2020 8th International Conference on Information and Communication Technology (ICoICT)最新文献

筛选
英文 中文
ICoICT 2020 Committees icicict 2020委员会
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/icoict49345.2020.9166149
{"title":"ICoICT 2020 Committees","authors":"","doi":"10.1109/icoict49345.2020.9166149","DOIUrl":"https://doi.org/10.1109/icoict49345.2020.9166149","url":null,"abstract":"","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115593024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Based Road Vehicle Counter Using Ultrasound Sensor and Cross-Correlation Algorithm 基于超声传感器和相关算法的物联网道路车辆计数器
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166350
Deta Kurnia Soundra, M. Abdurohman, Aji Gautama Putrada
{"title":"IoT-Based Road Vehicle Counter Using Ultrasound Sensor and Cross-Correlation Algorithm","authors":"Deta Kurnia Soundra, M. Abdurohman, Aji Gautama Putrada","doi":"10.1109/ICoICT49345.2020.9166350","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166350","url":null,"abstract":"Traffic systems at this time have shown evolution as technology develops. Supported by a transportation system that is certainly sophisticated. The two systems are part of smart city that are applied in big cities. Basically, all communicate with each other to create an integrated smart city. However, the communication must be in real time domain so that all smart city components are connected. In this research case a vehicle counting system in real-time that can calculate vehicles passing on a road segment is designed. Applications used are ultrasound sensors, microcontrollers, and an Internet of Things Platform that are interconnected to monitor road conditions. Normalized Cross-Correlation algorithm is used to detect passing vehicles. The concept that Normalized Cross-Correlation algorithm is an algorithm to determine the similarity in two frequency signals is used to detect ultrasound frequencies created by cars passing by the sensor. The system will detect by comparing input data from ultrasound sensors by making sample data first then the sample data is compared with the data after the sample data. After that the correlation value will come out which has been normalized on a scale of 0–1.0. From applying normalized cross-correlation method the threshold for the calculation of the vehicle is determined, which is ¡0.70. This threshold is determined as the optimum value after various tests. After testing the method in real environment the error rate of the method in counting passing vehicles is 10.1%.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel Construction of Information Technology Value Model: Design-Science Research Methodology 信息技术价值模型的并行构建:设计科学研究方法论
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166214
L. Abdurrahman, T. Mulyana
{"title":"Parallel Construction of Information Technology Value Model: Design-Science Research Methodology","authors":"L. Abdurrahman, T. Mulyana","doi":"10.1109/ICoICT49345.2020.9166214","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166214","url":null,"abstract":"To date, the study model of IT value usually takes the form of a serial construction relating its components. This paper tries to offer a parallel construction in modeling the IT value study. The applied methodology is the design-science research approach to create the construction relating its components. To perfect the construct, the paper applies the partial adjustment valuation that functions as an estimating technique to approximate and evaluate the mathematical magnitude of the performing returns of a component compared to the real figures. The developed pattern undertakes a case study with Mandiri’s data, an Indonesian state-owned banking industry, shows that the estimated revenue of the parallel configuration has a deviation of only 0.28% when compared with the bank’s real revenue during the period 2004-2014. Thus, the parallel configuration may appear as the alternative configuration in the study of IT value as a result of its authenticity academically as well as pragmatically.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognizing Personality from Social Media Linguistic Cues: A Case Study of Brand Ambassador Personality 从社交媒体语言线索识别个性:品牌大使个性的个案研究
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166221
A. Alamsyah, Rafa Syafiq Bastikarana, A. R. Ramadhanti, S. Widiyanesti
{"title":"Recognizing Personality from Social Media Linguistic Cues: A Case Study of Brand Ambassador Personality","authors":"A. Alamsyah, Rafa Syafiq Bastikarana, A. R. Ramadhanti, S. Widiyanesti","doi":"10.1109/ICoICT49345.2020.9166221","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166221","url":null,"abstract":"The burgeoning need of a brand ambassador (BA) as a company representative begin to rise in recent year. The phenomena followed by the increase of method to select the most suitable BA. The universal way of selecting one appropriate ambassador is by understanding their personality, therefore, measurement of a BA personality considered as one way to characterize a company credibility. This research proposes to design a method of measuring the BA personality from their social media data in Bahasa Indonesia. We enrich the methodology to measure human personality using the ontology modeling approach. The ontology model constructed under the ngram language model which provides a rapid and effective way of measuring a BA personality. The results of a BA personality measurement allow the utilization to portray of how an ambassador represent their brand and interact with their customer.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management 基于可信管理的物联网对象安全防范Sybil攻击
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166162
Ridwan Hadiansyah, V. Suryani, Aulia Arif Wardana
{"title":"IoT Object Security towards the Sybil Attack Using the Trustworthiness Management","authors":"Ridwan Hadiansyah, V. Suryani, Aulia Arif Wardana","doi":"10.1109/ICoICT49345.2020.9166162","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166162","url":null,"abstract":"Internet of Things (IoT), commonly referred to a physical object connected to network, refers to a paradigm in information technology integrating the advances in terms of sensing, computation and communication to improve the service in daily life. This physical object consists of sensors and actuators that are capable of changing the data to offer the improvement of service quality in daily life. When a data exchange occurs, the exchanged data become sensitive; making them vulnerable to any security attacks, one of which, for example, is Sybil attack. This paper aimed to propose a method of trustworthiness management based upon the authentication and trust value. Once performing the test on three scenarios, the system was found to be capable of detecting the Sybil attack rapidly and accurately. The average of time to detect the Sybil attacks was 9.3287 seconds and the average of time required to detect the intruder object in the system was 18.1029 seconds. The accuracy resulted in each scenario was found 100% indicating that the detection by the system to Sybil attack was 100% accurate.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact Evaluation of Procedurally Content Generated Against Immersion Games Using ANOVA 利用方差分析对沉浸式游戏生成的程序内容进行影响评估
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166314
Hardianto Wibowo, Dimas Nurpratama, Wildan Suharso, A. E. Minarno, G. Wicaksono, D. Harmanto
{"title":"Impact Evaluation of Procedurally Content Generated Against Immersion Games Using ANOVA","authors":"Hardianto Wibowo, Dimas Nurpratama, Wildan Suharso, A. E. Minarno, G. Wicaksono, D. Harmanto","doi":"10.1109/ICoICT49345.2020.9166314","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166314","url":null,"abstract":"This article explains the study of the impact of procedurally content generated on immersion games and has the quality of experience playing games. Therefore, experimental studies have been conducted in which players play two different versions of the game, procedurally generated content and human design. Using the questionnaire game immersion to measure the quality of the playing experience and will be compared into two groups. While there is a difference in total immersive, one-way ANOVA statistical analysis is suggested to analyze immersive total results. However, the statistical results of one-way ANOVA are not inclusive. For this reason, one-way ANOVA will be compared with two-way ANOVA, so that it shows conclusive results based on the results of the analysis, P-Value value from the PCG game level and human design one-way ANOVA. From the participant’s human design and 0.38 from PCG participants.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Boost of Attribute-aware Semantic Segmentation via Data Augmentation for Driver Assistance 基于数据增强的驾驶员辅助属性感知语义分割性能提升
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166219
M. D. Sulistiyo, Yasutomo Kawanishi, Daisuke Deguchi, I. Ide, Takatsugu Hirayama, H. Murase
{"title":"Performance Boost of Attribute-aware Semantic Segmentation via Data Augmentation for Driver Assistance","authors":"M. D. Sulistiyo, Yasutomo Kawanishi, Daisuke Deguchi, I. Ide, Takatsugu Hirayama, H. Murase","doi":"10.1109/ICoICT49345.2020.9166219","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166219","url":null,"abstract":"This paper is an extension of our work in developing an attribute-aware semantic segmentation method which focuses on pedestrian understanding in a traffic scene. Recently, the trending topic of semantic segmentation has been expanded to be able to collaborate with the object’s attributes recognition task; Here, it refers to recognizing a pedestrian’s body orientation. The attribute-aware semantic segmentation can be more beneficial for driver assistance compared to the conventional semantic segmentation because it can provide a more informative output to the system. In this paper, we conduct a study of the data augmentation usage as an effort to enhance the performance of the attribute-aware semantic segmentation task. The experiments show that the proposed method in augmenting the training data is able to improve the model’s performance. We also demonstrate some of qualitative results and discuss the benefits to a driver assistance system.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram 基于WhatsApp和Telegram的网络入侵通知系统的设计与实现
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166228
A. Hakim, J. Rinaldi, Muhammad Yusuf Bambang Setiadji
{"title":"Design and Implementation of NIDS Notification System Using WhatsApp and Telegram","authors":"A. Hakim, J. Rinaldi, Muhammad Yusuf Bambang Setiadji","doi":"10.1109/ICoICT49345.2020.9166228","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166228","url":null,"abstract":"Network Intrusion Detection System (NIDS) can help administrators of a server in detecting attacks by analyzing packet data traffic on the network in real-time. If an attack occurs, an alert to the administrator is provided by NIDS so that the attack can be known and responded immediately. On the other hand, the alerts cannot be monitored by administrators all the time. Therefore, a system that automatically sends notifications to administrators in real-time by utilizing social media platforms is needed. This paper provides an analysis of the notification system built using Snort as NIDS with WhatsApp and Telegram as a notification platform. There are three types of attacks that are simulated and must be detected by Snort, which are Ping of Death attacks, SYN flood attacks, and SSH brute force attacks. The results obtained indicate that the system successfully provided notification in the form of attack time, IP source of the attack, source of attack port and type of attack in real-time.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fire Detection System Using Multi-Sensor Networks Based on Fuzzy Logic in Indoor Scenarios 基于模糊逻辑的室内多传感器网络火灾探测系统
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166416
F. Rachman, G. Hendrantoro, Wirawan
{"title":"A Fire Detection System Using Multi-Sensor Networks Based on Fuzzy Logic in Indoor Scenarios","authors":"F. Rachman, G. Hendrantoro, Wirawan","doi":"10.1109/ICoICT49345.2020.9166416","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166416","url":null,"abstract":"This paper presents the development of a fire detection system using a wireless multi-sensor network based on fuzzy logic rules. Until recently, the fire detection systems have been limited in the coverage area and installation of the device, so that the sensitivity of the sensor becomes limited indoor. This research proposes the use of multi-sensor system to detect indoor phenomena. The Fuzzy logic method is used to process data on multiple sensors and the cluster head (CH). The result of multi-sensor data processing is the condition level on the end device (ED). The test results show that the data processing using fuzzy logic for the measurements from distributed sensors reduces the data storage and computing complexity at the fusion center (FC). Fire detection application (FDA) displays the status condition (SC), where data sources from multi-sensor nodes are displayed as room conditions.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deterministic Approach of Indoor Room THz Multipath Channel Model 室内太赫兹多径信道模型的确定性方法
2020 8th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2020-06-01 DOI: 10.1109/ICoICT49345.2020.9166161
Dwi Cahyono, F. Sheikh, Thomas Kai ser
{"title":"Deterministic Approach of Indoor Room THz Multipath Channel Model","authors":"Dwi Cahyono, F. Sheikh, Thomas Kai ser","doi":"10.1109/ICoICT49345.2020.9166161","DOIUrl":"https://doi.org/10.1109/ICoICT49345.2020.9166161","url":null,"abstract":"The terahertz (THz) communications are predicted to be the next generation of wireless communication networks for the coming 5–10 years. Both the transmitter (TX) and receiver (RX) employ highly directive antennas to overcome the problem of high propagation as well as reflection losses in THz band frequencies. One of the primary objectives of this paper is to investigate the influence of multipath channels on transmission links in an indoor office environment with the raytracing technique for line-of-sight (LoS) scenario. Furthermore, it elaborates the angle of arrival (AoA) and angle of departure (AoD) considering the relative received power, angular power profile (APP), and time of arrival (ToA). The LoS path is at 230.2° in azimuth plane with angular power of -92.36 dB.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131428554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信