2017 5th International Conference on Information and Communication Technology (ICoIC7)最新文献

筛选
英文 中文
The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm 特征选择方法在树突状细胞算法垃圾邮件风险评估中的显著效果
Kamahazira Zainal, M. Z. Jali
{"title":"The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm","authors":"Kamahazira Zainal, M. Z. Jali","doi":"10.1109/ICOICT.2017.8074688","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074688","url":null,"abstract":"The vast amount of online documentation and the thriving of Internet especially mobile technology have caused a crucial demand to handle and organize unstructured data appropriately. An information retrieval or even knowledge discovery can be enhanced when a proper and structured data are available. This paper studies empirically the effect of pre-selected term weighting schemes, namely as Term Frequency (TF), Information Gain Ratio (IG Ratio) and Chi-Square (CHI2) in the assessment of a threat's impact loss. This feature selection method then further fed in conjunction with the Dendritic Cell Algorithm (DCA) as the classifier to measure the risk concentration of a spam message. The final outcome of this research is very much expected to be able in assisting people to make a decision once they knew the possible impact caused by a particular spam. The findings showed that TF is the best feature selection methods and well suited to be demonstrated together with the DCA, resulted with high accuracy risk classification rate.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Indonesia infrastructure and consumer stock portfolio prediction using artificial neural network backpropagation 利用人工神经网络反向传播预测印尼基础设施和消费股投资组合
S. Prashant Mahasagara, A. Alamsyah, B. Rikumahu
{"title":"Indonesia infrastructure and consumer stock portfolio prediction using artificial neural network backpropagation","authors":"S. Prashant Mahasagara, A. Alamsyah, B. Rikumahu","doi":"10.1109/ICOICT.2017.8074710","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074710","url":null,"abstract":"Artificial Neural Network (ANN) method is increasingly popular to build predictive model that generated small error prediction. To have a good model, ANN needs large dataset as an input. ANN backpropagation is a gradient decrease method to minimize the output error squared. Stock price movements are suitable with ANN requirement: it is a large data set because stock price is recorded up to every seconds, usually called high frequency data. The implementation of stock price prediction using ANN approach is quite new. The predictive model help investor in building stock portfolio and their decision making process. Buying some stocks in portfolio decrease diversified risk and increases the chance of higher return. In this paper, we show how to generate prediction model using artificial neural network backpropagation of stock price and forming portfolio with predicted price that bring prediction of the portfolio with the smallest error. The data set we use is historical stock price data from ten different company stocks of infrastructure and consumer sector Indonesia Stock Exchage. The results is for lower risk condition, ANN predictive model gives higher expected return than the return from real condition, while for higher risk, the return from the real condition is higher than the ANN predictive model.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133548654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Digital clock synchronization using IP with wireless fidelity 数字时钟同步使用IP与无线保真度
Dhimas Wahyu Pratama, Endro Ariyanto, M. Abdurohman
{"title":"Digital clock synchronization using IP with wireless fidelity","authors":"Dhimas Wahyu Pratama, Endro Ariyanto, M. Abdurohman","doi":"10.1109/ICOICT.2017.8074706","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074706","url":null,"abstract":"A clock in daily-life functions are very much, especially the highly visible usefulness as determination lecture schedules has started and finished. The problems that led to the digital clock is not always accurate, because devices used in the manufacture of digital clock cannot keep time accurately and digital clock run time without using an additional device such as RTC. This clock can also synchronize at the same time according to the time on the computer server for the elapsed time and time in the digital clock is always updated. There are two models, namely digital clock, Raspberry pi as a microcontroller master clock and ESP 8266 as a slave microcontroller clock. Master clock sends the command as a slave as publisher and subscriber will perform a given task, namely, synchronization time and turn the alarm on. The average time accuracy of the master clock for one week is 99.998% and its average deviation time is 1 second in one day, while the clock slave has an average accuracy rate for the week amounted to 99.918% and its average deviation time is 71.29 seconds in one day. During the 6 hours running time, slave clock will run into inaccuracies of up to 17.8 seconds, therefore the synchronization process will be conducted every 6 hours or 4 times a day to maintain its deviation no more than 20 seconds.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of enhanced background filtering and wavelet fusion for high visibility and detection rate of deep sea underwater image of underwater vehicle 基于增强背景滤波和小波融合的水下机器人深海图像高可视性和高检出率
A. A. Ghani, A. Nasir, W. Tarmizi
{"title":"Integration of enhanced background filtering and wavelet fusion for high visibility and detection rate of deep sea underwater image of underwater vehicle","authors":"A. A. Ghani, A. Nasir, W. Tarmizi","doi":"10.1109/ICOICT.2017.8074678","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074678","url":null,"abstract":"This paper presents an enhanced technique for contrast and visibility improvement for deep sea underwater image which is normally used for underwater robot. The proposed technique uses an integration approach of enhanced background filtering and wavelet fusion methods (EBFWF). The novelty lies in this case in its methodology and capability of the proposed approach to minimize negative underwater effects such as blue and green color casts, low contrast, and low visibility in comparison with other state-of-the-art methods. The proposed method consists of a few steps that aims to eliminate negative effects and thus improving the contrast and visibility of underwater image. This purpose is carried out to provide a better platform for object detection and recognition processes. The input image is first sharpen before the low frequency background is removed. This minimizes the probability of image data to be regarded as noise in the consequences processes' steps. Image histograms are then mapped based on the intermediate color channel to reduce the gap between the inferior and dominant color channels. Wavelet fusion is applied followed by adaptive local histogram specification process. Based on the conduced tests, the proposed EBFWF technique, computationally, more effective and significant in improving the overall underwater image quality. The resultant images processed through the proposed approach could be further used for detection and recognition to extract more valuable information.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automated vehicle class and color profiling system based on fuzzy logic 基于模糊逻辑的自动车辆分类和颜色分析系统
Aaron Christian P. Uy, R. Bedruz, Ana Riza F. Quiros, John Anthony C. Jose, E. Dadios, A. Bandala, E. Sybingco, Oswald Sapang
{"title":"Automated vehicle class and color profiling system based on fuzzy logic","authors":"Aaron Christian P. Uy, R. Bedruz, Ana Riza F. Quiros, John Anthony C. Jose, E. Dadios, A. Bandala, E. Sybingco, Oswald Sapang","doi":"10.1109/ICOICT.2017.8074681","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074681","url":null,"abstract":"The study proposes an automated vehicle class and color profiling system to specifically have distinct information on any apprehended car in an intelligent traffic system. The problem arises from the fact that traffic enforcers are sometimes unreliable with apprehending cars due to the lack of information on the violator. The solution is an automated system which consists of background difference method, and fuzzy logic to classify these violators. The general process is as follows: a capture picture from a traffic CCTV camera is subjected to a car detection process, and then the fuzzy inference systems are run to find the class and color of the car, and finally display a cropped picture of it along with the said descriptions. The automated car profiling system was found to have an accuracy of 99.391% for the classification process while 98.580% for the color profiling process. These results show that the algorithm is well-suited for a reliable implementation on intelligent traffic system.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"493 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Planning of LTE network at cawang — Cikarang Utama Toll Road with adaptive soft frequency reuse 基于自适应软频率复用的加旺-芝卡朗乌塔玛收费公路LTE网络规划
R. Nurhasanah, U. Usman
{"title":"Planning of LTE network at cawang — Cikarang Utama Toll Road with adaptive soft frequency reuse","authors":"R. Nurhasanah, U. Usman","doi":"10.1109/ICOICT.2017.8074704","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074704","url":null,"abstract":"In this research, existing LTE network around Cawang — Cikarang Utama is analyzed by capacity and coverage planning for five years later. Those existing sites around the toll roadthat not working optimally according to LTE Provider's KPI, will be classified. One of those sites becomes an input in performance test simulation. With using Adaptive Soft Frequency Reuse (ASFR) technique, the simulation intends to prove that ASFR can improve cell performance by performing power and subcarrier adjustment. ASFR is developed from SFR that can increase user data rate both in cell edge and cell center.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online collaboration adoption: A case study in Indonesia' ABC Telco company in Indonesia 采用在线协作:以印度尼西亚的ABC电信公司为例
Indrawati, Duto Pratomo
{"title":"Online collaboration adoption: A case study in Indonesia' ABC Telco company in Indonesia","authors":"Indrawati, Duto Pratomo","doi":"10.1109/ICOICT.2017.8074708","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074708","url":null,"abstract":"ABC Telco as the largest state owned telecommunication company in Indonesia with 16,097 employees had introduced online collaboration application named “Olive” to support company's operational activities since the end of 2014. Olive is targeted to change the way of work of every employee to become more effective and efficient. Either of the number of employees who has registered or employees who have been actively using the application is still small, amounting to 12% of the total employees. In order to increase the adoption of Olive, finding factors that affect the Behavioral intention of ABC employee toward online collaboration applications (Olive) is needed. Based on Unified Theory of Acceptance and Use of Technology 2 (UTAUT2), this study proposes a new modified model toward Olive. The measurement tool which consists of 8 constructs and 39 items proposed in this study is valid and reliable. The data to test the model are collected from 526 valid respondents of ABC Telco employees chosen by purposive sampling techniques across Indonesia. The data is analyzed by using SmartPLS2.0 software and the result shows that five independent variables (Performance Expectancy, Social Influence, Habit, Content Quality, Hedonic Motivation) have positive significance influences on Behavioural Intention. While Effort Expectancy and Facilitating Condition have no significance influence on Behavioral Intention. Based on the result of this study, to increase the adoption rate of employees, it is suggested that ABC Company should increase the socialization of applications to employees, add additional features that are entertaining in the application, and use the management as a role model in using Olive.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gait recognition using temporal gradient patterns 基于时间梯度模式的步态识别
Jashila Nair Mogan, C. Lee, A. Tan
{"title":"Gait recognition using temporal gradient patterns","authors":"Jashila Nair Mogan, C. Lee, A. Tan","doi":"10.1109/ICOICT.2017.8074680","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074680","url":null,"abstract":"In this paper, a Temporal Gradient Patterns (TGP) method is proposed for gait recognition. The method first computes the gradients of the silhouette in each image. Subsequently, the gradient of each pixel determines the bin number to which the pixel belongs to. The bin number of current and next frame jointly cast a vote to the corresponding index in the matrix of oriented gradients. The obtained matrix henceforth encodes the gradient pattern of each pixel in the gait cycle. The TGP method not only describes the spatial silhouette shapes but also implicitly captures the silhouette deformation in temporal axis. Experimental results show that the proposed approach attains a promising recognition rates.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fraud detection on international direct dial call using hybrid NBTree algorithm and Kullback Leibler divergence
Aries Yulianto, Adiwijaya, M. Bijaksana, K. Lhaksmana
{"title":"Fraud detection on international direct dial call using hybrid NBTree algorithm and Kullback Leibler divergence","authors":"Aries Yulianto, Adiwijaya, M. Bijaksana, K. Lhaksmana","doi":"10.1109/ICOICT.2017.8074676","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074676","url":null,"abstract":"Fraud detection is a serious challenge in the telecommunication sector, including in international direct dial (IDD) call service. Fraudulent activities cause a greater impact on the company because the loss of revenue results in the loss of the gain due to expenses to be paid to global partners to provide an international call interconnection. Therefore IDD call fraud continues to be a concern among all IDD call service providers by developing various methods to overcome the problem. The objective of this paper is to propose a method to detect fraud suspects on IDD call services which combines the advantages of hybrid NBTree and Kullback Leibler divergence (KL-divergence or KLD). NBTree is employed due to its ability to handle large size data and its performance in accuracy and tree size that outperforms Decision Tree and Naive Bayesian. In addition, the use of KL-divergence in fraud detection, similarity measurement, and feature selection has long been proven and implemented practice. The experiment results show that the combination of the two provides better accuracy and F1-measure compared with the previous method: Naive Bayesian Classifier, hybrid Naive Bayesian — KL-divergence, and Support Vector Machine (SVM).","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indexing Voronoi cells using quadtree in spatial database 利用四叉树在空间数据库中索引Voronoi单元格
Eriza Tri Abdi Nugroho, Kiki Adhinugraha, I. Asror
{"title":"Indexing Voronoi cells using quadtree in spatial database","authors":"Eriza Tri Abdi Nugroho, Kiki Adhinugraha, I. Asror","doi":"10.1109/ICOICT.2017.8074684","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074684","url":null,"abstract":"Computational geometry is a mathematical knowlege in the field related to the design and analysis of algorithm to solve geometry problems. Its can be applicated in the fields of mapping, robotics, geometry and so forth. A method can be used is Voronoi diagram. Voronoi diagram is a method of deviding the area to a smaller area based on the principle of the nearest neighboring. This method only used in 1-order voronoi diagram. In voronoi diagram there is a new variation named Highest Order Voronoi Diagram (HSVD). HSVD can be used for all orders voronoi diagram. However, these methods have disadvantage that accessing fragment use linear search. Consequently make data fragment searches to find the region to be slow and takes a long time. Therefore, in this paper will present a index structure that incoperates Highest Order Voronoi Diagrams into Quadtree. Quadtree index used is capable of cutting more than half of the original data. This algorithm makes the search regions faster than before.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信