首页 > 最新文献

2018 International Conference on Information and Communications Technology (ICOIACT)最新文献

英文 中文
Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC) 通过使用可编程片上系统(SoC)的硬件/软件平台进行完整性检查和恢复,对未经授权的文件修改进行入侵检测
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350742
S. Julianto, R. Munir
The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.
网站黑客攻击、病毒感染、勒索软件等修改文件的攻击正在成为最近的问题。这是由于在web应用程序完成并连接到互联网后,对程序或维护缺乏关注,而黑客总是试图找到安全漏洞来渗透系统。目前市场上使用的基于软件的系统的安全性不足以保护这些攻击,因为基于软件的保护通常仍然可以被修改或操纵。因此,需要一种能够同时通过软件和硬件保护系统(如个人计算机或服务器)中的文件的机制。在硬件上实现该机制可以提高对恶意软件感染的免疫力。本文提出了一种利用现有的完整性检查和恢复(ICAR)概念,采用整体方法(硬件和软件保护),利用可编程片上系统(SoC)的开源安全面向平台,提供针对未经授权的文件修改的保护机制的方法。仿真结果表明,在不修改系统主配置的情况下,该系统可以在有限的攻击场景下保护文件的真实性,免受基于文件修改的攻击。
{"title":"Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)","authors":"S. Julianto, R. Munir","doi":"10.1109/ICOIACT.2018.8350742","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350742","url":null,"abstract":"The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"1 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89759254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Audio beam steering with phased array method using Arduino Due Microcontroller 基于Arduino Due微控制器的相控阵音频波束控制方法
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350683
Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma
The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.
音频系统需要大量的功率来将声能传输到房间内外的所有区域。声波能在空气中传播,在传播过程中受到很大的吸收。通常人们或听众只存在于一定距离和方向的区域,因此很多声音能量被浪费了。聚焦技术可以将声能传输到一定方向和距离的听众区域。因此,该技术可以显著节省能源。音频转向系统采用机械过程,对电力驱动功率要求高,耗时长。本文采用相位差法和相控阵法对四个扬声器系列的声能导引系统进行了研究。因此,不需要机械扬声器修饰器。计算机作为图形用户界面,通过Arduino Due微控制器生成每条路径的延迟配置模式,确定接收声音的观众的方向和距离。所以这个过程可以自动引导声能。实验结果表明,该系统在所选角度或目标角度处产生的声强大于其他角度。波束导向音频预计将用于大型会议室或户外,在那里,声音能量只根据听众的面积和距离发送到所需的功率。
{"title":"Audio beam steering with phased array method using Arduino Due Microcontroller","authors":"Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma","doi":"10.1109/ICOIACT.2018.8350683","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350683","url":null,"abstract":"The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"35 1","pages":"597-600"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing TAMEx model for availability of e-exam in wireless environment 介绍了无线环境下电子考试可用性的TAMEx模型
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350741
G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra
Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.
在电子学习系统中,通常采用计算机基础测试(CBT)或电子考试来评估学习过程的成果。随着大规模在线开放课程、托福、雅思等的实施,电子考试服务越来越受欢迎。然而,电子考试的安全性仍然存在争议。关于电子考试的安全性,人们从权威性和保密性两个方面进行了大量的研究。然而,在可用性方面,特别是在无线环境下实现电子考试的研究还不多。本文介绍了时间自适应移动电子考试(TAMEx)模型。该模型是为提高电子考试在无线网络特别是WLAN IEEE.802.11环境下的可用性而设计的。该模型采用Netsh命令提供无线局域网接口数据,并与电子考试应用程序集成。这里使用RSSI和接收数据速率来标识客户端的连接状态。当由于RSSI导致连接出现问题或接收到的数据速率低于要求的标准时,该模型会自动为某个在考试过程中失去连接的用户提供与连接中断持续时间相对应的额外时间。因此,在电子考试服务中实现TAMEx模型可以提高无线环境下电子考试的可靠性,因为它具有可用性、公平性和可问责性。
{"title":"Introducing TAMEx model for availability of e-exam in wireless environment","authors":"G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra","doi":"10.1109/ICOIACT.2018.8350741","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350741","url":null,"abstract":"Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"30 6 1","pages":"163-167"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77511674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Disturbance compensation using CTC with NDOB for formation control of mobile robots 基于NDOB的CTC扰动补偿用于移动机器人编队控制
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350703
A. Kusumawardana, T. Agustinah
This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.
针对移动机器人的编队控制,提出了基于非线性扰动观测器的计算转矩控制(CTC)来补偿扰动。利用机器人的运动学模型求解编队控制问题。采用SBC(分离-方位控制)方法形成机器人编队。然而,本文也采用了分离-分离控制(SSC),因为当其中一个从动件受到干扰时,SSC方法可以避免从动件之间的碰撞。在这种情况下,使用CTC来控制机器人的动力学,但是当机器人受到干扰时,控制器的性能很差,导致已经形成的编队在跟踪轨迹时中断。在这些条件下,设计NDOB来估计机器人的干扰。仿真结果表明,带NDOB的CTC成功地减小了扰动对机器人的影响,使得任意从动件受到扰动时都能保持队形。
{"title":"Disturbance compensation using CTC with NDOB for formation control of mobile robots","authors":"A. Kusumawardana, T. Agustinah","doi":"10.1109/ICOIACT.2018.8350703","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350703","url":null,"abstract":"This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"3 1","pages":"673-678"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91041940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling the household milk consumption data by endogenous Bayesian Tobit Quantile (BTQ) regression in sidoarjo 基于内源性贝叶斯Tobit分位数(BTQ)回归的家庭牛奶消费数据建模
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350781
Sartika Wulandari, I. Zain, S. Rahayu
In surveys conducted by Badan Pusat Statistik (BPS), such as SUSENAS, many households do not allocate expenditures for certain types of consumer goods. This causes a lot of censored data. An example of such expenditure is spending on milk consumption. Previous studies that analyzed household expenditure for milk consumption were conducted using the Bayesian Tobit Quantile (BTQ) model. However, the research has not been able to include household income variable that is not linear. This raises the assumption that the variable is endogenous. If the endogenous variable is used in BTQ model, the result of parameter estimation will be biased. Thus, an alternative model that can accommodate the endogenous variables is required. Based on the descriptions, this research used Endogenous Bayesian Tobit Quantile (BTQ) model. The variables used are household expenditures for milk consumption as the censored response variable, household income as the endogenous variable, household head education, percentage of household expenditure for food, numbers of household member, percentage of household member aged < 12 years, average of per capita expenditure, and percentage of working household member as the exogenous variables, and working hours of household head as the instrumantal variable. Furthermore, Endogenous BTQ models for household expenditure data for milk consumption are compared with both Tobit Quantile (TQ) and BTQ models using RMSE and the result is Endogenous BTQ models perform better when endogenous problems arise. In addition, it was found that from the data, significant endogeneity was found on the left side of 0.55-th quantile and on the right side of 0.80-th quantile. It's also found that in the lower quantiles, the percentage of household expenditure on food does not significantly affect household expenditure for milk consumption. Besides, in the upper quantile the percentage of household member aged < 12 years have no significant effect.
在巴丹市统计局(BPS)进行的调查中,如SUSENAS,许多家庭没有为某些类型的消费品分配支出。这导致了大量经过审查的数据。此类支出的一个例子是牛奶消费支出。以前分析家庭牛奶消费支出的研究是使用贝叶斯托比分位数(BTQ)模型进行的。然而,该研究未能纳入非线性的家庭收入变量。这就提出了一个假设,即变量是内生的。如果在BTQ模型中使用内生变量,参数估计的结果会有偏倚。因此,需要一种能够容纳内生变量的替代模型。在此基础上,本研究采用内源性贝叶斯Tobit分位数(Endogenous Bayesian Tobit Quantile, BTQ)模型。变量以家庭牛奶消费支出为审查响应变量,家庭收入为内生变量,户主教育程度、家庭食品支出百分比、家庭成员人数、家庭成员年龄< 12岁的百分比、人均支出平均值、家庭工作成员百分比为外生变量,户主工作时间为工具变量。此外,使用RMSE将家庭牛奶消费支出数据的内源性BTQ模型与Tobit分位数(TQ)和BTQ模型进行了比较,结果表明,当出现内源性问题时,内源性BTQ模型表现更好。此外,从数据中发现,在0.55分位数的左侧和0.80分位数的右侧存在显著的内生性。研究还发现,在较低的分位数中,家庭食品支出的百分比对家庭牛奶消费支出的影响并不显著。此外,在上分位数中,家庭成员年龄< 12岁的百分比没有显著影响。
{"title":"Modeling the household milk consumption data by endogenous Bayesian Tobit Quantile (BTQ) regression in sidoarjo","authors":"Sartika Wulandari, I. Zain, S. Rahayu","doi":"10.1109/ICOIACT.2018.8350781","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350781","url":null,"abstract":"In surveys conducted by Badan Pusat Statistik (BPS), such as SUSENAS, many households do not allocate expenditures for certain types of consumer goods. This causes a lot of censored data. An example of such expenditure is spending on milk consumption. Previous studies that analyzed household expenditure for milk consumption were conducted using the Bayesian Tobit Quantile (BTQ) model. However, the research has not been able to include household income variable that is not linear. This raises the assumption that the variable is endogenous. If the endogenous variable is used in BTQ model, the result of parameter estimation will be biased. Thus, an alternative model that can accommodate the endogenous variables is required. Based on the descriptions, this research used Endogenous Bayesian Tobit Quantile (BTQ) model. The variables used are household expenditures for milk consumption as the censored response variable, household income as the endogenous variable, household head education, percentage of household expenditure for food, numbers of household member, percentage of household member aged < 12 years, average of per capita expenditure, and percentage of working household member as the exogenous variables, and working hours of household head as the instrumantal variable. Furthermore, Endogenous BTQ models for household expenditure data for milk consumption are compared with both Tobit Quantile (TQ) and BTQ models using RMSE and the result is Endogenous BTQ models perform better when endogenous problems arise. In addition, it was found that from the data, significant endogeneity was found on the left side of 0.55-th quantile and on the right side of 0.80-th quantile. It's also found that in the lower quantiles, the percentage of household expenditure on food does not significantly affect household expenditure for milk consumption. Besides, in the upper quantile the percentage of household member aged < 12 years have no significant effect.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"11 1","pages":"753-758"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87281214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Bayesian network model in determining the risk of building damage caused by earthquakes 贝叶斯网络模型在确定地震建筑物破坏风险中的应用
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350776
D. P. Sari, D. Rosadi, A. R. Effendie, Danardono
Indonesia is one country that could potentially tectonic earthquakes. This is caused by the position of Indonesia is located at the junction of three major tectonic plates; the Indo-Australian, the Eurasian and Pacific. This earthquake impacts a huge loss both loss of life and property. It can be seen during the earthquake that struck Indonesia precisely in Padang at the end of 2009. One of these objects is building property losses. To minimize the potential losses of buildings due to earthquakes must be known the possibility of building in a location will be damaged by the earthquake. Various ways have been done to predict the level of damage to buildings, one of which is the Bayesian network model.
印度尼西亚是一个可能发生构造地震的国家。这是由于印度尼西亚的位置位于三大构造板块的交界处;印度-澳大利亚,欧亚和太平洋。这次地震造成了巨大的生命和财产损失。这可以在2009年底袭击印尼巴东的地震中看到。其中一个目标是建立财产损失。为了最大限度地减少建筑物因地震造成的潜在损失,必须了解建筑物所在位置将被地震破坏的可能性。人们采用了多种方法来预测建筑物的破坏程度,其中一种方法是贝叶斯网络模型。
{"title":"Application of Bayesian network model in determining the risk of building damage caused by earthquakes","authors":"D. P. Sari, D. Rosadi, A. R. Effendie, Danardono","doi":"10.1109/ICOIACT.2018.8350776","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350776","url":null,"abstract":"Indonesia is one country that could potentially tectonic earthquakes. This is caused by the position of Indonesia is located at the junction of three major tectonic plates; the Indo-Australian, the Eurasian and Pacific. This earthquake impacts a huge loss both loss of life and property. It can be seen during the earthquake that struck Indonesia precisely in Padang at the end of 2009. One of these objects is building property losses. To minimize the potential losses of buildings due to earthquakes must be known the possibility of building in a location will be damaged by the earthquake. Various ways have been done to predict the level of damage to buildings, one of which is the Bayesian network model.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"135 1","pages":"131-135"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88000527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Estimating fish weight based on visual captured 根据视觉捕捉估计鱼的重量
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350762
Raihan Islamadina, Nuriza Pramita, F. Arnia, K. Munadi
Nowadays, the fish weight measurement is still done manually by using the scales tool. It can lead to difficulties that are considered inaccurate, less effective and require a long time, especially in large quantities. In consequence, a method to measure the weight of the fish automatically based on visual capture is necessary so measuring fish become more effective and efficient. First stage starts from taking picture of the fish using digital camera. The picture will be pre-processed to get grayscale image. Grayscale image is segmented object in the form of separation of objects that are not needed in the fish image. Followed by the feature extraction process in calculating the weight of the fish from the average value of calibration automatically obtained the length, width and height of the fish. The results showed that the method to measure the weight of the fish automatically based on visual capture is able to produce the accuracy validity level from 80% to 97%.
现在,鱼的体重测量仍然是通过使用秤工具手动完成的。它可能导致被认为是不准确的困难,效率较低,需要很长时间,特别是大量。因此,需要一种基于视觉捕捉的自动测量鱼的重量的方法,从而使测量鱼变得更加有效和高效。第一阶段是用数码相机给鱼拍照。图像将被预处理得到灰度图像。灰度图像是以分离鱼图像中不需要的对象的形式对对象进行分割的。然后在特征提取过程中计算鱼的权重,从平均值中标定自动得到鱼的长、宽、高。结果表明,基于视觉捕获的鱼重自动测量方法的准确度效度在80% ~ 97%之间。
{"title":"Estimating fish weight based on visual captured","authors":"Raihan Islamadina, Nuriza Pramita, F. Arnia, K. Munadi","doi":"10.1109/ICOIACT.2018.8350762","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350762","url":null,"abstract":"Nowadays, the fish weight measurement is still done manually by using the scales tool. It can lead to difficulties that are considered inaccurate, less effective and require a long time, especially in large quantities. In consequence, a method to measure the weight of the fish automatically based on visual capture is necessary so measuring fish become more effective and efficient. First stage starts from taking picture of the fish using digital camera. The picture will be pre-processed to get grayscale image. Grayscale image is segmented object in the form of separation of objects that are not needed in the fish image. Followed by the feature extraction process in calculating the weight of the fish from the average value of calibration automatically obtained the length, width and height of the fish. The results showed that the method to measure the weight of the fish automatically based on visual capture is able to produce the accuracy validity level from 80% to 97%.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"37 1","pages":"366-372"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88367482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CCTV traffic congestion analysis at Pejompongan using case based reasoning 使用基于案例推理的佩宗蓬岸闭路电视交通拥堵分析
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350807
Surjandy, Firman Anindra, Haryono Soeparno, T. A. Napitupulu
Congestion in Jakarta is a chronic problem and is still being sought. The growing city of Jakarta is facing various international events, increasing the complexity of these congestion problems. This research is aimed to propose an alternative solution for congestion problem in Jakarta using Cased-Based Reasoning (CBR) approach on Pejompongan area. The CBR integrated model analyzes congestion at a given point in a particular hour to identify the same case. The Cased-Based Management (CBM) algorithm approach is used to capture transient problems and ultimately reduce case base cases for their contribution to long-term maintenance. Congestion data is obtained from CCTV cameras via website lewatmana.com in some strategic areas. With that data, we use CBR's integrated model to adjust traffic time for traffic flow to be optimized so that congestion will decompose. The results of this study can be used by relevant government agencies and policymakers in Jakarta to formulate the best solution to solve the congestion problem in the Indonesian capital. Image analysis at nights and bad weather conditions become a limitation and also the integration with traffic lights control in this paper that can be a new topic for further research.
雅加达的交通拥堵是一个长期问题,目前仍在解决中。不断发展的雅加达城市面临着各种国际事件,增加了这些拥堵问题的复杂性。本研究旨在利用基于案例的推理(CBR)方法在Pejompongan地区提出雅加达拥堵问题的替代解决方案。CBR集成模型通过分析特定时间点的拥堵情况来识别相同的情况。基于案例的管理(CBM)算法方法用于捕获暂态问题,并最终减少对长期维护贡献的案例基础案例。在一些战略区域,通过lewatmana.com网站从闭路电视摄像机获得拥堵数据。利用这些数据,我们利用CBR的集成模型来调整交通时间,使交通流得到优化,从而使拥堵分解。本研究的结果可为雅加达相关政府机构和政策制定者制定解决印尼首都拥堵问题的最佳方案提供参考。在夜间和恶劣天气条件下的图像分析成为本文研究的一个局限,而与交通灯控制的结合是一个值得进一步研究的新课题。
{"title":"CCTV traffic congestion analysis at Pejompongan using case based reasoning","authors":"Surjandy, Firman Anindra, Haryono Soeparno, T. A. Napitupulu","doi":"10.1109/ICOIACT.2018.8350807","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350807","url":null,"abstract":"Congestion in Jakarta is a chronic problem and is still being sought. The growing city of Jakarta is facing various international events, increasing the complexity of these congestion problems. This research is aimed to propose an alternative solution for congestion problem in Jakarta using Cased-Based Reasoning (CBR) approach on Pejompongan area. The CBR integrated model analyzes congestion at a given point in a particular hour to identify the same case. The Cased-Based Management (CBM) algorithm approach is used to capture transient problems and ultimately reduce case base cases for their contribution to long-term maintenance. Congestion data is obtained from CCTV cameras via website lewatmana.com in some strategic areas. With that data, we use CBR's integrated model to adjust traffic time for traffic flow to be optimized so that congestion will decompose. The results of this study can be used by relevant government agencies and policymakers in Jakarta to formulate the best solution to solve the congestion problem in the Indonesian capital. Image analysis at nights and bad weather conditions become a limitation and also the integration with traffic lights control in this paper that can be a new topic for further research.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"98 1","pages":"861-865"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85327080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Door automation system based on speech command and PIN using Android smartphone 基于语音指令和PIN码的Android智能手机门自动化系统
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350715
Retha Dinar Hayu Arifin, R. Sarno
Home automation is the implementation of information technology and control system to facilitate the daily life easier. The growth of technology make smartphone can control the home appliances. An automated device can work more flexible and efficient, including the use in unlocking door. For busy family or busy people, it is not easy to get out of the seat only to reach the door for unlocking people that already have known and made appointment before. The proposed system presents friendly expense design and implementation of home automation to unlock the door with authentication through speech command or pin via smartphone application. So, it is not only the open button from smartphone application that anyone can control, but also it is added an interface for speech command or pin which also can be useful as security. Users can change the password used by themselves. Thus, only users who know the password can control to unlock the door. The smartphone application designed facilitate the users to be free to choose the authentication between speech command or pin. In speech command, users can easily open the door with say it. Another work being tried is open the door with pin. It can help disabled people with speech impaired to be still able use the application. The design of proposed method is based on Android smartphone application, Bluetooth module and Arduino Board. Android smartphone application is used for serial communication to the Bluetooth module which is connected in Arduino Board to unlock the door. Besides it has low cost, Bluetooth based wireless home automation system can be easy implemented in the home. The suggested system is tested and it gives the expected system with more feature as authentication, either with speech command or with pin. Speech command enacted to the system is also tested the Bluetooth connectivity. The farthest range is 14 m to the controlled hardware system.
家庭自动化是实现信息技术和控制系统的方便,使日常生活更容易。科技的发展使得智能手机可以控制家用电器。自动化装置可以更加灵活和高效地工作,包括在开锁门中的使用。对于忙碌的家庭或忙碌的人来说,要从座位上起身,走到已经认识并预约好的人的门口并不容易。本系统以智能手机应用程序为基础,通过语音命令或pin码进行身份验证,实现了家庭自动化的友好设计和实现。因此,它不仅是智能手机应用程序的打开按钮,任何人都可以控制,而且它还增加了语音命令或pin的接口,这也可以作为安全有用。用户可以修改自己使用的密码。因此,只有知道密码的用户才能控制开门。设计的智能手机应用程序方便用户在语音命令或pin之间自由选择认证方式。在语音命令中,用户可以很容易地说开门。另一种正在尝试的工作是用大头针把门打开。它可以帮助有语言障碍的残疾人仍然能够使用该应用程序。本文提出的方法是基于Android智能手机应用、蓝牙模块和Arduino板的设计。使用Android智能手机应用程序与连接在Arduino板上的蓝牙模块进行串行通信,实现开门。基于蓝牙的无线家庭自动化系统成本低,易于在家庭中实现。所建议的系统经过测试,它提供了更多的功能作为认证,无论是语音命令或引脚。对系统所颁布的语音命令也进行了蓝牙连接测试。距离被控硬件系统最远14米。
{"title":"Door automation system based on speech command and PIN using Android smartphone","authors":"Retha Dinar Hayu Arifin, R. Sarno","doi":"10.1109/ICOIACT.2018.8350715","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350715","url":null,"abstract":"Home automation is the implementation of information technology and control system to facilitate the daily life easier. The growth of technology make smartphone can control the home appliances. An automated device can work more flexible and efficient, including the use in unlocking door. For busy family or busy people, it is not easy to get out of the seat only to reach the door for unlocking people that already have known and made appointment before. The proposed system presents friendly expense design and implementation of home automation to unlock the door with authentication through speech command or pin via smartphone application. So, it is not only the open button from smartphone application that anyone can control, but also it is added an interface for speech command or pin which also can be useful as security. Users can change the password used by themselves. Thus, only users who know the password can control to unlock the door. The smartphone application designed facilitate the users to be free to choose the authentication between speech command or pin. In speech command, users can easily open the door with say it. Another work being tried is open the door with pin. It can help disabled people with speech impaired to be still able use the application. The design of proposed method is based on Android smartphone application, Bluetooth module and Arduino Board. Android smartphone application is used for serial communication to the Bluetooth module which is connected in Arduino Board to unlock the door. Besides it has low cost, Bluetooth based wireless home automation system can be easy implemented in the home. The suggested system is tested and it gives the expected system with more feature as authentication, either with speech command or with pin. Speech command enacted to the system is also tested the Bluetooth connectivity. The farthest range is 14 m to the controlled hardware system.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"127 1","pages":"667-672"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86414026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-time motion tracking for dance visualization using Kalman filters 实时运动跟踪舞蹈可视化使用卡尔曼滤波器
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350669
Karina Abramova, A. Corradini, Jesper Nordentoft
This paper explores an application of Kalman filters for real-time dance visualization within the Unity3d framework. Experiments performed with camera-based motion sensors indicate that Kalman filter implementation can benefit the process of content development for real-time visualization of dance performances. Moreover, we showed that Kalman filters could be used for generating real-time visuals of dance performances. While the scope of this project is limited to dance visualizations our prototype can be extended to become a useful tool for practitioners to identify any movement dysfunctions, and to educate patients with musculoskeletal impairments on their movements.
本文探讨了在Unity3d框架下卡尔曼滤波器在实时舞蹈可视化中的应用。基于摄像机的运动传感器实验表明,卡尔曼滤波的实现有利于舞蹈表演实时可视化的内容开发过程。此外,我们还展示了卡尔曼滤波器可以用于生成舞蹈表演的实时视觉效果。虽然这个项目的范围仅限于舞蹈可视化,但我们的原型可以扩展为从业者识别任何运动功能障碍的有用工具,并教育患有肌肉骨骼损伤的患者如何运动。
{"title":"Real-time motion tracking for dance visualization using Kalman filters","authors":"Karina Abramova, A. Corradini, Jesper Nordentoft","doi":"10.1109/ICOIACT.2018.8350669","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350669","url":null,"abstract":"This paper explores an application of Kalman filters for real-time dance visualization within the Unity3d framework. Experiments performed with camera-based motion sensors indicate that Kalman filter implementation can benefit the process of content development for real-time visualization of dance performances. Moreover, we showed that Kalman filters could be used for generating real-time visuals of dance performances. While the scope of this project is limited to dance visualizations our prototype can be extended to become a useful tool for practitioners to identify any movement dysfunctions, and to educate patients with musculoskeletal impairments on their movements.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"129 1","pages":"343-347"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82221036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Information and Communications Technology (ICOIACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1