M. Nursalman, A. Sasongko, Yusuf Kurniawan, Kuspriyanto
{"title":"Improved generalizations of the Karatsuba algorithm in GF(2n)","authors":"M. Nursalman, A. Sasongko, Yusuf Kurniawan, Kuspriyanto","doi":"10.1109/ICAICTA.2014.7005938","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005938","url":null,"abstract":"The process of multiplications in Finite Fields required huge resources. If those implemented in the Elliptic Curve Cryptography (ECC), the need of resources would be inflated because those processes were enough to dominated in every ECC level. There were many researches to found methods that could reduce the number of multiplications. One method that was well-known and developed was Karatsuba ofman algorithm, where the development of this research were General Karatsuba Multiplier, Efficient Multiplier in GF((2n)4) Generalizations of Karatsuba Algorithm, 5-6-7 Term Karatsuba-Like Formulae, and improved modulo functions. From those researches is made a better algorithm than Generalizations of Karatsuba Algorithm and it is expected to leads to generalize the form n-Term Karatsuba-Like Formulae.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A joint time synchronization concept for wireless communication system","authors":"H. Setiawan, M. Kurosaki, H. Ochi","doi":"10.1109/ICAICTA.2014.7005950","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005950","url":null,"abstract":"This paper presents a concept of common timing detection for three different wireless communication standards i.e. WLAN, WiMAX and LTE. We propose a system consists of sample rate conversion, symmetry-based auto-correlation, and peak detector. The correlation part consists of a single 256-tap symmetric-based auto-correlation circuit and a peak detector with an adaptive threshold value. The fixed point simulation results show that the proposed system has satisfied the minimum receiver sensitivity requirements that specified by the standards. Moreover, the proposed system has fitted for FPGA Virtex-5 XC5VTX240T implementation by utilizing 50 percent of total look up table (LUT) in the FPGA, and can reach the clock frequency up to 76.7MHz.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122058461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website","authors":"Yohanes Wahyu Trio Pramono, Suhardi","doi":"10.1109/ICAICTA.2014.7005941","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005941","url":null,"abstract":"Websites are now widely used by many public and private sectors known to be the most popular system that is able to reach many users in many platforms through internet. Since websites are generally placed as a public domain, there is a large chance of intruders to compromise the system at any time. C-panel raw access log data nowadays widely used by many security tools to analysis the user behaviors regarding to the activities on the web, however they commonly provide the descriptive analysis, rather than prescriptive analysis for prediction and estimation. In this paper, we introduce the solution about the website security protection mechanism by investigating the user behaviors using sequential rule-pattern analysis. Rule-patterns of user behaviors are created by mining the log data with sequential pattern analysis in near real time. Using anomaly-based intrusion detection and prevention system approach, our proposed system then can predict the user behaviors activities whether identified as baseline patterns or malicious patterns.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126798973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hirofumi Nonaka, S. Kawano, T. Hiraoka, Takahisa Ota, Shigeru Masuyama
{"title":"Evaluating industrial cluster by using spatial auto correlation of patent applications","authors":"Hirofumi Nonaka, S. Kawano, T. Hiraoka, Takahisa Ota, Shigeru Masuyama","doi":"10.1109/ICAICTA.2014.7005937","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005937","url":null,"abstract":"Development of an industrial cluster that denotes a geographic concentration of interconnected businesses and associated institutions in a particular field is one of most important policies for many countries. One of the key issues for promotion of the policy is to use its proper assessment. At the present time, some assessment methods based on economic statistics or questionnaire investigations are proposed. However, the methods based on economic statistics can apply to only longterm assessment. On the other hand, the methods using questionnaire investigation include problems of consuming a lot of time and effort. In order to solve the problems, we develop a patent analysis method which uses geometric bias of patent applications, which is able to apply for middle/short-term assessment by using global Moran's test and local Moran's test that measures spatial auto-correlation. As a result, our method can detect the bias on patent applications.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a methodological framework for designing a knowledge market","authors":"D. Rustam, T. V. D. van der Weide","doi":"10.1109/ICAICTA.2014.7005946","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005946","url":null,"abstract":"Higher education institutions in Indonesia are widely dispersed by their expertise, their supporting infrastructure, and even by geographical separation. To facilitate knowledge sharing in such a complex system is a challenging task. This paper proposes a conceptual model of a knowledge market as a possible mechanism to overcome the problem. By employing the market mechanism in higher education knowledge sharing, both seller and buyer of knowledge can meet and make transactions to exchange the results of intellectual efforts. When used is a digital environment, we use the term `Knowledge as a Service' to designate the support of the market actor and the term `Market as a Service' to refer the organization of the market. Supporting Optimum knowledge exchange is achieved as a consequence of the market mechanism. This framework is to be evaluated by a case study to support the design of a framework for knowledge exchange in the higher education system in Indonesia.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strain hardening prediction of materials using genetic algorithm and artificial neural network","authors":"Mike Susmikanti, J. Sulistyo","doi":"10.1109/ICAICTA.2014.7005955","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005955","url":null,"abstract":"It is very important to analyze the characteristics of materials utilized especially in nuclear engineering. Many approximation of strain hardening phenomena or cooling process have been carried out by experiments, but many cases are costly. There are alternative such as modeling and simulation. The purpose of this study is to predict the properties of material due to a particular strain hardening process for molybdenum and austenitic stainless steel. The optimization for some load to get stress and strain was analysed by genetic algorithm. The strain hardening mechanism behavior under stress and strain of material can be modeled using Neural Network with Backpropagation. Levenberg-Marquardt was selected to reach convergence rapidly. The true strain and stress of molybdenum converges to 0.997 and 60489.821 psi. For the austenitic steel are stabilizes to 0.809 and 158255.290 psi. The estimates mean of an exponentially distributed of molybdenum is 4.5667 and austenitic steel is 4.1667.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise architecture for cloud-based ERP system development","authors":"A. Gunawan, K. Surendro","doi":"10.1109/ICAICTA.2014.7005915","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005915","url":null,"abstract":"The cloud computing concept is widely accepted as a new, influential method in the field of information technology. It offers ease of access, flexibility, security, etc. In recent years there are suggestions of making a large number of cloud-based applications; one of them is the enterprise resource planning (ERP). In general, making an ERP accessible through cloud computing offers great benefits regardless of what field may use them, but in order to achieve that level of operation some guidance and assessments are needed. There are numbers of companies who face failure in an attempt of using or even customizing ERP for their company. Enterprise architecture can be used to validate all necessary requirements a company needs to asses before implementing an ERP system, especially a cloud-based ERP system.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query subtopic mining for search result diversification","authors":"M. Z. Ullah, Masaki Aono","doi":"10.1109/ICAICTA.2014.7005960","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005960","url":null,"abstract":"Web search queries are usually short, ambiguous, and contain multiple aspects or subtopics. Different users may have different search intents (or information needs) when submitting the same query. The task of identifying the subtopics underlying a query has received much attention in recent years. In this paper, we propose a method that exploits query reformulations provided by three major Web search engines (WSEs) as a means to uncover different query subtopics. In this regard, we estimate the importance of the subtopics by introducing multiple query-dependent and query-independent features, and rank the subtopics by balancing relevancy and novelty. Our experiment with the NTCIR-10 INTENT-2 English Subtopic Mining test collection shows that our method outperforms all participants' methods in NTCIR-10 INTENT-2 task in terms of D#-nDCG@10.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk management framework with COBIT 5 and risk management framework for cloud computing integration","authors":"A. Khrisna, Harlili","doi":"10.1109/ICAICTA.2014.7005923","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005923","url":null,"abstract":"Cloud computing is one of the growing inclination in the field of information technology which brings many advantages. There have been many companies or organizations that are increasingly using cloud computing to improve their business process performance. However, cloud computing also carries a number of risks that could adversely affect a company or organization, therefore an effective risk management is needed. This research will integrate COBIT 5 and Risk Management Framework for Cloud Computing by considering the completeness and shortage of each framework to generate a complete framework and can help organization or company to create optimal values from the usage of cloud computing. The results of the integration consist of two phases, namely risk governance and risk management where each phase has primary processes and supporting processes. The result of the integration will be further evaluated through a case study on a company that already uses cloud computing.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122036257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of inheritance relationship between contents on social media — Case study of Niconico as a video-sharing site","authors":"Hitoyoshi Ohta, Akio Kobayashi, Shigeru Masuyama","doi":"10.1109/ICAICTA.2014.7005939","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005939","url":null,"abstract":"Social media is a platform on which collaborative creative activities on the Web create new contents. This study proposes a method for estimating inheritance relationship between contents when we assumed that contents have inherited from some other contents in its parts or properties. We estimate this relationship by targeting Niconico, a typical video-sharing Website in Japan, because we found this relationship from various meta-data given to the video. We think that we can observe the culture formation that occurs in social media by accounting for inheritance relationship of contents. We also think that we can analyze the phenomenon that a piece of contents inspired another one in chain in social media by applying the visualized culture formation. First, we propose a reference graph that represents inheritance relation obtained by analyzing the description of videos. We investigate characteristic of the relationship using edges in this graph. We confirm that some contents in Niconico has inheritance relationship with other contents. We have found that relationship is classified into the following four types: (1) Remake: Creator remakes some other videos into high-quality sound or high definition. (2) Arrangement: Creator arranges some other videos in their favorite style. (3) Partially-used: Creator uses some other videos in its music or scene as materials. (4) Inspired: Creator refers to some other videos in its representation or technique. We also propose a method for estimating this relationship using tags and titles from videos. We conducted experiments to evaluate our method and attained F-value 0.444 when threshold value is 0.330.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}