow network administrators to measure the impact of different network configurations have on voice, data, and video applications quality of service offered to the different users. For that, this project implemented tests to measure parameters such as packet loss, delay and jitter using static routing, different packet scheduling algorithms (Custom Queuing, Priority Queuing, and Weighted First Queuing), different services (voice, data, and video), and connection speeds using Cisco 2800 Routers and D-ITG traffic generator in conjunction with the Network Time Protocol synchronizer. A comparative analysis of sensitive parameters for Quality of Service was conducted to describe network behavior for each service. The implemented services presented performances according to quality requirements, reported in the literature. Specifically, the data service presented delay and jitter within the levels considered acceptable for this application and zero packet loss. For its part, the video service presented levels of delay and jitter according to the quality requirements for streaming. Finally, the voice service presented the best configuration performance with the Priority Queuing algorithm, for all measured service quality parameters.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 6th International Conference on Science in Information Technology (ICSITech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1