首页 > 最新文献

2018 International Conference on Information and Communications Technology (ICOIACT)最新文献

英文 中文
A text classification on the downstreaming potential of biomedicine publications in Indonesia 关于印度尼西亚生物医学出版物下游潜力的文本分类
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350778
Mesnan Silalahi, R. Hardiyati, I. M. Nadhiroh, T. Handayani, M. Amelia, R. Rahmaida
This study has the purpose to investigate the potential to downstreaming of biomedicine researches in Indonesia based on scientific publications. It is therefore necessary to extract unstructured information in natural language-based scientific publications. This paper reports result from an investigation on a classification model of the downstreaming potential of biomedical research publications in Indonesia based on text-mining. The predictive computational model was built by testing three classifier algorithms namely KNN, Naive Bayes and SVM, where the results show that the Naive Bayes-based model performs best.
这项研究的目的是调查基于科学出版物的印尼生物医学研究的下行潜力。因此,有必要从基于自然语言的科学出版物中提取非结构化信息。本文报告了基于文本挖掘的印度尼西亚生物医学研究出版物下游潜力分类模型的调查结果。通过对KNN、朴素贝叶斯和支持向量机三种分类器算法的测试,建立了预测计算模型,结果表明基于朴素贝叶斯的模型性能最好。
{"title":"A text classification on the downstreaming potential of biomedicine publications in Indonesia","authors":"Mesnan Silalahi, R. Hardiyati, I. M. Nadhiroh, T. Handayani, M. Amelia, R. Rahmaida","doi":"10.1109/ICOIACT.2018.8350778","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350778","url":null,"abstract":"This study has the purpose to investigate the potential to downstreaming of biomedicine researches in Indonesia based on scientific publications. It is therefore necessary to extract unstructured information in natural language-based scientific publications. This paper reports result from an investigation on a classification model of the downstreaming potential of biomedical research publications in Indonesia based on text-mining. The predictive computational model was built by testing three classifier algorithms namely KNN, Naive Bayes and SVM, where the results show that the Naive Bayes-based model performs best.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"11 1","pages":"515-519"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72790176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Indonesian Twitter Cyberbullying Detection using Text Classification and User Credibility 使用文本分类和用户可信度的印尼Twitter网络欺凌检测
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350758
Hani Nurrahmi, Dade Nurjanah
Cyberbullying is a repeated act that harasses, humiliates, threatens, or hassles other people through electronic devices and online social networking websites. Cyberbullying through the internet is more dangerous than traditional bullying, because it can potentially amplify the humiliation to an unlimited online audience. According to UNICEF and a survey by the Indonesian Ministry of Communication and Information, 58% of 435 adolescents do not understand about cyberbullying. Some of them might even have been the bullies, but since they did not understand about cyberbullying they could not recognise the negative effects of their bullying. The bullies may not recognise the harm of their actions, because they do not see immediate responses from their victims. Our study aimed to detect cyberbullying actors based on texts and the credibility analysis of users and notify them about the harm of cyberbullying. We collected data from Twitter. Since the data were unlabelled, we built a web-based labelling tool to classify tweets into cyberbullying and non-cyberbullying tweets. We obtained 301 cyberbullying tweets, 399 non-cyberbullying tweets, 2,053 negative words and 129 swear words from the tool. Afterwards, we applied SVM and KNN to learn about and detect cyberbullying texts. The results show that SVM results in the highest f1-score, 67%. We also measured the credibility analysis of users and found 257 Normal Users, 45 Harmful Bullying Actors, 53 Bullying Actors and 6 Prospective Bullying Actors.
网络欺凌是一种通过电子设备和在线社交网站骚扰、羞辱、威胁或骚扰他人的反复行为。通过互联网进行的网络欺凌比传统的欺凌更危险,因为它有可能将羞辱扩大到无限的在线受众。根据联合国儿童基金会和印度尼西亚通信和信息部的一项调查,435名青少年中有58%不了解网络欺凌。他们中的一些人甚至可能是欺凌者,但由于他们不了解网络欺凌,他们无法认识到自己欺凌的负面影响。欺凌者可能没有意识到他们行为的危害,因为他们没有看到受害者的即时反应。我们的研究旨在基于文本和用户可信度分析来发现网络欺凌行为者,并告知他们网络欺凌的危害。我们从推特上收集数据。由于数据没有标签,我们建立了一个基于网络的标签工具,将推文分为网络欺凌和非网络欺凌推文。我们从该工具中获得了301条网络欺凌推文、399条非网络欺凌推文、2053个负面词汇和129个脏话。之后,我们运用SVM和KNN对网络欺凌文本进行学习和检测。结果表明,支持向量机的f1得分最高,为67%。我们还测量了用户的可信度分析,发现257名正常用户,45名有害欺凌行为者,53名欺凌行为者和6名潜在欺凌行为者。
{"title":"Indonesian Twitter Cyberbullying Detection using Text Classification and User Credibility","authors":"Hani Nurrahmi, Dade Nurjanah","doi":"10.1109/ICOIACT.2018.8350758","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350758","url":null,"abstract":"Cyberbullying is a repeated act that harasses, humiliates, threatens, or hassles other people through electronic devices and online social networking websites. Cyberbullying through the internet is more dangerous than traditional bullying, because it can potentially amplify the humiliation to an unlimited online audience. According to UNICEF and a survey by the Indonesian Ministry of Communication and Information, 58% of 435 adolescents do not understand about cyberbullying. Some of them might even have been the bullies, but since they did not understand about cyberbullying they could not recognise the negative effects of their bullying. The bullies may not recognise the harm of their actions, because they do not see immediate responses from their victims. Our study aimed to detect cyberbullying actors based on texts and the credibility analysis of users and notify them about the harm of cyberbullying. We collected data from Twitter. Since the data were unlabelled, we built a web-based labelling tool to classify tweets into cyberbullying and non-cyberbullying tweets. We obtained 301 cyberbullying tweets, 399 non-cyberbullying tweets, 2,053 negative words and 129 swear words from the tool. Afterwards, we applied SVM and KNN to learn about and detect cyberbullying texts. The results show that SVM results in the highest f1-score, 67%. We also measured the credibility analysis of users and found 257 Normal Users, 45 Harmful Bullying Actors, 53 Bullying Actors and 6 Prospective Bullying Actors.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"51 1","pages":"543-548"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87464822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Simple and secure image steganography using LSB and triple XOR operation on MSB 使用LSB和MSB上的三重异或操作进行简单安全的图像隐写
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350661
Yani Parti Astuti, D. Setiadi, E. H. Rachmawanto, C. A. Sari
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic images. This method is widely used and continues to be developed to date, because of its advantages in steganographic image quality. However, the traditional LSB method is very simple and predictable. It needs a way to improve the security of hidden messages in this way. This research proposes a simple and safe way to hide messages in LSB techniques. Three times the XOR operation is done to encrypt the message before it is embedded on the LSB. To facilitate the process of encryption and decryption of messages, three MSB bits are used as keys in XOR operations. The results of this study prove that this method provides security to messages with very simple operation. The imperceptibility quality of the stego image is also excellent with a PSNR value above 50 dB.
最小有效位(LSB)是空间域隐写图像中非常流行的一种方法。由于其在隐写图像质量方面的优势,该方法得到了广泛的应用和不断的发展。然而,传统的LSB方法非常简单且可预测。这就需要一种方法来提高隐藏消息的安全性。本研究提出了一种简单安全的方法来隐藏LSB技术中的消息。在将消息嵌入到LSB之前,要执行三次异或操作来加密消息。为了方便消息的加密和解密过程,在异或操作中使用三个MSB位作为密钥。研究结果表明,该方法以非常简单的操作为消息提供了安全性。隐写图像的不可感知性也很好,PSNR值在50 dB以上。
{"title":"Simple and secure image steganography using LSB and triple XOR operation on MSB","authors":"Yani Parti Astuti, D. Setiadi, E. H. Rachmawanto, C. A. Sari","doi":"10.1109/ICOIACT.2018.8350661","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350661","url":null,"abstract":"Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic images. This method is widely used and continues to be developed to date, because of its advantages in steganographic image quality. However, the traditional LSB method is very simple and predictable. It needs a way to improve the security of hidden messages in this way. This research proposes a simple and safe way to hide messages in LSB techniques. Three times the XOR operation is done to encrypt the message before it is embedded on the LSB. To facilitate the process of encryption and decryption of messages, three MSB bits are used as keys in XOR operations. The results of this study prove that this method provides security to messages with very simple operation. The imperceptibility quality of the stego image is also excellent with a PSNR value above 50 dB.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"33 1","pages":"191-195"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88337513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Indonesian traffic sign detection and recognition using color and texture feature extraction and SVM classifier 印尼交通标志检测与识别采用颜色和纹理特征提取和SVM分类器
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350804
C. Rahmad, I. F. Rahmah, R. A. Asmara, S. Adhisuwignjo
This paper presents traffic sign detection and recognition which is necessary to be developed to support several expert systems such as driver assistance and autonomous driving system. This study focused on the detection and recognition process tested on Indonesian traffic signs. There were some major issues on detecting process such as damaged signs, faded color, and natural condition. Therefore, this paper is proposed to address some of these issues and will be done in two main processes. The first one is traffic sign detection which divided into two steps. Start with segmenting image based on RGBN (Normalized RGB), then detects traffic signs by processing blobs that have been extracted by the previous process. The second process is traffic sign recognition process. In this process there are two steps to take. The first one is feature extraction, in this research we propose the combination of some feature extraction that is HOG, Gabor, LBP and use HSV color space. In next recognition stage some classifier are compared such as SVM, KNN, Random Forest, and Naïve Bayes. The propose method has been tasted on Indonesia local traffic sign. The results of the experimental work reveal that the approach of RGBN method showed precision and recall about 98,7% and 95,1% respectively in detecting traffic signs, and 100% for the precision and 86,7% for recall in recognizing process using SVM Classifier.
本文介绍了支持驾驶员辅助和自动驾驶等专家系统所必须发展的交通标志检测与识别技术。本研究的重点是印尼交通标志的检测和识别过程测试。在检测过程中存在一些主要问题,如标识损坏、颜色褪色、自然状态等。因此,本文提出解决其中的一些问题,并将在两个主要过程中完成。首先是交通标志检测,分为两个步骤。首先基于RGBN(归一化RGB)分割图像,然后通过处理前一过程提取的斑点来检测交通标志。第二个过程是交通标志识别过程。在这个过程中有两个步骤。首先是特征提取,在本研究中,我们提出了HOG、Gabor、LBP和使用HSV颜色空间相结合的几种特征提取方法。在下一个识别阶段,比较了支持向量机、KNN、随机森林和Naïve贝叶斯等分类器。该方法已在印尼当地的交通标志上试用。实验结果表明,RGBN方法在交通标志检测中的准确率和召回率分别为98.7%和95.1%,在SVM分类器的识别过程中,准确率和召回率分别为100%和86.7%。
{"title":"Indonesian traffic sign detection and recognition using color and texture feature extraction and SVM classifier","authors":"C. Rahmad, I. F. Rahmah, R. A. Asmara, S. Adhisuwignjo","doi":"10.1109/ICOIACT.2018.8350804","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350804","url":null,"abstract":"This paper presents traffic sign detection and recognition which is necessary to be developed to support several expert systems such as driver assistance and autonomous driving system. This study focused on the detection and recognition process tested on Indonesian traffic signs. There were some major issues on detecting process such as damaged signs, faded color, and natural condition. Therefore, this paper is proposed to address some of these issues and will be done in two main processes. The first one is traffic sign detection which divided into two steps. Start with segmenting image based on RGBN (Normalized RGB), then detects traffic signs by processing blobs that have been extracted by the previous process. The second process is traffic sign recognition process. In this process there are two steps to take. The first one is feature extraction, in this research we propose the combination of some feature extraction that is HOG, Gabor, LBP and use HSV color space. In next recognition stage some classifier are compared such as SVM, KNN, Random Forest, and Naïve Bayes. The propose method has been tasted on Indonesia local traffic sign. The results of the experimental work reveal that the approach of RGBN method showed precision and recall about 98,7% and 95,1% respectively in detecting traffic signs, and 100% for the precision and 86,7% for recall in recognizing process using SVM Classifier.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"96 1","pages":"50-55"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75601654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Deep reinforcement learning for recommender systems 推荐系统的深度强化学习
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350761
Isshu Munemasa, Yuta Tomomatsu, K. Hayashi, T. Takagi
Services that introduce stores to users on the Internet are increasing in recent years. Each service conducts thorough analyses in order to display stores matching each user's preferences. In the field of recommendation, collaborative filtering performs well when there is sufficient click information from users. Generally, when building a user-item matrix, data sparseness becomes a problem. It is especially difficult to handle new users. When sufficient data cannot be obtained, a multi-armed bandit algorithm is applied. Bandit algorithms advance learning by testing each of a variety of options sufficiently and obtaining rewards (i.e. feedback). It is practically impossible to learn everything when the number of items to be learned periodically increases. The problem of having to collect sufficient data for a new user of a service is the same as the problem that collaborative filtering faces. In order to solve this problem, we propose a recommender system based on deep reinforcement learning. In deep reinforcement learning, a multilayer neural network is used to update the value function.
近年来,在互联网上向用户介绍商店的服务越来越多。每个服务都进行彻底的分析,以便显示符合每个用户偏好的商店。在推荐领域,当用户的点击信息足够多时,协同过滤效果较好。通常,在构建用户项矩阵时,数据稀疏性会成为一个问题。处理新用户尤其困难。当无法获得足够的数据时,采用多臂强盗算法。Bandit算法通过充分测试各种选项并获得奖励(即反馈)来推进学习。当需要学习的项目数量周期性增加时,几乎不可能学会所有内容。必须为服务的新用户收集足够的数据的问题与协同过滤所面临的问题相同。为了解决这个问题,我们提出了一个基于深度强化学习的推荐系统。在深度强化学习中,使用多层神经网络来更新值函数。
{"title":"Deep reinforcement learning for recommender systems","authors":"Isshu Munemasa, Yuta Tomomatsu, K. Hayashi, T. Takagi","doi":"10.1109/ICOIACT.2018.8350761","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350761","url":null,"abstract":"Services that introduce stores to users on the Internet are increasing in recent years. Each service conducts thorough analyses in order to display stores matching each user's preferences. In the field of recommendation, collaborative filtering performs well when there is sufficient click information from users. Generally, when building a user-item matrix, data sparseness becomes a problem. It is especially difficult to handle new users. When sufficient data cannot be obtained, a multi-armed bandit algorithm is applied. Bandit algorithms advance learning by testing each of a variety of options sufficiently and obtaining rewards (i.e. feedback). It is practically impossible to learn everything when the number of items to be learned periodically increases. The problem of having to collect sufficient data for a new user of a service is the same as the problem that collaborative filtering faces. In order to solve this problem, we propose a recommender system based on deep reinforcement learning. In deep reinforcement learning, a multilayer neural network is used to update the value function.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"9 1","pages":"226-233"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79135729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Sliding window method for eye movement detection based on electrooculogram signal 基于眼电图信号的滑动窗眼动检测方法
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350779
Catur Atmaji, A. E. Putra, A. Hanif
In the past few decades, biomedical signals have played important roles in assisting diagnosis for medical purposes. After the rose of brain-computer interfaces (BCI) and human-machine interaction (HMI) concept, biomedical signals such as electroencephalograph (EEG) and electrooculograph (EOG) begun to be implemented in control and communication systems. EOG, the signal resulted from eye movement, has been used to design various applications from drowsiness detection to virtual keyboard control. The key of the system developed from EOG signal is the detection system for every eye movement. In this study, a sliding window technique is proposed to make eye movement patterns easier be formulated and using overlap window to avoid local extrema when computing the feature. Evaluation of this method shows that combination of 0.5 s-window length and 25% overlap give 17% and 1% false discovery rate (FDR) in vertical and horizontal channel while the true positive rate (TPR) in both channel is 98% The combination of automatic-window and 25% overlap give a better accuracy with 99% and 100% TPR in the two direction while the FDRs are 22% and 1%.
在过去的几十年里,生物医学信号在辅助医学诊断方面发挥了重要作用。脑机接口(BCI)和人机交互(HMI)概念兴起后,脑电图(EEG)和眼电图(EOG)等生物医学信号开始在控制和通信系统中得到应用。眼电信号是由眼球运动产生的信号,已被用于设计从睡意检测到虚拟键盘控制的各种应用。以眼电信号为基础开发的眼动监测系统的关键是眼动监测系统。本研究提出了一种滑动窗口技术,使眼动模式更容易形成,并在计算特征时使用重叠窗口避免局部极值。对该方法的评价表明,0.5 s窗长和25%重叠的组合在垂直和水平通道上的错误发现率(FDR)分别为17%和1%,而在两个通道上的真阳性率(TPR)均为98%,自动窗口和25%重叠的组合在两个方向上的错误发现率(TPR)分别为99%和100%,而FDR分别为22%和1%。
{"title":"Sliding window method for eye movement detection based on electrooculogram signal","authors":"Catur Atmaji, A. E. Putra, A. Hanif","doi":"10.1109/ICOIACT.2018.8350779","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350779","url":null,"abstract":"In the past few decades, biomedical signals have played important roles in assisting diagnosis for medical purposes. After the rose of brain-computer interfaces (BCI) and human-machine interaction (HMI) concept, biomedical signals such as electroencephalograph (EEG) and electrooculograph (EOG) begun to be implemented in control and communication systems. EOG, the signal resulted from eye movement, has been used to design various applications from drowsiness detection to virtual keyboard control. The key of the system developed from EOG signal is the detection system for every eye movement. In this study, a sliding window technique is proposed to make eye movement patterns easier be formulated and using overlap window to avoid local extrema when computing the feature. Evaluation of this method shows that combination of 0.5 s-window length and 25% overlap give 17% and 1% false discovery rate (FDR) in vertical and horizontal channel while the true positive rate (TPR) in both channel is 98% The combination of automatic-window and 25% overlap give a better accuracy with 99% and 100% TPR in the two direction while the FDRs are 22% and 1%.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"102 1","pages":"628-632"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79373136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting student's psychomotor domain on the vocational senior high school using linear regression 运用线性回归预测职业高中学生心理运动域
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350768
R. Harimurti, Y. Yamasari, Ekohariadi, Munoto, B. I. Asto
The educational data can be mined to produce the useful knowledge. This paper focuses on the educational data processing to predict student's psychomotor domain. Here, we apply linear regression method to do it. On process stage, we use 4 regularizations, namely: no regularization, ridge regression, lasso regression and elastic net regression. Furthermore, we exploit 2 sampling methods as the evaluation technique, for examples: cross-validation sampling and random sampling. The experimental result indicates that the best regularization on cross-validation and random sampling are an elastic net regression because this regularization achieves the lowest predicting error. On cross-validation, values of MSE, RMSE, and MAE are 40.079, 6.330 and 5.183, respectively. Additionally, for random sampling, respectively, values of MSE, RMSE, and MAE are 86.910, 8.428 and 6.511.
通过对教育数据的挖掘,可以产生有用的知识。本文主要研究了教育数据处理对学生心理运动领域的预测。在这里,我们采用线性回归的方法来做。在过程阶段,我们使用了4种正则化,即:无正则化、脊回归、套索回归和弹性网回归。此外,我们采用了交叉验证抽样和随机抽样两种抽样方法作为评估技术。实验结果表明,交叉验证和随机抽样的最佳正则化是弹性网回归,因为该正则化的预测误差最小。经交叉验证,MSE、RMSE和MAE分别为40.079、6.330和5.183。随机抽样的MSE、RMSE和MAE分别为86.910、8.428和6.511。
{"title":"Predicting student's psychomotor domain on the vocational senior high school using linear regression","authors":"R. Harimurti, Y. Yamasari, Ekohariadi, Munoto, B. I. Asto","doi":"10.1109/ICOIACT.2018.8350768","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350768","url":null,"abstract":"The educational data can be mined to produce the useful knowledge. This paper focuses on the educational data processing to predict student's psychomotor domain. Here, we apply linear regression method to do it. On process stage, we use 4 regularizations, namely: no regularization, ridge regression, lasso regression and elastic net regression. Furthermore, we exploit 2 sampling methods as the evaluation technique, for examples: cross-validation sampling and random sampling. The experimental result indicates that the best regularization on cross-validation and random sampling are an elastic net regression because this regularization achieves the lowest predicting error. On cross-validation, values of MSE, RMSE, and MAE are 40.079, 6.330 and 5.183, respectively. Additionally, for random sampling, respectively, values of MSE, RMSE, and MAE are 86.910, 8.428 and 6.511.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"48 1","pages":"448-453"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78765806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Robustness of classical fuzzy C-means (FCM) 经典模糊c均值(FCM)的鲁棒性
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350729
B. I. Nasution, R. Kurniawan
Classical Fuzzy C-Means (FCM) was believed as a robust clustering method when it is optimized and modified. But, at this time many researchers stated that classical FCM is less robust. So this study aims to investigate and prove the robustness of FCM by conducting studies into several data sets and optimization methods and modifications. The results show that FCM is a robust-proven method when viewed from the value of the objective function, the number of iterations, and the time being completed.
对经典模糊c均值(FCM)方法进行优化和改进,证明其具有较好的鲁棒性。但是,此时许多研究人员认为经典FCM的鲁棒性较差。因此,本研究旨在通过对多个数据集以及优化方法和修改的研究来调查和证明FCM的鲁棒性。结果表明,从目标函数的取值、迭代次数和完成时间来看,FCM是一种鲁棒性被证明的方法。
{"title":"Robustness of classical fuzzy C-means (FCM)","authors":"B. I. Nasution, R. Kurniawan","doi":"10.1109/ICOIACT.2018.8350729","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350729","url":null,"abstract":"Classical Fuzzy C-Means (FCM) was believed as a robust clustering method when it is optimized and modified. But, at this time many researchers stated that classical FCM is less robust. So this study aims to investigate and prove the robustness of FCM by conducting studies into several data sets and optimization methods and modifications. The results show that FCM is a robust-proven method when viewed from the value of the objective function, the number of iterations, and the time being completed.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"11 1","pages":"321-325"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76635772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of fractional-order proportional-integral-derivative controller: Hardware realization 分数阶比例-积分-导数控制器的设计:硬件实现
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350813
Ibnu Masngut, G. Pratama, A. Cahyadi, S. Herdjunanto, J. Pakpahan
The aim of this paper is to present the implementation of Fractional-Order Proportional-Integral-Derivative (FOPID) to control the step response of the first-order circuit. With FOPID control, we obtain a satisfying result. The FOPID controller outperforms the classical integer PID, wherein both of them are optimized with the Nelder-Mead method. The FOPID controller succeeds to regulate the output of the system to our desired set point with better settling time and rise time than the classical one. In addition, hardware realization is presented with Arduino Uno.
本文的目的是实现分数阶比例积分导数(FOPID)来控制一阶电路的阶跃响应。采用FOPID控制,取得了满意的效果。FOPID控制器优于经典的整数PID,二者均采用Nelder-Mead方法进行优化。FOPID控制器成功地将系统的输出调节到我们想要的设定点,具有比经典控制器更好的稳定时间和上升时间。此外,还利用Arduino Uno进行了硬件实现。
{"title":"Design of fractional-order proportional-integral-derivative controller: Hardware realization","authors":"Ibnu Masngut, G. Pratama, A. Cahyadi, S. Herdjunanto, J. Pakpahan","doi":"10.1109/ICOIACT.2018.8350813","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350813","url":null,"abstract":"The aim of this paper is to present the implementation of Fractional-Order Proportional-Integral-Derivative (FOPID) to control the step response of the first-order circuit. With FOPID control, we obtain a satisfying result. The FOPID controller outperforms the classical integer PID, wherein both of them are optimized with the Nelder-Mead method. The FOPID controller succeeds to regulate the output of the system to our desired set point with better settling time and rise time than the classical one. In addition, hardware realization is presented with Arduino Uno.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"101 1","pages":"656-660"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78094629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web-based geographic information system for school mapping and disaster mitigation 基于网络的地理信息系统,用于学校制图和减灾
Pub Date : 2018-03-06 DOI: 10.1109/ICOIACT.2018.8350764
Yuliana Ariyanti, R. Yuana, Aris Budianto
Indonesia is a country with 129 active and 500 inactive volcanoes. Disasters caused by volcanic eruptions have impacted on several sectors including education. Development of geographic information system for mapping disaster-prone areas (KRB) can facilitate the identification of schools that require particular attention when disasters such as volcanic eruptions occur. This research aims to develop a web-based geographic information system for school mapping and disaster mitigation (SIMBAK). SIMBAK can map the schools located in the KRB, present school profile information and display the navigation. After SIMBAK have developed, the test was directed in two stages: limited test and expanded test to confirm the feasibility of a SIMBAK. Limited test completed by information system experts and disaster substance experts. Results from a limited test show a percentage value of 86.3%. The expanded test completed by actors involved in SIMBAK namely administrators, school operators, and users. The results of the expanded test show the percentage of the value of 87.9%. It means that SIMBAK is feasible to apply in areas that are in disaster-affected.
印度尼西亚是一个拥有129座活火山和500座不活火山的国家。火山爆发造成的灾害对包括教育在内的多个部门造成了影响。开发用于绘制灾害易发地区地图的地理信息系统,可以在发生火山爆发等灾害时方便地确定需要特别注意的学校。本研究的目的是开发一个基于网络的学校测绘和减灾地理信息系统(SIMBAK)。SIMBAK可以绘制位于KRB的学校地图,提供学校简介信息并显示导航。在SIMBAK开发完成后,测试分为两个阶段:有限测试和扩展测试,以确认SIMBAK的可行性。有限的测试由信息系统专家和灾害物质专家完成。有限试验的结果显示百分比值为86.3%。由参与SIMBAK的参与者,即管理员、学校经营者和用户完成的扩展测试。扩大试验结果表明,该指标的回收率为87.9%。这意味着SIMBAK在受灾害影响的地区是可行的。
{"title":"Web-based geographic information system for school mapping and disaster mitigation","authors":"Yuliana Ariyanti, R. Yuana, Aris Budianto","doi":"10.1109/ICOIACT.2018.8350764","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350764","url":null,"abstract":"Indonesia is a country with 129 active and 500 inactive volcanoes. Disasters caused by volcanic eruptions have impacted on several sectors including education. Development of geographic information system for mapping disaster-prone areas (KRB) can facilitate the identification of schools that require particular attention when disasters such as volcanic eruptions occur. This research aims to develop a web-based geographic information system for school mapping and disaster mitigation (SIMBAK). SIMBAK can map the schools located in the KRB, present school profile information and display the navigation. After SIMBAK have developed, the test was directed in two stages: limited test and expanded test to confirm the feasibility of a SIMBAK. Limited test completed by information system experts and disaster substance experts. Results from a limited test show a percentage value of 86.3%. The expanded test completed by actors involved in SIMBAK namely administrators, school operators, and users. The results of the expanded test show the percentage of the value of 87.9%. It means that SIMBAK is feasible to apply in areas that are in disaster-affected.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"41 1","pages":"136-140"},"PeriodicalIF":0.0,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88383420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 International Conference on Information and Communications Technology (ICOIACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1