2017 5th International Conference on Information and Communication Technology (ICoIC7)最新文献

筛选
英文 中文
A Malay named entity recognition using conditional random fields 马来命名实体识别使用条件随机场
M. S. Salleh, S. A. Asmai, H. Basiron, S. Ahmad
{"title":"A Malay named entity recognition using conditional random fields","authors":"M. S. Salleh, S. A. Asmai, H. Basiron, S. Ahmad","doi":"10.1109/ICOICT.2017.8074647","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074647","url":null,"abstract":"Currently, unstructured textual data analysis has attracted researchers' interest because it offers valuable information into many fields such as business, education, political, healthcare, crime prevention and other. Various sources are accessible that contain unstructured textual data such as online documents, Facebook, Twitter or Instagram. However, the implementation process for these types of unstructured data is limited, especially for Malay language. The lack of textual analysis process brings difficulties in obtaining important information for decision-making. This paper presented an Automated Malay Named Entity Recognition (AMNER) conceptual model using conditional random fields method for Malay language to recognize entities from unstructured textual data. The analysis focused on the developmental model based on Malay language features which guided the recognition process of entities from unstructured text documents.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Data analysis to uncover intruder attacks using data mining techniques 使用数据挖掘技术进行数据分析,以发现入侵者的攻击
S. Nazir, M. Ghazanfar, Naif R. Aljohani, M. A. Azam, Jalal S. Alowibdi
{"title":"Data analysis to uncover intruder attacks using data mining techniques","authors":"S. Nazir, M. Ghazanfar, Naif R. Aljohani, M. A. Azam, Jalal S. Alowibdi","doi":"10.1109/ICOICT.2017.8074683","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074683","url":null,"abstract":"Radicalism is becoming an increasingly potential concern. Intruder groups are using handful tactics and radicalism has disparaging effects, particularly in Gulf and Pakistan region. Forecasting the pattern of attacks is a complex task. This research paper presents new insights on intruder groups and targets using data mining algorithms. We propose a framework, which uses historical data to train machine-learning classifiers and can predict intruder groups and attack types based on selected features. We analyzed that the major victims of intruder groups would be citizen and property, government, police, and military sectors. We figured out that J48 and IBK learning algorithms perform consistently well under various experimental settings.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The performance of OpenMP architecture for simulating fire spreading in forest area by cellular automata 基于元胞自动机的OpenMP体系结构模拟森林地区火灾蔓延的性能
Mulyani, N. D. Putri, P. H. Gunawan
{"title":"The performance of OpenMP architecture for simulating fire spreading in forest area by cellular automata","authors":"Mulyani, N. D. Putri, P. H. Gunawan","doi":"10.1109/ICOICT.2017.8074661","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074661","url":null,"abstract":"The analysis of parallel performances in simulation of forest fires using Cellular Automata (CA) is considered in this paper. Two simulations are given, simulation of forest fire with topography and wind effects. Here, the Von Nuemann rule of CA is used. From the numerical simulations, the CPU time for several grids 100×100, 200×200, 400×400, 800×800, and 1600×1600. Using number of grids 1600×1600, the CPU time for serial and parallel codes with topography effect are obtained 6076.31 and 2670.43 seconds respectively. Meanwhile, the CPU time serial and parallel of simulation, with wind effect are obtained 186.325 and 128.793 with grid numbers 1600 × 1600. The speedup and efficiency for simulation with topography effect reach 2.27 and 56% respectively. Moreover, 1.44 and 36% are the speedup and efficiency for simulation with wind effect.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparative study of MFCC-KNN and LPC-KNN for hijaiyyah letters pronounciation classification system MFCC-KNN与LPC-KNN在hijaiyyah字母发音分类系统中的比较研究
Adiwijaya, Masyithah Nur Aulia, M. S. Mubarok, W. U. Novia, F. Nhita
{"title":"A comparative study of MFCC-KNN and LPC-KNN for hijaiyyah letters pronounciation classification system","authors":"Adiwijaya, Masyithah Nur Aulia, M. S. Mubarok, W. U. Novia, F. Nhita","doi":"10.1109/ICOICT.2017.8074689","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074689","url":null,"abstract":"Reciting Al-Qur'an sometimes becomes hard to do for Indonesian because Al-Qur'an was written in Arabic which is not the native language of Indonesian. The common mistake for Indonesian is pronouncing the Hijaiyah letters. In this paper, we propose to utilize the ability of Speech Recognition to help people learn reciting Al-Qur'an in the right way. This system is built using K-Nearest Neighbor (KNN) Algorithm as the classifier. For the extraction feature, we use Linear Predictive Coding (LPC) and Mel-Frequency Cepstrum Coefficients (MFCC) and compare both. We also compare the result for system with Principal Component Analysis (PCA) and without PCA. The best result when we use LPC is 78,92% and when we use MFCC is 59,87%.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Adoption factors of online-web railway ticket reservation service (A case from Indonesia) 铁路网上订票服务的采用因素(以印尼为例)
Indrawati, Sofiar Yusliansyah
{"title":"Adoption factors of online-web railway ticket reservation service (A case from Indonesia)","authors":"Indrawati, Sofiar Yusliansyah","doi":"10.1109/ICOICT.2017.8074709","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074709","url":null,"abstract":"PT. Kereta Api Indonesia (KAI) is the only company that has been given an authority by government to provide, manage and organize railway transportation in Indonesia. The railway industry in Indonesia started during the colonial in 1864 and in 2015 KAI had served 326 million passengers with an average growth in the number of 330.000 passengers annually. One of the biggest challenge faced by KAI is the improvement of pre-trip service quality. One of the improvement of this service is the development of Rail Ticketing System by using a web-based information technology platform. The online-web ticket reservation service (OTRS) had been launched since 2012 with 42 partner channels available on the internet. However — since its first launched in 2012 — the usage of OTRS had only 27% reservation compared to 67% ticket reservations from ticket counter at railway station. In order to increase the use of OTRS, finding factors that affect the behavior of OTRS user is needed. Based on Unified Theory of Acceptance and Use of Technology (UTAUT) 2 Model and modified UTAUT 2, this study proposed a new modified model toward the service. The data to test the model were collected from 682 valid respondents. The data were analyzed by using SmartPLS2.0 software and the result showed that the independent variables Performance Expectancy, Social Influence, Facilitating Condition, Hedonic Motivation and Perceived Risk had significant influence on Behavioral Intention and Facilitating Condition, Habit and Behavioral Intention had significant influence on the Use Behavior.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Worth eat: An intelligent application for restaurant recommendation based on customer preference (Case study: Five types of restaurant in Tangerang Selatan region, Indonesia) Worth eat:基于顾客偏好的餐厅推荐智能应用(案例研究:印尼Tangerang Selatan地区的五种餐厅)
D. N. Utama, Luqman Isyraqi Lazuardi, Hersy Ayu Qadrya, B. M. Caroline, Tris Renanda, Atthiya Prima Sari
{"title":"Worth eat: An intelligent application for restaurant recommendation based on customer preference (Case study: Five types of restaurant in Tangerang Selatan region, Indonesia)","authors":"D. N. Utama, Luqman Isyraqi Lazuardi, Hersy Ayu Qadrya, B. M. Caroline, Tris Renanda, Atthiya Prima Sari","doi":"10.1109/ICOICT.2017.8074654","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074654","url":null,"abstract":"In a metropolitan, to find a restaurant in rush hour is a challenging activity to do. It is going to be easy, when someone accesses an application and it recommend the best restaurant then he / she can visit to. Through using combination between methods fuzzy-logic and bubble-sort that were realized in customer preference case, an intelligent application for restaurant recommendation was technologically constructed. The method fuzzy logic used to parameterize three selected parameters; interest, location, and rating. And, the bubble-sort is a method to optimize the recommendation based on full-factorial concept. Tangerang Selatan (Indonesia) area and twelve restaurants indicating five types of restaurant were practically chosen as a case study of this research, and seventy seven respondents were realistically involved to justify the selected parameters.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Interactive and collaborative platform implementation on learning management system 学习管理系统的交互协作平台实现
Amanda Putri Septiani, D. D. J. Suwawi, A. Herdiani
{"title":"Interactive and collaborative platform implementation on learning management system","authors":"Amanda Putri Septiani, D. D. J. Suwawi, A. Herdiani","doi":"10.1109/ICOICT.2017.8074714","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074714","url":null,"abstract":"In common traditional learning, there are some weaknesses, one of which is students' limitation of receiving additional learning material. The use of e-learning in schools is expected to be a solution to these problems, because generally e-learning contains known traditional learning components such as group discussions, ideas submission and knowledge accumulation. Social Network allows users to do problem solving, creates connection and collaborates with other users. In this paper, the authors build e-learning system with interactive and collaborative platforms concept. Interactive and collaborative platform makes learning as a combination of cognitive and constructive process with social process, so it encourages more active learning and supports better group interaction. The concept of e-learning with interactive and collaborative platform and its features, such as news feeds, chat box, like and comment feature along with open course system, are able to increase the level of E-learner Satisfaction which includes Learner Interface, Learning Community, also Content and Personalization.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks SECO:用于检测和防御拒绝服务攻击的 SDN sEcure COntroller 算法
Song Wang, K. G. Chavez, S. Kandeepan
{"title":"SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks","authors":"Song Wang, K. G. Chavez, S. Kandeepan","doi":"10.1109/ICOICT.2017.8074692","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074692","url":null,"abstract":"Software Defined Network (SDN) brings additional flexibility to the traditional network allowing the implementation of intelligent information processing. SDN introduces a new architecture, where the controller acts as the brain of the network controlling several tasks such as routing, load balancing and providing the required quality of service (QoS). However, having a centralized controller makes the network vulnerable in terms of security. This paper introduces SDN sEcure COntroller (SECO) a novel and simple detect and defense algorithm, running in the controller, for improving SDN security features under Denial of Service (DoS) attacks. The network performance during attack is tested with and without the SECO algorithm. In this paper we show by means of simulations that the DoS attacks can degrade the controller's performance and the proposed algorithm could significantly reduce the impact of such DoS attacks.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128051349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A study of cloud based connected car services 基于云的联网汽车服务研究
S. Yogarayan, A. Azman, S. F. A. Razak, K. J. Raman, M. F. A. Abdullah, S. Z. Ibrahim, A. Amin, K. S. Muthu
{"title":"A study of cloud based connected car services","authors":"S. Yogarayan, A. Azman, S. F. A. Razak, K. J. Raman, M. F. A. Abdullah, S. Z. Ibrahim, A. Amin, K. S. Muthu","doi":"10.1109/ICOICT.2017.8074645","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074645","url":null,"abstract":"The automotive industry has been moving fast towards advanced integrated system. Connected car has been a very popular research field in both academic and automotive industries. Generally, vehicles can have communication efficiency with other wireless access points and Internet gateways which provide useful information and practical Internet access. A good amount of research has been done to exploit the different services that provides vehicle communication in several countries like USA, Europe and Japan. This paper provides a study of how a vehicle communication takes place with mobile phone experience application into embedded systems and the wireless communication technologies that is suitable to be used in vehicular environment in Malaysia.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Consumer perceptual mapping towards e-banking channel: (A study of bank BRI customer in Indonesia) 消费者对电子银行渠道的感知映射:(对印尼银行BRI客户的研究)
R. Giri, B. Santoso, A. Mustikasari, Made Kevin Bratawisnu
{"title":"Consumer perceptual mapping towards e-banking channel: (A study of bank BRI customer in Indonesia)","authors":"R. Giri, B. Santoso, A. Mustikasari, Made Kevin Bratawisnu","doi":"10.1109/ICOICT.2017.8074686","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074686","url":null,"abstract":"Implementation of e-banking services system provides various advantages for the company are cost and time efficiencies, and be able to create differentiation and able to target market segments with low cost. To determine the underlying motives customers to select and prefer one channel and the other required a systematic exploration of the customer perception. This study aims to understand the customers' perception of various e-banking channels and how their motives in choosing the channel usage. By understanding customer perceptions about various banking channels, it is expected to be more helpful in assisting banks in Indonesia to introduce e-banking. A convinience sampling technique used to select 234 customers who surveyed in this study. Findings suggest that Automatic Teller Machine was percieved to be low cost, low complexity and most usefulness. EFT is also almost similar to the ATM, get the low cost and low complexity but low on security. Perception on Internet banking was secure and usefulness and high on privacy. Meanwhile perception on SMS banking was easy to access and also high on privacy. And phone banking was perceived to be the most expensive and inaccurate. Future studies are expected in addition to using other multivariate techniques would also be able to add other attributes are more influential.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信