首页 > 最新文献

2018 International Conference on Information and Communications Technology (ICOIACT)最新文献

英文 中文
Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC) 通过使用可编程片上系统(SoC)的硬件/软件平台进行完整性检查和恢复,对未经授权的文件修改进行入侵检测
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350742
S. Julianto, R. Munir
The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.
网站黑客攻击、病毒感染、勒索软件等修改文件的攻击正在成为最近的问题。这是由于在web应用程序完成并连接到互联网后,对程序或维护缺乏关注,而黑客总是试图找到安全漏洞来渗透系统。目前市场上使用的基于软件的系统的安全性不足以保护这些攻击,因为基于软件的保护通常仍然可以被修改或操纵。因此,需要一种能够同时通过软件和硬件保护系统(如个人计算机或服务器)中的文件的机制。在硬件上实现该机制可以提高对恶意软件感染的免疫力。本文提出了一种利用现有的完整性检查和恢复(ICAR)概念,采用整体方法(硬件和软件保护),利用可编程片上系统(SoC)的开源安全面向平台,提供针对未经授权的文件修改的保护机制的方法。仿真结果表明,在不修改系统主配置的情况下,该系统可以在有限的攻击场景下保护文件的真实性,免受基于文件修改的攻击。
{"title":"Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)","authors":"S. Julianto, R. Munir","doi":"10.1109/ICOIACT.2018.8350742","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350742","url":null,"abstract":"The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"1 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89759254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Audio beam steering with phased array method using Arduino Due Microcontroller 基于Arduino Due微控制器的相控阵音频波束控制方法
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350683
Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma
The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.
音频系统需要大量的功率来将声能传输到房间内外的所有区域。声波能在空气中传播,在传播过程中受到很大的吸收。通常人们或听众只存在于一定距离和方向的区域,因此很多声音能量被浪费了。聚焦技术可以将声能传输到一定方向和距离的听众区域。因此,该技术可以显著节省能源。音频转向系统采用机械过程,对电力驱动功率要求高,耗时长。本文采用相位差法和相控阵法对四个扬声器系列的声能导引系统进行了研究。因此,不需要机械扬声器修饰器。计算机作为图形用户界面,通过Arduino Due微控制器生成每条路径的延迟配置模式,确定接收声音的观众的方向和距离。所以这个过程可以自动引导声能。实验结果表明,该系统在所选角度或目标角度处产生的声强大于其他角度。波束导向音频预计将用于大型会议室或户外,在那里,声音能量只根据听众的面积和距离发送到所需的功率。
{"title":"Audio beam steering with phased array method using Arduino Due Microcontroller","authors":"Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma","doi":"10.1109/ICOIACT.2018.8350683","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350683","url":null,"abstract":"The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"35 1","pages":"597-600"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing TAMEx model for availability of e-exam in wireless environment 介绍了无线环境下电子考试可用性的TAMEx模型
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350741
G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra
Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.
在电子学习系统中,通常采用计算机基础测试(CBT)或电子考试来评估学习过程的成果。随着大规模在线开放课程、托福、雅思等的实施,电子考试服务越来越受欢迎。然而,电子考试的安全性仍然存在争议。关于电子考试的安全性,人们从权威性和保密性两个方面进行了大量的研究。然而,在可用性方面,特别是在无线环境下实现电子考试的研究还不多。本文介绍了时间自适应移动电子考试(TAMEx)模型。该模型是为提高电子考试在无线网络特别是WLAN IEEE.802.11环境下的可用性而设计的。该模型采用Netsh命令提供无线局域网接口数据,并与电子考试应用程序集成。这里使用RSSI和接收数据速率来标识客户端的连接状态。当由于RSSI导致连接出现问题或接收到的数据速率低于要求的标准时,该模型会自动为某个在考试过程中失去连接的用户提供与连接中断持续时间相对应的额外时间。因此,在电子考试服务中实现TAMEx模型可以提高无线环境下电子考试的可靠性,因为它具有可用性、公平性和可问责性。
{"title":"Introducing TAMEx model for availability of e-exam in wireless environment","authors":"G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra","doi":"10.1109/ICOIACT.2018.8350741","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350741","url":null,"abstract":"Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"30 6 1","pages":"163-167"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77511674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Disturbance compensation using CTC with NDOB for formation control of mobile robots 基于NDOB的CTC扰动补偿用于移动机器人编队控制
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350703
A. Kusumawardana, T. Agustinah
This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.
针对移动机器人的编队控制,提出了基于非线性扰动观测器的计算转矩控制(CTC)来补偿扰动。利用机器人的运动学模型求解编队控制问题。采用SBC(分离-方位控制)方法形成机器人编队。然而,本文也采用了分离-分离控制(SSC),因为当其中一个从动件受到干扰时,SSC方法可以避免从动件之间的碰撞。在这种情况下,使用CTC来控制机器人的动力学,但是当机器人受到干扰时,控制器的性能很差,导致已经形成的编队在跟踪轨迹时中断。在这些条件下,设计NDOB来估计机器人的干扰。仿真结果表明,带NDOB的CTC成功地减小了扰动对机器人的影响,使得任意从动件受到扰动时都能保持队形。
{"title":"Disturbance compensation using CTC with NDOB for formation control of mobile robots","authors":"A. Kusumawardana, T. Agustinah","doi":"10.1109/ICOIACT.2018.8350703","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350703","url":null,"abstract":"This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"3 1","pages":"673-678"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91041940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and analysis of feedback control system 反馈控制系统的设计与分析
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350714
Faiq Ahmad Khan, Shibli Nisar
Feedback control system is one of the most significant and challenging area in this modern era. Almost in every technical program it is being taught. Different research work has been done on the analysis of feedback control systems. But all the previous research work is on analysis of system based on stability, initial and final value theorem, state space representation or based on root locus and bode plot individually. In this paper the complete analysis of feedback control systems has been carried out that includes transfer functions, poles and zeros, stability of a system, initial and final values, state space representations, different responses of a system, time response of first and second order systems, Routh-Hurwitz criterion, root locus and Bode plot together using MATLAB.
反馈控制系统是当今世界最重要和最具挑战性的领域之一。几乎在所有的技术课程中都有讲授。对反馈控制系统的分析已经做了不同的研究工作。但以往的研究工作都是基于稳定性、初值和终值定理、状态空间表示或分别基于根轨迹和波德图对系统进行分析。本文利用MATLAB对反馈控制系统进行了完整的分析,包括传递函数、极点和零点、系统的稳定性、初值和终值、状态空间表示、系统的不同响应、一阶和二阶系统的时间响应、Routh-Hurwitz准则、根轨迹和Bode图。
{"title":"Design and analysis of feedback control system","authors":"Faiq Ahmad Khan, Shibli Nisar","doi":"10.1109/ICOIACT.2018.8350714","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350714","url":null,"abstract":"Feedback control system is one of the most significant and challenging area in this modern era. Almost in every technical program it is being taught. Different research work has been done on the analysis of feedback control systems. But all the previous research work is on analysis of system based on stability, initial and final value theorem, state space representation or based on root locus and bode plot individually. In this paper the complete analysis of feedback control systems has been carried out that includes transfer functions, poles and zeros, stability of a system, initial and final values, state space representations, different responses of a system, time response of first and second order systems, Routh-Hurwitz criterion, root locus and Bode plot together using MATLAB.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"10 1","pages":"16-24"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74270477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Text mining based on tax comments as big data analysis using SVM and feature selection 基于支持向量机和特征选择的税务评论文本挖掘大数据分析
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350743
Mihuandayani, Ema Utami, E. T. Luthfi
The tax gives an important role for the contributions of the economy and development of a country. The improvements to the taxation service system continuously done in order to increase the State Budget. One of consideration to know the performance of taxation particularly in Indonesia is to know the public opinion as for the object service. Text mining can be used to know public opinion about the tax system. The rapid growth of data in social media initiates this research to use the data source as big data analysis. The dataset used is derived from Facebook and Twitter as a source of data in processing tax comments. The results of opinions in the form of public sentiment in part of service, website system, and news can be used as consideration to improve the quality of tax services. In this research, text mining is done through the phases of text processing, feature selection and classification with Support Vector Machine (SVM). To reduce the problem of the number of attributes on the dataset in classifying text, Feature Selection used the Information Gain to select the relevant terms to the tax topic. Testing is used to measure the performance level of SVM with Feature Selection from two data sources. Performance measured using the parameters of precision, recall, and F-measure.
税收对于一个国家的经济和发展的贡献起着重要作用。不断完善税务服务体系,增加国家预算。要了解税收的执行情况,特别是在印度尼西亚,需要考虑的一个因素是了解公众对客体服务的看法。文本挖掘可以用来了解公众对税收制度的看法。社交媒体中数据的快速增长促使本研究将数据来源作为大数据分析。所使用的数据集来自Facebook和Twitter,作为处理税务评论的数据来源。部分服务、网站系统、新闻等方面的舆情形式的意见结果,可以作为提高税务服务质量的考虑因素。在本研究中,文本挖掘通过文本处理、特征选择和支持向量机(SVM)分类三个阶段完成。为了减少文本分类中数据集属性数量的问题,Feature Selection使用信息增益来选择与税务主题相关的术语。采用测试的方法,通过两个数据源的特征选择来衡量支持向量机的性能水平。使用精度、召回率和F-measure参数测量性能。
{"title":"Text mining based on tax comments as big data analysis using SVM and feature selection","authors":"Mihuandayani, Ema Utami, E. T. Luthfi","doi":"10.1109/ICOIACT.2018.8350743","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350743","url":null,"abstract":"The tax gives an important role for the contributions of the economy and development of a country. The improvements to the taxation service system continuously done in order to increase the State Budget. One of consideration to know the performance of taxation particularly in Indonesia is to know the public opinion as for the object service. Text mining can be used to know public opinion about the tax system. The rapid growth of data in social media initiates this research to use the data source as big data analysis. The dataset used is derived from Facebook and Twitter as a source of data in processing tax comments. The results of opinions in the form of public sentiment in part of service, website system, and news can be used as consideration to improve the quality of tax services. In this research, text mining is done through the phases of text processing, feature selection and classification with Support Vector Machine (SVM). To reduce the problem of the number of attributes on the dataset in classifying text, Feature Selection used the Information Gain to select the relevant terms to the tax topic. Testing is used to measure the performance level of SVM with Feature Selection from two data sources. Performance measured using the parameters of precision, recall, and F-measure.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"25 1","pages":"537-542"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77607817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Xbee pro module application in to organize and monitoring earthquake disaster location with the robot control system 应用Xbee pro模块与机器人控制系统对地震灾害现场进行组织和监测
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350811
Adewasti, R. Febriani, Sholihin, Eka Susanti, Emilia Hesti
In Indonesia, the earthquake disaster is a disaster that often happens and cause a lot of damage and casualties, so researchers will try to design a Robot control system to monitor the Earthquake Disaster Location Using Xbee Pro Based Arduino. Initial robot formation, how to design a tool in the form of robot is one that must be considered for the tool produced in this case a robot can be useful for the community and can help the work of the SAR team in terms of monitoring the location of earthquakes. Researchers only limit the subject matter only to the set of receivers and monitoring devices. In order to monitor the state of the earthquake disaster site, this robot is equipped with a camera as a monitoring tool. This tool uses Arduino as Microcontroller, Xbee Pro as communication medium between remote and robot, Driver Motor as DC motor drive, DC Motor as a robot drive, Servo Motor as camera drive, Wireless Camera and Mobile as monitoring device. As a result the robot is able to walk and receive commands up to a distance of more than 20 meters while in the room, and stay connected to the phone to monitor the location of the earthquake.
在印度尼西亚,地震灾害是一种经常发生的灾害,造成了大量的破坏和人员伤亡,因此研究人员将尝试设计一个机器人控制系统,使用基于Xbee Pro的Arduino来监测地震灾害定位。在机器人形成初期,如何设计机器人形式的工具是必须考虑的一个问题,在这种情况下,机器人可以为社区提供有用的工具,并可以帮助搜救队在监测地震位置方面的工作。研究人员只将研究对象限制在一组接收器和监测设备上。为了监测地震灾害现场的状态,该机器人配备了摄像头作为监测工具。该工具采用Arduino作为微控制器,Xbee Pro作为远程与机器人之间的通信媒介,Driver Motor作为直流电机驱动,直流电机作为机器人驱动,伺服电机作为摄像头驱动,无线摄像头和移动设备作为监控设备。因此,机器人能够在房间内行走并接收20多米远的命令,并与手机保持连接,以监测地震的位置。
{"title":"Xbee pro module application in to organize and monitoring earthquake disaster location with the robot control system","authors":"Adewasti, R. Febriani, Sholihin, Eka Susanti, Emilia Hesti","doi":"10.1109/ICOIACT.2018.8350811","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350811","url":null,"abstract":"In Indonesia, the earthquake disaster is a disaster that often happens and cause a lot of damage and casualties, so researchers will try to design a Robot control system to monitor the Earthquake Disaster Location Using Xbee Pro Based Arduino. Initial robot formation, how to design a tool in the form of robot is one that must be considered for the tool produced in this case a robot can be useful for the community and can help the work of the SAR team in terms of monitoring the location of earthquakes. Researchers only limit the subject matter only to the set of receivers and monitoring devices. In order to monitor the state of the earthquake disaster site, this robot is equipped with a camera as a monitoring tool. This tool uses Arduino as Microcontroller, Xbee Pro as communication medium between remote and robot, Driver Motor as DC motor drive, DC Motor as a robot drive, Servo Motor as camera drive, Wireless Camera and Mobile as monitoring device. As a result the robot is able to walk and receive commands up to a distance of more than 20 meters while in the room, and stay connected to the phone to monitor the location of the earthquake.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"5 1","pages":"651-655"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79662426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Taxpayer compliance classification using C4.5, SVM, KNN, Naive Bayes and MLP 使用C4.5、SVM、KNN、朴素贝叶斯和MLP进行纳税人合规性分类
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350710
M. Jupri, R. Sarno
Tax revenue has a very important role to fund the State's finances. In order for the optimal tax revenue, the tax authorities must perform tax supervision to the taxpayers optimally. By using the self-assessment taxation system that is taxpayers calculation, pay and report their own tax obligations added with the data of other parties will create a very large data. Therefore, the tax authorities are required to immediately know the taxpayer non-compliance for further audit. This research uses the classification algorithm C4.5, SVM (Support Vector Machine), KNN (K-Nearest Neighbor), Naive Bayes and MLP (Multilayer Perceptron) to classify the level of taxpayer compliance with four goals that are corporate taxpayers comply formally and materially required, corporate taxpayers comply formally required, corporate taxpayers comply materially required and corporate taxpayers not comply formally and materially required. The classification results of each algorithm are compared and the best algorithm chosen based on criteria F-Score, Accuracy and Time taken to build the model by using fuzzy TOPSIS method. The final result shows that C4.5 algorithm is the best algorithm to classify taxpayer compliance level compared to other algorithms.
税收在国家财政中起着非常重要的作用。为了实现税收的最优,税务机关必须对纳税人进行最优的税务监督。通过使用自评税系统,即纳税人计算、缴纳和申报自己的纳税义务,再加上其他各方的数据,将形成一个非常大的数据。因此,税务机关需要立即了解纳税人的不合规情况,以便进一步审计。本研究采用C4.5分类算法、SVM(支持向量机)、KNN (k -近邻)、朴素贝叶斯和MLP(多层感知器)对纳税人符合正式实质性要求、符合正式实质性要求、符合实质性要求和不符合正式实质性要求四个目标进行分类。对各算法的分类结果进行比较,并根据F-Score、准确率和耗时标准选择最佳算法,采用模糊TOPSIS方法建立模型。最终结果表明,与其他算法相比,C4.5算法是对纳税人合规水平进行分类的最佳算法。
{"title":"Taxpayer compliance classification using C4.5, SVM, KNN, Naive Bayes and MLP","authors":"M. Jupri, R. Sarno","doi":"10.1109/ICOIACT.2018.8350710","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350710","url":null,"abstract":"Tax revenue has a very important role to fund the State's finances. In order for the optimal tax revenue, the tax authorities must perform tax supervision to the taxpayers optimally. By using the self-assessment taxation system that is taxpayers calculation, pay and report their own tax obligations added with the data of other parties will create a very large data. Therefore, the tax authorities are required to immediately know the taxpayer non-compliance for further audit. This research uses the classification algorithm C4.5, SVM (Support Vector Machine), KNN (K-Nearest Neighbor), Naive Bayes and MLP (Multilayer Perceptron) to classify the level of taxpayer compliance with four goals that are corporate taxpayers comply formally and materially required, corporate taxpayers comply formally required, corporate taxpayers comply materially required and corporate taxpayers not comply formally and materially required. The classification results of each algorithm are compared and the best algorithm chosen based on criteria F-Score, Accuracy and Time taken to build the model by using fuzzy TOPSIS method. The final result shows that C4.5 algorithm is the best algorithm to classify taxpayer compliance level compared to other algorithms.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"8 1","pages":"297-303"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81133614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Improving accuracy of C4.5 algorithm using split feature reduction model and bagging ensemble for credit card risk prediction 利用分割特征约简模型和bagging集成提高C4.5算法在信用卡风险预测中的准确性
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350753
M. A. Muslim, A. Nurzahputra, B. Prasetiyo
Giving credit to prospective debtor is determined by the existence of credit scoring. The accuracy of credit scoring to classify the debtor data is very important. The method that can be applied is classification and one of the classification method is decision tree. One of the decision tree algorithm that can be used is C4.5 algorithm. In this paper, the problem that discussed is how to increase the accuracy of C4.5 algorithm to predict credit receipts. The increasing accuracy is conducted by applying the Split Feature Reduction Model and Bagging Ensemble. Split Feature Reduction Model is applied in the preprocessing process which split datasets to the amount of n. In this paper, datasets split into 4 splits. Split 1 consists of 16 features, Split 2 consists of 12 features, Split 3 consists of 8 features, and Split 4 consists of 4 features. Then, C4.5 algorithm is applied to every splits. The best accuracy result by applying split feature reduction model with C4.5 algorithm is in Split 3 amount 73.1%. Then, the best accuracy results obtained by applying the split feature reduction model and bagging ensemble with C4.5 algorithm is in Split 3 amount 75.1%. In comparison to the accuracy of C4.5 algorithm stand alone, the applying of split feature reduction model and bagging ensemble obtained increased accuracy by 4.6%.
给潜在债务人信用是由信用评分的存在决定的。信用评分对债务人数据分类的准确性非常重要。可应用的方法是分类,其中一种分类方法是决策树。其中一种可以使用的决策树算法是C4.5算法。本文讨论的问题是如何提高C4.5算法预测信用收据的准确性。通过应用分割特征约简模型和Bagging Ensemble来提高准确率。预处理过程采用分割特征约简模型(Split Feature Reduction Model),对数据集进行n次分割。本文将数据集分割为4段。拆分1由16个特征组成,拆分2由12个特征组成,拆分3由8个特征组成,拆分4由4个特征组成。然后,将C4.5算法应用于每一次分割。采用C4.5算法的分割特征约简模型,分割3的准确率为73.1%。采用分割特征约简模型和C4.5算法的bagging集成获得的准确率最高,其中分割3为75.1%。与单独使用C4.5算法的准确率相比,使用分割特征约简模型和bagging集成的准确率提高了4.6%。
{"title":"Improving accuracy of C4.5 algorithm using split feature reduction model and bagging ensemble for credit card risk prediction","authors":"M. A. Muslim, A. Nurzahputra, B. Prasetiyo","doi":"10.1109/ICOIACT.2018.8350753","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350753","url":null,"abstract":"Giving credit to prospective debtor is determined by the existence of credit scoring. The accuracy of credit scoring to classify the debtor data is very important. The method that can be applied is classification and one of the classification method is decision tree. One of the decision tree algorithm that can be used is C4.5 algorithm. In this paper, the problem that discussed is how to increase the accuracy of C4.5 algorithm to predict credit receipts. The increasing accuracy is conducted by applying the Split Feature Reduction Model and Bagging Ensemble. Split Feature Reduction Model is applied in the preprocessing process which split datasets to the amount of n. In this paper, datasets split into 4 splits. Split 1 consists of 16 features, Split 2 consists of 12 features, Split 3 consists of 8 features, and Split 4 consists of 4 features. Then, C4.5 algorithm is applied to every splits. The best accuracy result by applying split feature reduction model with C4.5 algorithm is in Split 3 amount 73.1%. Then, the best accuracy results obtained by applying the split feature reduction model and bagging ensemble with C4.5 algorithm is in Split 3 amount 75.1%. In comparison to the accuracy of C4.5 algorithm stand alone, the applying of split feature reduction model and bagging ensemble obtained increased accuracy by 4.6%.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"31 1","pages":"141-145"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81546473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Non-blind RGB image watermarking technique using 2-level discrete wavelet transform and singular value decomposition 基于2级离散小波变换和奇异值分解的RGB图像非盲水印技术
Pub Date : 2018-03-01 DOI: 10.1109/ICOIACT.2018.8350793
Yudit Arum Mekarsari, D. Setiadi, C. A. Sari, E. H. Rachmawanto, Muljono
The main problem in using various watermarking methods to secure digital images is how to optimize the trade-off between robustness watermarked image against the effect of distortion and imperceptibility on watermark insertion. This research proposes a watermark insertion method to protect copyright in true color (RGB) images by combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) algorithms. DWT process will be done as much as 2 levels then selected subband LL2 to inserted watermark by Singular Value Decomposition (SVD) method. Measuring tool in this research using MSE, PSNR, SSI M for imperceptibility and NC quality measurement for robustness measurement. The results show that the proposed scheme can optimize the trade-off between imperceptibility and robustness. Some attacks are used such as Gaussian noise, salt & pepper noise, crop, blur and rotate for watermarked image resilience. The PSNR and SSIM values produced from this method are fairly stable values above 40 dB for PSNR and above 0.99 for SSIM. While the average value of NC resulting from this method is 1.
利用各种水印方法对数字图像进行安全保护的主要问题是如何在水印图像的鲁棒性和嵌入水印时的不可感知性和失真影响之间进行优化权衡。本研究将离散小波变换(DWT)和奇异值分解(SVD)算法相结合,提出了一种用于真彩色图像版权保护的水印插入方法。将DWT处理最多进行2级,然后通过奇异值分解(SVD)方法选择子带LL2插入水印。本研究的测量工具采用MSE、PSNR、SSI M进行不可感知性测量和NC质量测量进行鲁棒性测量。结果表明,该方法能够很好地处理不可感知性和鲁棒性之间的关系。利用高斯噪声、椒盐噪声、裁剪、模糊和旋转等攻击来提高水印图像的复原能力。该方法得到的PSNR和SSIM值相当稳定,PSNR在40 dB以上,SSIM在0.99以上。而该方法得到的NC平均值为1。
{"title":"Non-blind RGB image watermarking technique using 2-level discrete wavelet transform and singular value decomposition","authors":"Yudit Arum Mekarsari, D. Setiadi, C. A. Sari, E. H. Rachmawanto, Muljono","doi":"10.1109/ICOIACT.2018.8350793","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350793","url":null,"abstract":"The main problem in using various watermarking methods to secure digital images is how to optimize the trade-off between robustness watermarked image against the effect of distortion and imperceptibility on watermark insertion. This research proposes a watermark insertion method to protect copyright in true color (RGB) images by combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) algorithms. DWT process will be done as much as 2 levels then selected subband LL2 to inserted watermark by Singular Value Decomposition (SVD) method. Measuring tool in this research using MSE, PSNR, SSI M for imperceptibility and NC quality measurement for robustness measurement. The results show that the proposed scheme can optimize the trade-off between imperceptibility and robustness. Some attacks are used such as Gaussian noise, salt & pepper noise, crop, blur and rotate for watermarked image resilience. The PSNR and SSIM values produced from this method are fairly stable values above 40 dB for PSNR and above 0.99 for SSIM. While the average value of NC resulting from this method is 1.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"122 1","pages":"623-627"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89874010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 International Conference on Information and Communications Technology (ICOIACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1