Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350742
S. Julianto, R. Munir
The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.
{"title":"Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)","authors":"S. Julianto, R. Munir","doi":"10.1109/ICOIACT.2018.8350742","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350742","url":null,"abstract":"The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"1 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89759254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350683
Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma
The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.
{"title":"Audio beam steering with phased array method using Arduino Due Microcontroller","authors":"Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma","doi":"10.1109/ICOIACT.2018.8350683","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350683","url":null,"abstract":"The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"35 1","pages":"597-600"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350741
G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra
Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.
{"title":"Introducing TAMEx model for availability of e-exam in wireless environment","authors":"G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra","doi":"10.1109/ICOIACT.2018.8350741","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350741","url":null,"abstract":"Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"30 6 1","pages":"163-167"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77511674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350703
A. Kusumawardana, T. Agustinah
This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.
{"title":"Disturbance compensation using CTC with NDOB for formation control of mobile robots","authors":"A. Kusumawardana, T. Agustinah","doi":"10.1109/ICOIACT.2018.8350703","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350703","url":null,"abstract":"This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"3 1","pages":"673-678"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91041940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350781
Sartika Wulandari, I. Zain, S. Rahayu
In surveys conducted by Badan Pusat Statistik (BPS), such as SUSENAS, many households do not allocate expenditures for certain types of consumer goods. This causes a lot of censored data. An example of such expenditure is spending on milk consumption. Previous studies that analyzed household expenditure for milk consumption were conducted using the Bayesian Tobit Quantile (BTQ) model. However, the research has not been able to include household income variable that is not linear. This raises the assumption that the variable is endogenous. If the endogenous variable is used in BTQ model, the result of parameter estimation will be biased. Thus, an alternative model that can accommodate the endogenous variables is required. Based on the descriptions, this research used Endogenous Bayesian Tobit Quantile (BTQ) model. The variables used are household expenditures for milk consumption as the censored response variable, household income as the endogenous variable, household head education, percentage of household expenditure for food, numbers of household member, percentage of household member aged < 12 years, average of per capita expenditure, and percentage of working household member as the exogenous variables, and working hours of household head as the instrumantal variable. Furthermore, Endogenous BTQ models for household expenditure data for milk consumption are compared with both Tobit Quantile (TQ) and BTQ models using RMSE and the result is Endogenous BTQ models perform better when endogenous problems arise. In addition, it was found that from the data, significant endogeneity was found on the left side of 0.55-th quantile and on the right side of 0.80-th quantile. It's also found that in the lower quantiles, the percentage of household expenditure on food does not significantly affect household expenditure for milk consumption. Besides, in the upper quantile the percentage of household member aged < 12 years have no significant effect.
{"title":"Modeling the household milk consumption data by endogenous Bayesian Tobit Quantile (BTQ) regression in sidoarjo","authors":"Sartika Wulandari, I. Zain, S. Rahayu","doi":"10.1109/ICOIACT.2018.8350781","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350781","url":null,"abstract":"In surveys conducted by Badan Pusat Statistik (BPS), such as SUSENAS, many households do not allocate expenditures for certain types of consumer goods. This causes a lot of censored data. An example of such expenditure is spending on milk consumption. Previous studies that analyzed household expenditure for milk consumption were conducted using the Bayesian Tobit Quantile (BTQ) model. However, the research has not been able to include household income variable that is not linear. This raises the assumption that the variable is endogenous. If the endogenous variable is used in BTQ model, the result of parameter estimation will be biased. Thus, an alternative model that can accommodate the endogenous variables is required. Based on the descriptions, this research used Endogenous Bayesian Tobit Quantile (BTQ) model. The variables used are household expenditures for milk consumption as the censored response variable, household income as the endogenous variable, household head education, percentage of household expenditure for food, numbers of household member, percentage of household member aged < 12 years, average of per capita expenditure, and percentage of working household member as the exogenous variables, and working hours of household head as the instrumantal variable. Furthermore, Endogenous BTQ models for household expenditure data for milk consumption are compared with both Tobit Quantile (TQ) and BTQ models using RMSE and the result is Endogenous BTQ models perform better when endogenous problems arise. In addition, it was found that from the data, significant endogeneity was found on the left side of 0.55-th quantile and on the right side of 0.80-th quantile. It's also found that in the lower quantiles, the percentage of household expenditure on food does not significantly affect household expenditure for milk consumption. Besides, in the upper quantile the percentage of household member aged < 12 years have no significant effect.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"11 1","pages":"753-758"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87281214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350776
D. P. Sari, D. Rosadi, A. R. Effendie, Danardono
Indonesia is one country that could potentially tectonic earthquakes. This is caused by the position of Indonesia is located at the junction of three major tectonic plates; the Indo-Australian, the Eurasian and Pacific. This earthquake impacts a huge loss both loss of life and property. It can be seen during the earthquake that struck Indonesia precisely in Padang at the end of 2009. One of these objects is building property losses. To minimize the potential losses of buildings due to earthquakes must be known the possibility of building in a location will be damaged by the earthquake. Various ways have been done to predict the level of damage to buildings, one of which is the Bayesian network model.
{"title":"Application of Bayesian network model in determining the risk of building damage caused by earthquakes","authors":"D. P. Sari, D. Rosadi, A. R. Effendie, Danardono","doi":"10.1109/ICOIACT.2018.8350776","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350776","url":null,"abstract":"Indonesia is one country that could potentially tectonic earthquakes. This is caused by the position of Indonesia is located at the junction of three major tectonic plates; the Indo-Australian, the Eurasian and Pacific. This earthquake impacts a huge loss both loss of life and property. It can be seen during the earthquake that struck Indonesia precisely in Padang at the end of 2009. One of these objects is building property losses. To minimize the potential losses of buildings due to earthquakes must be known the possibility of building in a location will be damaged by the earthquake. Various ways have been done to predict the level of damage to buildings, one of which is the Bayesian network model.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"135 1","pages":"131-135"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88000527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350762
Raihan Islamadina, Nuriza Pramita, F. Arnia, K. Munadi
Nowadays, the fish weight measurement is still done manually by using the scales tool. It can lead to difficulties that are considered inaccurate, less effective and require a long time, especially in large quantities. In consequence, a method to measure the weight of the fish automatically based on visual capture is necessary so measuring fish become more effective and efficient. First stage starts from taking picture of the fish using digital camera. The picture will be pre-processed to get grayscale image. Grayscale image is segmented object in the form of separation of objects that are not needed in the fish image. Followed by the feature extraction process in calculating the weight of the fish from the average value of calibration automatically obtained the length, width and height of the fish. The results showed that the method to measure the weight of the fish automatically based on visual capture is able to produce the accuracy validity level from 80% to 97%.
{"title":"Estimating fish weight based on visual captured","authors":"Raihan Islamadina, Nuriza Pramita, F. Arnia, K. Munadi","doi":"10.1109/ICOIACT.2018.8350762","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350762","url":null,"abstract":"Nowadays, the fish weight measurement is still done manually by using the scales tool. It can lead to difficulties that are considered inaccurate, less effective and require a long time, especially in large quantities. In consequence, a method to measure the weight of the fish automatically based on visual capture is necessary so measuring fish become more effective and efficient. First stage starts from taking picture of the fish using digital camera. The picture will be pre-processed to get grayscale image. Grayscale image is segmented object in the form of separation of objects that are not needed in the fish image. Followed by the feature extraction process in calculating the weight of the fish from the average value of calibration automatically obtained the length, width and height of the fish. The results showed that the method to measure the weight of the fish automatically based on visual capture is able to produce the accuracy validity level from 80% to 97%.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"37 1","pages":"366-372"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88367482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350807
Surjandy, Firman Anindra, Haryono Soeparno, T. A. Napitupulu
Congestion in Jakarta is a chronic problem and is still being sought. The growing city of Jakarta is facing various international events, increasing the complexity of these congestion problems. This research is aimed to propose an alternative solution for congestion problem in Jakarta using Cased-Based Reasoning (CBR) approach on Pejompongan area. The CBR integrated model analyzes congestion at a given point in a particular hour to identify the same case. The Cased-Based Management (CBM) algorithm approach is used to capture transient problems and ultimately reduce case base cases for their contribution to long-term maintenance. Congestion data is obtained from CCTV cameras via website lewatmana.com in some strategic areas. With that data, we use CBR's integrated model to adjust traffic time for traffic flow to be optimized so that congestion will decompose. The results of this study can be used by relevant government agencies and policymakers in Jakarta to formulate the best solution to solve the congestion problem in the Indonesian capital. Image analysis at nights and bad weather conditions become a limitation and also the integration with traffic lights control in this paper that can be a new topic for further research.
{"title":"CCTV traffic congestion analysis at Pejompongan using case based reasoning","authors":"Surjandy, Firman Anindra, Haryono Soeparno, T. A. Napitupulu","doi":"10.1109/ICOIACT.2018.8350807","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350807","url":null,"abstract":"Congestion in Jakarta is a chronic problem and is still being sought. The growing city of Jakarta is facing various international events, increasing the complexity of these congestion problems. This research is aimed to propose an alternative solution for congestion problem in Jakarta using Cased-Based Reasoning (CBR) approach on Pejompongan area. The CBR integrated model analyzes congestion at a given point in a particular hour to identify the same case. The Cased-Based Management (CBM) algorithm approach is used to capture transient problems and ultimately reduce case base cases for their contribution to long-term maintenance. Congestion data is obtained from CCTV cameras via website lewatmana.com in some strategic areas. With that data, we use CBR's integrated model to adjust traffic time for traffic flow to be optimized so that congestion will decompose. The results of this study can be used by relevant government agencies and policymakers in Jakarta to formulate the best solution to solve the congestion problem in the Indonesian capital. Image analysis at nights and bad weather conditions become a limitation and also the integration with traffic lights control in this paper that can be a new topic for further research.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"98 1","pages":"861-865"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85327080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350715
Retha Dinar Hayu Arifin, R. Sarno
Home automation is the implementation of information technology and control system to facilitate the daily life easier. The growth of technology make smartphone can control the home appliances. An automated device can work more flexible and efficient, including the use in unlocking door. For busy family or busy people, it is not easy to get out of the seat only to reach the door for unlocking people that already have known and made appointment before. The proposed system presents friendly expense design and implementation of home automation to unlock the door with authentication through speech command or pin via smartphone application. So, it is not only the open button from smartphone application that anyone can control, but also it is added an interface for speech command or pin which also can be useful as security. Users can change the password used by themselves. Thus, only users who know the password can control to unlock the door. The smartphone application designed facilitate the users to be free to choose the authentication between speech command or pin. In speech command, users can easily open the door with say it. Another work being tried is open the door with pin. It can help disabled people with speech impaired to be still able use the application. The design of proposed method is based on Android smartphone application, Bluetooth module and Arduino Board. Android smartphone application is used for serial communication to the Bluetooth module which is connected in Arduino Board to unlock the door. Besides it has low cost, Bluetooth based wireless home automation system can be easy implemented in the home. The suggested system is tested and it gives the expected system with more feature as authentication, either with speech command or with pin. Speech command enacted to the system is also tested the Bluetooth connectivity. The farthest range is 14 m to the controlled hardware system.
{"title":"Door automation system based on speech command and PIN using Android smartphone","authors":"Retha Dinar Hayu Arifin, R. Sarno","doi":"10.1109/ICOIACT.2018.8350715","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350715","url":null,"abstract":"Home automation is the implementation of information technology and control system to facilitate the daily life easier. The growth of technology make smartphone can control the home appliances. An automated device can work more flexible and efficient, including the use in unlocking door. For busy family or busy people, it is not easy to get out of the seat only to reach the door for unlocking people that already have known and made appointment before. The proposed system presents friendly expense design and implementation of home automation to unlock the door with authentication through speech command or pin via smartphone application. So, it is not only the open button from smartphone application that anyone can control, but also it is added an interface for speech command or pin which also can be useful as security. Users can change the password used by themselves. Thus, only users who know the password can control to unlock the door. The smartphone application designed facilitate the users to be free to choose the authentication between speech command or pin. In speech command, users can easily open the door with say it. Another work being tried is open the door with pin. It can help disabled people with speech impaired to be still able use the application. The design of proposed method is based on Android smartphone application, Bluetooth module and Arduino Board. Android smartphone application is used for serial communication to the Bluetooth module which is connected in Arduino Board to unlock the door. Besides it has low cost, Bluetooth based wireless home automation system can be easy implemented in the home. The suggested system is tested and it gives the expected system with more feature as authentication, either with speech command or with pin. Speech command enacted to the system is also tested the Bluetooth connectivity. The farthest range is 14 m to the controlled hardware system.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"127 1","pages":"667-672"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86414026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/ICOIACT.2018.8350669
Karina Abramova, A. Corradini, Jesper Nordentoft
This paper explores an application of Kalman filters for real-time dance visualization within the Unity3d framework. Experiments performed with camera-based motion sensors indicate that Kalman filter implementation can benefit the process of content development for real-time visualization of dance performances. Moreover, we showed that Kalman filters could be used for generating real-time visuals of dance performances. While the scope of this project is limited to dance visualizations our prototype can be extended to become a useful tool for practitioners to identify any movement dysfunctions, and to educate patients with musculoskeletal impairments on their movements.
{"title":"Real-time motion tracking for dance visualization using Kalman filters","authors":"Karina Abramova, A. Corradini, Jesper Nordentoft","doi":"10.1109/ICOIACT.2018.8350669","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350669","url":null,"abstract":"This paper explores an application of Kalman filters for real-time dance visualization within the Unity3d framework. Experiments performed with camera-based motion sensors indicate that Kalman filter implementation can benefit the process of content development for real-time visualization of dance performances. Moreover, we showed that Kalman filters could be used for generating real-time visuals of dance performances. While the scope of this project is limited to dance visualizations our prototype can be extended to become a useful tool for practitioners to identify any movement dysfunctions, and to educate patients with musculoskeletal impairments on their movements.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"129 1","pages":"343-347"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82221036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}