首页 > 最新文献

2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)最新文献

英文 中文
KNN-Based Visitor Positioning For Museum Guide System 基于knn的博物馆导览系统访客定位
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878526
Eko Suripto Pasinggi, S. Sulistyo, B. Hantono
This study focuses on designing and implementing a Positioning System (PS) that is addressed as a component of the Location-aware Museum Guide System (GMS). The level of accuracy of the Positioning System (PS) is an important aspect in determining the suitability of the information received by the visitors. The design flow of the system begins by identifying the location of implementation. After that, choose the components to build the system. The principle used in this study is the use of existing infrastructure to reduce the cost of system development. A recent study was completed in the museum gathered information about the museum environment to assist with the design process. The system design is proposed by using WLAN technology with RSSI-based fingerprinting techniques. The algorithm used for this fingerprint technique is KNN. The addition of Access Point (AP) and AP filtering methods were also applied to improve the system performance. The test results showed that there were significant differences on accuracy level of PS among three times trial tested to the expectation of accuracy level at 1.2 meter. First trial was without additional support the existing infrastructure in the Museum is unable to provide an accurate estimating position. It was only 3.75 m. The second was by adding five APs from 6 to 11 APs, the accuracy level was 2.55 m. The last was to implement the AP filtering. It can provide improvement to 1.83 m.
本研究的重点是设计和实现定位系统(PS),该系统是定位感知博物馆导览系统(GMS)的一个组成部分。定位系统(PS)的准确度是决定访客接收到的信息是否合适的一个重要方面。系统的设计流程从确定实现位置开始。之后,选择构建系统的组件。本研究中使用的原则是利用现有的基础设施来降低系统开发的成本。最近在博物馆完成了一项研究,收集了有关博物馆环境的信息,以协助设计过程。采用无线局域网技术和基于rssi的指纹识别技术,提出了该系统的设计方案。这种指纹技术使用的算法是KNN。为了提高系统性能,还采用了增加接入点(AP)和AP滤波方法。试验结果表明,三次试验的PS精度水平与1.2 m精度水平的期望有显著差异。第一次试验是在没有额外支持的情况下,博物馆现有的基础设施无法提供准确的估计位置。它只有3.75米。二是在6 ~ 11个ap中增加5个ap,精度达到2.55 m。最后是实现AP过滤。它可以提供1.83米的改进。
{"title":"KNN-Based Visitor Positioning For Museum Guide System","authors":"Eko Suripto Pasinggi, S. Sulistyo, B. Hantono","doi":"10.1109/EIConCIT.2018.8878526","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878526","url":null,"abstract":"This study focuses on designing and implementing a Positioning System (PS) that is addressed as a component of the Location-aware Museum Guide System (GMS). The level of accuracy of the Positioning System (PS) is an important aspect in determining the suitability of the information received by the visitors. The design flow of the system begins by identifying the location of implementation. After that, choose the components to build the system. The principle used in this study is the use of existing infrastructure to reduce the cost of system development. A recent study was completed in the museum gathered information about the museum environment to assist with the design process. The system design is proposed by using WLAN technology with RSSI-based fingerprinting techniques. The algorithm used for this fingerprint technique is KNN. The addition of Access Point (AP) and AP filtering methods were also applied to improve the system performance. The test results showed that there were significant differences on accuracy level of PS among three times trial tested to the expectation of accuracy level at 1.2 meter. First trial was without additional support the existing infrastructure in the Museum is unable to provide an accurate estimating position. It was only 3.75 m. The second was by adding five APs from 6 to 11 APs, the accuracy level was 2.55 m. The last was to implement the AP filtering. It can provide improvement to 1.83 m.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Study on Zoning, Histogram, and Structural Methods to Classify Sundanese Characters from Handwriting 分区、直方图和结构方法对手写巽他语汉字分类的实验研究
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878640
Eki Nugraha, Alifia Chinka Rizal Muhammad, L. Riza, Haviluddin
Sundanese characters are one of the original Sundanese historical relics that have existed since the 5th century and have become the writing language at that time. Classification of handwriting characters is a challenge because the results of handwriting are very diverse, including the characters of handwritten characters. The number of feature extraction methods that can be used in the classification process, but not all feature extraction methods are in accordance with the characteristics of the Sundanese characters. Therefore, the focus of this research is to find the optimal feature extraction method to classify the character of Sundanese characters, in order to get better accuracy by running some experiments. Feature extraction methods proposed in this research are zoning, histograms and structural approaches. Then, some following classifier methods are used for constructing models and prediction over new data: Random Forest (RF), K-Nearest Neighbor (KNN), Artificial Neural Network (ANN), and Support Vector Machine (SVM). Based on the experiments, we can state that RF provided the best results (i.e., 89.84% in average) while the optimal feature-constructing method is by using the structural approach.
Sundanese汉字是最早的Sundanese历史遗迹之一,自5世纪以来一直存在,并成为当时的书写语言。手写字符的分类是一个挑战,因为手写的结果非常多样化,包括手写字符的字符。分类过程中可以使用的特征提取方法的数量,但并不是所有的特征提取方法都符合巽他语字符的特征。因此,本研究的重点是寻找最优的特征提取方法来对巽他语字符进行分类,并通过一些实验来获得更好的准确率。本研究提出的特征提取方法有分区法、直方图法和结构法。然后,利用随机森林(Random Forest, RF)、k近邻(K-Nearest Neighbor, KNN)、人工神经网络(Artificial Neural Network, ANN)和支持向量机(Support Vector Machine, SVM)等分类器方法对新数据进行建模和预测。通过实验,我们可以得出RF提供了最好的结果(平均为89.84%),而最优的特征构建方法是使用结构方法。
{"title":"Experimental Study on Zoning, Histogram, and Structural Methods to Classify Sundanese Characters from Handwriting","authors":"Eki Nugraha, Alifia Chinka Rizal Muhammad, L. Riza, Haviluddin","doi":"10.1109/EIConCIT.2018.8878640","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878640","url":null,"abstract":"Sundanese characters are one of the original Sundanese historical relics that have existed since the 5th century and have become the writing language at that time. Classification of handwriting characters is a challenge because the results of handwriting are very diverse, including the characters of handwritten characters. The number of feature extraction methods that can be used in the classification process, but not all feature extraction methods are in accordance with the characteristics of the Sundanese characters. Therefore, the focus of this research is to find the optimal feature extraction method to classify the character of Sundanese characters, in order to get better accuracy by running some experiments. Feature extraction methods proposed in this research are zoning, histograms and structural approaches. Then, some following classifier methods are used for constructing models and prediction over new data: Random Forest (RF), K-Nearest Neighbor (KNN), Artificial Neural Network (ANN), and Support Vector Machine (SVM). Based on the experiments, we can state that RF provided the best results (i.e., 89.84% in average) while the optimal feature-constructing method is by using the structural approach.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"48 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Warning Condition Transient Stability on South Sulawesi System using Extreme Learning Machine 基于极限学习机的南苏拉威西系统暂态稳定预警
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878568
B. A. Ashad, I. Gunadin, A. Siswanto, Yusran
The electrical systems, the addition of loads can result in fewer stability limits, if there is interference, it can cause black out. In this study analyzing early warning, by observing the limits of stability in the event of a disturbance before black out in the South Sulawesi electricity system. This study observed an early warning system consisting of 44 buses and 15 generators using a Voltage stability margin (VSM) in the event of a disruption. From the training data about each disruption from various buses that occur then learning to use Extreme Learning (ELM) engines is used to detect early warnings during transient conditions. From the ELM simulation results can work quickly 0.0001 and 0.0024 and the error value is low so that it can be known before a blackout occurs.
对电力系统来说,负荷的增加会导致稳定性限制的减少,如果有干扰,就会造成停电。本研究通过观察南苏拉威西电力系统在停电前发生扰动时的稳定性极限,对预警进行分析。本研究观察了一个由44个母线和15个发电机组成的预警系统,该系统使用电压稳定裕度(VSM)来处理中断事件。从各种公共汽车发生的每次中断的训练数据中,学习使用极限学习(ELM)引擎来检测瞬态条件下的早期预警。从ELM仿真结果可以快速工作0.0001和0.0024,并且误差值很低,因此可以在停电发生之前知道。
{"title":"Early Warning Condition Transient Stability on South Sulawesi System using Extreme Learning Machine","authors":"B. A. Ashad, I. Gunadin, A. Siswanto, Yusran","doi":"10.1109/EIConCIT.2018.8878568","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878568","url":null,"abstract":"The electrical systems, the addition of loads can result in fewer stability limits, if there is interference, it can cause black out. In this study analyzing early warning, by observing the limits of stability in the event of a disturbance before black out in the South Sulawesi electricity system. This study observed an early warning system consisting of 44 buses and 15 generators using a Voltage stability margin (VSM) in the event of a disruption. From the training data about each disruption from various buses that occur then learning to use Extreme Learning (ELM) engines is used to detect early warnings during transient conditions. From the ELM simulation results can work quickly 0.0001 and 0.0024 and the error value is low so that it can be known before a blackout occurs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance of K-Nearest Neighbor Classification in Paraphilia Disease k近邻分类在性反常症中的表现
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878672
Wistiani Astuti, Lilis Nur Hayati, Abdul Rachman Manga’, Herdianti Darwis, Yulita Salim, Harlinda, Poetri Lestari Lokapitasari Belluano
Paraphilia is still not widely known by the public. Lack of information about paraphilia is a serious concern of the Makassar City Government. This is because there are 12 types of paraphilia and some of them are contagious diseases such as fetishism, transvestism, sadomasochism, pedophilia, transsexualism, voyeurism, exhibitionism. There are several paraphilia diseases that are difficult to distinguish. The nature of paraphilia can be seen by society through its given (nature) and caused by environmental influences. In this study, the K-Nearest Neighbor (KNN) method has been applied to categorize the disease. The dataset used is derived from observations of 250 datasets. The dataset is divided into two, training data (165) and testing data (70). Based on the experiment, the k-NN method has an accuracy of Confusion Matrix of 8l%. On the other hand, the k-NN method is able to classify 12 venereal diseases quite accurately. Thus, this method was good as an alternative method for the classification task. For future research, optimization of the application will be performed to increase the accuracy of kNN.
异性恋还没有被公众广泛知晓。缺乏关于性反常的信息是望加锡市政府严重关注的问题。这是因为有12种异性恋癖,其中一些是传染性疾病,如恋物癖、异装癖、施虐受虐癖、恋童癖、易性癖、窥阴癖、暴露癖。有几种性反常疾病很难区分。异性恋的本质可以通过其给定的(性质)被社会所看到,并由环境影响所引起。在本研究中,采用k -最近邻(KNN)方法对疾病进行分类。所使用的数据集来自250个数据集的观测结果。数据集分为两个部分,训练数据(165)和测试数据(70)。实验结果表明,k-NN方法的混淆矩阵准确率达到81%。另一方面,k-NN方法能够相当准确地分类12种性病。因此,该方法作为分类任务的备选方法是很好的。在未来的研究中,将对应用程序进行优化,以提高kNN的精度。
{"title":"A Performance of K-Nearest Neighbor Classification in Paraphilia Disease","authors":"Wistiani Astuti, Lilis Nur Hayati, Abdul Rachman Manga’, Herdianti Darwis, Yulita Salim, Harlinda, Poetri Lestari Lokapitasari Belluano","doi":"10.1109/EIConCIT.2018.8878672","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878672","url":null,"abstract":"Paraphilia is still not widely known by the public. Lack of information about paraphilia is a serious concern of the Makassar City Government. This is because there are 12 types of paraphilia and some of them are contagious diseases such as fetishism, transvestism, sadomasochism, pedophilia, transsexualism, voyeurism, exhibitionism. There are several paraphilia diseases that are difficult to distinguish. The nature of paraphilia can be seen by society through its given (nature) and caused by environmental influences. In this study, the K-Nearest Neighbor (KNN) method has been applied to categorize the disease. The dataset used is derived from observations of 250 datasets. The dataset is divided into two, training data (165) and testing data (70). Based on the experiment, the k-NN method has an accuracy of Confusion Matrix of 8l%. On the other hand, the k-NN method is able to classify 12 venereal diseases quite accurately. Thus, this method was good as an alternative method for the classification task. For future research, optimization of the application will be performed to increase the accuracy of kNN.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121915446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Call for Paper 3rd 2019 EIConCIT 2019 EIConCIT征稿第3期
Pub Date : 2018-11-01 DOI: 10.1109/eiconcit.2018.8878580
{"title":"Call for Paper 3rd 2019 EIConCIT","authors":"","doi":"10.1109/eiconcit.2018.8878580","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878580","url":null,"abstract":"","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote Speech 1 Fair and Effective Resource Sharing in Network Control 主题演讲1网络控制中公平有效的资源共享
Pub Date : 2018-11-01 DOI: 10.1109/eiconcit.2018.8878548
M. Tsuru
In response to the explosive growth of network traffic as well as the continuous increase of network applications diversity and complexity, fair and effective network resource sharing among multiple users/applications are essential. In this talk, after briefly viewing recent trends in communication networks, we survey and discuss the concept of fairness in terms of achieved performance of each user through a few simple examples in wireless and wired networks. Then we go into more detail about one example and see how a network control scheme works to realize fair and effective resource sharing
面对网络流量的爆炸式增长,以及网络应用多样性和复杂性的不断提高,在多个用户/应用之间实现公平有效的网络资源共享至关重要。在本次演讲中,在简要回顾了通信网络的最新趋势之后,我们通过无线和有线网络中的几个简单示例,调查并讨论了每个用户实现性能方面的公平性概念。然后,我们将更详细地介绍一个示例,并了解网络控制方案如何实现公平有效的资源共享
{"title":"Keynote Speech 1 Fair and Effective Resource Sharing in Network Control","authors":"M. Tsuru","doi":"10.1109/eiconcit.2018.8878548","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878548","url":null,"abstract":"In response to the explosive growth of network traffic as well as the continuous increase of network applications diversity and complexity, fair and effective network resource sharing among multiple users/applications are essential. In this talk, after briefly viewing recent trends in communication networks, we survey and discuss the concept of fairness in terms of achieved performance of each user through a few simple examples in wireless and wired networks. Then we go into more detail about one example and see how a network control scheme works to realize fair and effective resource sharing","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection of Oral Cyst and Tumor Images Using Principal Component Analysis 基于主成分分析的口腔囊肿和肿瘤图像特征选择
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878641
Syahrul Mubarak, Herdianti Darwis, Fitriyani Umar, Lutfi Budi Ilmawan, Siska Anraeni, Muh. Aliyazid Mude
Tumor and cyst are two dangerous gum diseases commonly found in the mouth. However, unnoticed signs and symptoms in the early stages of them frequently lead to the late treatment of recovery. Earlier detection to them as a preventive care before becoming a chronic cancer is considered important leading to earlier diagnosis and treatment. Feature selection before detection and classification plays a vital role in order to maximize the classification accuracy. In this research, an implementation of principal component analysis (PCA) is proposed to overcome the high dimensionality of the dental panoramic images. This research is intended to offer a solution in selecting the most dominant and principal features to prevent the features weaken the accuracy. It has figured out that by using PCA, there are only four features that dominant among 33 features extracted. This means that only 12% of overall features significantly play a dominant role. Variance of these features affects the proportion contributed. Components that have a proportion of contribution greater than 1% are PC1, PC2, PC3, PC4, each of 86.44%, 9.74%, 2.59%, and 1,125%. The four dominant features which have been found are Feature 21, 22, 24, and 27 extracted by using GLRLM with SRE, LRE, RP, and HGRE respectively in other words, the 4 selected features represent 99.7% of the overall data variance representing 99.7% of the overall data variance.
肿瘤和囊肿是口腔常见的两种危险的牙龈疾病。然而,在早期阶段未被注意到的体征和症状往往导致治疗恢复晚。在癌症发展为慢性癌症之前,及早发现并采取预防措施,对早期诊断和治疗非常重要。在检测和分类之前进行特征选择对于实现分类精度最大化至关重要。本研究提出了一种主成分分析(PCA)的实现方法,以克服牙科全景图像的高维性。本研究旨在提供一种选择最主要和最主要特征的解决方案,以防止特征削弱准确性。通过PCA分析发现,在提取的33个特征中,只有4个特征占主导地位。这意味着只有12%的整体功能发挥了显著的主导作用。这些特征的方差影响贡献的比例。贡献率大于1%的组件为PC1、PC2、PC3、PC4,分别为86.44%、9.74%、2.59%、1125%。利用GLRLM与SRE、LRE、RP和HGRE分别提取的4个优势特征为Feature 21、22、24和27,即选取的4个特征代表了总体数据方差的99.7%,占总体数据方差的99.7%。
{"title":"Feature Selection of Oral Cyst and Tumor Images Using Principal Component Analysis","authors":"Syahrul Mubarak, Herdianti Darwis, Fitriyani Umar, Lutfi Budi Ilmawan, Siska Anraeni, Muh. Aliyazid Mude","doi":"10.1109/EIConCIT.2018.8878641","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878641","url":null,"abstract":"Tumor and cyst are two dangerous gum diseases commonly found in the mouth. However, unnoticed signs and symptoms in the early stages of them frequently lead to the late treatment of recovery. Earlier detection to them as a preventive care before becoming a chronic cancer is considered important leading to earlier diagnosis and treatment. Feature selection before detection and classification plays a vital role in order to maximize the classification accuracy. In this research, an implementation of principal component analysis (PCA) is proposed to overcome the high dimensionality of the dental panoramic images. This research is intended to offer a solution in selecting the most dominant and principal features to prevent the features weaken the accuracy. It has figured out that by using PCA, there are only four features that dominant among 33 features extracted. This means that only 12% of overall features significantly play a dominant role. Variance of these features affects the proportion contributed. Components that have a proportion of contribution greater than 1% are PC1, PC2, PC3, PC4, each of 86.44%, 9.74%, 2.59%, and 1,125%. The four dominant features which have been found are Feature 21, 22, 24, and 27 extracted by using GLRLM with SRE, LRE, RP, and HGRE respectively in other words, the 4 selected features represent 99.7% of the overall data variance representing 99.7% of the overall data variance.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynote Speech 2 How Machine Intelligence Transforms Sabah E-Government to Smart Government 主题演讲2机器智能如何将沙巴电子政府转变为智能政府
Pub Date : 2018-11-01 DOI: 10.1109/eiconcit.2018.8878588
Rayner Alfred
Over the last few years, the concept of e-government has enabled governments to serve the public using the Internet. It also allowed governments to capture data, process and report on data efficiently and improve on their decision making. However, the advances in smart technologies (e.g., Artificial Intelligence and Machine Learning), better informed and connected citizens, and global connected economies have created opportunities, forcing governments to rethink their role in today’s society. With the rise of people awareness about the fourth industrial revolution (IR4.0), driven by four disruptions: the astonishing rise in data volumes, computational power, and connectivity, especially new low-power wide-area networks; the emergence of analytics and business-intelligence capabilities; government should look into a few opportunities to transform from e-government into a modern and smart government. Local governments can now gather real time data, combined with the capabilities of artificial intelligence, and are realizing interesting new ways to run more efficiently and effectively. Artificial Intelligence is a collection of advanced technologies that allows machines to sense, comprehend, act and learn. Some of the key applications include intelligent automation, robotic process automation, cognitive robotics, virtual agents, machine learning and deep learning, natural language processing and video analytics. It was unrealistic to apply artificial intelligence or machine learning to many areas of government administration before. But now even more exciting, machines can now analyze things that humans might not have been able to do so before. In this talk, we will share some of the machine learning algorithms that can now be applied in transforming Sabah e- Government to smart government. Particularly, we will look several applications that can be used to enhance the effectiveness of Sabah administration that include detecting fake news, measuring public opinion using sentiment analysis, learning how people use cities/buildings in order to optimize infrastructures in cities/buildings, improving public safety in cities/buildings and improving services and productivity.
在过去几年中,电子政务的概念使政府能够使用互联网为公众服务。它还使政府能够有效地获取数据,处理和报告数据,并改进其决策。然而,智能技术(如人工智能和机器学习)的进步、信息更灵通、联系更紧密的公民以及全球互联经济创造了机会,迫使政府重新思考其在当今社会中的角色。随着人们对第四次工业革命(IR4.0)意识的提高,在四个中断的推动下:数据量、计算能力和连接性的惊人增长,特别是新的低功耗广域网;分析和商业智能功能的出现;政府应把握机遇,从电子政务向现代智慧政府转型。地方政府现在可以收集实时数据,结合人工智能的能力,并正在实现更高效、更有效地运行的有趣新方法。人工智能是一系列先进技术的集合,它使机器能够感知、理解、行动和学习。一些关键应用包括智能自动化、机器人过程自动化、认知机器人、虚拟代理、机器学习和深度学习、自然语言处理和视频分析。以前,将人工智能或机器学习应用于政府管理的许多领域是不现实的。但现在更令人兴奋的是,机器现在可以分析人类以前可能无法做到的事情。在这次演讲中,我们将分享一些机器学习算法,这些算法现在可以应用于将沙巴州的电子政府转变为智能政府。特别是,我们将研究可用于提高沙巴行政效率的几个应用程序,包括检测假新闻,使用情绪分析测量民意,了解人们如何使用城市/建筑物以优化城市/建筑物的基础设施,改善城市/建筑物的公共安全以及改善服务和生产力。
{"title":"Keynote Speech 2 How Machine Intelligence Transforms Sabah E-Government to Smart Government","authors":"Rayner Alfred","doi":"10.1109/eiconcit.2018.8878588","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878588","url":null,"abstract":"Over the last few years, the concept of e-government has enabled governments to serve the public using the Internet. It also allowed governments to capture data, process and report on data efficiently and improve on their decision making. However, the advances in smart technologies (e.g., Artificial Intelligence and Machine Learning), better informed and connected citizens, and global connected economies have created opportunities, forcing governments to rethink their role in today’s society. With the rise of people awareness about the fourth industrial revolution (IR4.0), driven by four disruptions: the astonishing rise in data volumes, computational power, and connectivity, especially new low-power wide-area networks; the emergence of analytics and business-intelligence capabilities; government should look into a few opportunities to transform from e-government into a modern and smart government. Local governments can now gather real time data, combined with the capabilities of artificial intelligence, and are realizing interesting new ways to run more efficiently and effectively. Artificial Intelligence is a collection of advanced technologies that allows machines to sense, comprehend, act and learn. Some of the key applications include intelligent automation, robotic process automation, cognitive robotics, virtual agents, machine learning and deep learning, natural language processing and video analytics. It was unrealistic to apply artificial intelligence or machine learning to many areas of government administration before. But now even more exciting, machines can now analyze things that humans might not have been able to do so before. In this talk, we will share some of the machine learning algorithms that can now be applied in transforming Sabah e- Government to smart government. Particularly, we will look several applications that can be used to enhance the effectiveness of Sabah administration that include detecting fake news, measuring public opinion using sentiment analysis, learning how people use cities/buildings in order to optimize infrastructures in cities/buildings, improving public safety in cities/buildings and improving services and productivity.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"42 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Public Perception on Organic Coffee through Text Mining Approach using Naïve Bayes Classifier 使用Naïve贝叶斯分类器的文本挖掘方法分析公众对有机咖啡的认知
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878572
I. Nuritha, A. A. Arifiyanti, Vandha Widartha
Productivity of organic coffee plants in Indonesia is still lower if compared by productivity of coffee which use ordinary cultivation. One of the problems, which is faced by farmers to develop organic coffee is no certainty market. This could be because not all people of Indonesia are able to buy organic coffee products which quite expensive. Based on these, it is necessary to analyze public perception sentiment of organic coffee products, to identify potential and opportunities the development of organic coffee farming in Indonesia. This research uses a text mining approach to classify the public perception sentiment on organic coffee products based on tweet which posted in social media, i.e., twitter. Sentiment classification is performed by Naïve Bayes Classifier algorithm. The most of sentiment value formed in this research is positive sentiment. These results show that the public perception on organic coffee is in positive manner. So that the prospect of organic coffee plants development in Indonesia and the market opportunity of organic coffee products are predicted to rise as well.
如果与普通种植的咖啡相比,印尼有机咖啡的产量仍然较低。农民发展有机咖啡面临的问题之一是市场不确定。这可能是因为不是所有的印尼人都能买到非常昂贵的有机咖啡产品。在此基础上,有必要分析公众对有机咖啡产品的认知情绪,以识别印尼有机咖啡种植发展的潜力和机遇。本研究采用文本挖掘的方法,对公众对有机咖啡产品的感知情绪进行分类,该分类基于社交媒体(即twitter)上发布的tweet。情感分类采用Naïve贝叶斯分类器算法。本研究所形成的情感价值以积极情绪为主。这些结果表明,公众对有机咖啡的认知是积极的。因此,有机咖啡在印尼的发展前景和有机咖啡产品的市场机会也将增加。
{"title":"Analysis of Public Perception on Organic Coffee through Text Mining Approach using Naïve Bayes Classifier","authors":"I. Nuritha, A. A. Arifiyanti, Vandha Widartha","doi":"10.1109/EIConCIT.2018.8878572","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878572","url":null,"abstract":"Productivity of organic coffee plants in Indonesia is still lower if compared by productivity of coffee which use ordinary cultivation. One of the problems, which is faced by farmers to develop organic coffee is no certainty market. This could be because not all people of Indonesia are able to buy organic coffee products which quite expensive. Based on these, it is necessary to analyze public perception sentiment of organic coffee products, to identify potential and opportunities the development of organic coffee farming in Indonesia. This research uses a text mining approach to classify the public perception sentiment on organic coffee products based on tweet which posted in social media, i.e., twitter. Sentiment classification is performed by Naïve Bayes Classifier algorithm. The most of sentiment value formed in this research is positive sentiment. These results show that the public perception on organic coffee is in positive manner. So that the prospect of organic coffee plants development in Indonesia and the market opportunity of organic coffee products are predicted to rise as well.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced MAC based on Hybrid-MD Algorithm 基于Hybrid-MD算法的增强MAC
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878523
Muslim Muslim, Suarga Suarga, As’ad Djamalilleil, Fitriyani Umar, Mardiyyah Hasnawi, Syahrul Mubarak
In the digital era like now almost all transactions are done in online. However, information on the results of transactions sent through digital communication channels are very vulnerable to counterfeiting attacks. Therefore, it is made to ensure that the received message information is still intact and genuine. A MAC is a cryptographic algorithm that is suitable and widely used as a solution for such problems even though there are still many tricks that can be used by attackers to find fake messages for deceive other parties. The secure Ok-MAC algorithm developed in this paper is that enhanced MAC uses a message digest based on a hybrid of two existing message digests using just one key. The test results show that for the small-sized message the MAC algorithm Ok-MAC is slightly slower (26.53 ms) than the HMAC-SHA-1 (24.94 ms) and Ok-MAC is expected to validate the integrity and authenticity of the sort message well.
在现在这样的数字时代,几乎所有的交易都是在网上完成的。然而,通过数字通信渠道发送的有关交易结果的信息非常容易受到假冒攻击。因此,这样做是为了确保接收到的消息信息仍然是完整和真实的。MAC是一种适合并广泛用于解决此类问题的加密算法,尽管攻击者仍然可以使用许多技巧来找到虚假消息以欺骗其他方。本文开发的安全的Ok-MAC算法是增强型MAC使用基于两个现有消息摘要的混合消息摘要,仅使用一个密钥。测试结果表明,对于小尺寸的消息,MAC算法Ok-MAC (26.53 ms)比HMAC-SHA-1 (24.94 ms)略慢,并且Ok-MAC有望很好地验证排序消息的完整性和真实性。
{"title":"Enhanced MAC based on Hybrid-MD Algorithm","authors":"Muslim Muslim, Suarga Suarga, As’ad Djamalilleil, Fitriyani Umar, Mardiyyah Hasnawi, Syahrul Mubarak","doi":"10.1109/EIConCIT.2018.8878523","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878523","url":null,"abstract":"In the digital era like now almost all transactions are done in online. However, information on the results of transactions sent through digital communication channels are very vulnerable to counterfeiting attacks. Therefore, it is made to ensure that the received message information is still intact and genuine. A MAC is a cryptographic algorithm that is suitable and widely used as a solution for such problems even though there are still many tricks that can be used by attackers to find fake messages for deceive other parties. The secure Ok-MAC algorithm developed in this paper is that enhanced MAC uses a message digest based on a hybrid of two existing message digests using just one key. The test results show that for the small-sized message the MAC algorithm Ok-MAC is slightly slower (26.53 ms) than the HMAC-SHA-1 (24.94 ms) and Ok-MAC is expected to validate the integrity and authenticity of the sort message well.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1