2016 2nd International Conference on Science and Technology-Computer (ICST)最新文献

筛选
英文 中文
Spinal curvature determination from scoliosis X-Ray image using sum of squared difference template matching 基于平方差和模板匹配的脊柱侧凸x线图像脊柱曲率确定
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877343
B. Kusuma, H. A. Nugroho, S. Wibirama
{"title":"Spinal curvature determination from scoliosis X-Ray image using sum of squared difference template matching","authors":"B. Kusuma, H. A. Nugroho, S. Wibirama","doi":"10.1109/ICSTC.2016.7877343","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877343","url":null,"abstract":"Scoliosis is a disorder in which there is a sideways curve of the spine. Curve are often S-shaped or C-shaped. One of the methods to ascertain a patient with scoliosis is through using Cobb angle measurement. The importance of the automatic spinal curve detection system is to detect any spinal disorder quicker and faster. This study is intended as a first step based on computer-aided diagnosis. The spinal detection method that we propose is using template matching based on Sum of Squared Difference (SSD). This method is used to estimate the location of the vertebra. By using polynomial curve fitting, a spinal curvature estimation can be done. This paper discusses the performance of SSD method used to detect a variety of data sources of X-Ray from numerous patients. The results from the implementation indicate that the proposed algorithm can be used to detect all the X-ray images. The best result in this experiment has 96.30% accuracy using 9-subdivisions poly 5 algorithm, and the average accuracy is 86.01%.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Overview on computational-based B-cell epitope prediction: Dataset, method and accuracy 基于计算的b细胞表位预测综述:数据集、方法和准确性
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877350
Binti Solihah, Afiahayati
{"title":"Overview on computational-based B-cell epitope prediction: Dataset, method and accuracy","authors":"Binti Solihah, Afiahayati","doi":"10.1109/ICSTC.2016.7877350","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877350","url":null,"abstract":"Vaccine development evolves to peptide-based vaccine which is effective and efficient if it is composed from epitopes of pathogens. Experimental-based epitope prediction such as X-ray crystallography is time consuming and expensive. Available data from this experiment makes a possibility to develop computer based epitope prediction method. This approach is crucial to accelerate epitope identification in wet experiment. The performance of B cell epitope prediction is still in the medium level, although the development of methods, database and software have evolved and the improvement of the earlier method is statistically significant. This state shows that the improvement of the performance is an open problem. In this study, computational based epitope prediction to support vaccine development is resumed and is studied comprehensively. Therefore, this article can be used as a reference for another researcher to identify the current state in this research area.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design optimization of tri core PM linear generator using SA and FPA for wave energy conversion system in south coast of Java Island 爪哇岛南海岸波浪能转换系统中采用SA和FPA的三芯永磁直线发电机的设计优化
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877359
F. D. Wijaya, Sarjiya, Rifa'i P.S Muhammad, Daud P Kukuh
{"title":"Design optimization of tri core PM linear generator using SA and FPA for wave energy conversion system in south coast of Java Island","authors":"F. D. Wijaya, Sarjiya, Rifa'i P.S Muhammad, Daud P Kukuh","doi":"10.1109/ICSTC.2016.7877359","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877359","url":null,"abstract":"Due to the significant high waves which usually occurred, the south coast of Java Island has a huge potential of ocean waves energy which can be used to generate electricity. Converting ocean waves energy using permanent magnet linear generator (PMLG) can replace linear to rotational motion converter usage which has large mechanical power losses. However, high power losses in the PMLG's winding can occur if it is not optimally designed. This paper presents optimization methods for designing tri core PMLG with low power losses in the winding. The objectives function are derived from a magnetical model of linear generator. To obtain the best design, simulated annealing (SA) and flower pollination algorithm (FPA) with several variables and constraints is performed. The power losses in the winding of PMLG were ideally minimized using both methods. Optimization results from SA method were compared with the results from FPA. Based on the simulation, each method had that own characteristic to find the global optimal solution, including each variables value, objectives function value, and execution time.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of XBee-Pro transmission range for Wireless Sensor Network's node under forested environments based on Received Signal Strength Indicator (RSSI) 基于RSSI的森林环境下无线传感器网络节点XBee-Pro传输距离评估
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877347
Iswandi, Herlina Tri Nastiti, Ina Eprilia Praditya, I. Mustika
{"title":"Evaluation of XBee-Pro transmission range for Wireless Sensor Network's node under forested environments based on Received Signal Strength Indicator (RSSI)","authors":"Iswandi, Herlina Tri Nastiti, Ina Eprilia Praditya, I. Mustika","doi":"10.1109/ICSTC.2016.7877347","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877347","url":null,"abstract":"Wireless sensor networks (WSN) have been proposed to develop a monitoring system for forest in which XBee is one of prospective device for this implementation due to its simple set-up, low cost, low power consumption, and relative wide transmission coverage. Regarding the coverage area of WSN in forest is generally wide and the radio transmission is highly attenuated by foliage, the coverage range of device must be defined to optimize the number of nodes in the WSN systems. This paper delivers the empirical study of XBee transmission range in the forest based on Received Signal Strength Indicator (RSSI). The measurements have conducted in two different type of forest, i.e. heterogeneous tropical forest and homogeneous pine forest. The measurement results found highly degrades of transmission range compared to non-forest environment with the maximum distance of transmission are 250 m and 330 m for both aforementioned types of forest consecutively.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A visual recognition supporting tool for mapping environmental data using handheld measurement instruments 使用手持测量仪器绘制环境数据的视觉识别支持工具
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877363
Luthfi Zharif, Balza Achmad, Faridah, M. K. Ridwan
{"title":"A visual recognition supporting tool for mapping environmental data using handheld measurement instruments","authors":"Luthfi Zharif, Balza Achmad, Faridah, M. K. Ridwan","doi":"10.1109/ICSTC.2016.7877363","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877363","url":null,"abstract":"The environmental data mapping has become an important step to measure the mitigation plans from pollution impacts. It often requires an observer to measure environmental data in the field using portable measuring devices and combines them with geolocation data to produce geomapped data. One of its technical difficulties during this process is in the step of recording the data, since the observer usually has to record measurement data manually into certain program. In this paper, we developed a smartphone application that capable in reading digits on a handheld measuring device display using computer vision. The measured data is sent to a cloud-based data management system, Google Fusion Tables in order to be displayed in the form of interactive maps with web application. The template matching and pixel counting methods were used to recognize the digits of each respective digit. The variations of pre-processing techniques and template matching methods were also tested. It is shown that the combination of pixel counting and normalized correlation coefficient template matching method with binary digit and template images input resulted in maximum accuracy. From 120 sample images with varied lighting conditions, both in lab-scaled and in-field tests, the digit recognition rate has achieved 70.83% accuracy in lab-scaled and 67.92% when tested in-field. Nevertheless, digit recognition method shown unsatisfactory result which demands different digit recognition method.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the security of mp3 steganography using AES Encryption and MD5 hash function 使用AES加密和MD5哈希函数提高mp3隐写的安全性
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877361
R. Indrayani, H. A. Nugroho, Risanuri Hidayat, Irfan Pratama
{"title":"Increasing the security of mp3 steganography using AES Encryption and MD5 hash function","authors":"R. Indrayani, H. A. Nugroho, Risanuri Hidayat, Irfan Pratama","doi":"10.1109/ICSTC.2016.7877361","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877361","url":null,"abstract":"In the internet age, the security of data exchange becomes risky from some tapping attacks. One of the ways to maintain the data's security is by using steganography techniques. In this paper, steganography is combined with cryptography for security enhancement. The cover media is mp3 audio file. Since mp3 is a file that has been widely used in the Internet as a medium of entertainment, the secret message has been embedded to the homogenous frame of mp3 file. Before being embedded into the mp3 file, the secret message was encrypted with Advance Encryption Standard (AES) algorithm using a key that had been processed by Message Digest 5 (MD5) hash function. The secret message file type inserted could be in the form of text, image, audio, video, or compressed file. The result shows that the steganographic capacity does not depend on the size of mp3 but on the number of homogeneous frames owned by mp3 audio file. The result also shows that the method which combined steganography and cryptography, was successfully done without reducing the quality of used mp3 audio file.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Data classification for air quality on wireless sensor network monitoring system using decision tree algorithm 基于决策树算法的无线传感器网络空气质量监测系统数据分类
2016 2nd International Conference on Science and Technology-Computer (ICST) Pub Date : 2016-10-01 DOI: 10.1109/ICSTC.2016.7877369
B. Sugiarto, Rika Sustika
{"title":"Data classification for air quality on wireless sensor network monitoring system using decision tree algorithm","authors":"B. Sugiarto, Rika Sustika","doi":"10.1109/ICSTC.2016.7877369","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877369","url":null,"abstract":"Currently, the air quality monitoring becomes important things for knowing the value of air pollution especially in the cities. In our previous research, we built the air quality monitoring system using wireless sensor network (WSN). Each sensor nodes will transmit all of the air quality data to the base station controller (BSC). This data consists of weather condition, temperature, humidity, carbon monoxide (CO) and carbon dioxide (CO2). In this paper, we propose an implementation of the classification algorithm for classifying air quality in BSC node for generating the danger status of the warning system. By using the C4.5 algorithm, the entropy and information gain values of each case were determined in order to construct the decision tree structure and building the rule sets. From the experiment using confusion matrix, we can see that the proposed decision tree algorithm has the capability to classify the air quality data from sensor nodes with the accuracy of 85.71%, the precision of 81.82%, the sensitivity of 60.00%, and the specificity of 92.31%.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信