首页 > 最新文献

2016 2nd International Conference on Science in Information Technology (ICSITech)最新文献

英文 中文
Big data properties designed for customer engagement information via multi-channel digital services 通过多渠道数字服务为客户参与信息设计的大数据属性
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852635
Panant Krairojananan, Sakuna Anuvareepong
The growth of Big Data plays an important role to transform data generated by online consumers in valuable assets. This paper aims to explore the design of big data properties, which are composed of volume, velocity, variety, and veracity, for managing customer engagement information; including intrinsic, extrinsic, and economic drive. Accordingly, the customer engagement information is derived from customer activities via multi-channel digital services comprised social media, blogs, and Webboards. The implications of this study lead to be used as the useful information for the big data infrastructure enablers. The results from the study reveal that most of single female in higher education whose average income at 10,000 – 30,000 Thai Baht were respondents who used Facebook and LINE app everyday at night time. Besides, the result also shows the significance of big data properties to support customer engagement.
大数据的增长对将在线消费者产生的数据转化为有价值的资产起着重要作用。本文旨在探讨客户参与信息管理的大数据属性设计,即容量、速度、多样性和准确性;包括内在动力、外在动力和经济动力。因此,客户参与信息是通过包括社交媒体、博客和网络论坛在内的多渠道数字服务从客户活动中获得的。本研究的影响将被用作大数据基础设施推动者的有用信息。研究结果显示,平均收入在1万至3万泰铢的高等教育单身女性中,大多数是每天晚上使用Facebook和LINE应用的受访者。此外,结果也显示了大数据属性对支持客户参与的重要性。
{"title":"Big data properties designed for customer engagement information via multi-channel digital services","authors":"Panant Krairojananan, Sakuna Anuvareepong","doi":"10.1109/ICSITECH.2016.7852635","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852635","url":null,"abstract":"The growth of Big Data plays an important role to transform data generated by online consumers in valuable assets. This paper aims to explore the design of big data properties, which are composed of volume, velocity, variety, and veracity, for managing customer engagement information; including intrinsic, extrinsic, and economic drive. Accordingly, the customer engagement information is derived from customer activities via multi-channel digital services comprised social media, blogs, and Webboards. The implications of this study lead to be used as the useful information for the big data infrastructure enablers. The results from the study reveal that most of single female in higher education whose average income at 10,000 – 30,000 Thai Baht were respondents who used Facebook and LINE app everyday at night time. Besides, the result also shows the significance of big data properties to support customer engagement.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User difficulties in e-learning system 电子学习系统中的用户困难
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852626
Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil
An interface is very effective to encourage the users intention and engage them to achieve their destination in e-learning process. This research aims to explore the user needs through learner experience on using e-learning interface. The case study is needed to identify and to collect the learner problem in e-learning, especially in User Interface. It took three months to get the user interface problems, such as login page, choice menus, and table of contents, content presentation, interactive media, and presentation of exercises, example solutions, and self-assessment. The research took three months data collection of forty-seven students in Mulawarman University. Based on this research, it shows that the communicativeness of the interface is the most difficult part, followed by choices menu, and self-assessment. Meanwhile, the example solutions and login page are among the least difficult of the menu.
在电子学习过程中,界面对于鼓励用户的意图和吸引他们实现目标是非常有效的。本研究旨在透过学习者使用电子学习界面的体验,探讨使用者的需求。通过案例研究来识别和收集电子学习中学习者的问题,特别是在用户界面方面。用户界面问题,如登录页面、选择菜单、目录、内容呈现、交互媒体、练习呈现、示例解决方案、自我评估等,耗时3个月。这项研究花了三个月的时间收集了Mulawarman大学47名学生的数据。基于本研究,界面的交流性是最困难的部分,其次是选择菜单和自我评价。同时,示例解决方案和登录页面是菜单中最简单的。
{"title":"User difficulties in e-learning system","authors":"Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil","doi":"10.1109/ICSITECH.2016.7852626","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852626","url":null,"abstract":"An interface is very effective to encourage the users intention and engage them to achieve their destination in e-learning process. This research aims to explore the user needs through learner experience on using e-learning interface. The case study is needed to identify and to collect the learner problem in e-learning, especially in User Interface. It took three months to get the user interface problems, such as login page, choice menus, and table of contents, content presentation, interactive media, and presentation of exercises, example solutions, and self-assessment. The research took three months data collection of forty-seven students in Mulawarman University. Based on this research, it shows that the communicativeness of the interface is the most difficult part, followed by choices menu, and self-assessment. Meanwhile, the example solutions and login page are among the least difficult of the menu.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of the Cellular Automata Algorithm for developing an educational game 元胞自动机算法在教育游戏开发中的实现
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852628
N. Fauzia, D. Rohendi, L. Riza
During the past two decades, game developments have been increasing rapidly. In developing these games, there are various algorithms involved. The objective of this research is to develop an educational game by using the Cellular Automata Algorithm (CAA) to construct areas in the game. It is used for generating a dynamic labyrinth, so that it always changes in every game play. Therefore, it basically is a labyrinth game involving some obstacles for representing tasks that should be done in order to finish it. In this game, four types of educational evaluations are included, as follows: multiple choice, briefings answer, arranging the code, and filling in the blank. For the case study, this game contains the Fundamental Programming subject, focused on the Looping chapter. According to the experiment, it is capable in increasing student's comprehension with 0.37 gain. Finally, it can be used to increase cognitive comprehension for Vocational High School students.
在过去的20年里,游戏开发发展迅速。在开发这些游戏时,涉及到各种算法。本研究的目的是通过使用元胞自动机算法(CAA)来构建游戏中的区域来开发一个教育游戏。它用于生成动态迷宫,因此它在每次游戏过程中都会发生变化。因此,它基本上是一个迷宫游戏,包含一些代表任务的障碍,以完成任务。在这个游戏中,有四种类型的教育评价,分别是:选择题,简要回答,排列代码,填空。对于案例研究,这个游戏包含基础编程主题,重点是循环章节。实验结果表明,该方法能使学生的理解力提高0.37倍。最后,它可以用于提高高职学生的认知理解。
{"title":"Implementation of the Cellular Automata Algorithm for developing an educational game","authors":"N. Fauzia, D. Rohendi, L. Riza","doi":"10.1109/ICSITECH.2016.7852628","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852628","url":null,"abstract":"During the past two decades, game developments have been increasing rapidly. In developing these games, there are various algorithms involved. The objective of this research is to develop an educational game by using the Cellular Automata Algorithm (CAA) to construct areas in the game. It is used for generating a dynamic labyrinth, so that it always changes in every game play. Therefore, it basically is a labyrinth game involving some obstacles for representing tasks that should be done in order to finish it. In this game, four types of educational evaluations are included, as follows: multiple choice, briefings answer, arranging the code, and filling in the blank. For the case study, this game contains the Fundamental Programming subject, focused on the Looping chapter. According to the experiment, it is capable in increasing student's comprehension with 0.37 gain. Finally, it can be used to increase cognitive comprehension for Vocational High School students.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A system to diagnose learning disability in children of special need 诊断有特殊需要的儿童的学习障碍的系统
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852606
M. Rasim, Chepy Cahyadi, L. Riza
There are many factors that led to the occurrence of learning disability, namely impaired concentration, memory, dyslexia, dyscalculia, and the environment. The difficulty to determine solution and find out the cause of the learning disability occurrence is the problem of the research. Dempster-Shafer method is used to build an expert system in diagnosing learning disability. Interference engine used to calculate the value of belief function and the results of children diagnosis against symptoms. The result found that 15 of the 25 people inquired are known to experience learning disability while others are normal. Further development of the system which focuses on the characteristics of learning disability in more detail is needed.
导致学习障碍发生的因素有很多,即注意力、记忆力、阅读障碍、计算障碍和环境。难以确定解决方案和找出学习障碍发生的原因是本研究的问题。采用Dempster-Shafer方法建立了学习障碍诊断专家系统。干扰引擎用于计算信念函数值和儿童对症状的诊断结果。结果发现,25人中有15人已知有学习障碍,而其他人则正常。该系统需要进一步的开发,更详细地关注学习障碍的特征。
{"title":"A system to diagnose learning disability in children of special need","authors":"M. Rasim, Chepy Cahyadi, L. Riza","doi":"10.1109/ICSITECH.2016.7852606","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852606","url":null,"abstract":"There are many factors that led to the occurrence of learning disability, namely impaired concentration, memory, dyslexia, dyscalculia, and the environment. The difficulty to determine solution and find out the cause of the learning disability occurrence is the problem of the research. Dempster-Shafer method is used to build an expert system in diagnosing learning disability. Interference engine used to calculate the value of belief function and the results of children diagnosis against symptoms. The result found that 15 of the 25 people inquired are known to experience learning disability while others are normal. Further development of the system which focuses on the characteristics of learning disability in more detail is needed.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicle detection and tracking based on corner and lines adjacent detection features 基于拐角和直线相邻检测特征的车辆检测与跟踪
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852641
M. D. Enjat Munajat, D. H. Widyantoro, R. Munir
This paper discusses a new method in detecting moving objects, which is differ from most of the methods used such as Gaussian Mixture Model, and Haar-Like approach. The focus is on utilizing corner detection and line adjacent detection features through thresholding process creating black and white images to detect the corner of each object in each frame. The process divides a frame length into 4 parts, whereas the first part acted as initiation process of moving object recognition while the rest of the frame functioning as vehicle tracking, speed measurement, and number of vehicles calculation. The initiation process started by identifying corner spots of the moving objects that must be recognized as a single object. The lines surpassing through two points are later identified to determine whether those spots have dark color (0) or light color (1). The moving objects is represented by light color (1) and the walking objects is represented by dark color (0). A group of corner spots, identified and connected by two-point-line equation to be recognized as one unified object by using corner and line adjacent method. The identified vehicle objects can be more easily tracked and identified by the average speed in order to obtain the number of passing vehicles. The research result shows that in the initiation phase, the corner and line adjacent features able to detect moving object and distinguish it with different objects. Furthermore, in tracking phase, system is able to track the vehicle position, measuring the speed and number of vehicles. The system is proven to be able to recognize the moving objects quickly and accurately resulting in the more feasible process of speed measurement and tracking.
本文讨论了一种不同于高斯混合模型和Haar-Like方法的运动目标检测新方法。重点是利用角点检测和线相邻检测特征,通过阈值化处理生成黑白图像来检测每帧中每个物体的角点。该过程将帧长度分为4部分,其中第一部分作为运动目标识别的起始过程,帧的其余部分用于车辆跟踪、速度测量和车辆数量计算。启动过程从识别移动物体的角点开始,这些角点必须被识别为单个物体。然后对超过两点的线进行识别,确定这些点是深色(0)还是浅色(1)。运动物体用浅色(1)表示,行走物体用深色(0)表示。将一组角点通过两点线方程识别并连接,利用角线相邻法将其识别为一个统一的物体。通过平均速度可以更容易地跟踪和识别已识别的车辆目标,从而获得通过车辆的数量。研究结果表明,在初始阶段,角点和线相邻特征能够检测到运动目标,并将其与不同的目标区分开来。此外,在跟踪阶段,系统能够跟踪车辆的位置,测量车辆的速度和数量。实验证明,该系统能够快速准确地识别运动物体,从而使速度测量和跟踪过程更加可行。
{"title":"Vehicle detection and tracking based on corner and lines adjacent detection features","authors":"M. D. Enjat Munajat, D. H. Widyantoro, R. Munir","doi":"10.1109/ICSITECH.2016.7852641","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852641","url":null,"abstract":"This paper discusses a new method in detecting moving objects, which is differ from most of the methods used such as Gaussian Mixture Model, and Haar-Like approach. The focus is on utilizing corner detection and line adjacent detection features through thresholding process creating black and white images to detect the corner of each object in each frame. The process divides a frame length into 4 parts, whereas the first part acted as initiation process of moving object recognition while the rest of the frame functioning as vehicle tracking, speed measurement, and number of vehicles calculation. The initiation process started by identifying corner spots of the moving objects that must be recognized as a single object. The lines surpassing through two points are later identified to determine whether those spots have dark color (0) or light color (1). The moving objects is represented by light color (1) and the walking objects is represented by dark color (0). A group of corner spots, identified and connected by two-point-line equation to be recognized as one unified object by using corner and line adjacent method. The identified vehicle objects can be more easily tracked and identified by the average speed in order to obtain the number of passing vehicles. The research result shows that in the initiation phase, the corner and line adjacent features able to detect moving object and distinguish it with different objects. Furthermore, in tracking phase, system is able to track the vehicle position, measuring the speed and number of vehicles. The system is proven to be able to recognize the moving objects quickly and accurately resulting in the more feasible process of speed measurement and tracking.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy and security of sharing referral medical record for health care system 卫生保健系统转诊病历共享的隐私与安全
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852639
Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie
Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical ID-Based Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can access the referral medical record. The result of performance testing shows that the average percentage increase from length of cipher text is 75%, with the smallest percentage increase is 22.80% and the largest is 236%.
由于医院和诊所的设施、服务和专科医生的数量有限,他们经常将病人转介给专科医生,共享健康信息已成为日常事务。本文提出了基于HIBE (Hierarchical ID-Based Encryption)的转诊病历共享安全设计,重点关注信息共享能力和转诊病历的保密性。我们提出的系统能够保护第三方的转诊病历,并且只有转诊医生可以访问转诊病历。性能测试结果表明,密文长度的平均增益百分比为75%,最小增益百分比为22.80%,最大增益百分比为236%。
{"title":"Privacy and security of sharing referral medical record for health care system","authors":"Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie","doi":"10.1109/ICSITECH.2016.7852639","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852639","url":null,"abstract":"Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical ID-Based Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can access the referral medical record. The result of performance testing shows that the average percentage increase from length of cipher text is 75%, with the smallest percentage increase is 22.80% and the largest is 236%.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Path analysis method to identify factors affecting consumer interest on online shopping 路径分析法识别影响消费者网上购物兴趣的因素
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852601
R. Purwaningsih, Belan Adison
Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are to understand what factors affect consumer intention to shop in a virtual world and to analyze the relationships among these factors. Particularly, this study explores consumer innovativeness (consumer novelty seeking and consumer independent judgment making) as an external variable that influences consumer intention indirectly through its effects on consumer experiences with the virtual world application (ease of use, control, concentration, and enjoyment). Path analysis method is used to identify the variable given significant influence to consumer intention to shop. The finding indicates that independent variables Consumer Novelty Seeking and Consumer Independent Judgment Making have influence to Perceived concentration, Perceived enjoyment, and Ease of Use. These three variables give significant influence to consumer intention to shop.
目前的研究表明,新奇、刺激和吸引人的购物体验对消费者的购买行为有积极的影响。识别影响消费者使用虚拟世界购物行为的因素将有助于零售商在虚拟世界中创造和保持存在感,同时积极影响购买和退货意愿。因此,本研究的目的是了解哪些因素会影响消费者在虚拟世界中的购物意愿,并分析这些因素之间的关系。特别是,本研究探讨了消费者创新(消费者寻求新奇和消费者独立判断)作为一个外部变量,通过其对虚拟世界应用的消费者体验(易用性、控制性、集中性和享受性)的影响,间接影响消费者意愿。采用路径分析法,找出对消费者购物意愿有显著影响的变量。研究结果表明,自变量“消费者求新”和“消费者独立判断”对感知集中度、感知享受度和易用性有影响。这三个变量对消费者的购物意愿有显著的影响。
{"title":"Path analysis method to identify factors affecting consumer interest on online shopping","authors":"R. Purwaningsih, Belan Adison","doi":"10.1109/ICSITECH.2016.7852601","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852601","url":null,"abstract":"Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are to understand what factors affect consumer intention to shop in a virtual world and to analyze the relationships among these factors. Particularly, this study explores consumer innovativeness (consumer novelty seeking and consumer independent judgment making) as an external variable that influences consumer intention indirectly through its effects on consumer experiences with the virtual world application (ease of use, control, concentration, and enjoyment). Path analysis method is used to identify the variable given significant influence to consumer intention to shop. The finding indicates that independent variables Consumer Novelty Seeking and Consumer Independent Judgment Making have influence to Perceived concentration, Perceived enjoyment, and Ease of Use. These three variables give significant influence to consumer intention to shop.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud computing sensitive data protection using multi layered approach 云计算敏感数据保护采用多层方法
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852610
Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah
Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment.
云计算是一种现代技术,它允许在请求时访问网络所需的计算资源(网络、服务器、存储、应用程序和服务)。这种令人兴奋的计算模型依赖于数据流量,并由第三方控制。尽管预期可以节省基础设施和业务灵活性的开发成本,但对于许多基于服务的公司来说,安全性仍然是实现计算的最大挑战。本文讨论了云计算环境下数据安全和隐私实现所面临的挑战。提出了一种适应云计算环境中敏感数据保护的框架。该框架由授权、安全和隐私、保存和验证三个级别组成。本文的主要目的是讨论该框架的实现及其体系结构验证。期望通过研究得到一个经过验证的框架来保护云环境中的私有和敏感数据。
{"title":"Cloud computing sensitive data protection using multi layered approach","authors":"Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah","doi":"10.1109/ICSITECH.2016.7852610","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852610","url":null,"abstract":"Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Car detection based on road direction on traffic surveillance image 基于道路方向的交通监控图像车辆检测
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852660
A. Prahara, Murinto
One of the challenges in car detection is to be able to detect car in any viewpoint from traffic surveillance camera. The size, shape, and appearance of car are different if they are viewed from various viewpoint of traffic surveillance cameras. Car also has the most variety of models compared to the other vehicle. However, car poses usually follow road direction. Therefore, this research proposes a method to detect car based on road direction. The method utilizes 3D car models to generate car poses, groups them into four pairs of viewpoint orientation: 1) front / back view, 2) top left / bottom right view, 3) top right / bottom left view, and 4) left side / right side view, then builds car detectors corresponding to each orientation. On traffic surveillance image, road area is extracted to localize the detection area and road direction is estimated to determine the car detector that will be used by Linear-Support Vector Machine (Linear-SVM). Finally, SVM classifies the features extracted by Histogram of Oriented Gradients (HOG) to detect cars. The test result on various viewpoints of traffic surveillance image gives 0.9098 of Balance Accuracy (BAC).
车辆检测面临的挑战之一是如何从交通监控摄像机的任意视点检测车辆。从交通监控摄像机的不同角度看,汽车的大小、形状、外观都不一样。与其他车辆相比,汽车也拥有最多样化的车型。然而,汽车姿势通常遵循道路方向。因此,本研究提出了一种基于道路方向的车辆检测方法。该方法利用三维汽车模型生成汽车姿态,将其分为4对视角方向:1)前/后视图,2)左上/右下视图,3)右上/左下视图,4)左/右视图,然后根据每个方向构建对应的汽车检测器。在交通监控图像上,提取道路区域定位检测区域,估计道路方向,确定用于线性支持向量机(Linear-SVM)的车辆检测器。最后,SVM对HOG (Histogram of Oriented Gradients,方向梯度直方图)提取的特征进行分类,进行汽车检测。对不同视点的交通监控图像的测试结果为0.9098的平衡精度(BAC)。
{"title":"Car detection based on road direction on traffic surveillance image","authors":"A. Prahara, Murinto","doi":"10.1109/ICSITECH.2016.7852660","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852660","url":null,"abstract":"One of the challenges in car detection is to be able to detect car in any viewpoint from traffic surveillance camera. The size, shape, and appearance of car are different if they are viewed from various viewpoint of traffic surveillance cameras. Car also has the most variety of models compared to the other vehicle. However, car poses usually follow road direction. Therefore, this research proposes a method to detect car based on road direction. The method utilizes 3D car models to generate car poses, groups them into four pairs of viewpoint orientation: 1) front / back view, 2) top left / bottom right view, 3) top right / bottom left view, and 4) left side / right side view, then builds car detectors corresponding to each orientation. On traffic surveillance image, road area is extracted to localize the detection area and road direction is estimated to determine the car detector that will be used by Linear-Support Vector Machine (Linear-SVM). Finally, SVM classifies the features extracted by Histogram of Oriented Gradients (HOG) to detect cars. The test result on various viewpoints of traffic surveillance image gives 0.9098 of Balance Accuracy (BAC).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"19 814 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The determinants affecting e-loyalty: Hospitality industry in Indonesia 影响电子忠诚度的决定因素:印度尼西亚的酒店业
Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852621
V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho
The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality had an influence on e-satisfaction. E-satisfaction had an influence on e-loyalty. E-marketing and e-service did not influence e-loyalty. Based on the results of this study, we suggested that hotels should develop their website with interesting and detailed features for e-marketing and also provide live chat service for increasing e-service quality. E-satisfaction can be supported by customer satisfaction surveys on a regular basis or to be a part of the standard operating procedure, whereas customer loyalty programs need to be developed in the near future to build customers' e-loyalty.
本研究的目的是确定电子营销和电子服务质量对电子满意度的影响及其对电子忠诚度的影响。这项研究是对雅加达的客户进行的。数据收集自100名受访者的样本。采用通径分析法对数据进行分析。本研究结果发现,网路行销并未影响网路满意度。网络营销和网络服务质量对网络满意度有影响。电子满意度对电子忠诚度有影响。电子营销和电子服务对电子忠诚没有影响。根据本研究的结果,我们建议酒店应开发具有有趣和详细功能的网站,以进行电子营销,并提供实时聊天服务,以提高电子服务质量。电子满意度可以通过定期的客户满意度调查来支持,或者作为标准操作程序的一部分,而客户忠诚度计划需要在不久的将来开发,以建立客户的电子忠诚度。
{"title":"The determinants affecting e-loyalty: Hospitality industry in Indonesia","authors":"V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho","doi":"10.1109/ICSITECH.2016.7852621","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852621","url":null,"abstract":"The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality had an influence on e-satisfaction. E-satisfaction had an influence on e-loyalty. E-marketing and e-service did not influence e-loyalty. Based on the results of this study, we suggested that hotels should develop their website with interesting and detailed features for e-marketing and also provide live chat service for increasing e-service quality. E-satisfaction can be supported by customer satisfaction surveys on a regular basis or to be a part of the standard operating procedure, whereas customer loyalty programs need to be developed in the near future to build customers' e-loyalty.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 2nd International Conference on Science in Information Technology (ICSITech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1