2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)最新文献

筛选
英文 中文
Analysis of E-Commerce using Technology Acceptance Model and Its Interaction with Risk, Enjoyment, Compatibility Variables 电子商务技术接受模型分析及其与风险、享受、兼容变量的交互作用
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982436
M. I. Setiyadi, B. B. Mangiwa, D. Nugraheni
{"title":"Analysis of E-Commerce using Technology Acceptance Model and Its Interaction with Risk, Enjoyment, Compatibility Variables","authors":"M. I. Setiyadi, B. B. Mangiwa, D. Nugraheni","doi":"10.1109/ICICoS48119.2019.8982436","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982436","url":null,"abstract":"Electronic commerce provides a business method with unprecedented capabilities where customers are able to make personal contact with an information system or web retailer through their web browser [1]. One types of C2C commerce is e- marketplace. E-marketplace users experience growth as internet users increase. Technology acceptance analysis is carried out to determine the factors that influence in using e-marketplace. The Technology Acceptance Model (TAM) is used as a basis for research and added with the perceived enjoyment, perceived risk and compatibility variables that can strengthen the model and to devise the factors that affect technology acceptance. The model was tested with 174 respondent which are student. This study's results are perceived enjoyment, perceived usefulness and compatibility influences the user motive to use e-marketplace. While, perceived risk and perceived ease of use have no effect.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Optimum Clustered Grid-Based Particle Swarm Optimization to Enhance Efficiency Energy in Wireless Sensor Networks 基于最优聚类网格的粒子群算法提高无线传感器网络的效率和能量
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982414
Kun Nursyaiful Priyo Pamungkas, W. Wibisono, S. Djanali
{"title":"An Optimum Clustered Grid-Based Particle Swarm Optimization to Enhance Efficiency Energy in Wireless Sensor Networks","authors":"Kun Nursyaiful Priyo Pamungkas, W. Wibisono, S. Djanali","doi":"10.1109/ICICoS48119.2019.8982414","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982414","url":null,"abstract":"Wireless sensor nodes are small but heavy-duty devices. This small device is tasked with monitoring and measuring environmental conditions with limited resources. The main problem is the limited battery capacity. While changing batteries or recharging is not possible routinely. Clustering is a technique that can be utilized to overcome problems in wireless sensor networks effectively. However, to set the optimal amount of clusters and to select the optimal cluster heads (CH) are non-deterministic polynomial-time hard (NP-hard) problem. Optimum Clustered Grid-Based (OCGB) protocol proposed in order to enhance energy efficiency and to protract the working time of sensor nodes. At the beginning operating time, OCGB splits network area into grids. At the next step, OCGB set the optimal amount of clusters in every grid. Furthermore, the OCGB utilizes the Particle swarm optimization (PSO) for forming clusters and selecting the optimal CHs. Evaluation is performed with MATLAB and compared with other protocols, namely LEACH. Simulation results present that our proposed protocol OCGB has better performance in terms of energy efficiency and network lifetime compared to LEACH protocol.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Snake Fruit Classification by Using Histogram of Oriented Gradient Feature and Extreme Learning Machine 基于定向梯度特征直方图和极限学习机的蛇果分类
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982528
Rismiyati, H. A. Wibawa
{"title":"Snake Fruit Classification by Using Histogram of Oriented Gradient Feature and Extreme Learning Machine","authors":"Rismiyati, H. A. Wibawa","doi":"10.1109/ICICoS48119.2019.8982528","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982528","url":null,"abstract":"Snake fruit, or most famous as Salak, is Indonesian local fruit. Salak is also one of fruit commodity from Indonesia. To perform export on Salak, rigid sortation is performed. The sortation is usually done manually. This study will implement digital image processing technique to differentiate Salak quality for export purpose. Salak sample were taken from Magelang district, one of the largest Salak producer. The feature used in this study is Histogram of Oriented Gradient. The classification used is Extreme Learning Machine (ELM). It is shown in this study that by using ELM, the highest accuracy can be achieved is 95%. A comparison classifier, SVM, is also used in this study. In this case SVM is able to achieve highest accuracy of 97.3%, which is still higher than ELM result","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124415732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Twitter Buzzer Detection for Indonesian Presidential Election 印尼总统选举的推特蜂鸣器检测
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982529
Andi Suciati, A. Wibisono, P. Mursanto
{"title":"Twitter Buzzer Detection for Indonesian Presidential Election","authors":"Andi Suciati, A. Wibisono, P. Mursanto","doi":"10.1109/ICICoS48119.2019.8982529","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982529","url":null,"abstract":"The campaign that was done in social media has high correlation to the supporters who disseminating the information deliberately, which called as buzzer. However, data that were generated by buzzer accounts can be considered as noise and need to be removed. In this research we performed task for detecting the buzzer accounts in Twitter by observing the impact of features we used which we selected based on their Mutual Information scores. We examined the performance of four machine learning algorithms which are Ada Boost (AB), Gradient Boosting (GB), Extreme Gradient Boosting (XGB), and Histogram-based Gradient Boosting (HGB). The algorithms were evaluated using 10 folds cross validation and the results show that the best accuracy and precision achieved by AB which are 62.3% and 61.3% respectively with 25 features while the recall attained by XGB (67.9%) which the score same with its recall result with 20 features.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Acquiring Domain Knowledge for Cardiotocography: A Deep Learning Approach 获取心脏造影领域知识:一种深度学习方法
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982397
Priyamvada Pushkar Huddar, S. Sontakke
{"title":"Acquiring Domain Knowledge for Cardiotocography: A Deep Learning Approach","authors":"Priyamvada Pushkar Huddar, S. Sontakke","doi":"10.1109/ICICoS48119.2019.8982397","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982397","url":null,"abstract":"Infant cardiac distress is the leading cause of neonatal deaths in the world. Cardiotocography (CTG) is a diagnostic tool used for recording fetal heartbeat and uterine contractions during pregnancy to determine cardiac distress. To avoid the need of continuous monitoring by on-site medical personnel, researchers have been working on several machine learning tools to automate the process. Most of these approaches discover statistical trends in data to predict target variables. However, being reliant on these trends makes them prone to overfitting and other statistical perils. In this paper, we demonstrate the usage of a modified deep neural network to learn about 2 seemingly disjointed tasks in the field of cardiotocography. The proposed model acquires predictive power in one task whilst being trained on a separate yet related task in the same field. Further, it establishes that regularization facilitates the sharing of knowledge across tasks. The resulting model mimics the human learning process by demonstrating the ability to acquire domain knowledge.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering of Districts in Indonesia using the 2015 High School Social Sciences National Examination Results 使用2015年高中社会科学国家考试结果对印度尼西亚地区进行聚类
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982524
R. Ferdhiana, K. Amri, T. Abidin
{"title":"Clustering of Districts in Indonesia using the 2015 High School Social Sciences National Examination Results","authors":"R. Ferdhiana, K. Amri, T. Abidin","doi":"10.1109/ICICoS48119.2019.8982524","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982524","url":null,"abstract":"This study aims to cluster 513 districts in Indonesia using the results of High School National Examination or “Ujian Nasional (UN)” in Indonesian language majoring in social sciences to map the learning outcomes in the districts. The attributes consist of 6 subjects which are Bahasa Indonesia, English, Mathematics, Economics, Sociology, and Geography. The clustering methods used are Complete-linkage and K-Means. The clustering results are compared with the District Human Development Index (HDI) of the clusters. The results show that the districts in Indonesia are grouped into 5 clusters and there is a slight dissimilarity between the scores of UN and HDI.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129437446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Layered Encryption Method 多层加密方法
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982407
Usman Sudibyo, Cinantya Paramita
{"title":"Multi-Layered Encryption Method","authors":"Usman Sudibyo, Cinantya Paramita","doi":"10.1109/ICICoS48119.2019.8982407","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982407","url":null,"abstract":"Information is categorized as precious thing when only current specific people have the opportunity to gain it, or it is so called confidential. Confidential information is secure if it contains Cryptograph method which contains process of encryption and decryption since their function is to present data and to process it into confidential information. The aim is to keep the information confidential for current people, and they are the ones who can understand and reveal the information. The multi-layered encryption process itself makes the level of difficulties in analysing the information hard to predict. According to that, this process is best applied on securing information which contains alphabetic on plaintext. The quality of multilayered encryption is evaluated with avalanche effect parameter which results value 34% in which a bit variation on a plaintext keeps the consistent of an encryption. Aftermath comparison to the method layer of multi-layered encryption avalanche effect it produce values lower at 33% obtained by change the structure decryption is being encryption layer.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132900775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Model for Human Anatomy Learning Based Augmented Reality on Marker Puzzle 3D Printing 基于标记谜题3D打印增强现实的人体解剖学学习概念模型
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982471
W. Hidayat, A. E. Permanasari, P. Santosa, N. Arfian, L. Choridah
{"title":"Conceptual Model for Human Anatomy Learning Based Augmented Reality on Marker Puzzle 3D Printing","authors":"W. Hidayat, A. E. Permanasari, P. Santosa, N. Arfian, L. Choridah","doi":"10.1109/ICICoS48119.2019.8982471","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982471","url":null,"abstract":"Learning medicine not only requires students to master a variety of abilities but also must follow some doctoral standards. In general, the learning process within the Faculty of Medicine students is still conducted by using cadaver. However, several obstacles were encountered when using that media. To overcome the limitations, the use of Augmented Reality (AR) technology has become a medium used for learning. A systematic review method of the study and research of human anatomy on AR in the field of medicine is presented. Based on this review, a model for developing human anatomy learning media using AR that uses 3D printing object marker puzzles was created. The concept model is expected to be able to overcome some of the problems. Potential challenges in developing human anatomy learning models using 3D printing puzzle markers present more specific information and location of a part of human anatomy.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132985169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Convolutional Adversarial Network-Based Feature Learning for Tea Clones Identifications 基于深度卷积对抗网络的茶叶克隆识别特征学习
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982416
Endang Suryawati, Vicky Zilvan, R. S. Yuwana, A. Heryana, D. Rohdiana, H. Pardede
{"title":"Deep Convolutional Adversarial Network-Based Feature Learning for Tea Clones Identifications","authors":"Endang Suryawati, Vicky Zilvan, R. S. Yuwana, A. Heryana, D. Rohdiana, H. Pardede","doi":"10.1109/ICICoS48119.2019.8982416","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982416","url":null,"abstract":"Tea is a commodity has a strategic role in the Indonesian economy. The cultivation of tea plants becomes very important in order to maintain the superior commodity, with respect to increase the production and/or improve the quality of tea. In a tea plantation management system, it is essential to identify the types of tea clones planted in the field. But, it requires human experts to distinguish one types of clones with another. The existence of an automatic clones identification is expected to make the identification easy, fast, accurate, and easily accessible for common farmers. In this work, we propose an unsupervised feature learning algorithm derived from Deep Convolutional Generative Adversarial Network (DCGAN) for automatic tea clone identification. The use of unsupervised learning enable us to utilize unlabeled data. Our experiments suggest the effectiveness of our method for tea clones detection task.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Feature Extraction using Self-Supervised Convolutional Autoencoder for Content based Image Retrieval 基于内容的图像检索中基于自监督卷积自编码器的特征提取
2019 3rd International Conference on Informatics and Computational Sciences (ICICoS) Pub Date : 2019-10-01 DOI: 10.1109/ICICoS48119.2019.8982468
I. Siradjuddin, Wrida Adi Wardana, M. K. Sophan
{"title":"Feature Extraction using Self-Supervised Convolutional Autoencoder for Content based Image Retrieval","authors":"I. Siradjuddin, Wrida Adi Wardana, M. K. Sophan","doi":"10.1109/ICICoS48119.2019.8982468","DOIUrl":"https://doi.org/10.1109/ICICoS48119.2019.8982468","url":null,"abstract":"This paper presents Autoencoder using Convolutional Neural Network for feature extraction in the Content-based Image Retrieval. Two type of layers are in the convolutional autoencoder architecture, they are encoder and decoder layer. The encoder layer extracts the important representation of the image using feature learning capability of the convolutional neural network, and reduces the dimension of the image. The decode layer reconstructs the representation, such that, the output of the autoencoder is close to the input data. The important representation of the image from the encoder layer in convolutional autoencoder, is used as the extracted features in the content-based image retrieval. Similarity distance between the extracted feature of the query image and the database is calculated to retrieve relevant images. The images in Corel dataset are used for the experiment and tested using the proposed model. The experiments show that the extracted features are representable for the images, and can be used to retrieve relevant images in the content-based image retrieval.","PeriodicalId":105407,"journal":{"name":"2019 3rd International Conference on Informatics and Computational Sciences (ICICoS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124765059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信