M. Nursalman, A. Sasongko, Yusuf Kurniawan, Kuspriyanto
{"title":"Improved generalizations of the Karatsuba algorithm in GF(2n)","authors":"M. Nursalman, A. Sasongko, Yusuf Kurniawan, Kuspriyanto","doi":"10.1109/ICAICTA.2014.7005938","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005938","url":null,"abstract":"The process of multiplications in Finite Fields required huge resources. If those implemented in the Elliptic Curve Cryptography (ECC), the need of resources would be inflated because those processes were enough to dominated in every ECC level. There were many researches to found methods that could reduce the number of multiplications. One method that was well-known and developed was Karatsuba ofman algorithm, where the development of this research were General Karatsuba Multiplier, Efficient Multiplier in GF((2n)4) Generalizations of Karatsuba Algorithm, 5-6-7 Term Karatsuba-Like Formulae, and improved modulo functions. From those researches is made a better algorithm than Generalizations of Karatsuba Algorithm and it is expected to leads to generalize the form n-Term Karatsuba-Like Formulae.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A joint time synchronization concept for wireless communication system","authors":"H. Setiawan, M. Kurosaki, H. Ochi","doi":"10.1109/ICAICTA.2014.7005950","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005950","url":null,"abstract":"This paper presents a concept of common timing detection for three different wireless communication standards i.e. WLAN, WiMAX and LTE. We propose a system consists of sample rate conversion, symmetry-based auto-correlation, and peak detector. The correlation part consists of a single 256-tap symmetric-based auto-correlation circuit and a peak detector with an adaptive threshold value. The fixed point simulation results show that the proposed system has satisfied the minimum receiver sensitivity requirements that specified by the standards. Moreover, the proposed system has fitted for FPGA Virtex-5 XC5VTX240T implementation by utilizing 50 percent of total look up table (LUT) in the FPGA, and can reach the clock frequency up to 76.7MHz.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122058461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website","authors":"Yohanes Wahyu Trio Pramono, Suhardi","doi":"10.1109/ICAICTA.2014.7005941","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005941","url":null,"abstract":"Websites are now widely used by many public and private sectors known to be the most popular system that is able to reach many users in many platforms through internet. Since websites are generally placed as a public domain, there is a large chance of intruders to compromise the system at any time. C-panel raw access log data nowadays widely used by many security tools to analysis the user behaviors regarding to the activities on the web, however they commonly provide the descriptive analysis, rather than prescriptive analysis for prediction and estimation. In this paper, we introduce the solution about the website security protection mechanism by investigating the user behaviors using sequential rule-pattern analysis. Rule-patterns of user behaviors are created by mining the log data with sequential pattern analysis in near real time. Using anomaly-based intrusion detection and prevention system approach, our proposed system then can predict the user behaviors activities whether identified as baseline patterns or malicious patterns.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126798973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hirofumi Nonaka, S. Kawano, T. Hiraoka, Takahisa Ota, Shigeru Masuyama
{"title":"Evaluating industrial cluster by using spatial auto correlation of patent applications","authors":"Hirofumi Nonaka, S. Kawano, T. Hiraoka, Takahisa Ota, Shigeru Masuyama","doi":"10.1109/ICAICTA.2014.7005937","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005937","url":null,"abstract":"Development of an industrial cluster that denotes a geographic concentration of interconnected businesses and associated institutions in a particular field is one of most important policies for many countries. One of the key issues for promotion of the policy is to use its proper assessment. At the present time, some assessment methods based on economic statistics or questionnaire investigations are proposed. However, the methods based on economic statistics can apply to only longterm assessment. On the other hand, the methods using questionnaire investigation include problems of consuming a lot of time and effort. In order to solve the problems, we develop a patent analysis method which uses geometric bias of patent applications, which is able to apply for middle/short-term assessment by using global Moran's test and local Moran's test that measures spatial auto-correlation. As a result, our method can detect the bias on patent applications.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a methodological framework for designing a knowledge market","authors":"D. Rustam, T. V. D. van der Weide","doi":"10.1109/ICAICTA.2014.7005946","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005946","url":null,"abstract":"Higher education institutions in Indonesia are widely dispersed by their expertise, their supporting infrastructure, and even by geographical separation. To facilitate knowledge sharing in such a complex system is a challenging task. This paper proposes a conceptual model of a knowledge market as a possible mechanism to overcome the problem. By employing the market mechanism in higher education knowledge sharing, both seller and buyer of knowledge can meet and make transactions to exchange the results of intellectual efforts. When used is a digital environment, we use the term `Knowledge as a Service' to designate the support of the market actor and the term `Market as a Service' to refer the organization of the market. Supporting Optimum knowledge exchange is achieved as a consequence of the market mechanism. This framework is to be evaluated by a case study to support the design of a framework for knowledge exchange in the higher education system in Indonesia.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strain hardening prediction of materials using genetic algorithm and artificial neural network","authors":"Mike Susmikanti, J. Sulistyo","doi":"10.1109/ICAICTA.2014.7005955","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005955","url":null,"abstract":"It is very important to analyze the characteristics of materials utilized especially in nuclear engineering. Many approximation of strain hardening phenomena or cooling process have been carried out by experiments, but many cases are costly. There are alternative such as modeling and simulation. The purpose of this study is to predict the properties of material due to a particular strain hardening process for molybdenum and austenitic stainless steel. The optimization for some load to get stress and strain was analysed by genetic algorithm. The strain hardening mechanism behavior under stress and strain of material can be modeled using Neural Network with Backpropagation. Levenberg-Marquardt was selected to reach convergence rapidly. The true strain and stress of molybdenum converges to 0.997 and 60489.821 psi. For the austenitic steel are stabilizes to 0.809 and 158255.290 psi. The estimates mean of an exponentially distributed of molybdenum is 4.5667 and austenitic steel is 4.1667.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise architecture for cloud-based ERP system development","authors":"A. Gunawan, K. Surendro","doi":"10.1109/ICAICTA.2014.7005915","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005915","url":null,"abstract":"The cloud computing concept is widely accepted as a new, influential method in the field of information technology. It offers ease of access, flexibility, security, etc. In recent years there are suggestions of making a large number of cloud-based applications; one of them is the enterprise resource planning (ERP). In general, making an ERP accessible through cloud computing offers great benefits regardless of what field may use them, but in order to achieve that level of operation some guidance and assessments are needed. There are numbers of companies who face failure in an attempt of using or even customizing ERP for their company. Enterprise architecture can be used to validate all necessary requirements a company needs to asses before implementing an ERP system, especially a cloud-based ERP system.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Person identification by face recognition on portable device for teaching-aid system: Preliminary report","authors":"Albadr Nasution, D. B. Sena Bayu, J. Miura","doi":"10.1109/ICAICTA.2014.7005935","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005935","url":null,"abstract":"We propose a face recognition system to identify a person and obtain his/her information, especially for teaching-aid contexts. This system is based on the communication between a portable device and a server. We evaluate face detection-recognition methods provided by OpenCV that will be used in the system. We also combine these methods with our illumination normalization and prove it can improve the detection and the recognition rate. With haar-based face detection and the illumination normalization, detection rate is stable at 95% in simple and severe illumination situations. Using Fisherface method with normalization, three training images per person are enough to achieve on average 96.4% recognition rate on Yale B Extended Database. Online prototype has been built and achieves up to 10 fps in performance.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132227932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vitality based feature selection for intrusion detection","authors":"Jupriyadi, A. I. Kistijantoro","doi":"10.1109/ICAICTA.2014.7005921","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005921","url":null,"abstract":"Intrusion detection system is the process to monitor network traffic to detect possible attacks. In recent time, network traffic increasing rapidly. There are plenty of research today focused on feature selection or reduction, as some of the features are irrelevant and degrade the performance of an intrusion detection system. By eliminating some of features, we can improve the performance of classification algorithm. In this paper, we evaluate the performance of feature selection methods, such as Correlation Based Feature Selection (CFS), Information Gain (IG), Gain Ratio (GR), Feature Vitality Based Reduction Method (FVBRM). We propose a modification to FVBRM by changing the parameter True Positives Rate (TPR) into False Positives Rate (FPR) and by applying Naïve Bayes classifier on reduced dataset to measure the result of our feature selection method. The results of modified FVBRM indicate that selected attributes provide better performance for intrusion detection system.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133372207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sign language word recognition using via-point information and correlation of they bimanual movements","authors":"Shinpei Igari, Naohiro Fukumura","doi":"10.1109/ICAICTA.2014.7005918","DOIUrl":"https://doi.org/10.1109/ICAICTA.2014.7005918","url":null,"abstract":"We have studied Japanese sign Language (JSL) recognition system. In our previous research, we focus on only JSL words performed in the movement of the dominant arm and proposed a recognition method using via-points extracted from the trajectory data of the dominant arm as feature points based on the minimum jerk model. In this study, in order to recognize JSL words performed in bimanual movements, we investigated an integration method of the matching result of the both arms. We classified JSL movements into three categories as part of sign language recognition system. And we used a correlation coefficient and difference of the path length between the both arm movements as a factor to classify JSL. As a result of recognition experiment, the recognition rate was 98% or more in 80 words from multiple speakers.","PeriodicalId":173600,"journal":{"name":"2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116312880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}