首页 > 最新文献

2021 13th International Conference on Information & Communication Technology and System (ICTS)最新文献

英文 中文
A Novel Approach on Conducting Reviewer Recommendations Based on Conflict of Interest 基于利益冲突的审稿人推荐新方法
Adi Setyo Nugroho, Aizul Faiz Iswafaza, R. Anggraini, R. Sarno
the reviewer's recommendation in accordance with the field of research is crucial where this is directly proportional to the results of the review on the research. In finding suitable reviewers, conflicts of interest (COI) are often found. In this paper, we propose an approach to reviewer recommendations with topic extraction and author extraction to prevent COI. First, we separate the process into 2, namely to do topic extraction using Latent Dirichlet Allocation (LDA), and also to do author extraction using Cosine Similarity. The next step is to combine the two results to rank the 10 recommended authors. The experimental results show that our approach has succeeded in getting 10 recommended reviewers to avoid COI.
审稿人根据研究领域的建议是至关重要的,因为这与研究的审查结果直接成正比。在寻找合适的审稿人时,经常会发现利益冲突(COI)。在本文中,我们提出了一种通过主题提取和作者提取来防止COI的审稿人推荐方法。首先,我们将这个过程分成2部分,即使用潜在狄利克雷分配(Latent Dirichlet Allocation, LDA)进行主题提取,以及使用余弦相似性进行作者提取。下一步是将这两个结果结合起来对10位被推荐的作者进行排名。实验结果表明,我们的方法成功地获得了10个推荐审稿人,避免了COI。
{"title":"A Novel Approach on Conducting Reviewer Recommendations Based on Conflict of Interest","authors":"Adi Setyo Nugroho, Aizul Faiz Iswafaza, R. Anggraini, R. Sarno","doi":"10.1109/ICTS52701.2021.9609054","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9609054","url":null,"abstract":"the reviewer's recommendation in accordance with the field of research is crucial where this is directly proportional to the results of the review on the research. In finding suitable reviewers, conflicts of interest (COI) are often found. In this paper, we propose an approach to reviewer recommendations with topic extraction and author extraction to prevent COI. First, we separate the process into 2, namely to do topic extraction using Latent Dirichlet Allocation (LDA), and also to do author extraction using Cosine Similarity. The next step is to combine the two results to rank the 10 recommended authors. The experimental results show that our approach has succeeded in getting 10 recommended reviewers to avoid COI.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"5 1","pages":"195-200"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90199310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Activity Design Using Innovation Profiling in Appreciative Learning Serious Game of Indonesian Pronunciation 印尼语发音欣赏学习严肃游戏的活动设计
Hanny Haryanto, Aripin, I. Gamayanto
Activity is one of the main elements for shaping the experience in serious game, that could enhance the player understanding on the learning material. However, lack of concept or framework to design the activity could resulted in poor experience. In previous research, Appreciative Learning has been used to design the activities in serious game. In this study, we use Innovation Profiling as a framework to develop activities in Design Stage of Appreciative Learning. Design stage in Appreciative Learning consists of activities to produce innovation. Therefore, the Innovation Profiling could provide the detailed concept for the activities in this stage. Innovation profiling has four types of innovation, that are open innovation, blind innovation, hidden innovation and unknown innovation. It divided into seven important parts: imitating, seeing, understanding, trying, changing, understanding, solution, integration and creative. Realistic visual speech synthesis is used as the player avatar to interact with the game and serve as main education tool of Indonesian pronunciation. Results show that the activity could enhance the player experience and motivation to learn Indonesian pronunciation.
活动是塑造严肃游戏体验的主要元素之一,它可以增强玩家对学习材料的理解。然而,缺乏设计活动的概念或框架可能会导致糟糕的体验。在以往的研究中,欣赏学习被用于设计严肃游戏中的活动。在本研究中,我们使用创新剖析作为框架来发展欣赏学习设计阶段的活动。欣赏式学习的设计阶段包括产生创新的活动。因此,创新概况可以为这一阶段的活动提供详细的概念。创新分析有四种类型的创新,即开放式创新、盲目创新、隐性创新和未知创新。它分为七个重要部分:模仿、观察、理解、尝试、改变、理解、解决、整合和创造。逼真的视觉语音合成作为玩家化身与游戏互动,并作为印尼语发音的主要教育工具。结果表明,该活动可以增强玩家学习印尼语发音的体验和动力。
{"title":"Activity Design Using Innovation Profiling in Appreciative Learning Serious Game of Indonesian Pronunciation","authors":"Hanny Haryanto, Aripin, I. Gamayanto","doi":"10.1109/ICTS52701.2021.9608559","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608559","url":null,"abstract":"Activity is one of the main elements for shaping the experience in serious game, that could enhance the player understanding on the learning material. However, lack of concept or framework to design the activity could resulted in poor experience. In previous research, Appreciative Learning has been used to design the activities in serious game. In this study, we use Innovation Profiling as a framework to develop activities in Design Stage of Appreciative Learning. Design stage in Appreciative Learning consists of activities to produce innovation. Therefore, the Innovation Profiling could provide the detailed concept for the activities in this stage. Innovation profiling has four types of innovation, that are open innovation, blind innovation, hidden innovation and unknown innovation. It divided into seven important parts: imitating, seeing, understanding, trying, changing, understanding, solution, integration and creative. Realistic visual speech synthesis is used as the player avatar to interact with the game and serve as main education tool of Indonesian pronunciation. Results show that the activity could enhance the player experience and motivation to learn Indonesian pronunciation.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"278 1","pages":"24-28"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76893346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bilingual Question Answering System Using Bidirectional Encoder Representations from Transformers and Best Matching Method 基于变压器双向编码器表示和最佳匹配方法的双语问答系统
D. A. Navastara, Ihdiannaja, A. Arifin
Question answering (QA) system is built to answer asked queries based on an unstructured collection of documents in natural language. The implementation of the QA system makes QA more efficient because the system can answer similar questions automatically. However, similarity queries based on questions or answers alone fail to retrieve documents relevant to the query in some cases because the word choice used in the query is different from the word choice in the QA database even though the context is the same. The same context can be seen from the list of references used by a QA. Therefore, it is necessary to measure the similarity of the query that does not only take into account the question and answer but also the reference. In this paper, we propose to build a bilingual QA system that answers Indonesian questions based on the combination of query similarities among question, answer, and external reference in Arabic using Bidirectional Encoder Representation from Transformers (BERT) and Best Matching (BM25) method. The similarity between query and reference are able to help to recognize a QA that uses reference with similar context. Based on the experimental result, the combination parameter of query-Question followed by query-Answer achieves the highest evaluation score with the Mean Average Precision (MAP) score of 0.988 and the Mean Reciprocal Rank (MRR) score of 1.000.
问答(QA)系统是基于自然语言的非结构化文档集合来回答用户提出的问题。QA系统的实现使得QA更加高效,因为系统可以自动回答类似的问题。然而,在某些情况下,仅基于问题或答案的相似性查询无法检索与查询相关的文档,因为查询中使用的单词选择与QA数据库中的单词选择不同,即使上下文相同。同样的上下文可以从QA使用的引用列表中看到。因此,有必要测量查询的相似度,不仅要考虑问题和答案,还要考虑参考。在本文中,我们提出了一个基于阿拉伯语问题、答案和外部参考之间的查询相似度组合的双语问答系统,该系统采用双向编码器表示(BERT)和最佳匹配(BM25)方法来回答印尼语问题。查询和引用之间的相似性有助于识别使用具有相似上下文的引用的QA。从实验结果来看,query-Question后query-Answer的组合参数评价得分最高,MAP (Mean Average Precision)得分为0.988,MRR (Mean Reciprocal Rank)得分为1.000。
{"title":"Bilingual Question Answering System Using Bidirectional Encoder Representations from Transformers and Best Matching Method","authors":"D. A. Navastara, Ihdiannaja, A. Arifin","doi":"10.1109/ICTS52701.2021.9608905","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608905","url":null,"abstract":"Question answering (QA) system is built to answer asked queries based on an unstructured collection of documents in natural language. The implementation of the QA system makes QA more efficient because the system can answer similar questions automatically. However, similarity queries based on questions or answers alone fail to retrieve documents relevant to the query in some cases because the word choice used in the query is different from the word choice in the QA database even though the context is the same. The same context can be seen from the list of references used by a QA. Therefore, it is necessary to measure the similarity of the query that does not only take into account the question and answer but also the reference. In this paper, we propose to build a bilingual QA system that answers Indonesian questions based on the combination of query similarities among question, answer, and external reference in Arabic using Bidirectional Encoder Representation from Transformers (BERT) and Best Matching (BM25) method. The similarity between query and reference are able to help to recognize a QA that uses reference with similar context. Based on the experimental result, the combination parameter of query-Question followed by query-Answer achieves the highest evaluation score with the Mean Average Precision (MAP) score of 0.988 and the Mean Reciprocal Rank (MRR) score of 1.000.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"114 1","pages":"360-364"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80795589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating The Preliminary Models to Identify Fake News on COVID-19 Tweets 评估COVID-19推特上假新闻识别的初步模型
Ayu Mutiara Sari, Nurul Fajrin Ariyani, A. Ahmadiyah
The spread propagation of fake news about COVID-19 can make it distressing to handle the pandemic situation. Identifying the fake and real news on social media needs to be done as quickly as possible to prevent chaos in the community and hampering the handling of COVID-19. In this study, we conducted some experiments to get a model that works well for classifying information into fake or real news using tweet data. We implemented two different ways to represent data to train machine learning classifier models, syntactic-based using Bag-of-Words and TF-IDF, and semantic-based using Word2Vec and FastText. We evaluated each model produced by the training process using two types of testing data. The results show that The Linear Support Vector Machine model using TF-IDF obtained the best F1-Score value in both testing data. The model obtained F1-Score 92.21% in Testing Data 1 and 93.33% in Testing Data 2.
假新闻的传播和传播会给应对疫情带来痛苦。要尽快识别社交媒体上的假新闻和真新闻,防止社会混乱,阻碍COVID-19的处理。在本研究中,我们进行了一些实验,以获得一个模型,可以很好地使用tweet数据将信息分类为假新闻或真实新闻。我们实现了两种不同的方式来表示数据以训练机器学习分类器模型,基于句法的使用Bag-of-Words和TF-IDF,以及基于语义的使用Word2Vec和FastText。我们使用两种类型的测试数据评估了训练过程产生的每个模型。结果表明,使用TF-IDF的线性支持向量机模型在两个测试数据中获得了最佳的F1-Score值。模型在测试数据1和测试数据2中分别获得了92.21%和93.33%的F1-Score。
{"title":"Evaluating The Preliminary Models to Identify Fake News on COVID-19 Tweets","authors":"Ayu Mutiara Sari, Nurul Fajrin Ariyani, A. Ahmadiyah","doi":"10.1109/ICTS52701.2021.9607996","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9607996","url":null,"abstract":"The spread propagation of fake news about COVID-19 can make it distressing to handle the pandemic situation. Identifying the fake and real news on social media needs to be done as quickly as possible to prevent chaos in the community and hampering the handling of COVID-19. In this study, we conducted some experiments to get a model that works well for classifying information into fake or real news using tweet data. We implemented two different ways to represent data to train machine learning classifier models, syntactic-based using Bag-of-Words and TF-IDF, and semantic-based using Word2Vec and FastText. We evaluated each model produced by the training process using two types of testing data. The results show that The Linear Support Vector Machine model using TF-IDF obtained the best F1-Score value in both testing data. The model obtained F1-Score 92.21% in Testing Data 1 and 93.33% in Testing Data 2.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"75 1","pages":"336-341"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82025676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SER: Speech Emotion Recognition Application Based on Extreme Learning Machine 基于极限学习机的语音情感识别应用
Ainurrochman, Irfanur Ilham Febriansyah, Umi Laili Yuhana
Nowadays, device control is commonly using the human body feature or voice recognition technology. To expand the functionality of voice recognition, plenty of researchers have developed speech emotion recognition. By recognizing sound emotions, a system can provide better and beneficial decision-making output. This paper describes the development of an application that is able to recognize speech emotions using Extreme Learning Machine (ELM). We use the dataset from Toronto Emotional Speech Set (TESS). The dataset contains 2800 data points (audio files) in total and has high quality audio that focused on female voices to ensure the reliability of the data. The Speech Emotion Recognition application was design as web-based application that used Golang and Python which built with Extreme Learning Machine and Random Forest to recognize speech emotions. As a result, the functionality test shows that the application was able to satisfy 6 out of 6 requirements, and the accuracy test shows an accuracy value of 100% by identifying 70 out of 70 test data.
目前,设备控制多采用人体特征或语音识别技术。为了扩展语音识别的功能,许多研究者开发了语音情感识别技术。通过识别正确的情绪,系统可以提供更好和有益的决策输出。本文描述了一种能够使用极限学习机(ELM)识别语音情绪的应用程序的开发。我们使用来自多伦多情感语音集(TESS)的数据集。该数据集共包含2800个数据点(音频文件),具有高质量的音频,以女声为重点,确保数据的可靠性。语音情绪识别应用程序设计为基于web的应用程序,使用Golang和Python,使用极限学习机和随机森林构建语音情绪识别。结果,功能测试表明应用程序能够满足6个需求中的6个,准确性测试通过识别70个测试数据中的70个显示了100%的准确性值。
{"title":"SER: Speech Emotion Recognition Application Based on Extreme Learning Machine","authors":"Ainurrochman, Irfanur Ilham Febriansyah, Umi Laili Yuhana","doi":"10.1109/ICTS52701.2021.9609016","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9609016","url":null,"abstract":"Nowadays, device control is commonly using the human body feature or voice recognition technology. To expand the functionality of voice recognition, plenty of researchers have developed speech emotion recognition. By recognizing sound emotions, a system can provide better and beneficial decision-making output. This paper describes the development of an application that is able to recognize speech emotions using Extreme Learning Machine (ELM). We use the dataset from Toronto Emotional Speech Set (TESS). The dataset contains 2800 data points (audio files) in total and has high quality audio that focused on female voices to ensure the reliability of the data. The Speech Emotion Recognition application was design as web-based application that used Golang and Python which built with Extreme Learning Machine and Random Forest to recognize speech emotions. As a result, the functionality test shows that the application was able to satisfy 6 out of 6 requirements, and the accuracy test shows an accuracy value of 100% by identifying 70 out of 70 test data.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"183 1","pages":"179-183"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91527580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discontinuity Preserving Optical Flow Based on Anisotropic Operator 基于各向异性算子的保持不连续光流
Muzammil Khan, Pushpendra Kumar
Variational models are more popular approaches in the estimation of optical flow between two image frames and yield the most accurate flow fields. More fidelity terms in the variational model makes the estimation robust. This paper proposed an anisotropic operator which is designed using the greatest integer and an exponential function to estimate average flow velocity. This will help to preserve discontinuity in the optical flow and provides a significant smooth flow over a uniform region. The design of this operator is motivated from an isotropic operator that is based on the intensity differences of the pixels. This is employed in the controlling of flow propagation. The validation of the accuracy and robustness of our algorithm is provided in terms of qualitative and quantitative results on a variety of spectrum datasets.
变分模型是估计两帧图像间光流的常用方法,它能产生最精确的流场。变分模型中更多的保真项使估计具有鲁棒性。本文提出了一种利用最大整数和指数函数来估计平均流速的各向异性算子。这将有助于保持光流的不连续,并在均匀区域上提供显著的平滑流。该算子的设计源于基于像素强度差异的各向同性算子。这被用于控制流的传播。在各种光谱数据集上的定性和定量结果验证了我们算法的准确性和鲁棒性。
{"title":"Discontinuity Preserving Optical Flow Based on Anisotropic Operator","authors":"Muzammil Khan, Pushpendra Kumar","doi":"10.1109/ICTS52701.2021.9608188","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608188","url":null,"abstract":"Variational models are more popular approaches in the estimation of optical flow between two image frames and yield the most accurate flow fields. More fidelity terms in the variational model makes the estimation robust. This paper proposed an anisotropic operator which is designed using the greatest integer and an exponential function to estimate average flow velocity. This will help to preserve discontinuity in the optical flow and provides a significant smooth flow over a uniform region. The design of this operator is motivated from an isotropic operator that is based on the intensity differences of the pixels. This is employed in the controlling of flow propagation. The validation of the accuracy and robustness of our algorithm is provided in terms of qualitative and quantitative results on a variety of spectrum datasets.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"51 1","pages":"306-311"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73586430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Methods Classifier Comparison for Anomaly Based Intrusion Detection System on CIDDS-002 Dataset 基于CIDDS-002数据集的异常入侵检测系统集成方法分类器比较
Ainurrochman, A. Nugroho, Raditia Wahyuwidayat, Santi Tiodora Sianturi, Muhamad Fauzi, M. Ramadhan, B. Pratomo, A. M. Shiddiqi
With the rapid development of information technology, the network has been everywhere. This technology has brought a lot of convenience to people, but there are also some security problems. To solve these problems, many methods have been proposed, among which is intrusion detection. A lot of research has been done to find the most effective Intrusion Detection Systems. In term of detecting novel attacks, Anomaly-Based Intrusion Detection Systems has better significance than Misuse-Based Intrusion Detection Systems. The research on the datasets being used for training and testing purposes in the detection model is as important as the model. Better dataset quality can improve intrusion detection model results. This research presents the statistical analysis of labeled flow-based CIDDS-002 dataset using ensemble methods classifier. The analysis is done concerning some prominent evaluation metrics used for evaluating Intrusion Detection Systems including Detection Rate, Accuracy, and False Positive Rate. As a result, the accuracy of the Bagging (Decision Tree) is 99.71% and Bagging (Gaussian Naïve Bayes) is 67.57%.
随着信息技术的飞速发展,网络已经无处不在。这项技术给人们带来了很多便利,但也存在一些安全问题。为了解决这些问题,人们提出了许多方法,入侵检测就是其中之一。为了找到最有效的入侵检测系统,人们进行了大量的研究。在检测新型攻击方面,基于异常的入侵检测系统比基于误用的入侵检测系统更有意义。对检测模型中用于训练和测试目的的数据集的研究与模型一样重要。更好的数据集质量可以改善入侵检测模型的结果。本研究利用集成方法对基于标记流的CIDDS-002数据集进行统计分析。分析了入侵检测系统的主要评价指标,包括检测率、准确率和误报率。因此,Bagging(决策树)的准确率为99.71%,Bagging(高斯Naïve贝叶斯)的准确率为67.57%。
{"title":"Ensemble Methods Classifier Comparison for Anomaly Based Intrusion Detection System on CIDDS-002 Dataset","authors":"Ainurrochman, A. Nugroho, Raditia Wahyuwidayat, Santi Tiodora Sianturi, Muhamad Fauzi, M. Ramadhan, B. Pratomo, A. M. Shiddiqi","doi":"10.1109/ICTS52701.2021.9608714","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608714","url":null,"abstract":"With the rapid development of information technology, the network has been everywhere. This technology has brought a lot of convenience to people, but there are also some security problems. To solve these problems, many methods have been proposed, among which is intrusion detection. A lot of research has been done to find the most effective Intrusion Detection Systems. In term of detecting novel attacks, Anomaly-Based Intrusion Detection Systems has better significance than Misuse-Based Intrusion Detection Systems. The research on the datasets being used for training and testing purposes in the detection model is as important as the model. Better dataset quality can improve intrusion detection model results. This research presents the statistical analysis of labeled flow-based CIDDS-002 dataset using ensemble methods classifier. The analysis is done concerning some prominent evaluation metrics used for evaluating Intrusion Detection Systems including Detection Rate, Accuracy, and False Positive Rate. As a result, the accuracy of the Bagging (Decision Tree) is 99.71% and Bagging (Gaussian Naïve Bayes) is 67.57%.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"1 1","pages":"62-67"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82077470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
News Verification using Ethereum Smart Contract and Inter Planetary File System (IPFS) 使用以太坊智能合约和星际文件系统(IPFS)进行新闻验证
Haekal Febriansyah Ramadhan, Fandi Aditya Putra, R. F. Sari
News is a form of information sharing that tells the people about current event that is happening. With the advancement of technologies, the rate of spreading of the news is also increasing. One of the most popular places to read news is through the Internet. However, most of the people that read news from the Internet is not aware about the news sources. This leads to the spread of some fake news in society. In this paper, we suggest a way to verify a news using Ethereum smart contract and IPFS. There are four entities that involved in the system, such as Journalist as the one that provides the news, Validator as the one that will rate the news, Ethereum Smart Contract that will store the data inside the blockchain, and IPFS that will store the news and giving hash code to be stored inside the blockchain. This paper also analyzed the cost required to run the function of the smart contract deployed. The result is that all of the Rating Functions cost the same. However, the News Submit Function is not. The difference is the bigger the news stored in the IPFS, the more expensive the cost required to run the function.
新闻是一种信息共享的形式,它告诉人们当前正在发生的事件。随着科技的进步,新闻的传播速度也在增加。最受欢迎的阅读新闻的地方之一是通过互联网。然而,大多数从互联网上阅读新闻的人并不知道新闻的来源。这导致了一些假新闻在社会上的传播。在本文中,我们提出了一种使用以太坊智能合约和IPFS来验证新闻的方法。系统中涉及四个实体,例如提供新闻的Journalist,对新闻进行评级的Validator,将数据存储在区块链中的以太坊智能合约,以及将存储新闻并给出哈希码存储在区块链中的IPFS。本文还分析了运行部署的智能合约功能所需的成本。结果是所有的评级函数的成本都是一样的。然而,新闻提交功能不是。不同之处在于IPFS中存储的新闻越大,运行该函数所需的成本就越高。
{"title":"News Verification using Ethereum Smart Contract and Inter Planetary File System (IPFS)","authors":"Haekal Febriansyah Ramadhan, Fandi Aditya Putra, R. F. Sari","doi":"10.1109/ICTS52701.2021.9608826","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608826","url":null,"abstract":"News is a form of information sharing that tells the people about current event that is happening. With the advancement of technologies, the rate of spreading of the news is also increasing. One of the most popular places to read news is through the Internet. However, most of the people that read news from the Internet is not aware about the news sources. This leads to the spread of some fake news in society. In this paper, we suggest a way to verify a news using Ethereum smart contract and IPFS. There are four entities that involved in the system, such as Journalist as the one that provides the news, Validator as the one that will rate the news, Ethereum Smart Contract that will store the data inside the blockchain, and IPFS that will store the news and giving hash code to be stored inside the blockchain. This paper also analyzed the cost required to run the function of the smart contract deployed. The result is that all of the Rating Functions cost the same. However, the News Submit Function is not. The difference is the bigger the news stored in the IPFS, the more expensive the cost required to run the function.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"33 1","pages":"96-100"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80020788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
e-Detect: Non-User Mask Detection Based on Image Processing Using Convolutional Neural Network Method e-Detect:基于卷积神经网络方法的图像处理的非用户掩码检测
R. W. Tri Hartono, Nadya Sarah, Regina Nur Shabrina, Evan Lokajaya
The COVID-19 pandemic is a situation that spreads the disease caused by the corona virus. One of the efforts to prevent the spread of the virus from one person to another is by requiring everyone to wear a face mask, especially for those in public areas. There have been several similar previous studies, however, none of them accompanied by follow-up, if someone is found without a face mask. The purpose of this research is to make a detector called e-Detect to detect visitors in public areas such as supermarkets, hospitals, schools and other similar places that without wearing a face mask (non-user face mask) uses the Convolutional Neural Network (CNN) method. If e-Detect detects non-user face mask who will enter through the gate of a public area without wearing face mask, the gate will not open, the buzzer will sound, and the visitor's photo will be sent to the security guard via telegram as a notification. The gate is only open when visitors wear face masks. Experiments have been carried out using 17 types of masks with percentages of: accuracy 94%, precision 100%, sensitivity 94.11%, specificity 100%, and error rate is 5.56%. A trial on e-Detect ability, show in the experiment range detection distance using any type of mask, which is 175 centimeters. All visitors who come to public areas through the gate that has been installed e-Detect can be ensured that the visitor's face will not be more than 175 cm apart, thus all visitors can be ensured to be well supervised. Based on this data, it can be said that e-Detect is feasible to be produced and used as an effort to prevent the spread of COVID-19.
COVID-19大流行是由冠状病毒引起的疾病传播的情况。防止病毒在人与人之间传播的努力之一是要求每个人都戴口罩,特别是在公共场所。然而,之前有几项类似的研究,如果发现有人没有戴口罩,都没有随访。本研究的目的是制作一种名为e-Detect的检测器,使用卷积神经网络(CNN)方法检测在超市、医院、学校等公共场所不戴口罩(非用户口罩)的访客。如果e-Detect检测到未戴口罩的非用户从公共区域的大门进入,大门将不打开,蜂鸣器将发出声音,并将访客的照片通过电报发送给保安作为通知。只有游客戴上口罩,大门才会开放。采用17种口罩进行实验,准确度为94%,精密度为100%,灵敏度为94.11%,特异度为100%,错误率为5.56%。对e-Detect能力进行了试验,在实验中显示使用任意类型掩模的探测距离为175厘米。所有通过安装了e-Detect的大门进入公共区域的游客,可以确保游客的脸不会超过175厘米的距离,从而确保所有游客都能得到很好的监督。基于这些数据,可以说e-Detect作为防止COVID-19传播的努力是可行的。
{"title":"e-Detect: Non-User Mask Detection Based on Image Processing Using Convolutional Neural Network Method","authors":"R. W. Tri Hartono, Nadya Sarah, Regina Nur Shabrina, Evan Lokajaya","doi":"10.1109/ICTS52701.2021.9608120","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9608120","url":null,"abstract":"The COVID-19 pandemic is a situation that spreads the disease caused by the corona virus. One of the efforts to prevent the spread of the virus from one person to another is by requiring everyone to wear a face mask, especially for those in public areas. There have been several similar previous studies, however, none of them accompanied by follow-up, if someone is found without a face mask. The purpose of this research is to make a detector called e-Detect to detect visitors in public areas such as supermarkets, hospitals, schools and other similar places that without wearing a face mask (non-user face mask) uses the Convolutional Neural Network (CNN) method. If e-Detect detects non-user face mask who will enter through the gate of a public area without wearing face mask, the gate will not open, the buzzer will sound, and the visitor's photo will be sent to the security guard via telegram as a notification. The gate is only open when visitors wear face masks. Experiments have been carried out using 17 types of masks with percentages of: accuracy 94%, precision 100%, sensitivity 94.11%, specificity 100%, and error rate is 5.56%. A trial on e-Detect ability, show in the experiment range detection distance using any type of mask, which is 175 centimeters. All visitors who come to public areas through the gate that has been installed e-Detect can be ensured that the visitor's face will not be more than 175 cm apart, thus all visitors can be ensured to be well supervised. Based on this data, it can be said that e-Detect is feasible to be produced and used as an effort to prevent the spread of COVID-19.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"61 1","pages":"271-276"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84559968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Text Summarization using Maximum Marginal Relevance for Health Ethics Protocol Document in Bahasa 基于最大边际相关性的卫生伦理协议文件自动文本摘要
Doni Putra Purbawa, Malikhah, Ratih Nur Esti Anggraini, R. Sarno
The rapid development of science and technology in the health sector cannot be separated from the support of health research results. Before the research with human as a subject is conducted, every health research in Indonesia is required to make a health ethics protocol document in Bahasa which must comply with basic ethical principles. To determine whether the health research ethics protocol document has met the ethical principles, the health research ethics protocol document will be reviewed by a competent reviewer. The health research ethics protocol document consists of several parts and has a large number of pages, so to conduct a review, reviewers need a long time to understand and analyze the health research ethics protocol document. To reduce the review time, an automatic text summarization (ATS) is needed. ATS extracts important information in health research ethics protocol documents and presents it to reviewers. This research uses cosine similarity and Maximum Marginal Relevance (MMR) and TextRank to summarize the document. The MMR method is considered to have more stable results than TextRank based on the ROUGE evaluation results. The evaluation of result with the ROUGE Toolkit showed F-score value of 19.92% for document 1 and 10.98% for document 2 using MMR.
卫生科学技术的快速发展离不开卫生研究成果的支持。在进行以人类为研究对象的研究之前,印度尼西亚的每项卫生研究都必须制定一份卫生伦理协议文件,该文件必须符合基本的伦理原则。为确定卫生研究伦理方案文件是否符合伦理原则,卫生研究伦理方案文件将由有资格的审稿人进行审查。卫生研究伦理协议文件由几个部分组成,并且有大量的页面,因此要进行审查,审稿人需要很长时间来理解和分析卫生研究伦理协议文件。为了减少复习时间,需要自动文本摘要(ATS)。ATS从卫生研究伦理协议文件中提取重要信息并提交给审稿人。本研究使用余弦相似度和最大边际相关性(MMR)和TextRank来总结文档。基于ROUGE评价结果,MMR方法被认为比TextRank方法具有更稳定的结果。ROUGE Toolkit对结果的评价显示,MMR对文献1和文献2的f评分值分别为19.92%和10.98%。
{"title":"Automatic Text Summarization using Maximum Marginal Relevance for Health Ethics Protocol Document in Bahasa","authors":"Doni Putra Purbawa, Malikhah, Ratih Nur Esti Anggraini, R. Sarno","doi":"10.1109/ICTS52701.2021.9607951","DOIUrl":"https://doi.org/10.1109/ICTS52701.2021.9607951","url":null,"abstract":"The rapid development of science and technology in the health sector cannot be separated from the support of health research results. Before the research with human as a subject is conducted, every health research in Indonesia is required to make a health ethics protocol document in Bahasa which must comply with basic ethical principles. To determine whether the health research ethics protocol document has met the ethical principles, the health research ethics protocol document will be reviewed by a competent reviewer. The health research ethics protocol document consists of several parts and has a large number of pages, so to conduct a review, reviewers need a long time to understand and analyze the health research ethics protocol document. To reduce the review time, an automatic text summarization (ATS) is needed. ATS extracts important information in health research ethics protocol documents and presents it to reviewers. This research uses cosine similarity and Maximum Marginal Relevance (MMR) and TextRank to summarize the document. The MMR method is considered to have more stable results than TextRank based on the ROUGE evaluation results. The evaluation of result with the ROUGE Toolkit showed F-score value of 19.92% for document 1 and 10.98% for document 2 using MMR.","PeriodicalId":6738,"journal":{"name":"2021 13th International Conference on Information & Communication Technology and System (ICTS)","volume":"31 1","pages":"324-329"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79368177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 13th International Conference on Information & Communication Technology and System (ICTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1