首页 > 最新文献

2016 2nd International Conference on Science in Information Technology (ICSITech)最新文献

英文 中文
UCPabc as an integration model for software cost estimation UCPabc作为软件成本估算的集成模型
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852631
R. S. Dewi, Grandys Frieska Prassida, Sholiq, A. P. Subriadi
This study aims to construct a scientific model in estimating effort and cost of software development projects. Use Case Points (UCP) is very important method to estimate the total effort in software development projects. While the technique of Activity-based Costing (ABC) serves as the calculation of costs in each of the activities, especially the allocation of project resources. ABC technique consists of five stages are estimates based on the allocation of its resources, by having the total of UCP first. The result of this research is a proposed model of integration between UCP and ABC method or also called UCPabc. UCPabc model testing performed on five software development project small-medium scales. The results of test evaluations UCPabc estimation model with the company's actual cost turned out to be quite impressive, which the deviation only 2.16 percent. Meanwhile, the company forecast profit margin of 30.4 percent between total project contract value with cost estimation by using UCPabc.
本研究旨在建立一个科学的估算软件开发项目的工作量和成本的模型。用例点(UCP)是评估软件开发项目总工作量的一种非常重要的方法。而作业成本法(ABC)则是对每项活动的成本进行计算,特别是对项目资源的分配。ABC技术由五个阶段组成,是基于其资源分配的估计,首先有UCP的总数。本研究的结果是提出了UCP与ABC方法的集成模型,也称为UCPabc。在五个中小规模的软件开发项目中进行了UCPabc模型测试。用公司的实际成本对UCPabc估算模型进行了测试评估,结果令人印象深刻,偏差仅为2.16%。与此同时,利用UCPabc,预计工程合同总额与成本估算之间的利润率为30.4%。
{"title":"UCPabc as an integration model for software cost estimation","authors":"R. S. Dewi, Grandys Frieska Prassida, Sholiq, A. P. Subriadi","doi":"10.1109/ICSITECH.2016.7852631","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852631","url":null,"abstract":"This study aims to construct a scientific model in estimating effort and cost of software development projects. Use Case Points (UCP) is very important method to estimate the total effort in software development projects. While the technique of Activity-based Costing (ABC) serves as the calculation of costs in each of the activities, especially the allocation of project resources. ABC technique consists of five stages are estimates based on the allocation of its resources, by having the total of UCP first. The result of this research is a proposed model of integration between UCP and ABC method or also called UCPabc. UCPabc model testing performed on five software development project small-medium scales. The results of test evaluations UCPabc estimation model with the company's actual cost turned out to be quite impressive, which the deviation only 2.16 percent. Meanwhile, the company forecast profit margin of 30.4 percent between total project contract value with cost estimation by using UCPabc.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123063689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new approach on prediction of fever disease by using a combination of Dempster Shafer and Naïve bayes 利用Dempster Shafer和Naïve bayes联合预测发热疾病的新方法
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852664
Y. Mulyani, E. F. Rahman, Herbert, L. Riza
Health is an important aspect of human life. Symptom of fever is one of the symptoms that can interfere with human health. The symptoms are common in human, but for handling errors sometimes occur diagnosis that can lead to death. Such errors can occur due to lack of expertise or reluctance of patients to check themselves since the symptom fever is common. By considering the issues, we conduct a study to design an application that can help patients with the fever symptom. The research was conducted by combining two following concepts: expert systems (i.e., Dempster Shafer) and machine learning (i.e., Naïve bayes). By combining the methods, we can obtain a single solution considering knowledge formulated by human experts and extracted from data training. Moreover, the application is implemented by an R package connecting R language with PHP, which is RShinny. A case study was taken by using medical records from the hospital Muhammadiyah, Bandung, West Java, Indonesia. To determine the level of accuracy of the system, we carried out two experimental stages, namely the fitting and testing steps. For the fitting step, we obtained the accuracy of 70.67 percent while 56.25 percent is the accuracy of the testing stage.
健康是人类生活的一个重要方面。发烧是影响人体健康的症状之一。这些症状在人类中很常见,但由于处理错误有时会发生诊断,可能导致死亡。这种错误可能是由于缺乏专业知识或患者不愿自我检查,因为发烧的症状是常见的。考虑到这些问题,我们进行了一项研究,设计一个应用程序,可以帮助患者发烧症状。该研究结合了以下两个概念:专家系统(即Dempster Shafer)和机器学习(即Naïve bayes)。通过这两种方法的结合,我们可以得到考虑人类专家制定的知识和从数据训练中提取的单一解。此外,该应用程序是由一个连接R语言和PHP的R包RShinny实现的。利用印度尼西亚西爪哇万隆Muhammadiyah医院的医疗记录进行了个案研究。为了确定系统的精度水平,我们进行了两个实验阶段,即拟合和测试步骤。拟合步骤的准确率为70.67%,测试阶段的准确率为56.25%。
{"title":"A new approach on prediction of fever disease by using a combination of Dempster Shafer and Naïve bayes","authors":"Y. Mulyani, E. F. Rahman, Herbert, L. Riza","doi":"10.1109/ICSITECH.2016.7852664","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852664","url":null,"abstract":"Health is an important aspect of human life. Symptom of fever is one of the symptoms that can interfere with human health. The symptoms are common in human, but for handling errors sometimes occur diagnosis that can lead to death. Such errors can occur due to lack of expertise or reluctance of patients to check themselves since the symptom fever is common. By considering the issues, we conduct a study to design an application that can help patients with the fever symptom. The research was conducted by combining two following concepts: expert systems (i.e., Dempster Shafer) and machine learning (i.e., Naïve bayes). By combining the methods, we can obtain a single solution considering knowledge formulated by human experts and extracted from data training. Moreover, the application is implemented by an R package connecting R language with PHP, which is RShinny. A case study was taken by using medical records from the hospital Muhammadiyah, Bandung, West Java, Indonesia. To determine the level of accuracy of the system, we carried out two experimental stages, namely the fitting and testing steps. For the fitting step, we obtained the accuracy of 70.67 percent while 56.25 percent is the accuracy of the testing stage.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A proposed method for predicting US presidential election by analyzing sentiment in social media 一种通过分析社交媒体上的情绪来预测美国总统大选的方法
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852647
A. Wicaksono, Suyoto, Pranowo
US Presidential election is an event anticipated by US citizens and people around the world. By utilizing the big data provided by social media, this research aims to make a prediction of the party or candidate that will win the US presidential election 2016. This paper proposes two stages in research methodology which is data collection and implementation. Data used in this research are collected from Twitter. The implementation stage consists of preprocessing, sentiment analysis, aggregation, and implementation of Electoral College system to predict the winning party or candidate. The implementation of Electoral College will be limited only by using winner take all basis for all states. The implementations are referring from previous works with some addition of methods. The proposed method still unable to use real time data due to random user location value gathered from Twitter REST API, and researchers will be working on it for future works.
美国总统大选是美国公民和全世界人民都期待的大事。通过利用社交媒体提供的大数据,本研究旨在预测2016年美国总统大选的政党或候选人。本文提出了研究方法的两个阶段:数据收集和实施。本研究中使用的数据来自Twitter。实施阶段包括预处理、情感分析、汇总、选举团制度的实施等,以预测获胜政党或候选人。选举人团制度的实施将仅限于在所有州采用胜者全选制。这些实现参考了以前的作品,并添加了一些方法。由于从Twitter REST API收集的随机用户位置值,所提出的方法仍然无法使用实时数据,研究人员将在未来的工作中对其进行研究。
{"title":"A proposed method for predicting US presidential election by analyzing sentiment in social media","authors":"A. Wicaksono, Suyoto, Pranowo","doi":"10.1109/ICSITECH.2016.7852647","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852647","url":null,"abstract":"US Presidential election is an event anticipated by US citizens and people around the world. By utilizing the big data provided by social media, this research aims to make a prediction of the party or candidate that will win the US presidential election 2016. This paper proposes two stages in research methodology which is data collection and implementation. Data used in this research are collected from Twitter. The implementation stage consists of preprocessing, sentiment analysis, aggregation, and implementation of Electoral College system to predict the winning party or candidate. The implementation of Electoral College will be limited only by using winner take all basis for all states. The implementations are referring from previous works with some addition of methods. The proposed method still unable to use real time data due to random user location value gathered from Twitter REST API, and researchers will be working on it for future works.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A framework of fuzzy partition based on Artificial Bee Colony for categorical data clustering 基于人工蜂群的模糊划分框架用于分类数据聚类
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852644
I. R. Yanto, Younes Saadi, D. Hartama, Dewi Pramudi Ismi, A. Pranolo
Fuzzy k-partition (FkP) is an effective clustering technique, which is mathematical model based. Thus, the objective function of FkP is a nonlinear function. Membership random selection is featured by an iterative process, which results in local optima traps easily. It is important to find global optimal consider to nonlinear objective function of the problem. Moreover, Artificial Bee colony (ABC) has ability and efficiently used for multivariable, multinomial function optimization. To this, this paper proposes the hybridization of FkP based on Artificial Bee colony (ABC) a population based algorithm. Some of benchmarks data sets have been elaborated to test the proposed approach. The experiment shows that FkP ABC obtains better results in term of the dun index validity clustering as compared to the baseline algorithm.
模糊k划分(FkP)是一种基于数学模型的有效聚类技术。因此,FkP的目标函数是一个非线性函数。隶属度随机选择的特点是一个迭代过程,容易产生局部最优陷阱。考虑问题的非线性目标函数,寻找全局最优是重要的。此外,人工蜂群算法具有求解多变量、多项函数优化的能力和效率。为此,本文提出了基于人工蜂群(ABC)的FkP杂交算法。已经详细阐述了一些基准数据集来测试所提出的方法。实验表明,与基线算法相比,FkP ABC算法在多指标有效性聚类方面取得了更好的结果。
{"title":"A framework of fuzzy partition based on Artificial Bee Colony for categorical data clustering","authors":"I. R. Yanto, Younes Saadi, D. Hartama, Dewi Pramudi Ismi, A. Pranolo","doi":"10.1109/ICSITECH.2016.7852644","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852644","url":null,"abstract":"Fuzzy k-partition (FkP) is an effective clustering technique, which is mathematical model based. Thus, the objective function of FkP is a nonlinear function. Membership random selection is featured by an iterative process, which results in local optima traps easily. It is important to find global optimal consider to nonlinear objective function of the problem. Moreover, Artificial Bee colony (ABC) has ability and efficiently used for multivariable, multinomial function optimization. To this, this paper proposes the hybridization of FkP based on Artificial Bee colony (ABC) a population based algorithm. Some of benchmarks data sets have been elaborated to test the proposed approach. The experiment shows that FkP ABC obtains better results in term of the dun index validity clustering as compared to the baseline algorithm.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic generation of Content Security Policy to mitigate cross site scripting 自动生成内容安全策略以减轻跨站点脚本
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852656
Samer Attallah Mhana, J. Din, R. Atan
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help site administers to overcome these limitations in order to utilize the full benefits of CSP mechanism which leads to more immune sites from XSS. The algorithm is implemented as a plugin. It does not interfere with the web application original code. The plugin can be “installed” on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.
内容安全策略(CSP)是功能强大的客户端安全层,有助于减轻和检测包括跨站点脚本(XSS)在内的广泛的web攻击。然而,站点管理员使用CSP是一个容易出错的过程,可能需要对web应用程序代码进行重大更改。在本文中,我们提出了一种方法来帮助网站管理员克服这些限制,以充分利用CSP机制的优势,从而导致更多的免疫站点来自XSS。该算法是作为插件实现的。它不会干扰web应用程序的原始代码。插件可以“安装”在任何其他web应用程序与最小的努力。该算法可以作为Web服务器层的一部分实现,而不是作为业务逻辑层的一部分。它可以扩展为支持为加载后由JavaScript修改的内容生成CSP。当前的方法检查url的静态内容。
{"title":"Automatic generation of Content Security Policy to mitigate cross site scripting","authors":"Samer Attallah Mhana, J. Din, R. Atan","doi":"10.1109/ICSITECH.2016.7852656","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852656","url":null,"abstract":"Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help site administers to overcome these limitations in order to utilize the full benefits of CSP mechanism which leads to more immune sites from XSS. The algorithm is implemented as a plugin. It does not interfere with the web application original code. The plugin can be “installed” on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The effect of task technology fit toward individual performance on the Generation X (1956–1980) using information technology 任务技术对使用信息技术的X一代(1956-1980)个人绩效的契合效应
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852630
P. P. Widagdo, Ramadiani, T. D. Susanto
The generation is defined as a group of individuals who were born in the same birth ranges, which at that time had formed the uniqueness of the experience, history or the same era. The rapidly evolving technological developments lead to Generation X (1956–1980) having different perspectives, thoughts, ideas in using information technology to complete its work. This study aims to the relationship between the task-technology fit (TTF) affecting utilization and individual performance impact on Generation X in the usage of information technology. The method that is used is PLS-SEM with 101 respondents from Generation X in Mulawarman University. The results showed the empirical model is able to explain 64.7% of the variance of individual performance impact on Generation X in using of information technology at the Mulawarman University. The research proves task-technology fit are factors that affect the generation x in the use information technology services, task-technology fit and utilization is a factor that has a significant positive relationship effects on individual performance improvement the generation x in using of information technology services at the Mulawarman University. The results of this study revealed that the better the suitability of the information technology to the user's tasks (task-technology fit) in Generation x at the Mulawarman University, influence in increasing the utilization and improving the performance of individuals impact on generation x in using information technology.
一代人被定义为一群出生在同一出生范围内的个体,他们在当时形成了经历、历史或同一时代的独特性。快速发展的技术发展导致X一代(1956-1980)在使用信息技术来完成其工作方面有不同的观点,思想,想法。本研究旨在探讨影响信息技术使用的任务-技术契合度(TTF)与X世代个人绩效影响之间的关系。使用的方法是PLS-SEM,对Mulawarman大学的101名X世代受访者进行了调查。结果表明,实证模型能够解释64.7%的信息技术使用对X一代个体绩效影响的方差。Mulawarman大学的研究证明,任务-技术契合度是影响x一代使用信息技术服务的因素,任务-技术契合度和利用程度对x一代使用信息技术服务的个人绩效提升具有显著的正相关影响。本研究结果表明,信息技术对Mulawarman大学x世代用户任务的适合性(任务-技术契合度)越好,对提高个人利用率和提高绩效的影响对x世代使用信息技术的影响越大。
{"title":"The effect of task technology fit toward individual performance on the Generation X (1956–1980) using information technology","authors":"P. P. Widagdo, Ramadiani, T. D. Susanto","doi":"10.1109/ICSITECH.2016.7852630","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852630","url":null,"abstract":"The generation is defined as a group of individuals who were born in the same birth ranges, which at that time had formed the uniqueness of the experience, history or the same era. The rapidly evolving technological developments lead to Generation X (1956–1980) having different perspectives, thoughts, ideas in using information technology to complete its work. This study aims to the relationship between the task-technology fit (TTF) affecting utilization and individual performance impact on Generation X in the usage of information technology. The method that is used is PLS-SEM with 101 respondents from Generation X in Mulawarman University. The results showed the empirical model is able to explain 64.7% of the variance of individual performance impact on Generation X in using of information technology at the Mulawarman University. The research proves task-technology fit are factors that affect the generation x in the use information technology services, task-technology fit and utilization is a factor that has a significant positive relationship effects on individual performance improvement the generation x in using of information technology services at the Mulawarman University. The results of this study revealed that the better the suitability of the information technology to the user's tasks (task-technology fit) in Generation x at the Mulawarman University, influence in increasing the utilization and improving the performance of individuals impact on generation x in using information technology.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128406274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory 基于深度长短期记忆流量预测的动态带宽管理
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852655
T. W. Cenggoro, I. Siahaan
In dynamic bandwidth management based on traffic prediction, the traffic flows can be modeled as time-series data. State-of-the-art technique used in modeling this traffic flows is by using a linear model. In contrast, Recurrent Neural Network (RNN) has been the state-of-the-art technique in speech recognition, which data is also time-series. Therefore, we conjecture that the use of RNN can improve performance in dynamic bandwidth management based on traffic prediction. In this paper, we employ a variant of RNN called Deep Long Short Term Memory (DLSTM), which is common to be used in speech recognition. The result of this work shows that DLSTM is suitable for traffic prediction and is able to decrease packet loss ratio of a network system simulated using Network Simulator 3 (NS3).
在基于流量预测的动态带宽管理中,可以将流量建模为时间序列数据。最先进的技术用于建模这种交通流量是通过使用线性模型。相比之下,递归神经网络(RNN)一直是语音识别领域最先进的技术,其数据也是时间序列的。因此,我们推测使用RNN可以提高基于流量预测的动态带宽管理的性能。在本文中,我们采用了RNN的一种变体,称为深度长短期记忆(DLSTM),它通常用于语音识别。研究结果表明,DLSTM适用于流量预测,并能降低网络系统的丢包率。
{"title":"Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory","authors":"T. W. Cenggoro, I. Siahaan","doi":"10.1109/ICSITECH.2016.7852655","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852655","url":null,"abstract":"In dynamic bandwidth management based on traffic prediction, the traffic flows can be modeled as time-series data. State-of-the-art technique used in modeling this traffic flows is by using a linear model. In contrast, Recurrent Neural Network (RNN) has been the state-of-the-art technique in speech recognition, which data is also time-series. Therefore, we conjecture that the use of RNN can improve performance in dynamic bandwidth management based on traffic prediction. In this paper, we employ a variant of RNN called Deep Long Short Term Memory (DLSTM), which is common to be used in speech recognition. The result of this work shows that DLSTM is suitable for traffic prediction and is able to decrease packet loss ratio of a network system simulated using Network Simulator 3 (NS3).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A wireless sensor networks localization using geometric triangulation scheme for object tracking in urban search and rescue application 一种基于几何三角定位的无线传感器网络定位方案在城市搜救目标跟踪中的应用
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852643
P. Kristalina, Aries Pratiarso, T. Badriyah, E. Putro
Wireless sensor networks (WSNs) have been widely used for monitoring, tracking or object navigating whether stationer or mobile object. The system could be implemented in indoor or outdoor area. Disaster activity in urban area such as earthquake, tornado even militant activity inside the building need an object tracking in order to carry out search and rescue procedure for the victims or rescuers. Localization technique in indoor area encounters some problems which related to environment characteristics such as building material, multipath, reflection and other parameters which will decrease the accuracy of estimated object position. We propose a geometric triangulation scheme as an alternative way of calculating the estimated position of the object, based on the angle of arrival between an object node and its references. This scheme is free from environment problem. The simulation result shows that using least square method through the average of position error the estimated position accuracy will be increased up to 22.27% better than the previous triangulation scheme.
无线传感器网络(WSNs)已广泛应用于固定物体或移动物体的监测、跟踪或导航。该系统可在室内或室外使用。城市地区的灾害活动,如地震、龙卷风甚至建筑物内的武装活动都需要物体跟踪,以便对受害者或救援人员进行搜救程序。室内区域定位技术会遇到一些与建筑材料、多径、反射等环境特性有关的问题,这些问题会降低目标位置估计的精度。我们提出了一种几何三角测量方案,作为计算物体估计位置的一种替代方法,该方法基于物体节点与其参考点之间的到达角度。该方案不存在环境问题。仿真结果表明,采用最小二乘法对定位误差进行平均,估计的定位精度比原来的三角剖分方案提高22.27%。
{"title":"A wireless sensor networks localization using geometric triangulation scheme for object tracking in urban search and rescue application","authors":"P. Kristalina, Aries Pratiarso, T. Badriyah, E. Putro","doi":"10.1109/ICSITECH.2016.7852643","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852643","url":null,"abstract":"Wireless sensor networks (WSNs) have been widely used for monitoring, tracking or object navigating whether stationer or mobile object. The system could be implemented in indoor or outdoor area. Disaster activity in urban area such as earthquake, tornado even militant activity inside the building need an object tracking in order to carry out search and rescue procedure for the victims or rescuers. Localization technique in indoor area encounters some problems which related to environment characteristics such as building material, multipath, reflection and other parameters which will decrease the accuracy of estimated object position. We propose a geometric triangulation scheme as an alternative way of calculating the estimated position of the object, based on the angle of arrival between an object node and its references. This scheme is free from environment problem. The simulation result shows that using least square method through the average of position error the estimated position accuracy will be increased up to 22.27% better than the previous triangulation scheme.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Soft Maximal Association Rule for web user mining 用于web用户挖掘的软最大关联规则
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852659
I. R. Yanto, Arif Rahman, Youes Saaadi
Association rule mining of the web user transaction is one of important techniques for extracting information from web data, including its content, link, and user information using data mining tool. This technique finds a pattern and causal relation between items on given databases. The Maximal Association Rule is a data mining tools to determine the association rule the rough set theory based. Accordingly, the rough set can be defined in a form of soft set. This paper presents an implementation of Soft Maximal Association Rule which is the soft set theory based for web mining. The experiment shows that the computation of the proposed technique outperforms comparing to the baseline technique.
web用户事务关联规则挖掘是利用数据挖掘工具从web数据中提取信息的重要技术之一,包括web数据的内容、链接和用户信息。该技术在给定数据库上查找项目之间的模式和因果关系。最大关联规则是一种基于粗糙集理论确定关联规则的数据挖掘工具。因此,粗糙集可以定义为软集的形式。本文提出了一种基于软集理论的web挖掘软最大关联规则的实现方法。实验表明,该算法的计算性能优于基线算法。
{"title":"Soft Maximal Association Rule for web user mining","authors":"I. R. Yanto, Arif Rahman, Youes Saaadi","doi":"10.1109/ICSITECH.2016.7852659","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852659","url":null,"abstract":"Association rule mining of the web user transaction is one of important techniques for extracting information from web data, including its content, link, and user information using data mining tool. This technique finds a pattern and causal relation between items on given databases. The Maximal Association Rule is a data mining tools to determine the association rule the rough set theory based. Accordingly, the rough set can be defined in a form of soft set. This paper presents an implementation of Soft Maximal Association Rule which is the soft set theory based for web mining. The experiment shows that the computation of the proposed technique outperforms comparing to the baseline technique.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring quality of service for mobile internet services 测量移动互联网服务的服务质量
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852652
E. Budiman, Oki Wicaksono
Quality of Service is an important thing in maintaining the performance of the service to the customer. Not only for marketing purposes, the quality of services can also bridge the gap between the promise given by the service provider and what the customers get. This study aims to get the quality of service for internet data usage of several mobile operators in the city Samarinda. The study was conducted using a mobile device and implemented in seven districts and four points in every district in the city of Samarinda. Measurements using the standard quality of TIPHON with some parameters such end-to-end delay, jitter, packet loss probability and throughput. From the measurement results, based on standard QoS TIPHON, the average value of packet loss are in the good category. Latency delay value is very high, above 400 ms, which is a bad category. Delay variation (jitter) of each ISP is different, with the average value of jitter is more than 50 ms. The measurement results show that the jitter at each site are in a bad category.
服务质量在保持对顾客的服务表现方面是一件重要的事情。不仅是为了营销目的,服务质量还可以弥合服务提供商给出的承诺和客户得到的东西之间的差距。本研究的目的是获得服务质量的互联网数据使用的几个移动运营商在萨玛林达市。这项研究是使用移动设备进行的,并在萨马林达市的七个地区和每个地区的四个点实施。使用TIPHON的标准质量进行测量,包括端到端延迟、抖动、丢包概率和吞吐量等参数。从测量结果来看,基于标准QoS TIPHON的丢包平均值属于良好。延迟值非常高,超过400ms,这是一个不好的类别。每个ISP的延迟变化(抖动)是不同的,抖动的平均值大于50ms。测量结果表明,各部位的抖动都处于较差的范围。
{"title":"Measuring quality of service for mobile internet services","authors":"E. Budiman, Oki Wicaksono","doi":"10.1109/ICSITECH.2016.7852652","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852652","url":null,"abstract":"Quality of Service is an important thing in maintaining the performance of the service to the customer. Not only for marketing purposes, the quality of services can also bridge the gap between the promise given by the service provider and what the customers get. This study aims to get the quality of service for internet data usage of several mobile operators in the city Samarinda. The study was conducted using a mobile device and implemented in seven districts and four points in every district in the city of Samarinda. Measurements using the standard quality of TIPHON with some parameters such end-to-end delay, jitter, packet loss probability and throughput. From the measurement results, based on standard QoS TIPHON, the average value of packet loss are in the good category. Latency delay value is very high, above 400 ms, which is a bad category. Delay variation (jitter) of each ISP is different, with the average value of jitter is more than 50 ms. The measurement results show that the jitter at each site are in a bad category.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
2016 2nd International Conference on Science in Information Technology (ICSITech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1