{"title":"Adaptive security for multilevel adhoc networks — A survey","authors":"Tahira Mahboob, Samman Fatima, Zunaira Atta","doi":"10.1109/ICITISEE.2016.7803037","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803037","url":null,"abstract":"An adhoc network does not depend on any fixed structure or mechanism, unlike other types of networks. These have been widely in use for commercial purposes due to their unique properties. With major advantages of diversity offered by adhoc networks security is one of the greatest challenges faced by adhoc networks. The present study has been mainly dedicated towards highlighting various threats and challenges faced by ad-hoc networks. The scope of the study has been set for academia and research. This study aims to serve as an aid towards developing and understanding of adoption of required security for multi-level adhoc networks. Diverse security mechanisms, protocols, security threats/attacks, challenges and algorithms for securing ad-hoc networks are discussed in detail.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automatic 3D face model segmentation for acquiring weight motion area","authors":"Rio Caesar, Suyoto, Samuel Gandang Gunanto","doi":"10.1109/ICITISEE.2016.7803052","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803052","url":null,"abstract":"Inside facial animation works there is an animator that need to be skilled enough to produce detailed animation, so the facial animation can be smooth when doing facial expressions. Every animated character requires special handling based on the characteristics of the size and location of the bone. This process, where every face model need special handling were time consuming and tedious work. For that issue this research propose method for using motion capture marker data in 3D face model for automatically segment weight motion area based on the feature point. Marker data that came from motion capture of human model will be used to represent a centroid of vertex cluster that forming expressions in animated character. The data grouping process will be spherical coordinate result calculation between feature point and vertices using modified nearest neighbor algorithm. The result obtained in this research will show the weight motion area that generated automatically from the feature point based on nearest neighbor algorithm in a 3D face model.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128455885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Rohman, R. Indrawijaya, D. Kurniawan, O. Heriana, Chaeriah Bin Ali Wael
{"title":"Sidelobe suppression on pulse compression using curve-shaped nonlinear frequency modulation","authors":"B. Rohman, R. Indrawijaya, D. Kurniawan, O. Heriana, Chaeriah Bin Ali Wael","doi":"10.1109/ICITISEE.2016.7803046","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803046","url":null,"abstract":"Pulse compression is a method for improving the range resolution of the radar systems. Linear Frequency Modulation (LFM) is a type of pulse compression which is commonly used in the radar applications because of its simplicity and Doppler tolerance. However this method provides relatively high first peak sidelobe level within around -13.3 dB. This paper presents a developed curve-shaped Nonlinear Frequency Modulation (NLFM) using second degree polynomial approach for radar pulse compression in order to reduce the sidelobe level. The radar signal is assumed has bandwidth 30 MHz while the length of pulse signal as long as 10e-6 s. The curve-shaped chirp waveform is formed by the polynomial equation utilizing the LFM waveform as the base line. According to the simulation results and analysis, using a certain polynomial equation, the curve-shaped NLFM with negative orientation provides lower sidelobe level than the LFM. The best first peak sidelobe level achieved by this proposed NLFM is approximately -18.6 dB.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126896715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of e-leaming based on knowledge management system for Indonesian academic institution","authors":"N. Karna, I. Supriana, N. Maulidevi","doi":"10.1109/ICITISEE.2016.7803045","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803045","url":null,"abstract":"As per May 2016, in the second semester of 2015-2016 there are 5.144.659 active students served by all academic institutions in Indonesia. This number is large compared to the number of academic document indexed by Google Scholar, which only reaches about 1.150.000 documents. The main purpose of this research is to propose a design of information system solution that has the capability on acquiring knowledge, manage the knowledge, and empowering the knowledge in the form of academic document, which in return can improve the number of documents indexed by Google Scholar. We use TM Forum Application Map or TAM from Frameworx 13.5 as a framework to design the solution as Knowledge Management System. Empowerment of well-documented explicit knowledge to create eLearning will focus on Data Presentation and Distribution functionality, which means both explain how eLearning presents the knowledge to create courses and how eLearning distribute the courses. There are several advantages offered by an eLearning based on Knowledge Management System, include creation of a course freely by using cross knowledge study, updating the reference whenever a newer edition is available, and creation of unlimited number of courses by using abundant explicit knowledge. This will gives further benefit in knowledge sharing and reuse. The novelty of this research is by implementing eLearning based on Knowledge Management System for Indonesia academic Institution.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128834376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadhilur Rizki, T. A. B. Wirayuda, Kurniawan Nur Ramadhani
{"title":"Identity recognition based on palm vein feature using two-dimensional linear discriminant analysis","authors":"Fadhilur Rizki, T. A. B. Wirayuda, Kurniawan Nur Ramadhani","doi":"10.1109/ICITISEE.2016.7803041","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803041","url":null,"abstract":"Research on biometrics continues to grow. Various studies conducted to increase the performance of personal identification based on physical and behavioral characteristics. Palm vein recognition became an interesting field lately. Palm vein feature covered underneath the skin so that it hard to forge and more resist to external factors than fingerprint and face features. In this research, recognition process consists of preprocessing, feature extraction and matching. Feature extraction has been done using Two-Dimensional Linear Discriminant Analysis. This method could reduce dimension by maximizing between-class scatter and minimizing within-class scatter. Two-Dimensional Linear Discriminant Analysis obtained a good performance for CASIA palm vein dataset. The configuration of parameters needs to be determined in order to increase the system performance. The best performance obtained 8% in term of EER and Recognition Rate 94,67% with threshold 0,4933.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Hasanah, A. E. Permanasari, S. Kusumawardani, Feddy Setio Pribadi
{"title":"A review of an information extraction technique approach for automatic short answer grading","authors":"U. Hasanah, A. E. Permanasari, S. Kusumawardani, Feddy Setio Pribadi","doi":"10.1109/ICITISEE.2016.7803072","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803072","url":null,"abstract":"The requirement for automatic short answer grading (ASAG) system brings researchers to discover more knowledge about this field. Many techniques have been developed to reach the highest accuration. It can be processed by following stages: creating data set, pre-processing, model building, grading, and model evaluation. One of the techniques which commonly used is information extraction technique. Information extraction is a technique that employing finding fact on the student answers as patterns and then matches these to the teacher answer. The accuration is pointed out in computer and human raters agreement. The goal of this paper is to present a review of several ASAG research which using information extraction technique. However, this paper does not conclude the best method which can be used for general cases.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Riza, Imam Fachmi Nasrulloh, E. Junaeti, Rena Zain, A. Nandiyanto
{"title":"gradDescentR: An R package implementing gradient descent and its variants for regression tasks","authors":"L. Riza, Imam Fachmi Nasrulloh, E. Junaeti, Rena Zain, A. Nandiyanto","doi":"10.1109/ICITISEE.2016.7803060","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803060","url":null,"abstract":"Gradient Descent (GD) is one of famous machine-learning methods used for prediction on regression tasks in many fields. However, only a few software library utilizing it can be found in the literature. Therefore, this research is aimed to implement the method and the following variants: Mini-Batch Gradient Descent (MBGD), Stochastic Gradient Descent (SGD), and Stochastic Average Gradient Descent (SAG). The package is written in the programming language R, which is a software environment offering many facilities for statistics and machine-learning tools. Moreover, we provide the use of these approaches in a case study of gas industries, which is to predict values of the compressibility factor (Z-factor) of CO2. Basically, we consider the problem as a regression task including pressure and temperature as the input attributes. The first step is generating a learning model from available training data by using the methods. Then, the model is used to predict the Z-factor over new data. A performance comparison between the package and other methods from the literature is presented as well.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of chaff point generation methods for fuzzy vault scheme","authors":"Bambang Pilu Hartato, T. B. Adji, Agus Bejo","doi":"10.1109/ICITISEE.2016.7803070","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803070","url":null,"abstract":"Bio-encryption is a concept that aims to improve the traditional cryptographic security by combining biometrics and cryptography. Fuzzy Vault scheme is a bio-encryption method which is very famous for its ability to handle fuzzy biometric data while at the same time combines them with cryptographic mechanism. Moreover, Fuzzy Vault scheme is claimed as a bio-encryption method that can be deployed in System-on-Chip (SoC) based security devices. One of the requirements that must be fulfilled by a system that can be run on SoC based devices is less resource consuming. In other words, the system must have sufficient resource efficiency or must use the fairly efficient algorithms. One of the important phases in the Fuzzy Vault scheme is chaff point generation. Chaff points are analogized as a noise used for covering valuable information inside of Fuzzy Vault. Although the chaff point generation phase is a quite important phase, it would be the phase that has the highest computation level. Hence, research on chaff point generation method to find efficient methods while maintaining the security aspects of Fuzzy Vault Scheme became an interesting topic in bio-encryption field for some researchers. This paper will discuss and also will do some comparisons toward three current chaff point generation methods that have been proposed by some researchers. Thus, this paper is expected to contribute knowledge about the characteristics of these three methods.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Sediyono, Gregorius Anung Hanindito, A. Setiawan
{"title":"Analyzing land conversion in South East Minahasa, Indonesia, under Landsat Satellite image data using the supervised classification method","authors":"E. Sediyono, Gregorius Anung Hanindito, A. Setiawan","doi":"10.1109/ICITISEE.2016.7803051","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803051","url":null,"abstract":"South East Minahasa is recent regency located in the North Sulawesi Province, Indonesia. It is officially announced in 2007 as the expansion of South Minahasa Regency. This area has a superior commodity in the plantation sector, especially for coconut plantation. This study is analyzing the expansion pattern of plantation land and conversion of forest to plantation in South East Minahasa, Indonesia. The image data are taken from Landsat Satellite from the year of 2002, 2007, 2010, and 2014. The results show that during 2002-2014 there are forest degradation trend in South East Minahasa; from 42.906,25 Ha in 2002 to 26.392,87 ha in 2014. It is hoped that the results can give valuable input for the related government in establishing the land management regulation in the upcoming years.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134279515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saktioto, R. Farma, D. Irawan, M. Sufi, F. D. Ismail
{"title":"Computationally numerical experiment of carbon species densities for thermal plasma dynamic","authors":"Saktioto, R. Farma, D. Irawan, M. Sufi, F. D. Ismail","doi":"10.1109/ICITISEE.2016.7803058","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803058","url":null,"abstract":"The present work develops a computationally effective one-dimensional sub grid set in numerical integration for density formulation from thermal plasma. The model incorporates two-body and more collision effects throughout Carbon plasma using continuity equation. The carbon gas inter electrode gap is accelerated by the electric field to produce plasma. In this model the reaction processes of carbon species is identified. The extrapolation of species dominant in arc discharge process is critical issue in significant for predicting carbon nanostructure production. In this paper, we describe chemical kinetic models and their possibilities of carbon ion and neutral species production based on collisions and time dependence. The results show the reaction rate of Carbon ions calculated at 7.85 × 1028 m-3 s-1 while the temperature increment decreases, the reaction rate is up to 6.25 × 1027 m-3 s-1. The electron density reduces until 108 m-3 from initial condition at 1 atm. However, the electron density increases 1013 m-3 from 0.05 eV-0.3 eV. The ionization of Carbon reaction has been affected by pressure and temperature which gains a quantitative understanding of the density at equilibrium state.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124163615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}