2022 International Conference on ICT for Smart Society (ICISS)最新文献

筛选
英文 中文
Implication of Low-Code Development Platform on Use Case Point Methods 低代码开发平台对用例点方法的启示
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915166
Abdurrasyid, M. Susanti, Indrianto
{"title":"Implication of Low-Code Development Platform on Use Case Point Methods","authors":"Abdurrasyid, M. Susanti, Indrianto","doi":"10.1109/ICISS55894.2022.9915166","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915166","url":null,"abstract":"Low-Code Development Platform (LCDP) is a digital platform that provides a variety of applications that can be used to develop software very quickly by eliminating the efforts of traditional programming methods. The development of this technology is an evolution of the fourth-generation language, opening opportunities for research by making LCDP a tool that can be applied in various fields. The Use Case Point method is one of the algorithmic methods that are widely used in estimating software development, this method uses the use case where use cases are very often used in performing software design as the main tool in measuring how much effort is needed to develop software, in this paper try to test whether the use case point method is accurate to estimate software development with LCDP, testing is carried out on the development of letter management applications using LCDP testing It was done using two methods, namely Mean Magnitude of Relative Error (MMRE) and Mean Magnitude of Error Relative (MMER) the findings of this study show MMRE of 3,57 and MMER of 0.78, in this case the use case point method is inaccurate for software development using a low-code development platform.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128277747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Morph Detection: A Systematic Review 人脸形态检测:系统综述
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915233
Rezza Fauzy Sucipto, F. Hidayat
{"title":"Face Morph Detection: A Systematic Review","authors":"Rezza Fauzy Sucipto, F. Hidayat","doi":"10.1109/ICISS55894.2022.9915233","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915233","url":null,"abstract":"Biometric verification especially faces recognition has been widely applied in daily life, including in immigration. Face recognition is used for identification verification in passport identities. But there is a security threat in face recognition, which is called face morph. Face morph is the combination of the passport applicant's face image with the face image of another subject to produce a face image similar to the face of the applicant's passport document by covering the facial features of the other subject. It can cause serious problems if misused by people listed on the blacklist. Blacklists are people who are subject to immigration restrictions such as suspension of passport issuance, inclusion on the prevention list, and inclusion on the deterrence list. So that the person listed on the blacklist can have a passport to then cross the border out of Indonesian territory which can cause problems and disturb the country's sovereignty. This research uses the Systematic Literature Review (SLR) method to collect and analyze previous studies related to the research topic. The result of this research is to get the method and trend of face morph detection. Detection of face morphs is generally divided into 2 scenarios, i.e., single image-based and differential image-based. The detection method for single image-based is divided into texture, quality, noise, deep learning, and hybrid, while the detection method for differential image-based is divided into feature difference and demorphing. So, with face morph detection, it is expected to be able to increase the security of passport documents and increase security at immigration checkpoints.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Innovation and Local Initiatives as Part of Smart Society: Case Study of Urban Kampongs in Semarang and Batam Smart Cities 作为智慧社会一部分的社会创新和地方倡议:三宝垄和巴淡岛智慧城市城市甘榜案例研究
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915110
Henny Warsilah, Y. Pramadi, Rusydan Fathy, P. Hananto, G. Indraprahasta
{"title":"Social Innovation and Local Initiatives as Part of Smart Society: Case Study of Urban Kampongs in Semarang and Batam Smart Cities","authors":"Henny Warsilah, Y. Pramadi, Rusydan Fathy, P. Hananto, G. Indraprahasta","doi":"10.1109/ICISS55894.2022.9915110","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915110","url":null,"abstract":"Many cities in Indonesia have adopted the smart city concept. Centered around the utilization of digital technology, the concept is expected to address a multitude of urban problems and entail different aspects of urban systems. One important aspect of a smart city is smart people/society. In this paper, our aim is to highlight social innovation, and local initiatives, which we argue as two notable characteristics of smart society, in urban kampongs in two Indonesian cities, Semarang and Batam. We believe that a city cannot be smart by just relying on the physical infrastructure and technological artifacts without the support of its communities. Social innovation and local initiatives were thus investigated to uncover the bottom-up process in Indonesia's smart city co-creation. Additionally, we highlight a particular urban place that tends to be overlooked in the smart city discussion, i.e., urban kampong, to bring up urban diversity. The novelty of this paper is to analyze the concept of smart people, which must be attached to the concept of a smart city. Because there are still few articles that discuss the importance of smart people. In this paper, smart people will be seen from social innovations and local initiatives from residents in urban kampongs. In this research, we mainly used primary data collected through focused group discussions and in-depth interviews.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"207 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GreenSoal:Illegal Tree Logging Detection System Using IOT GreenSoal:使用物联网的非法采伐检测系统
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915139
H. Bandaranayake, D.M.M.Y.P. Mahamohottala, W. Wijekoon, K.M.V.T. Sandakelum, N. Gamage, Windhya Rankothge
{"title":"GreenSoal:Illegal Tree Logging Detection System Using IOT","authors":"H. Bandaranayake, D.M.M.Y.P. Mahamohottala, W. Wijekoon, K.M.V.T. Sandakelum, N. Gamage, Windhya Rankothge","doi":"10.1109/ICISS55894.2022.9915139","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915139","url":null,"abstract":"Illegal logging causes widespread deforestation. Global consequences. Controlling when, where, and how illegal actions occur would help protect trees and decrease deforestation. Because people don't know this, illicit logging is hard to remove. This can be reduced by monitoring protected forests. In protected woods, wireless sensor networks and neural networks can detect chainsaw and human sounds. We also offer sound source detection. The proposed system was able to distinguish noises emanating from a range of 30 meters, detect the position of the sounds to within 180 degrees, and communicate its generated message to authorities by using a proposed wireless transmission protocol on a hop-to-hop system. Proposed machine learning model performs at above 93% accuracy.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134442749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predictive Maintenance on Railway Turnout System: A Systematic Literature Review 铁路道岔系统预见性维修:系统文献综述
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915046
Zastra Alfarezi Pratama, F. Hidayat
{"title":"Predictive Maintenance on Railway Turnout System: A Systematic Literature Review","authors":"Zastra Alfarezi Pratama, F. Hidayat","doi":"10.1109/ICISS55894.2022.9915046","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915046","url":null,"abstract":"Train passengers in Indonesia reached 453 million in 2019. That fact shows that train use is in high demand in Indonesia. Therefore, railway operational equipment availability must be considered to ensure service quality. Signaling equipment plays a critical role in the safety and sustainability of railway operations. The turnout system is the most critical railway signaling equipment because faults and failures in the turnout system cause impact such as delay, collision, and train wheels out from the track. Maintenance activity is required to ensure equipment availability. The maintenance strategy needed is a strategy that can ensure availability before failure occurs, reduce costs, and also improve safety. Predictive maintenance (PdM) is a maintenance strategy that can detect failure and fault equipment while finding the remaining useful life of equipment as an early warning. However, a literature review is needed to understand the concept and strategy of PdM for implementation on railway equipment. Therefore, a systematic literature review was conducted on 40 research articles based on four research questions. This study reviews and presents research trends involving turnout systems based on the scope of predictive maintenance in the railway industry. The results of this study show that several steps must be carried out before predictive maintenance. In addition, this study discusses what parameters can be used, what components can be predicted, what infrastructure can be utilized, and what predictive methods can be used.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
O-RAN Intelligent Application for Cellular Mobility Management O-RAN在蜂窝移动管理中的智能应用
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915221
Baud Haryo Prananto, Iskandar, A. Kurniawan
{"title":"O-RAN Intelligent Application for Cellular Mobility Management","authors":"Baud Haryo Prananto, Iskandar, A. Kurniawan","doi":"10.1109/ICISS55894.2022.9915221","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915221","url":null,"abstract":"Machine Learning (ML) is gaining a more important role in cellular networks. Mobility management can be improved using ML due to its complexity and criticality to network performance. Managing mobility while maintaining the network connection is very important because the user's movement may disrupt their data transmission. In some cases, the traditional mobility management algorithm is not reliable enough. Here is where ML may provide a more intelligent mobility management algorithm. ML implementation in the cellular network requires a major modification in the network element software logic and architecture. This may cause difficulties in real-world implementation. Open Radio Access Network (O-RAN) consortium provides a modular solution to implement ML algorithms by adding an optional Radio Intelligent Controller (RIC) to host the intelligent application without major modification to the existing network elements. Using this RIC, a lot of intelligent use cases can be implemented modularly in the network. In this paper, we prove that the ML algorithm can be used to improve mobility management in some particular cases. As the experiment results, we demonstrated that machine learning has superior performance compared to the traditional handover algorithm.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward an E-Learning Adoption: Student Perspectives 迈向电子化学习:学生的观点
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915113
Indriana, D. Alamsyah, N. Othman
{"title":"Toward an E-Learning Adoption: Student Perspectives","authors":"Indriana, D. Alamsyah, N. Othman","doi":"10.1109/ICISS55894.2022.9915113","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915113","url":null,"abstract":"The purpose of this study is to investigate the relationship between perceived ease of use, IT infrastructure, e-learning curriculum, educational partners and e-learning adoption. The research was conducted by surveying students who have implemented the concept of e-learning in the city of Bandung, where there were 151 students who provided data through an online questionnaire. Data from respondents was processed using SmartPLS by testing the Inner and Outer models and to confirm the results, the research hypothesis was tested. The results of the study were conveyed that there were two factors that were able to control student e-learning adoption, namely perceived ease of use and e-learning curriculum. Meanwhile, IT infrastructure and educational partners are not able to support the achievement of e-learning adoption. The research findings explain the factors of e-learning users who are able to support e-learning adoption. Information from research can be input for universities that have implemented the concept of e-learning so that e-learning goals can be achieved better.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Studying the Performance of Transfer Learning on CNN Models for Fruit Sorting 迁移学习在CNN水果分拣模型上的性能研究
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915244
Beauty Tatenda Tasara, Nunung Nurul Qomariyah
{"title":"Studying the Performance of Transfer Learning on CNN Models for Fruit Sorting","authors":"Beauty Tatenda Tasara, Nunung Nurul Qomariyah","doi":"10.1109/ICISS55894.2022.9915244","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915244","url":null,"abstract":"The field of computer vision has made some significant breakthroughs in the past years one of which has led to convolutional neural networks (CNN) being state-of-the-art algorithms for computer vision tasks. This breakthrough led to the development of different types of CNN architectures by researchers. These CNNs are typically evaluated on the popular ImageNet competition thus making it the benchmark for performance analysis of CNNs. This research leverage some of the popular pre-trained models; MobilenetV3-small, Resnet50, and VGG-16 for the classification(sorting) of fruit images according to their appearance. The models are fine tuned to obtain the best performing model to solve the fruit sorting problem which consumes a lot of resources in the form of labor, time, and finance. The results show that transfer learning can be successfully applied to sorting fruit and the model with outstanding performance is VGG16, followed by ResNe $t$ 50, and lastly MobilenetV3-small with an average accuracy of 95%, 76%, and 63% respectively. This research shows a comparative analysis of VGG-16, MobilenetV3-small, and Resnet50 of their performance during sorting. In addition, this research also investigates the performance of the model when the number of fruit classes is increased.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Natural Language Processing for Phishing Detection Using Machine and Deep Learning Models 使用机器和深度学习模型的自然语言处理在网络钓鱼检测中的应用
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915037
Alonica R. Villanueva, Christian Atibagos, Jericko De Guzman, John Carlo Dela Cruz, Menchie M. Rosales, Ryan Francisco
{"title":"Application of Natural Language Processing for Phishing Detection Using Machine and Deep Learning Models","authors":"Alonica R. Villanueva, Christian Atibagos, Jericko De Guzman, John Carlo Dela Cruz, Menchie M. Rosales, Ryan Francisco","doi":"10.1109/ICISS55894.2022.9915037","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915037","url":null,"abstract":"Phishing scams are internet frauds that target people by sending them harmful links. Many victims ranging from individuals to big companies, have suffered numerous losses due to phishing, highlighting the increasing need to effectively detect and prevent a phishing attack as soon as it is received. This paper applied machine and deep learning models to detect phishing attacks by natural language processing of Uniform Resource Locators. Machine learning algorithms such as Logistic Regression and Multi-Naive Bayes were used Uniform Resource Locators for classification of legitimate and phishing. Additionally, Long Term Short Memory, Gated Recurrent Units, and Bidirectional Recurrent Neural Networks were used as Deep Learning models. Two of the used models are Long Term Short Memory and Gated Recurrent Units models possess significantly high training and validation scores with an overall accuracy of 95%. The Bidirectional Recurrent Neural Net using Gated Recurrent Units and Bidirectional Recurrent Neural Net using LTSM shows 97% accuracy. Therefore, using multiple deep learning models to predict whether URLs are phishing or legitimate is a significant assistance in reviewing websites. Further research for other parameters aside from using Uniform Resource Locators with different deep learning models can be used to improve the accuracy of phishing detection.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serious Game Application Development for Learning Battle of Surabaya 学习《泗水之战》的严肃游戏应用开发
2022 International Conference on ICT for Smart Society (ICISS) Pub Date : 2022-08-10 DOI: 10.1109/ICISS55894.2022.9915076
Robinardo Ekariski Rinaldi, Marco Thomas Wihartono, Ryan Eka Dharmalim, Suharjito
{"title":"Serious Game Application Development for Learning Battle of Surabaya","authors":"Robinardo Ekariski Rinaldi, Marco Thomas Wihartono, Ryan Eka Dharmalim, Suharjito","doi":"10.1109/ICISS55894.2022.9915076","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915076","url":null,"abstract":"The main purpose of this research is to educate the society, especially those who are still in school about Indonesian history and to increase public interest to learn the history of Indonesia, especially the history of the battle of Surabaya which took place on November 10, 1945. Where in this game the player will play as an Indonesian warrior character who fights foreign soldiers. So that the authors make an android-based game that is an educational genre. This game is based on android, because currently android-based smartphones are easier to access. This study uses the Black-Box Testing evaluation method, where this evaluation method only uses the upper and lower limits as values to test functionality. The game engine used in the development of this game is “Unity” which helps writers to develop Indonesian historical games to make the learning process of Indonesian history can be learned more simply and in a more enjoyable way in the hope that public interest, especially those who are still in school can increase and encourage the interest of a wider society in accessing other educational games.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信