2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)最新文献

筛选
英文 中文
Conceptual framework for public policymaking based on system dynamics and big data 基于系统动力学和大数据的公共决策概念框架
Feldiansyah Bakri Nasution, Nor Erne Nazira Bazin, Hasanuddin
{"title":"Conceptual framework for public policymaking based on system dynamics and big data","authors":"Feldiansyah Bakri Nasution, Nor Erne Nazira Bazin, Hasanuddin","doi":"10.1109/EECSI.2017.8239192","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239192","url":null,"abstract":"Public policy is the critical key of the welfare programs. It is also a powerful instrument to achieve a feasible national competitiveness. Unfortunately, many public policy making processes does not utilize an appropriate data and tool in holistic and systematical approach. This research will focus on creating a comprehensive conceptual framework for public policymaking based on data and system approach. In connection with information technology, there are at least two approaches that will be considered for obtaining a more comprehensive public policy. First is utilization of Big Data to extract information. It is believed that if more accurate data are collected and analyzed, then more comprehensive public policy is created. Utilization of data mining will be intensively used to obtain knowledge. Second approach is the system dynamics. The knowledge created in the first approach is useful in modeling the system. The model will be used to simulate the future possibilities of several scenarios. The scenario with the best outcome is selected as an input for public policymaking. At the end of this research, a conceptual framework for public policy making will be created by incorporating Big Data and system dynamics.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133201960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of network emulator based on the use of resources in virtual laboratory 基于资源利用的虚拟实验室网络仿真器性能分析
Yuri Ariyanto, Y. Syaifudin, B. Harijanto
{"title":"Performance analysis of network emulator based on the use of resources in virtual laboratory","authors":"Yuri Ariyanto, Y. Syaifudin, B. Harijanto","doi":"10.1109/EECSI.2017.8239075","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239075","url":null,"abstract":"A network emulator is a software in its environment mimicking the functions and habits of the original network. Problems often encountered in doing research on computer networks is a problem of design and trial scenarios that require software and hardware enough to implement such a network scenario similar to a real scenario. Using virtual machine technology is expected to solve the problem. Netkit supports experiments with various network technologies and can support other technologies necessary for certain network experiments. This study uses a network emulator with netkit, where it is freely available and built based on Linux User Mode. Netkit allows users to experiment with complex computer network scenarios that can be easily implemented using linux. The experimental research is done by making the design first. The design is used to implement the routing process, to connect 4 different network addresses. On the Netkit implementation of the design, it is implemented by creating a virtual routing lab based on data from computer network topologies. The virtual laboratory implementation of this research routing is based on a network topology scenario. The results of these virtual routing lab experiments, the routing process runs well on the network based on predetermined test scenarios, with the occurrence of connections between different network addresses. In the end the virtual routing lab implementation works well, with performance analysis results from the netkit emulator on the use of computer resources showing Usage CPU usage of 0% and Memory Usage averaging 20942.8k test time for 12 minutes. The results of this trial is very helpful for administrators before the implementation on the real network","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124080433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Revealing daily human activity pattern using process mining approach 利用过程挖掘方法揭示人类日常活动模式
M. Ma’arif
{"title":"Revealing daily human activity pattern using process mining approach","authors":"M. Ma’arif","doi":"10.1109/eecsi.2017.8239160","DOIUrl":"https://doi.org/10.1109/eecsi.2017.8239160","url":null,"abstract":"In the last few years, with the emergence of ambient assisted living, the study of human behavioral pattern took a wide interest from research communities around the world. In many literatures, pattern recognition was widely adopted approach to implements in human behavior study from computing perspective. Pattern recognition brings a promising results in terms of accuracy for modeling human behavior. But the problem with this approach is the complexity of knowledge representation which formulated in mathematical model. In turns, a correction by the experts is hardly conducted. In another hand, gathering a graphical insight is not a trivial task. This paper investigate the use of process mining technology to gives an alternative to such problems. Process mining is data-driven approach to infer a graphical representation of any kind of process. In terms of human behavior, process can be defined as sequences of activities performed by human on daily basis. From the conducted experiments process mining was shown a potential use to infer a human daily activity pattern in a graphical representation.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysis of statement branch and loop coverage in software testing with genetic algorithm 用遗传算法分析软件测试中的语句分支和循环覆盖
Rizal Broer Bahaweres, Khoirunnisya Zawawi, D. Khairani, Nashrul Hakiem
{"title":"Analysis of statement branch and loop coverage in software testing with genetic algorithm","authors":"Rizal Broer Bahaweres, Khoirunnisya Zawawi, D. Khairani, Nashrul Hakiem","doi":"10.1109/EECSI.2017.8239088","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239088","url":null,"abstract":"Software testing is one important aspect of the software development process. About 50% of the time and cost in the software development process used for software testing process. There are two methods of software testing, black-box testing and white-box testing. This research using white-box testing. Software testing can be done manually or automatically. Based on research conducted, genetic algorithm has been widely implemented in software testing, such as test data generator. The purpose of this study is to apply a genetic algorithm in software testing and comparing the results with manual testing, automated, and automated with genetic algorithm. The test parameters are coverage measurements (statement, branch and loop coverage) and the time of testing. The conclusion of this study is automated testing with genetic algorithm requires fewer time and test cases to achieve coverage of 100%.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
IoT smart device for e-leaming content sharing on hybrid cloud environment 用于混合云环境下电子学习内容共享的物联网智能设备
Mohd Yazid Bin Idris, D. Stiawan, Nik Mohd Habibullah, A. H. Fikri, M. Rahim, Massolehin Dasuki
{"title":"IoT smart device for e-leaming content sharing on hybrid cloud environment","authors":"Mohd Yazid Bin Idris, D. Stiawan, Nik Mohd Habibullah, A. H. Fikri, M. Rahim, Massolehin Dasuki","doi":"10.1109/EECSI.2017.8239078","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239078","url":null,"abstract":"Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative solution to eliminate bottleneck access. Although CDN is an effective solution, the implementation of technology is expensive and has less impact for student who lives in limited or non-existence internet access in geographical area. In this paper, we introduce an IoT smart device to provide e-Learning access for content sharing on hybrid cloud environment with distributed peer-to-peer communication solution for data synchronization and updates. The IoT smart device acts as an intermediate device between user and cloud services, and provides content sharing solution without fully depending on the cloud server.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PID designs using DE and PSO algorithms for damping oscillations in a DC motor speed PID设计使用DE和PSO算法阻尼振荡在直流电机的速度
L. Syafaah, Widianto, I. Pakaya, D. Suhardi, M. Irfan
{"title":"PID designs using DE and PSO algorithms for damping oscillations in a DC motor speed","authors":"L. Syafaah, Widianto, I. Pakaya, D. Suhardi, M. Irfan","doi":"10.1109/EECSI.2017.8239138","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239138","url":null,"abstract":"In this paper, a design and a simulation of a PID controller are presented to control a DC motor speed. The design is proposed to increase a dynamic stability of the motor speed. Changing the speed setpoint values may generate oscillations, thus the controller is required to maintain a system stability. The PID controller is tuned using Differential Evolutionary (DE) and Particle Swarm Optimization (PSO) algorithms. Performance of both algorithms is compared by Integral Square Error (ISE) and rise time values. Experiments are performed by changing the speed setpoint values. In simulation results, the ISE and the rise time values of the DE algorithm are slower than the PSO algorithm.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Determining the nutrition of patient based on food packaging product using fuzzy C means algorithm 基于食品包装产品,采用模糊C均值算法确定患者的营养状况
S. Winiarti, S. Kusumadewi, I. Muhimmah, H. Yuliansyah
{"title":"Determining the nutrition of patient based on food packaging product using fuzzy C means algorithm","authors":"S. Winiarti, S. Kusumadewi, I. Muhimmah, H. Yuliansyah","doi":"10.1109/EECSI.2017.8239151","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239151","url":null,"abstract":"The main idea in this research is the utilization of Fuzzy C Means (FCM) method as the determination of patient's nutritional status, which is implemented, in mobile application. Parameters used to cluster nutritional status are height, weight and age. The result of the decision will give 3 clusters on nutritional status is good nutrition, malnutrition and better nutrition. Mobile apps are used as a reminder of the nutritional value or ingredients contained in the packaging of food products while consuming food. The result of system testing for application of FCM algorithm in this mobile application obtained validation of 80%.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of unbiased stereology method for organ volume estimation using image processing 基于图像处理的无偏立体器官体积估计方法的实现
M. Faiq, Balza Achmad, G. Partadiredja
{"title":"Implementation of unbiased stereology method for organ volume estimation using image processing","authors":"M. Faiq, Balza Achmad, G. Partadiredja","doi":"10.1109/EECSI.2017.8239093","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239093","url":null,"abstract":"Stereology had been widely used around the globe for estimating the value of the biological structure. It interlinks the connection between the dimensions using a sample that is 2D for a quantification in 3D structure. Volume estimation using stereology method is the most common and basic quantification that shows an example of how stereology works. Stereology method has a drawback when it comes to a lot of samples, so it is common for a researcher to use the computer to help to quantify and to do repetitive work, which is known as computer-assisted stereology quantification. The purpose of this research is to develop software that can assist researchers using stereology method for estimating the volume of a sample object from its 2D digital images with point counting method. The software was built based on the manual procedure of volume estimation using stereology method performed by experienced researchers. The volume estimation using the software were then compared with the results of the manual procedure by the experts on the same samples, i.e., the kidney and trigeminal ganglion of a rat. The experimental results showed that the relative difference of the volume estimations between manual and computer assisted calculations were 0.93% for rat kidney sample and 10.81%. TA1 trigeminal ganglion sample. Based on the results, the software estimation can be used for further analysis.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting the early drop of attention using EEG signal 利用脑电图信号检测早期注意力下降
F. Gunawan, Krisantus Wanandi, B. Soewito, S. Candra, N. Sekishita
{"title":"Detecting the early drop of attention using EEG signal","authors":"F. Gunawan, Krisantus Wanandi, B. Soewito, S. Candra, N. Sekishita","doi":"10.1109/EECSI.2017.8239175","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239175","url":null,"abstract":"The capability to detect the drop of attention as early as possible has many practical applications including for the development of the early warning system for those who involve in high-risk works that require a constant level of concentration. This study intends to develop such the capability on the basis of the data of the brain waves: delta, theta, alpha, beta, and gamma. For the purpose, a number of participants are asked to participate in the study where their brain waves are recorded by using a low-cost Neurosky Mindwave EEG sensor. In the process, the participants are performing a continuous performance test from which their attention levels are directly measured in the form of the response time in conjunction to those waves. When the response time is much longer than a normal one, the participant attention is assumed to be dropped. A simple k-NN classification method is used with the k = 3. The results are the following. The best detection of the attention drop is achieved when the attention features are extracted from the earliest stage of the brain wave signals. The brain wave signal should be recorded longer than 1 s since the time the stimulus is presented as a short signal leads to a poor categorization. A significant drop in the level of response time is required to provide the brain signal that better predicts the change of the attention.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"100 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of knowledge management system using technology acceptance model 基于技术接受模型的知识管理系统评价
J. Suroso, A. Retnowardhani, Abraham Fernando
{"title":"Evaluation of knowledge management system using technology acceptance model","authors":"J. Suroso, A. Retnowardhani, Abraham Fernando","doi":"10.1109/EECSI.2017.8239158","DOIUrl":"https://doi.org/10.1109/EECSI.2017.8239158","url":null,"abstract":"This study was motivated to assess the Knowledge Management System (KMS) using Technology Acceptance Model (TAM). TAM is the best concept to be taken as model on explaining user attitude of new technology. TAM model used in the study because it has been widely adopted among IT researchers and appears to be growing rapidly, has the reliability and construct validity were established, and realized that the model has not been applied to the acceptance KMS. The data population in this study is the employees in PT. XYZ who have work-related to development and maintenance process. The data analysis was done using Partial Least Squares (PLS). The analysis was proof to be statistically significant: a) perceived ease of use and perceived usefulness, b) perceived ease of use and attitude, c) perceived usefulness and attitude, d) perceived usefulness and behavioral intention to use, e) behavioral intention to use and actual use.","PeriodicalId":220109,"journal":{"name":"2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信