2016 International Conference on Information & Communication Technology and Systems (ICTS)最新文献

筛选
英文 中文
Fraud detection on event logs of goods and services procurement business process using Heuristics Miner algorithm 基于启发式Miner算法的商品服务采购业务流程事件日志欺诈检测
Dewi Rahmawati, Muhammad Ainul Yaqin, R. Sarno
{"title":"Fraud detection on event logs of goods and services procurement business process using Heuristics Miner algorithm","authors":"Dewi Rahmawati, Muhammad Ainul Yaqin, R. Sarno","doi":"10.1109/ICTS.2016.7910307","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910307","url":null,"abstract":"Event logs are history records that contain sequence data for the activity of a case that has been executed by an information system. Event logs can be valuable information with a technique called mining process. With this technique, cheating on the business processes of an enterprise can be detected early on. Thus, the company can commit further examination of business processes, especially the business process of procurement of goods and services to achieve business process is expected.[8] In this study, management data of event log obtained from log data at each event transaction procurement and services. The event log data is then analyzed using a heuristic miner algorithm. Heuristics miner algorithm chosen because it has advantages that are not owned by Alpha++ algorithm that this algorithm can calculate the frequency relation between activities in the log to determine the causal dependency. Heuristic Miner can be used to determine the predominant process of thousands of logs and detect behaviors that are not common in a process.[11] This study aims to detect anomalies on business processes that occur during the process of procurement of goods and services by calculating the fitness value of the event log into the system. Heuristic miner algorithm using the results obtained identification accuracy of 0.88%.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130612901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Using Google Trend data in forecasting number of dengue fever cases with ARIMAX method case study: Surabaya, Indonesia 用ARIMAX方法预测登革热病例数的Google趋势数据案例研究:印度尼西亚泗水
Wiwik Anggraeni, Laras Aristiani
{"title":"Using Google Trend data in forecasting number of dengue fever cases with ARIMAX method case study: Surabaya, Indonesia","authors":"Wiwik Anggraeni, Laras Aristiani","doi":"10.1109/ICTS.2016.7910283","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910283","url":null,"abstract":"Indonesia has the highest number of dengue fever cases in Southeast Asia. Early detection of the disease is required in order to be able to prepare preventive measures against dengue fever. Previous research has shown that certain query search related to communicable disease on Google Trends are highly correlated with number of communicable disease cases in South Korea. Based on previous research, Google Trends search index shows potential to be included as external variable in a multivariate quantitative forecasting model. Using time series model, the role of Google Trends on epidemiology of dengue fever transmissions in Surabaya will be analyzed. This research uses several data (1) Number of dengue fever cases obtained from general local hospital of Dr. Soetomo (2) Google Trends search index of certain queries related to dengue fever. All of the data spans from December 2010 – August 2015. Interpolation and extrapolation techniques are used to handle the missing data. ARIMA and ARIMAX model with Google Trends data are implemented in order to forecast the number of dengue fever cases. The research shows that the addition of Google Trends into ARIMAX model improves forecasting performance. The best ARIMAX with Google Trends model improves MAPE value by 3%.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130625094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Maximum entropy principle for exudates segmentation in retinal fundus images 视网膜眼底图像中渗出物分割的最大熵原理
I. Ardiyanto, H. A. Nugroho, Ratna Lestari Budiani Buana
{"title":"Maximum entropy principle for exudates segmentation in retinal fundus images","authors":"I. Ardiyanto, H. A. Nugroho, Ratna Lestari Budiani Buana","doi":"10.1109/ICTS.2016.7910284","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910284","url":null,"abstract":"This paper addresses a novel segmentation algorithm for detecting one of the diabetic retinopathy pathologies, called “exudates”. Exudates segmentation is ordinarily examined from retinal fundus images by various image processing techniques. Instead of carefully picking up the specific exudates features on the retinal images as has been done by the other works, our scheme is to observe global information of the retinal images. The global information, as well as spatial information, is extracted by maximum entropy-based thresholding. The proposed algorithm determines a reasonable threshold value for separating exudates areas, which are usually sparse and brighter, from the rest of images. This approach also ensures and minimizes the illumination variance effects of different images since it takes into account the global information. In addition to the proposed algorithm, luminance channel of the retinal images is exploited for pre-processing stage. After the optical disc which has similar characteristic to the exudates is separated, the pathological areas are subsequently acquired. Evaluations on the E-OPHTHA-EX retinal fundus images database show the advantages of the proposed approach, with the accuracy 99.4 percent, specificity 99.6 percent, and sensitivity 16.9 percent.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Clustering of SSH brute-force attack logs using k-clique percolation 使用k-clique渗透对SSH暴力攻击日志进行聚类
H. Studiawan, B. Pratomo, R. Anggoro
{"title":"Clustering of SSH brute-force attack logs using k-clique percolation","authors":"H. Studiawan, B. Pratomo, R. Anggoro","doi":"10.1109/ICTS.2016.7910269","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910269","url":null,"abstract":"The brute-force attacks to SSH service still persist in the server environments. The existing methods have not applied graph theory to analyze authentication log that records this attack. Therefore, we model the log as a graph and propose k-clique percolation to cluster auth.log file to assist the system administrators to inspect this incident. The k-clique percolation has proven in clustering of biological networks and we will deploy it to this problem. We then provide the mechanism for edge removal to separate the generated clusters and make clear the clustering outputs. The experimental results show that this approach is appropriate to cluster raw logs of SSH brute-force attacks.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamics simulation of air passenger forecasting and passenger terminal capacity expansion scenario in Yogyakarta Airport 日惹机场航空客运量预测及客运站扩容方案的动态模拟
B. Amaliah, Azizha Zeinita, E. Suryani
{"title":"Dynamics simulation of air passenger forecasting and passenger terminal capacity expansion scenario in Yogyakarta Airport","authors":"B. Amaliah, Azizha Zeinita, E. Suryani","doi":"10.1109/ICTS.2016.7910296","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910296","url":null,"abstract":"Adisutjipto International Airport Yogyakarta has reached four times more than capacity allowed in 2015. The building capacity only accommodate 1,5 million passengers per year, but in 2015 there were 6 million passengers. For this reason, in 2016 the airport developing new airport, Kulon Progo Airport. Actually, since 2003, passenger terminal capacity already exceeded two times capacity allowed. To solve this problem, this research proposed new modeling-simulation-dynamic-system, that combine between GDP, population, terminal capacity and regulation from minister of transport to forecast passenger demand and time to expansion the airport. Simulation model utilized historical data in 2005–2015 to generate forecasting for 2016–2050. There were three scenarios used as consideration in determining policy, such as pessimistic, most likely, and optimistic scenario. In the pessimistic scenario models, the ideal for development is before 2031. In the most likely scenario models, the ideal time for development is before 2025. While the model of the optimistic scenario, the ideal time for development is before 2024.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"NS24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a gamification for monitoring Surabaya City development 设计监测泗水市发展的游戏化
Nur Aini Rakhmawati, Bagus Fibrianto
{"title":"Designing a gamification for monitoring Surabaya City development","authors":"Nur Aini Rakhmawati, Bagus Fibrianto","doi":"10.1109/ICTS.2016.7910309","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910309","url":null,"abstract":"The City hall of Surabaya has a website that allows Surabaya citizen to write a proposal of Surabaya development. This websites also give information to the citizen about response of government toward the proposals which are uploaded by citizen. However, the status of the proposals cannot be monitored by citizen using the website. Therefore, a web application Monitoring dan Visualisasi Musrenbang or called Monvis-Musrenbang is developed to facilitate a citizen in terms of monitoring and tracking their proposals. The more citizen participate in giving feedback, the more accurate the information are. The web application should increase and maintain the citizen activity in giving the feedback. Thus, a gamification is implemented over the web application. The gamification system is designed based on User-centered approach. A user earn points after doing an activity or completing an event. The activity and event are formulated clearly in this paper. A group of people are asked to do set of activities before and after the gamification implementation. The evaluation results reveal that the gamification design can stimulate a citizen to do an activity without changing his motivation.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pressure control of a wheeled wall climbing robot using proporsional controller 基于比例控制器的轮式爬壁机器人压力控制
Novia Andriani, Muhammad Doni Maulida, Yunafi'atul Aniroh, Miftahul Falahi Alfafa
{"title":"Pressure control of a wheeled wall climbing robot using proporsional controller","authors":"Novia Andriani, Muhammad Doni Maulida, Yunafi'atul Aniroh, Miftahul Falahi Alfafa","doi":"10.1109/ICTS.2016.7910285","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910285","url":null,"abstract":"The increased interest in the development of wall climbing robot has been shown in the past decade. Wall climbing robot with the ability to maneuver on vertical surfaces capable of performing dangerous operations such as multi-storey building inspection, surveillance, reconnaissance, assist in firefighting and rescue. By using this wall climbing robot costs become cheaper and less risky. Design wall climbing robots are wheeled robot. This robot is configured with two motors for the wheels, a suction motors, batteries, control movement, and sensors. To create a robot attached to the wall, the robot is equipped with suction. The main sensors used are pressure sensors, to monitor the level of pressure in the vacuum space. Sensors connected to arduino mega generate control inputs for suction motors. The controller used is proportional controller. Proportional controller is used to keep the pressure on the robot to remain constant at surface conditions that vary according to a certain set point.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HTTP communication latency via cellular network for Intelligent Transportation System applications 智能交通系统应用的蜂窝网络HTTP通信延迟
Michael Ardita, Suwadi, A. Affandi, Endroyono
{"title":"HTTP communication latency via cellular network for Intelligent Transportation System applications","authors":"Michael Ardita, Suwadi, A. Affandi, Endroyono","doi":"10.1109/ICTS.2016.7910268","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910268","url":null,"abstract":"Intelligent Transportation System (ITS) relies on the performance of wireless network. The cellular networks performance should be explored before building an application to obtain optimal system. In this paper, the wireless network performance is evaluated from latency of information delivery by using hypertext transfer protocol (HTTP). The tests of 3G and LTE networks are performed in static and mobile conditions. Based on measurement result of cellular network in mobile conditions, the best application using HTTP platform for ITS in mobile environment is text based communication between mobile units and traffic management center.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The development of method of the enhancement of Technical Factor (TF) and Environmental Factor (EF) to the Use Case Point (UCP) to calculate the estimation of software's effort 开发了将技术因素(TF)和环境因素(EF)增强到用例点(UCP)来计算软件工作量估算的方法
Sarwosri, Muhammad Jabir Al Haiyan, Mujahid Husein, Aditya Putra Ferza
{"title":"The development of method of the enhancement of Technical Factor (TF) and Environmental Factor (EF) to the Use Case Point (UCP) to calculate the estimation of software's effort","authors":"Sarwosri, Muhammad Jabir Al Haiyan, Mujahid Husein, Aditya Putra Ferza","doi":"10.1109/ICTS.2016.7910299","DOIUrl":"https://doi.org/10.1109/ICTS.2016.7910299","url":null,"abstract":"Use Case Point (UCP) is one of many approaches used for software project estimation. This approach is implemented by calculating effort estimation based on prediction a total number of workers and software development time. UCP was fist introduced by Karner on 1993. This approach is widely used. It was because some research on UCP showed that UCP approach is better than those approaches developed by experts. The calculation of effort estimation that was mentioned in the paper (Chetan Nagar, 2011), it has been proven that calculation estimation using UCP sometimes doesn't fit the real effort. This leads to the difference in cost calculation and a total number of workers on software development project.","PeriodicalId":177275,"journal":{"name":"2016 International Conference on Information & Communication Technology and Systems (ICTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信