2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)最新文献

筛选
英文 中文
Real-Time 3-D Motion Gesture Recognition using Kinect2 as Basis for Traditional Dance Scripting 基于Kinect2的传统舞蹈脚本实时三维运动手势识别
A. Emanuel, Andreas Widjaja
{"title":"Real-Time 3-D Motion Gesture Recognition using Kinect2 as Basis for Traditional Dance Scripting","authors":"A. Emanuel, Andreas Widjaja","doi":"10.1109/ICACSIS.2018.8618251","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618251","url":null,"abstract":"This preliminary study presents a system capable of recognizing human gesture in real-time. The gesture is acquired from a Kinect2 sensor which provides skeleton joints represented by three-dimensional coordinate points. The model set consists of eight motion gestures is provided for basis of gesture recognition using Dynamic Time Warping (DTW) algorithm. DTW algorithm is utilized to identify in real time manner by measuring the shortest combined distances in x, y, and z coordinates in order to determined the matched gesture. It can be shown that the system is able to recognize these 8 motions in real time with some limitations. The findings of the this study will provide solid foundation of further research in which the ultimate goal of the research is to create system to automatically recognize sequence of motions in Indonesian traditional dances and convert them into standardized Resource Description Framework (RDF) scripts for the purpose of preserving these dances.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICACSIS 2018 Index
{"title":"ICACSIS 2018 Index","authors":"","doi":"10.1109/icacsis.2018.8618222","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618222","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enumeration and Handling Security Issues of Government Official Web Application 政府官方网站应用程序的安全问题列举及处理
A. Fajar, S. Yazid
{"title":"Enumeration and Handling Security Issues of Government Official Web Application","authors":"A. Fajar, S. Yazid","doi":"10.1109/ICACSIS.2018.8618196","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618196","url":null,"abstract":"Web applications are one of the targets in information security attacks. Many security holes can be exploited can be source of damage and operational disruption of the application itself and even the IT infrastructure in it. Web Application Security Issues usually relate to problems that the developer or the owner may not aware or tend to ignore the issues. The main objective is to enumerate, describe and analyze security issues of the government official web application in Indonesia. The issues covers technical, environment and support issues of application development, configuration and security governance. Technical and environment issues identified using application vulnerability scanners tools. The result shows that web applications have most weakness in configuration issues, both application and security configuration. All of weaknesses that identified relate to technical development, application environment and support. The state of the art of the work lay on that how to improve the quality of web application development which often ignore security requirement during design, development, and deployment. That conditions may raise security issue when the web application has published that may affect other systems. The work recommend several approach to handle the security issues as a contribution to developer and the owner to fix the issues.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICACSIS 2018 Cover Page ICACSIS 2018封面
{"title":"ICACSIS 2018 Cover Page","authors":"","doi":"10.1109/icacsis.2018.8618245","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618245","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127103182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is Informatics Education Students ' Impression of Using Metacognitive Training System at The First Time? 信息学教育学生第一次使用元认知训练系统的印象如何?
W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah
{"title":"What is Informatics Education Students ' Impression of Using Metacognitive Training System at The First Time?","authors":"W. Hidayat, Setiadi Cahyono Putro, M. A. Gumilang, Indriana Hidayah","doi":"10.1109/ICACSIS.2018.8618171","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618171","url":null,"abstract":"The use of Metacognitive Training System (MTS) is relatively new in Indonesia. Previously, a prototype of MTS has been developed and applied in Universitas Gadjah Mada. To become a massive product, the prototype of the MTS must be tested on a larger scale. It is intended to capture user impression about a new product. In this paper, we present User Experience (UX) measurement for the developed MTS in larger scale, involving 90 undergraduate students of informatics education at Universitas Negeri Malang. Two UX measurement methods are used, including User Experience Questionnaires (UEQ) and short-interview. UEQ is used for capturing general impressions, whereas, short-interview is conducted to get deeper feedback about the efficacy of the MTS in their studies. The UX measurement result is benchmarked and revealed that Attractiveness, Efficiency, and Stimulation categorized excellent and the interview result shows that more than 75% respondent responds with the positive answer in five questions. With this result, it could be concluded that the MTS is ready for massive product.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Betawi Traditional Food Image Detection using ResNet and DenseNet 基于ResNet和DenseNet的传统食品图像检测
Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany
{"title":"Betawi Traditional Food Image Detection using ResNet and DenseNet","authors":"Noer Fitria Putra Setyono, D. Chahyati, M. I. Fanany","doi":"10.1109/ICACSIS.2018.8618175","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618175","url":null,"abstract":"Technological developments in the field of Smart System is now growing and began to spread to various areas such as tourism sector. In this research, we developed a smart system for Betawi culinary tourism. Detection of traditional food names using images is a challenge because the variety of shape and direction of shooting is always different. The use of deep learning architecture is expected to overcome the problem, but the selection of effective deep learning architecture is also a problem. This study compares some deep learning architecture to determine the suitable architecture to detect culinary images. Based on our experimental results, DenseNet169 gives the best performance in terms of accuracy, error rate and training time when using CPU and ResNet50 when using GPU..","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of Factors that Influence Purchase Intention on Omni-channel Services 全渠道服务购买意愿影响因素分析
H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
{"title":"Analysis of Factors that Influence Purchase Intention on Omni-channel Services","authors":"H. Susanto, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICACSIS.2018.8618249","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618249","url":null,"abstract":"The emergence of online and new digital media such as mobile applications and social media changed the retail business model and its consumers behaviors. These changes bring new challenges for companies and their stores to manage various channels. This phenomenon creates new idea to integrate them into Omni-channel services. It requires the readiness and complex maintenance because each channel has different characteristics. The consumers find difficulties in ensuring their transactions to be accurate and trustable. This study aims to analyze the factors that influence consumers to use Omni-channel services. It adopts the UTAUT2 with two new variables, such as personal innovativeness and perceived security. The quantitative approach is demonstrated using PLS-SEM with 168 respondents. As the results, social influence variable becomes the most influencing factor on purchasing intention in Omni-channel services, followed by performance expectation, and security perception. These factors become priority when a company formulates strategies for its omni-channel.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma 精益方法在IT基础设施监控系统管理中的应用——以Kalbe农场为例
D. Pratama, R. F. Aji, S. Yazid
{"title":"Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma","authors":"D. Pratama, R. F. Aji, S. Yazid","doi":"10.1109/ICACSIS.2018.8618260","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618260","url":null,"abstract":"Monitoring system is a crucial part in establishing sophisticated IT infrastructure. Monitoring of IT infrastructure becomes indispensable for knowing the status and performance of technology components. Complex infrastructure, such as virtualization and cloud computing systems, boost up the number of nodes to be monitored. Notifications accumulate, which makes it more difficult to track problems. With lots of unneccessary notifications, the challenge to provide availabmty and improve service quality becomes more complex. A monitoring system that can deliver accurate monitoring information is needed. This research proposed a method to manage IT infrastructure monitoring system using Lean method. Lean method is a popular method of process management and has been successfully used in several IT process improvement projects. The results of this research show that lean methods can be applied to increase the quality of monitoring system, through the process stages that have been described in the lean implementation principle. Quantitatively it is known that after the lean method is applied, the number of network elements, nodes and interfaces monitored increases by 39%, 105% and 1%, respectively. While the alerts and events generated decreased by 77% and 49%, respectively. Qualitatively based on the identification of value achievement, the system can deliver the value expected by the customer, in which case the customer is a user of monitoring system.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Indonesian Sentiments Using Indonesian Sentiment Lexicon by Considering Denial 用印尼情绪词汇分析印尼人的情绪,并考虑否认
F. Saputra, Yani Nurhadryani
{"title":"Analysis of Indonesian Sentiments Using Indonesian Sentiment Lexicon by Considering Denial","authors":"F. Saputra, Yani Nurhadryani","doi":"10.1109/ICACSIS.2018.8618142","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618142","url":null,"abstract":"The amount of public opinion can be very much against a trendy thing. Seeing this, it is not possible to read every opinion manually to get a conclusion from all opinions because it will take quite a lot of time. Sentiment analysis can be used as a solution to the problem. However, public opinion is not always written in just one sentence, it can even be written in more than one sentence. It should also be noted that sentences in Indonesian are divided into two based on their forms, namely simple sentences and compound sentences. Simple sentences only consist of one clause, while compound sentences consist of one or more clauses. Each clause in compound sentences can have differences based on whether there is denial the clause or not. Seeing this, this paper seeks to improve performance by considering the denial, sentence form in Indonesian, and punctuation that is used as a paused or finished intonation. Data used in this paper obtained from Twitter during the campaign of the election in West Java 2018. The methodology of model building consist of 4 stages: data preprocessing, feature extraction, classification, and evaluation. The model resulted in this paper has improved accuracy by 3% from 60.15% to 63.7%.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of User Awareness, Trust, and Privacy Concerns on Sharing Personal Information on Social Media: Facebook, Twitter, and Instagram 用户意识、信任和隐私问题对在社交媒体上分享个人信息的影响:Facebook、Twitter和Instagram
Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto
{"title":"Impact of User Awareness, Trust, and Privacy Concerns on Sharing Personal Information on Social Media: Facebook, Twitter, and Instagram","authors":"Valentinus Paramarta, Muhammad Jihad, Ardhian Dharma, Ika Chandra Hapsari, P. Sandhyaduhita, A. Hidayanto","doi":"10.1109/ICACSIS.2018.8618220","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618220","url":null,"abstract":"Facebook, Twitter, and Instagram are the most often and most widely used social-media sites, especially in Indonesia. The number of social-media users is increasing every year, accompanied by increased risks. One of those risks is to the security and privacy of users, as shown by the user-data leak experienced by Facebook in 2018. These issues led the authors to conduct research relating to the influence of privacy concerns, trust, and user awareness on the readiness to share personal information via social-media sites. A research model was developed based on several hypotheses. The research model was confirmed, and experiment was conducted from 340 social-media users through a questionnaire-based online survey over a period of 2 months. To confirm the structural model used in this research, reliability and validity analyses were performed. Structural equation model (SEM) analysis was used to detect relationships among constructs in the research model. The results of this research show that user awareness, trust, and privacy concerns have a positive and significant effect on sharing personal data on social media. Then we discussed the implications of our results for policy-making, practice, and future research.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128704257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信