{"title":"Predictor-based dynamic soft VSC in time-delay systems with magnitude-constrained input signal","authors":"P. Ignaciuk","doi":"10.1109/IC3INA.2016.7863025","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863025","url":null,"abstract":"In order to achieve a short regulation cycle time-optimal control has been considered in the past. However, implementation difficulties and sensitivity to errors and uncertainty have incited other research directions. In this paper, soft Variable Structure Control (VSC) is analyzed from the perspective of linear systems with input delay. Fast convergence under smoothly varying input signal is obtained. The stability issues originating from non-negligible time delay are addressed explicitly through the application of a state predictor, applicable to both structurally stable and unstable plants. Properties of the obtained dynamic soft VSC system are demonstrated analytically and verified in numerical experiments.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123753881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Albert Sagala, Rudy Pardosi, Alexander Lumbantobing, Pandapotan Siagian
{"title":"Industrial control system security-malware botnet detection","authors":"Albert Sagala, Rudy Pardosi, Alexander Lumbantobing, Pandapotan Siagian","doi":"10.1109/IC3INA.2016.7863036","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863036","url":null,"abstract":"Industrial realize that SCADA System was built without considering the security aspect. It was believe that there will be no attacks go to the SCADA plant using malware, such as botnet. Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols (e.g., IRC) and structures (e.g., centralized), and can become ineffective as botnets change their C&C techniques. In this research, we study vertexnet malware attack on a SCADA Server so that it can identify a SCADA Operator machine. The identification was used by analyzing and comparing process list which is run on the infecting host, so the attacker didn't take the wrong target, taking over the SCADA and sending some command to disrupt or operate the plant or machine, and to identifying of Botnet Vertexnet function and activity. From the experiment conducted, we get result that botnet Vertexnet can identifying SCADA Operator, taking over the server, and the activity can be detected effectively and efficiently.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karto Iskandar, F. Gaol, B. Soewito, H. Warnars, R. Kosala
{"title":"Software size measurement of knowledge management portal with use case point","authors":"Karto Iskandar, F. Gaol, B. Soewito, H. Warnars, R. Kosala","doi":"10.1109/IC3INA.2016.7863021","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863021","url":null,"abstract":"Knowledge Management portal is a system to support Knowledge Management process, in order to create, capture, develop, share, reuse and optimize the knowledge and particularly in Bina Nusantara University which has implemented Knowledge Management System (KMS) since 2002. However, this KMS need to be measured in order to know how better this KMS in term of the software size. The BINUS KMS will be measured in term of their software size in functionality perspective with use case point method. This metric of KMS will be used by management to know how better the software size, complexity level and effort to development in numbering. Measurement of software size with software metric such as Use Case Point upon use case diagram for BINUS knowledge Management Portal shows that the project has medium software size with score Use Case Point (UCP) = 108.56 and has estimate effort will be developed in 2,064 hours (or in 258 days or 51.6 weeks or 12.9 months) and has development cost for 516,000,000.00 rupiah (Indonesian currency). Use Case Point, estimate effort and project value will powerful to help management in order to make decision regarding the implementation of IT software project development in term of time, money and people.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep architectures for super-symmetric particle classification with noise labelling","authors":"Iftitahu Ni'mah, Rifki Sadikin","doi":"10.1109/IC3INA.2016.7863044","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863044","url":null,"abstract":"Deep learning algorithms modelled with deep architectures have demonstrated impressive results to alleviate common problems of Feedforward Neural Networks, i.e. escaping poor solutions of local minima. Basic architecture concepts behind these powerful models have been set up by preliminary research on Neural Networks, including the application of unsupervised pretraining algorithms and greedy layer-wise strategy and on small scale benchmark datasets. We present practical experiments to evaluate deep classifiers on large scale Super-symmetric (SUSY) particle data sets with variations of noise labelling to examine the robustness of its regularizer. Deep architecture models that are compared in this study include one single hidden layer Multilayer Perceptrons (MLP), Deep stacked Neural Networks (DNN), Stacked Denoising Autoencoders (SDAE), and Deep Belief Networks (DBN). The result shows that deep architecture models (DNN and SDAE) can reduce error gap between low-level and complete feature learning up to 78%, as compared to shallow model (MLP). In our experiment, SDAE can also maintain its superiority in less noisy data set and exhibits nearly linear convergence through the benefits of unsupervised pretraining layers and early stopping of hyperparameter learning.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Khotimah, Masatoshi Yoshikawa, A. Hamasaki, Osamu Sugiyama, K. Okamoto, T. Kuroda
{"title":"Comparing frequent patterns: A study case of Apriori and singleton implementations in a diabetes type 2 data set","authors":"P. Khotimah, Masatoshi Yoshikawa, A. Hamasaki, Osamu Sugiyama, K. Okamoto, T. Kuroda","doi":"10.1109/IC3INA.2016.7863043","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863043","url":null,"abstract":"Frequent sequential pattern (FSP) mining has become an effective tool to explore the pattern sequence occurrences in many fields. The methods developed in FSP is mainly based on Apriori algorithm. This algorithm looks for frequent sequence of itemset which need not to be consecutive. In addition, the itemset that supports the cardinality of a frequent sequence can be a partial itemset. However, in the case of medication for diabetes type 2, the selection of patient medication is considered essential. A combination of medications represents the clinical conditions of the patients. Therefore, we considered a medication combination as one full item sets (i.e., singleton). We are interested in the transition events from one medication episode to the next. As such, we consider consecutive sequence of singleton. This paper studies the result characteristic of Apriori-based FSP and singleton mining. The result of this study shows that the singleton mining results set is the subset of Apriori-based algorithm, with 0.203 of ratio value. However, Apriori-based algorithm results set contains frequent sequence pattern of medication transition event which is unlikely to happen in real clinical conditions with high frequency. By contrast, the singleton mining results set represents the true medication transition event.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132904795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iman Firmansyah, W. A. Sukarto, B. Hermanto, J. Asta, H. Nugraha
{"title":"Wi-Fi based temperature monitoring system for thermal analysis with Kalman Filter implementation","authors":"Iman Firmansyah, W. A. Sukarto, B. Hermanto, J. Asta, H. Nugraha","doi":"10.1109/IC3INA.2016.7863013","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863013","url":null,"abstract":"We developed the Wi-Fi based temperature monitoring system which determines the melting point of a material caused by thermal events in a material. The system is consisting of a furnace combined with digital PID controller, embedded microcontroller and two K-type thermocouple sensors for measuring both reference and sample temperature. In this paper, we performed the measurement by combining the common furnace along with an embedded microcontroller which is integrated by a customized of OpenWRT Linux distribution and Wireless Access Point (WAP) as well. The Linux operating system served as a web server delivering the measurement process from the microcontroller and thermocouple sensors. Since the board contains WAP, the measurement process was accessed by utilizing web browser wirelessly. For the sake of data backup, the measurement data were also saved on the installed ROM or SD card. The melting point of material was calculated by subtracting the reference from the material under tested. To filter the noise, Kalman Filter algorithm was implemented in the analysis to get the better result.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132701669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The synthesis of AUV high-precision path following control system on the base of PD-controller","authors":"V. Filaretov, D. Yukhimets","doi":"10.1109/IC3INA.2016.7863037","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863037","url":null,"abstract":"Autonomous underwater vehicle (AUV) are complex nonlinear dynamic objects with variable and uncertain parameters, operating in conditions of significant interacting between their degrees of freedom in the presence of external influences. For high-precision path-control of AUV the control system (CS) consisting of two loops is offered in this paper. First loop is the loop of tracking a target point and second loop is the loop of correction of position of this point. Thus, for improvement of characteristics of this CS in paper the method of synthesis of controller of target point position based on Lyapunov method is offered and the features of its implementation as part of on-board AUV CS are described. Performed mathematical simulation shows that the proposed AUV path controller provides highly accurate motion AUV for given spatial trajectories in the presence of external disturbances, as well as changing the parameters of the AUV.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"And the winner is …: Bayesian Twitter-based prediction on 2016 U.S. presidential election","authors":"Elvyna Tunggawan, Y. Soelistio","doi":"10.1109/IC3INA.2016.7863019","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863019","url":null,"abstract":"This paper describes a Naive Bayesian predictive model for 2016 U.S. Presidential Election based on Twitter data. We use 33,708 tweets gathered since December 16, 2015 until February 29, 2016. We propose a simple way for data preprocessing which can still achieve 95.8% accuracy on predicting sentiments. The predicted sentiments are used to forecast the U.S. Republican and Democratic parties candidacies. The forecast is compared to the poll collected from RealClearPolitics.com with 26.7% accuracy. However, the true forecasting capacity of the method still have to be observed after the election process come to conclusion.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of educational institution DNS network traffic for insider threats","authors":"Kristanto Santosa, Charles Lim, Alva Erwin","doi":"10.1109/IC3INA.2016.7863040","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863040","url":null,"abstract":"The Internet is a medium for people to communicate with each other. Individuals and/or organizations are faced with increased security threats on the Internet. Many organizations prioritize on handling external security threats over internal security threats and for this reason, internal security threats are often missed or worst ignored. Domain Name System (DNS) is one of major Internet services that resolve user's request on domain name to an IP address. Since all of the user query to domain name utilize DNS to resolve the domain name or vice versa, including malicious intended user's query. Thus, DNS is a great source of information for detecting potential insider threat to detect unknown insider threats. This research aims to detect insider threats using DNS based features and these potential insider threats are clustered based on the DNS traffic features. Machine learning algorithms are used to cluster the DNS traffic under investigation. Our research shows that suspected clusters of DNS traffic contain insider threats in the organizations and the most frequent suspect of insider threats are botnet, categorized as misuse in insider threat classification. Some clusters could be suspicious indicating insider threats and other cluster is also a benign cluster but potentially an abnormal traffic.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A performance study of anomaly detection using entropy method","authors":"A. A. Waskita, H. Suhartanto, L. T. Handoko","doi":"10.1109/IC3INA.2016.7863038","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863038","url":null,"abstract":"An experiment to study the entropy method for an anomaly detection system has been performed. The study has been conducted using real data generated from the distributed sensor networks at the Intel Berkeley Research Laboratory. The experimental results were compared with the elliptical method and has been analyzed in two dimensional data sets acquired from temperature and humidity sensors across 52 micro controllers. Using the binary classification to determine the upper and lower boundaries for each series of sensors, it has been shown that the entropy method are able to detect more number of out ranging sensor nodes than the elliptical methods. It can be argued that the better result was mainly due to the lack of elliptical approach which is requiring certain correlation between two sensor series, while in the entropy approach each sensor series is treated independently. This is very important in the current case where both sensor series are not correlated each other.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}