2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)最新文献

筛选
英文 中文
Compressive Sensing and Histogram Adaptive Fuzzy Image Steganography 压缩感知与直方图自适应模糊图像隐写
Yoga Adhy Nugraha, Irma Safitri, Ratri Dwi Atmaja
{"title":"Compressive Sensing and Histogram Adaptive Fuzzy Image Steganography","authors":"Yoga Adhy Nugraha, Irma Safitri, Ratri Dwi Atmaja","doi":"10.1109/ISRITI.2018.8864460","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864460","url":null,"abstract":"We proposed compressive sensing (CS) and histogram adaptive fuzzy (HAF) for the image steganography system. Based on our experiments, red layer is the best color layer for insertion with the acquisition of the average PSNR value of 36.15912 dB. While the best subband is in the high high or HH subband with an average PSNR value of 42,65717 dB. Meanwhile, the stego image has the highest PSNR value of 63,9643 dB. Our system can have BER = 0 and PSNR = 30.5574 dB by using the Barcode.bmp file as the message image. We have BER = 0.0122 with a measurement rate of 30%.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solar Cell-Wind Turbine Hybrid Generation as a Solution of the Energy Audit Analysis at Hospital 太阳能-风能混合发电作为医院能源审计分析的解决方案
Husein Mubarok, Wisnu Ananda Priyatama
{"title":"Solar Cell-Wind Turbine Hybrid Generation as a Solution of the Energy Audit Analysis at Hospital","authors":"Husein Mubarok, Wisnu Ananda Priyatama","doi":"10.1109/isriti.2018.8864384","DOIUrl":"https://doi.org/10.1109/isriti.2018.8864384","url":null,"abstract":"Energy audits have the purpose of obtaining electricity savings that are consumed without affecting the level of comfort in humans who occupy a building. An energy audit was conducted Panti Rapih Hospital Yogyakarta, where the results of the auditor provided various energy-saving opportunities that could be realized to achieve efficient energy use. In 2017, Panti Rapih Hospital Yogyakarta has an Energy Consumption Intensity (ECI) value of 195.731 kWh/m2/ year or in the category of a bit wasteful. So that a detailed audit process is needed which includes measurements of lux (level of lighting) and room temperature based on provisions, measurement of building load profiles, and analyzing energy saving opportunities to be provided. Energy saving opportunities that are recommended are only 2 systems, namely lighting and air conditioning (AC). Energy-saving opportunities provided include reduction of tool operating hours, reduction in the number of devices, use of Arduino-based lamps and PIR sensors, use of electronic ballasts in TL lamp types, use of MC22 refrigerants, use of LED lights as a whole, design of hybrid power plants (solar cell and wind turbine), and the use of the latest type of air conditioner (AC) inverter and energy saving. The total savings in electrical energy consumption from the overall energy saving opportunity action is 1,373,480.24 kWh/year. So getting the new Energy Consumption Intensity (ECI) value to 143.612 kWh/m2/year or into the efficient category. So that it can be seen the value of Energy Consumption Intensity (ECI) after the opportunity to save energy to 143.612 kWh/m2/ year and come to the efficient standard category.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Chatbot System for E-Commerce Assitance based on AIML 基于AIML的电子商务辅助智能聊天机器人系统
Arif Nursetyo, D. Setiadi, Egia Rosi Subhiyakto
{"title":"Smart Chatbot System for E-Commerce Assitance based on AIML","authors":"Arif Nursetyo, D. Setiadi, Egia Rosi Subhiyakto","doi":"10.1109/ISRITI.2018.8864349","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864349","url":null,"abstract":"Currently, the conventional market is starting to be replaced with many online markets. The tight online market competition demands excellent service from sellers to buyers, so many online stores provide full 24-hour service. This service certainly requires a lot of money if done manually. Chatbot can be used as a solution to automatically shop online. Then the bot must be able to provide an accurate and fast response. This study proposes an intelligent chatbot system based on Artificial Intelligence Markup Language (AIML) which can be used as an e-commerce assistant. This Chatbot is applied to the Telegram application. Input questions from users will be processed through three stages, namely, parsing, pattern matching and crawling data using AIML. In the AIML process, user requests are classified into three categories, namely general questions, calculations, and stock checks. Where the calculation request traps the order and payment process. Based on the results of 300 trials, the proposed method can answer all user requests well, with an average response time of 3.4 seconds.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library 基于Android的开源Cryptomator库实现微型加密算法(TEA)和高级加密标准(AES)算法的比较
Dani Budiyanto, Prasetyo Adi Wibowo Putro
{"title":"Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library","authors":"Dani Budiyanto, Prasetyo Adi Wibowo Putro","doi":"10.1109/ISRITI.2018.8864236","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864236","url":null,"abstract":"Android based open source cryptomator library is an open source library created by Skymatic and published on the cryptomator.org page. This library uses the AES algorithm which has good speed but in some studies it still has problems in code size. Based on the results of a study in 2015, the Tiny Encryption Algorithm (TEA) algorithm was stated to be lighter and requires less code size than AES. Therefore, this study will compare the performance of the implementation of the TEA and AES algorithm Android-based library for cryptomator. Based on the results of a comparative study, the performance of the TEA algorithm implementation is better than AES seen from two parameters of performance testing, namely execution time and throughput.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ISRITI 2018 Technical Program Committee ISRITI 2018技术计划委员会
{"title":"ISRITI 2018 Technical Program Committee","authors":"","doi":"10.1109/isriti.2018.8864281","DOIUrl":"https://doi.org/10.1109/isriti.2018.8864281","url":null,"abstract":"","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia 印度尼西亚移动交通系统对用户行为的安全和信任因素
Surjandy, Erick Fernando, Meyliana, A. Condrobimo, Ivan Sebastian Edbert, Vivien
{"title":"The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia","authors":"Surjandy, Erick Fernando, Meyliana, A. Condrobimo, Ivan Sebastian Edbert, Vivien","doi":"10.1109/ISRITI.2018.8864250","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864250","url":null,"abstract":"Mobile transportation recently new phenomenon including in Indonesia country the positive value of mobile transportation system makes the user easy to get the support of delivery things and transportation. However, until now there is the negative impact of usage of mobile transportation system such as deception of mobile transportation account, robbery of the driver or passenger accompanied by murder. Therefore, this research by using the quantitative method with correlation bivariate will find the answer the correlation between safe and trust factors of mobile transportation. Do the passenger trust to the driver of mobile transportation? Do the passenger trust in mobile transportation system? Does the company mobile transportation brand image influence the passenger? Does the passenger feel safe using the mobile transportation system? The research found 37 significant correlation factors from 312 respondents.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VIP READY: A Mobile Leisure Search Engine for Visually Impaired Persons Utilizing Phone Motion and Speech Recognition VIP READY:利用手机动作和语音识别为视障人士提供的移动休闲搜索引擎
G. Catedrilla, Marco Antonio T. Subion
{"title":"VIP READY: A Mobile Leisure Search Engine for Visually Impaired Persons Utilizing Phone Motion and Speech Recognition","authors":"G. Catedrilla, Marco Antonio T. Subion","doi":"10.1109/ISRITI.2018.8864282","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864282","url":null,"abstract":"VIP-READY: A Mobile Leisure Search Engine for Visually Impaired Persons Utilizing Gesture and Speech Recognition was developed to help the visually impaired. It is a navigation mobile application with speech recognition technology that is conceptualized and designed to assist visually impaired person on locating leisure and place they want to go to. One of the main purposes of this project is to address the needs of giving a fair access to the world to any kind of person with disability. The research was designed and accomplished through different scientific processes and techniques. Through the help of MFCC and HMM an accent friendly speech recognition was developed. This paper found out that this kind of application can promote mobility in navigation for different kind of visually impaired person. Nevertheless, the instinct of totally blind person is still needed for a better navigation. The researchers would like to give stressed that researches that can help any kind of person with disability must be promoted and considered by many researchers.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ISRITI 2018 Committees
{"title":"ISRITI 2018 Committees","authors":"","doi":"10.1109/isriti.2018.8864446","DOIUrl":"https://doi.org/10.1109/isriti.2018.8864446","url":null,"abstract":"","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) 基于技术接受与使用统一理论2 (UTAUT2)的电子政务服务使用行为意愿影响因素研究
Syamsudin, Ruci Meiyanti, Deki Satria, R. Wahyuni, D. I. Sensuse
{"title":"Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2)","authors":"Syamsudin, Ruci Meiyanti, Deki Satria, R. Wahyuni, D. I. Sensuse","doi":"10.1109/ISRITI.2018.8864474","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864474","url":null,"abstract":"This study used Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to understanding factors affecting behavioral intention to use e-Government services. UTAUT2 model more completely than UTAUT with added variables such as hedonic motivation, price value, and habit. We modify some variables in UTAUT2. Price value variable was substituted by public value variable. Whereas the hedonic motivation variable was eliminated because public service is not business activity. We complete the model with antecedent trust variable. We have 203 respondents from the citizen that spread in Jakarta and surroundings to answer through online questionnaires. The data analysis showed that public value, habit and effort expectancy have positive impact on behavioral intention to use e-government services.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application Android聊天应用中多媒体文件安全的AES和SHA-256加密设计与实现
Noveline Aziz Fauziah, E. H. Rachmawanto, De Rosal Ignatius Moses Setiadi, C. A. Sari
{"title":"Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application","authors":"Noveline Aziz Fauziah, E. H. Rachmawanto, De Rosal Ignatius Moses Setiadi, C. A. Sari","doi":"10.1109/ISRITI.2018.8864485","DOIUrl":"https://doi.org/10.1109/ISRITI.2018.8864485","url":null,"abstract":"In the current era of globalization, security is one of the most important aspects in the development of communication applications, especially when sending confidential files. Advanced Encryption Standard (AES) is one method that can be used to secure data by encrypting and decrypting an information. AES is also an algorithm that has a fast encryption process and has been widely implemented in various fields. To provide data security that is transferred to the network, AES is considered a fast and best algorithm. AES is an open source cryptography with symmetric keys used for encryption and decryption of files. Files to be encrypted are multimedia files such as images, audio and video. The file is entered into the application, then the user inputs a key that is encrypted with the SHA-256 algorithm to secure the contents of the file. Encrypted files are stored in the UUencoding format to avoid the compression process when sending files via the chat application. The file is also safer, because the message cannot be seen directly. Based on the results of experiments in this study, multimedia file encryption applications have been successfully built. Although the process of encryption and decryption changes the size of the original file a little, the contents and meaning of the file remain the same and has been wrapped up by measuring the PNSR value that produces an infinity value.","PeriodicalId":162781,"journal":{"name":"2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信