2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

筛选
英文 中文
Non-linear effects of high rate soliton transmission on DWDM optical fiber communication system 高速率孤子传输对DWDM光纤通信系统的非线性影响
Brian Pamukti, D. Perdana
{"title":"Non-linear effects of high rate soliton transmission on DWDM optical fiber communication system","authors":"Brian Pamukti, D. Perdana","doi":"10.1109/ICITISEE.2016.7803042","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803042","url":null,"abstract":"The bit error rate (BER) decreasing of soliton transmission in dense wavelength division multiplexing (DWDM) system because of non-linear effects is investigated. Non-linear effects in DWDM are brought on by the Quadratic Electro-Optic effects (Kerr Effects) and inelastic scattering. The Kerr effects included self-phase modulation, four wave mixing, and cross phase modulation. Kerr effects can cause problems in the limited number of channels and bandwidth. In this paper, we analyzed the impact of Kerr-effect on 10 Gbps soliton transmission DWDM systems which found that the value of refractive index of non-linear (n2) influences on reducing the number of input channel. The results show that soliton can increase quality of performance with Q factor more than 6. Several research with same bitrate using a length of 100 km, this paper analyzed longer distances have doubled, which is 200 km. Transmit power has a lower power value of about 35%, it is very important for issue of energy savings. In addition, the number of channels increasing up to 80 channels.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient implementation of mean formula for image processing using FPGA device 利用FPGA器件高效实现图像处理的均值公式
Aqwam Rosadi Kardian, S. Sudiro, S. Madenda
{"title":"Efficient implementation of mean formula for image processing using FPGA device","authors":"Aqwam Rosadi Kardian, S. Sudiro, S. Madenda","doi":"10.1109/ICITISEE.2016.7803057","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803057","url":null,"abstract":"Image processing needs a process based on mathematical formula applied to image data. In software it is easy to do that and accessing data from memory. The other hand for hardware implementation with a lot of constraint. This article propose an implementation of optimum mean formula in FGPA Device. For mean calculation only need one addition component (in one accumulator) and one division using shift right register, for 8×8 image size need 64 clock cycle to finish the mean calculation, comparing other approach that need more than 512 addition component.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSA implementation for data transmission security in BEM chairman E-voting Android based application RSA在BEM主席电子投票系统中实现数据传输安全
F. P. Juniawan
{"title":"RSA implementation for data transmission security in BEM chairman E-voting Android based application","authors":"F. P. Juniawan","doi":"10.1109/ICITISEE.2016.7803054","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803054","url":null,"abstract":"Voting is a process that should be do in terms of leadership. In case, voting still use conventional methods which are less effective in terms of cost, governance, and working time. The possibility of calculation errors and fraud in the calculation process can also occur. STMIK Atma Luhur still using the conventional voting method in the election of the chairman of BEM. With the development of today's technology, we can make electronic voting system based on Android to solve the problems of conventional voting. E-voting security becomes fundamental things that must be considered. RSA cryptographic methods can be a solution to ensure the security. RSA choses because it has the advantage of difficulty level in factoring numbers into prime numbers. More difficult factoring the numbers, it will be more difficult to break the encryption. Another advantage is the form of higher security than symmetric algorithm. This algorithm is also resistant to various forms of attack, such as brute force. The security testing are using Wireshark and Eclipse LogCat. The result is the establishment of an e-voting system based on Android that is safe and confidential, so the students can do the voting quickly, whenever and wherever.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adopting information security techniques for cloud computing—A survey 采用云计算的信息安全技术——调查
Tahira Mahboob, Maryam Zahid, Gulnoor Ahmad
{"title":"Adopting information security techniques for cloud computing—A survey","authors":"Tahira Mahboob, Maryam Zahid, Gulnoor Ahmad","doi":"10.1109/ICITISEE.2016.7803038","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803038","url":null,"abstract":"Cloud Computing is widely used technique for data storage on-demand but involves risk such as data security, privacy protection, access-control and data confidentiality. Present study is a survey of the popularly used encryption techniques that is helpful to secure sensitive information on cloud. A discussion of the fundamental challenges and issues/characteristics of cloud computing has been done. Identification of security and privacy issues within this framework are highlighted. Study of the widely used encryption techniques helpful in securing sensitive information on cloud is debated. Scope has been set for academicians and researchers. Diverse versions of the encryption techniques surveyed and analyzed to identify optimization features for cloud security.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Implementation of image enhancement techniques based on intel edison platform 基于intel edison平台的图像增强技术实现
Zaid Hadi, N. Sulaiman, I. Halin, N. A. M. Yunus
{"title":"Implementation of image enhancement techniques based on intel edison platform","authors":"Zaid Hadi, N. Sulaiman, I. Halin, N. A. M. Yunus","doi":"10.1109/ICITISEE.2016.7803040","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803040","url":null,"abstract":"Image enhancement (IE) is to produce images with suitable visual quality. These enhanced images can then be used in many image processing applications, for e.g., remote sensing, medical imaging, and aerial imaging. However, most of the previous applications have been implemented on traditional computers, which are expensive and large. This work addresses the implementation of IE techniques like color balance, brightness, contrast, and sharpness, on a low cost platform (Intel Edison). The proposed enhancements are programmed by Python, with the assistance of Python imaging library (PIL). Two systems are being run, traditional computer and Intel Edison. The performance evaluation has been done by comparing the visual appearance and histogram of the enhanced images. The result shows that both systems produce similar outputs. Hence, with the low cost (75$) and tiny size (6×2.9×0.8 cm) of Intel Edison compared to the traditional computer (500$), performing IE on the Intel Edison is a viable low-cost alternative.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face detection and tracking using live video acquisition in camera closed circuit television and webcam 基于闭路电视和网络摄像头的实时视频采集人脸检测与跟踪
D. Saputra, Kamal Miftahul Amin
{"title":"Face detection and tracking using live video acquisition in camera closed circuit television and webcam","authors":"D. Saputra, Kamal Miftahul Amin","doi":"10.1109/ICITISEE.2016.7803065","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803065","url":null,"abstract":"Human face detection is one domain in computer vision application. There are so many researches in the field of image processing on the face. Some researchers previously conducted research on face recognition, no matter from what tribe, how healthy, how old, they developed research on facial expressions, whether sad, normal or laugh. Some previous research also built on the face detection system focusing on environmental conditions. CCTV is generally used as a complementary security and is widely used in industries, military, airports, shops, offices, factories, and even today many housing have been using and applying this technology. CCTV uses signals that are closed, unlike the usual television that is broadcast signal. The use of CCTV with face detection, is expected to see the actual condition and detect any human presence on the video. Using the technology of tracking (tracking) and face detection, it can develop a system that can detect human presence, as for the implementation of this research is the application of technology Live Video Acquisition for the presence of human beings based on the detected face on the CCTV camera.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125953557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Second preimage attack method on various MAC constructions and its application with AES-128 各种MAC结构的二次预像攻击方法及其在AES-128中的应用
A. B. Sihite, B. H. Susanti
{"title":"Second preimage attack method on various MAC constructions and its application with AES-128","authors":"A. B. Sihite, B. H. Susanti","doi":"10.1109/ICITISEE.2016.7803044","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803044","url":null,"abstract":"A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, ECBC-MAC, FCBC-MAC, XCBC-MAC, RMAC, TMAC, OMAC and CMAC are some of MAC constructions that used in the hash function. In this paper, we propose a method of second preimage attack that utilizes the concept of existential forgery on CBC-MAC and it can be used on all of that various MAC construction. We apply the method to find second preimage on that various MAC constructions which uses AES-128 block cipher algorithm in its basic construction for the proof that the method is working. The results show that with the modifications as many as 220 for each sample, we can obtain the second preimages easily as many as 220 in that various MAC constructions.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rainfall prediction in Tengger region Indonesia using Tsukamoto fuzzy inference system 基于Tsukamoto模糊推理系统的印尼腾格里地区降雨预测
I. Wahyuni, W. Mahmudy, A. Iriany
{"title":"Rainfall prediction in Tengger region Indonesia using Tsukamoto fuzzy inference system","authors":"I. Wahyuni, W. Mahmudy, A. Iriany","doi":"10.1109/ICITISEE.2016.7803061","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803061","url":null,"abstract":"Rainfall Prediction in Indonesia is very important for agricultural sector. However, obtaining an accurate prediction is difficult as there are too many input parameters including the world climate change that affect the accuracy. An accurate prediction is required to arrange a good schedule for planting agricultural commodities. A good approach is required to obtain a good model as well as the accurate prediction. This paper proposes Tsukamoto fuzzy inference system (FIS) to solve the problem. An intensive effort is put in building fuzzy membership function based on rainfall data in Tengger region from ten years ago. A series of numerical experiments prove that the proposed approach produces better results comparable to those achieved by other approach. In Tutur region Tsukamoto fuzzy inference system obtain Root Mean Square Error (RMSE) of 8.64, it is better than GSTAR-SUR method that obtain RMSE of 10.89.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Feature extraction for lesion margin characteristic classification from CT Scan lungs image CT扫描肺图像病灶边缘特征分类的特征提取
Yosefina Finsensia Riti, H. A. Nugroho, S. Wibirama, B. Windarta, L. Choridah
{"title":"Feature extraction for lesion margin characteristic classification from CT Scan lungs image","authors":"Yosefina Finsensia Riti, H. A. Nugroho, S. Wibirama, B. Windarta, L. Choridah","doi":"10.1109/ICITISEE.2016.7803047","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803047","url":null,"abstract":"Lung cancer is one of the common cancer which occurred in both male and female. Revealed by WHO data, in 2012, this disease become one of the major cause of death in worldwide with the mortality rate about 1.59 million. An early detection of lung cancer by using Computed Tomography (CT) Scan can provide more opportunity to survive. However, the diagnosis of lung cancer by reading the CT scan image which performed by radiologists may lead to an error. A computer-based digital image processing is a solution to improve the accuracy and consistency in reading the CT Scan image result. This study aim is to identify the morphological characteristic of regular and irregular margins by using feature extraction method. In this research, image processing divided into several stages refer to the segmentation process with Otsu method, feature extraction with number of features such as convexity, solidity, circularity, and compactness, and the last is classification by using Multi Layer Perceptron (MLP). The classification process of features convexity, solidity, circularity, and compactness, resulted in the accuracy value of 85%, sensitivity of 85%, and specificity of 85%.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A parameter identification method for fractional order inductance of iron core reactor 铁芯电抗器分数阶电感的参数辨识方法
Pengcheng Xia, Zhishan Liang
{"title":"A parameter identification method for fractional order inductance of iron core reactor","authors":"Pengcheng Xia, Zhishan Liang","doi":"10.1109/ICITISEE.2016.7803043","DOIUrl":"https://doi.org/10.1109/ICITISEE.2016.7803043","url":null,"abstract":"This paper is based on the capacitance and inductance are the fractional order, using the experimental method of measuring the impulse response characteristics of the iron core reactor. According to the fractional calculus Mittag-Leffler function of the Laplasse transform formula, the use of MATLAB toolbox in the MLF function program, so as to calculate the pulse response characteristics of the fractional order iron core reactor. Finally, the three parameters (equivalent resistance, inductance and fractional order) of the impedance model of an iron core reactor are obtained by the least square method. The pulse responses using the extracted parameters show very close agreement with the simulated and experimental datasets; with less than 0.1% relative error for the simulations and less than 10% from the experimental results. This method makes up for the defects of the parameters in the production design and the practical application of the iron core reactor.","PeriodicalId":217262,"journal":{"name":"2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信