2021 9th International Conference on Information and Communication Technology (ICoICT)最新文献

筛选
英文 中文
IoT Application on Agricultural Area Surveillance and Remote-controlled Irrigation Systems 物联网在农区监控和远程控制灌溉系统中的应用
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527438
Ratnasari Nur Rohmah, H. Supriyono, Agus Supardi, Hasyim Asyari, Riant Rahmadi, Yana Oktafianto
{"title":"IoT Application on Agricultural Area Surveillance and Remote-controlled Irrigation Systems","authors":"Ratnasari Nur Rohmah, H. Supriyono, Agus Supardi, Hasyim Asyari, Riant Rahmadi, Yana Oktafianto","doi":"10.1109/ICoICT52021.2021.9527438","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527438","url":null,"abstract":"This research applies IoT technology to help farmers overcome two problems by proposing an agricultural land surveillance system and a remote-controlled irrigation system. The agricultural land surveillance system in this research was designed to detect object’s motion, take pictures of objects, and send image data to the user’s smartphone. The surveillance system also provided a live streaming video mode by request. The irrigation system was designed to monitor temperature, send data to the user, and allowing the control of water pump operation remotely by the user via a smartphone. Tests on systems performance show that both systems performed properly. In the surveillance system, the optimal distance for motion detection by the sensor was 6 meters. On sunny days, the time needed from taking the image when motion was detected and notification received by the user was 4.9 seconds while the interval from notification to the image sent was 3.9 seconds. In live streaming video mode, the user must wait 2.3 seconds on average to receive live streaming video on a smartphone. In the irrigation system performance, the average temperature measurement error of the sensor was 1.49%. Sensor data transmission to the user’s smartphone works well and the user can remotely control the pump operation.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberbullying Detection on Indonesian Twitter using Doc2Vec and Convolutional Neural Network 基于Doc2Vec和卷积神经网络的印尼推特网络欺凌检测
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527420
Shindy Trimaria Laxmi, Rita Rismala, Hani Nurrahmi
{"title":"Cyberbullying Detection on Indonesian Twitter using Doc2Vec and Convolutional Neural Network","authors":"Shindy Trimaria Laxmi, Rita Rismala, Hani Nurrahmi","doi":"10.1109/ICoICT52021.2021.9527420","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527420","url":null,"abstract":"Cyberbullying is the act of threatening or endangering others by posting text or images that humiliate or harass people through the internet or other communication devices. According to a survey from Polling Indonesia and Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) about cyberbullying, 49% of 5900 participants claimed they have been bullied. Therefore, this research was conducted with the intention to prevent cyberbullying acts, especially in Indonesia. We collected data from Twitter based on Twitter’s Trending keywords which correlated to cyberbully events. Then we combined it with the data from previous research. We obtained a total of 1425 tweets, consists of 393 data labeled as cyberbully and 1032 data labeled as non-cyberbully. Thereupon, we build a Doc2Vec model for features extraction, and a classifier model using the baseline classification method (SVM and RF) and CNN to detect cyberbully texts. The results show that the classifier using CNN and Doc2vec has the highest F1-score, 65.08%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IoT Drone Camera for a Paddy Crop Health Detector with RGB Comparison 用于具有RGB比较的水稻作物健康检测器的物联网无人机摄像头
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527421
Elvaretta Dian Detiana Yucky, Aji Gautama Putrada, M. Abdurohman
{"title":"IoT Drone Camera for a Paddy Crop Health Detector with RGB Comparison","authors":"Elvaretta Dian Detiana Yucky, Aji Gautama Putrada, M. Abdurohman","doi":"10.1109/ICoICT52021.2021.9527421","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527421","url":null,"abstract":"This paper proposes the system of paddy crop health detector using drone camera. Indonesia is an agricultural country that has very large agricultural land, where every plant health monitoring activity is done manually. However, applying technological developments in land monitoring activities will shorten time and increase work efficiency. In this paper a drone with a raspberry pi camera has been used to capture several images of rice fields from several areas. The image data is processed into a digital leaf color chart (LCC) through the process of image acquisition, RGB color extraction, and k-Nearest Neighbor (k-NN) classification. The data has been compared with the real LCC, which is a reference to the health color of rice plants. The paddy fields that are used as the research material are 25 days after planting. The result shows that the precision of the method is 88.89%, the recall is 93.02%, the accuracy is 98.22%, and the specificity is 98.77%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1991 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spam Detection on Indonesian Beauty Product Review 印尼美容产品评论的垃圾邮件检测
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527409
Muhammad Ahsan Athallah, A. Romadhony
{"title":"Spam Detection on Indonesian Beauty Product Review","authors":"Muhammad Ahsan Athallah, A. Romadhony","doi":"10.1109/ICoICT52021.2021.9527409","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527409","url":null,"abstract":"A product review is one of the most important sources of information that can help consumers to find the most suitable products for their needs. However, there is a chance a reviewer has other intentions than providing an honest review, including advertising the brand or other brands. A review that does not contain any information related to the product’s aspects/features could be considered spam. This paper presents our work on spam review detection, specifically in the domain of beauty products. We used SVM and Logistic Regression classifier and the following features: the review sentiments, product-related features, and review-centric features extracted from the reviews. We classified the beauty product review texts as spam and non-spam reviews. The experimental result showed that the best accuracy percentage was 81%, obtained when we used the sentiments and review-centric features with the SVM algorithm.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122416638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware Detection on Bitcoin Transactions Using Artificial Neural Network Methods 基于人工神经网络的比特币交易勒索软件检测
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527414
Hairil, N. Cahyani, H. Nuha
{"title":"Ransomware Detection on Bitcoin Transactions Using Artificial Neural Network Methods","authors":"Hairil, N. Cahyani, H. Nuha","doi":"10.1109/ICoICT52021.2021.9527414","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527414","url":null,"abstract":"The use of digital currency or cryptocurrency in various virtual transactions is common due to its easiness. Cryptocurrency is a digital currency that is used for virtual transactions on the internet network. The most common types of cryptocurrencies include Litecoin, Ethereum, Monero, Ripple, and Bitcoin. Even though cryptocurrencies have secret codes that are quite complicated and complex that serve to protect and maintain the security of digital currencies, it is possible to be hacked by skilled hackers. Cryptocurrency-related hacking is a type of digital crime that is very harmful or dangerous acts. For example, in recent years, cases of hacking on bitcoin transactions using ransomware have been on the rise. Ransomware is malicious software that secretly infects a victim’s device, and suddenly asks for a ransom to decrypt encrypted data. This type of malware aims to blackmail a victim whose computer is infected with ransomware by asking for a certain amount of money as a ransom. Therefore, a design was built in the form of a ransomware detection system based on available bitcoin heist data so as to minimize hacking attacks against cryptocurrency in the future. The ransomware detection system was built using the backpropagation artificial neural network method using Weka software. The best results in data testing are using the parameter number of hidden layer with 9 neurons; learning rate 0.1; and the number of iterations of 5000 yields an accuracy rate of 97%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125510240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Non-Stationary Order of Vector Autoregression in Significant Ocean Wave Forecasting 非平稳阶向量自回归在重大海浪预报中的应用
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527502
Fikka Raudiya, A. A. Rohmawati, D. Adytia
{"title":"Non-Stationary Order of Vector Autoregression in Significant Ocean Wave Forecasting","authors":"Fikka Raudiya, A. A. Rohmawati, D. Adytia","doi":"10.1109/ICoICT52021.2021.9527502","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527502","url":null,"abstract":"This paper studies the implementation of non-stationary multivariate time series model to fit the ocean wave data. A model comprises from a regression term and associate with exogenous variables in a particular time horizon. Because of the trend fluctuation in the data leading to unstable process, differentiated data are used in fitting the model. The approach suggested is applied to the finite order of Vector Autoregression for an improvement in prediction simultaneously of ocean wave by carrying out wind-related information to waves. The proposed model is compared with linear simple autoregressive model. The performance of both forecasting procedures is assessed by RMSE of well-known error measures. The forecast based on the proposed methodology indicated that it can be regarded as a promising method for wave ocean prediction, it outperforms using 4-order Vector Autoregression.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing an Educational Game Evaluation Framework Based on Game Mechanics 基于游戏机制的教育游戏评价框架设计
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527418
Satrio Adi Rukmono, Fais Zharfan Azif, Muhammad Zuhri Catur Candra
{"title":"Designing an Educational Game Evaluation Framework Based on Game Mechanics","authors":"Satrio Adi Rukmono, Fais Zharfan Azif, Muhammad Zuhri Catur Candra","doi":"10.1109/ICoICT52021.2021.9527418","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527418","url":null,"abstract":"Children in everyday life are increasingly using educational games. However, the quality of each of the many educational games available varies. Some evaluation frameworks exist, but most are prone to the evaluator’s subjectivity, which cannot be compared objectively. This study aims to formulate a framework that evaluates the quality of educational games objectively based on the game mechanics used. The framework is built upon Bloom’s taxonomy as the basis to ascertain the academic side and MDA (Mechanics-Dynamics-Aesthetics) Framework to distinguish the game side. Then, it assesses each educational mechanic based on a standard in the evaluation framework to obtain an accurate, quantifiable score as a measure. Validation of the framework involves using the framework to evaluate existing educational games and comparing the results with expert reviews. With this framework, an educational game quality can be measured objectively and quantitatively based on the technical and fundamental elements that exist in each game.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132644566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review on IoT with Big Data Analytics 物联网与大数据分析综述
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527503
Abu Fuad Ahmad, Md. Shohel Sayeed, Choo Peng Tan, K. Tan, Md Ahsanul Bari, Ferdous Hossain
{"title":"A Review on IoT with Big Data Analytics","authors":"Abu Fuad Ahmad, Md. Shohel Sayeed, Choo Peng Tan, K. Tan, Md Ahsanul Bari, Ferdous Hossain","doi":"10.1109/ICoICT52021.2021.9527503","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527503","url":null,"abstract":"The Internet of Things (IoT) is a powerful and transformative force for the convergence of the physical and digital world of technology. The IoT is connecting things, businesses, and people in real-time and on a massive scale. The IoT is the network of interconnected devices that contains actuators, sensors, electronics, software and connectivity which lets these things connect, interact and transfer data. Connected devices and software work in ways that produce massive amounts of data where Big Data comes into the picture. The terminology of Big Data represents diverse sets of information that are both very large and complex in nature. Big data offers a better way of managing and using a large amount of data with the opportunity to conduct deeper and richer analysis. Although the extensive number of big data analytics and IoT studies has been performed, the overlapping of the two fields of study creates various possibilities for thriving data analysis in the IoT environment. This paper presents a thorough review of the recent advancement of IoT with big data and analytics. We also make a review of the relationship between these fields. We present a discussion on the application area of IoT and big data analytics as well as the opportunities created by enabling analytics in an IoT system.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hoax Identification on Tweets in Indonesia Using Doc2Vec 使用Doc2Vec识别印度尼西亚推文中的骗局
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527515
Titi Widaretna, Jimmy Tirtawangsa, A. Romadhony
{"title":"Hoax Identification on Tweets in Indonesia Using Doc2Vec","authors":"Titi Widaretna, Jimmy Tirtawangsa, A. Romadhony","doi":"10.1109/ICoICT52021.2021.9527515","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527515","url":null,"abstract":"In this paper, we present our work on hoax detection on a collection of Tweets. We tackle the hoax detection as a text classification problem, with Doc2Vec as the text representation method and SVM as the classifier. We collected and annotated 5000 Tweets that consist of 2500 hoax Tweets and 2500 truth Tweets. The experimental results show that the accuracy of our proposed hoax detection on Tweets is 93.4%.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing Suicide Risk Idea Identification for Teenager (SERIINA) Mobile Apps Prototype using Extended Rapid Application Development 基于扩展快速应用程序开发开发青少年自杀风险想法识别(SERIINA)移动应用程序原型
2021 9th International Conference on Information and Communication Technology (ICoICT) Pub Date : 2021-08-03 DOI: 10.1109/ICoICT52021.2021.9527508
Tenia Wahyuningrum, Gita Fadila Fitriana, Ariq Cahya Wardhana, Muhammad Amien Sidiq, Dyah Wahyuningsih
{"title":"Developing Suicide Risk Idea Identification for Teenager (SERIINA) Mobile Apps Prototype using Extended Rapid Application Development","authors":"Tenia Wahyuningrum, Gita Fadila Fitriana, Ariq Cahya Wardhana, Muhammad Amien Sidiq, Dyah Wahyuningsih","doi":"10.1109/ICoICT52021.2021.9527508","DOIUrl":"https://doi.org/10.1109/ICoICT52021.2021.9527508","url":null,"abstract":"Suicide death is the number 15 cause of death in the world. Suicide cases go undetected because the perpetrator shows no signs beforehand. Therefore, it is necessary to identify the risk of suicide in adolescents early, accessed quickly, maintains user privacy, and understand user needs. Using the Risk Factors of Suicidal Ideation (RFSI) questionnaire, it hoped to detect early suicide incidents in adolescents. This research proposed a Suicide Risk Idea Identification for Teenager (SERIINA), a mobile application developed using the Extended Rapid Application Development (ERAD) method. The ERAD method combines the concept of design sprint and RAD in the system development cycle. Based on the research results, SERIINA mobile apps development is completed in 19 days. The functional testing using Black-Box testing shows that the application works well and compatible with the five main scenarios. The results of interface design testing using heuristic evaluation indicate that the application has been well designed, with a usability value of 2.34 or about 72-85% according to design rules.","PeriodicalId":191671,"journal":{"name":"2021 9th International Conference on Information and Communication Technology (ICoICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信