2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

筛选
英文 中文
An Android Application for Predicting Traffic Congestion Using Polling Method 基于轮询方法预测交通拥堵的Android应用程序
Nuzulul Aulia Perdana Putra, K. Lhaksmana, Bambang Ari Wahyudi
{"title":"An Android Application for Predicting Traffic Congestion Using Polling Method","authors":"Nuzulul Aulia Perdana Putra, K. Lhaksmana, Bambang Ari Wahyudi","doi":"10.1109/ICOICT.2018.8528738","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528738","url":null,"abstract":"Traffic congestion is often a problem in major cities causing economic and social harm, air and sound pollution, as well as delays in daily activities. Existing traffic assistant applications usually provide traffic prediction based on real-time traffic condition and typical traffic record during weekdays. Such a traffic prediction is not applicable to predict traffic for special moments, e.g. long weekends and national holidays, on which the number of vehicle is very much different compared to that on weekdays. To tackle this issue, this paper proposes a method for traffic prediction by combining poll, traffic records, and linear regression. The proposed method is evaluated by conducting a poll to traffic users on one of the roads nearby Telkom University, collecting the traffic record, estimating the future traffic condition using linear regression, and then comparing the predicted traffic condition with that of the actual traffic condition. The level of congestion is measured as the road's level of service. The experiment result shows that the proposed method successfully predicts the traffic condition within the same class of level of service with the actual traffic condition. This confirms that the method is applicable for predicting traffic condition. In this research, the proposed method is also implemented in an android-based mobile application.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Contract Using Block Chaining and Elliptic Curve Based Digital Signature 基于区块链和椭圆曲线的数字签名的数字合约
Sony Adan Kalamsyah, A. Barmawi, Muhammad Arzaki
{"title":"Digital Contract Using Block Chaining and Elliptic Curve Based Digital Signature","authors":"Sony Adan Kalamsyah, A. Barmawi, Muhammad Arzaki","doi":"10.1109/ICOICT.2018.8528771","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528771","url":null,"abstract":"Recently, a contract agreement or contract document was used as a legal requirement of the business deal. For securing the contract, authentication and encryption is necessary. In conventional contract, the contract owner (the sender) is authenticated by the client (the receiver). The authentication is conducted by verifying the owner's signature using human vision. It is shown that the conventional contract has drawback when it was used to conduct long distance business. Since conventional agreement is using only digital signatures, the sender of the contract documents can be authenticated but there is still problem because both parties cannot perform mutual authentication and it cannot resolve legal dispute. Therefore, a witness was required, to overcome the problems when legal dispute was occurred. For implementing the witness, block chaining is proposed. There are several works that have been proposed for realizing authentication, and one of them is using RSA proposed by Raji et al. Since RSA needs large complexity, then in this research, ECC and ECDSA is proposed. ECC and ECDSA is proposed because it has less complexity than RSA. Based on the experiment result, it is shown that legal dispute can be resolved and the security level of the proposed method is greater than RSA. Meanwhile, the complexity of ECDSA is less than digital signature based on RSA.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Android Application for Controlling Air Conditioner Using Fuzzy Logic 基于模糊逻辑控制空调的Android应用
Andhika Cahya Pratama, R. Sarno
{"title":"Android Application for Controlling Air Conditioner Using Fuzzy Logic","authors":"Andhika Cahya Pratama, R. Sarno","doi":"10.1109/ICOICT.2018.8528726","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528726","url":null,"abstract":"There are many kind of electronic appliances around us such as microwave, lamp, television, and air conditioner around us. Sometimes many people are confuse and do not know how to manage those electronic appliances. It is hard to manage whenever they aren't at home or go to another places. By using electronic appliance in our daily life, it always need our electrical resources and some electronic devices consume more electrical energy such as Air Conditioner, Microwave and also a computer. Those devices are makes our electricity bill can be increased and makes some people surprised when they looked on their bill, they don't know how to reduce the power consumption all those electronic parts since they don't understand how to maintain those parts some people often forgot to turn off the electronic devices when they leave for working, school and any other activities, so this is make that electronic devices would be turn on all day long then makes our electricity resources provide more energy for those electronic devices so automatically your electronic bill will be increase as long as it used. In this paper, we provide some method and tools to maintain those electrical component can be controlled and measureable, by using IoT devices like adruino and artificial intelligence such as Fuzzy Logic. Based on research, Fuzzy logic can save around 40% energy saving.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP) 基于H264和RTMP的高性能流媒体
Anif Nurrohman, M. Abdurohman
{"title":"High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP)","authors":"Anif Nurrohman, M. Abdurohman","doi":"10.1109/ICOICT.2018.8528770","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528770","url":null,"abstract":"This paper proposes a framework of video communication in smartphone with android-based operating system technology. The technology that used for encoding and decoding is compression standard H264 with data transmission protocol of Real Time Messaging Protocol (RTMP) and media server Red5. This framework is proposed as improvement of the used H263-based system with Real Time Streaming Protocol (RTSP). The case study was made in live video streaming mode in android-based smartphone device. The result shows that the proposed system has better quality for live video streaming service, producing delay that is ranged between 137.48ms to 146.02ms, jitter is ranged between 22.917 to 27.695ms and packet loss is ranged between 0 to 0.4%. The performance of the proposed framework has met the standard of live video streaming that was defined by ITU-T. The ITU-T standard of delay in real time category for one-way communication which is less than 10s. The standard value of jitter is less than 30ms and packet loss less than 5%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analyzing Factors Influencing Continuance Intention of E-Payment Adoption Using Modified UTAUT 2 Model 基于修正UTAUT - 2模型的电子支付延续意愿影响因素分析
Indrawati, Dianty Anggraini Putri
{"title":"Analyzing Factors Influencing Continuance Intention of E-Payment Adoption Using Modified UTAUT 2 Model","authors":"Indrawati, Dianty Anggraini Putri","doi":"10.1109/ICOICT.2018.8528748","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528748","url":null,"abstract":"Online business of Indonesia continuous to grow rapidly. This rapid growth encourages developments for electronic payment systems. Moreover, Bank Indonesia is running a program to increase the awareness of society to become cash-less. One of the e-payment that emerging in Indonesia is Go-Pay, a Go-Jek payment system. Go-Pay successfully becomes one of the fifth largest e-money in Indonesia less than a year of its operation. Therefore, Bank Indonesia awarded Go-Jek as the most active company that increase society's awareness in conducting non-cash transactions in 2017. The successful of Go-Pay creates opportunities to upgrade the positions of Go-Pay service by knowing factors that influence its customers in continuing using Go-Pay services. This study intended to analyze factors influencing continuance intention of Go-Pay adoption in Indonesia by using a Modified Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Model with Trust as a new variable. The data were gathered from 507 valid respondents in Indonesia chosen by purposive sampling technique. The result revealed that the factors influence continuance intention adoption of Go-Pay from the highest to the lowest respectively are Habit, Trust, Social Influence, Price Saving Orientation, Hedonic Motivation, and Performance Expectancy. The model can predict strongly the continuance intention of consumers towards Go-Pay services in Indonesia since the R2 is 72.8%. This model can be used by Go-Pay management in making decisions to maintain the continuance intention of consumers towards Go-Pay adoption by paying attention to those factors and their indicators.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Person Locator Using GPS Module and GSM Shield Applied for Children Protection 使用GPS模块和GSM屏蔽的儿童定位器
F. Fahmi, B. Siregar, Svlvi Evelvn, Dani Gunawan, U. Andayani
{"title":"Person Locator Using GPS Module and GSM Shield Applied for Children Protection","authors":"F. Fahmi, B. Siregar, Svlvi Evelvn, Dani Gunawan, U. Andayani","doi":"10.1109/ICOICT.2018.8528720","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528720","url":null,"abstract":"Children safety is very important for parents. Currently, more and more crimes occur against children, one that often happened is kidnapping. From year to year, the number of child abductions continues to increase. Parents should be aware of the safety and their children. In this study, we proposed a system to monitor the presence of children to anticipate the occurrence of crime against children. A person locator system that using GPS Module, GSM Shield, and Arduino can provide a solution for monitoring children. The test results showed that GPS Module, GSM Shield, and Arduino were able to work stable to detect the location of children and able to monitor the movement of children by limiting certain areas as the boundary of the allowed movement of children.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Context-Aware Ontological Hybrid Recommender System For IPTV 面向IPTV的上下文感知本体混合推荐系统
Mohammad Wahiduzzaman Khan, Gaik-Yee Chain, Fang-Fang Chua, S. Haw, Muhsin Hassan, F. A. Saaid
{"title":"Context-Aware Ontological Hybrid Recommender System For IPTV","authors":"Mohammad Wahiduzzaman Khan, Gaik-Yee Chain, Fang-Fang Chua, S. Haw, Muhsin Hassan, F. A. Saaid","doi":"10.1109/ICOICT.2018.8528758","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528758","url":null,"abstract":"With the huge growing amount of information continuously produced, shared and available online, finding relevant and beneficial contents or services at a single or few clicks have become almost impossible. Most of the time, we will be returned with thousands of irrelevant web links. As such, a recommender system which recommends contents or services that likely meet the user's needs is crucial, especially in the IPTV domain when the choices for program selection has no time and physical boundary restriction. The two major recommendation techniques are content based and collaborative filtering. Nevertheless, such techniques still suffer from several problems such as cold start, data sparsity and over specialization. Our proposed system namely COHRS is a context-aware recommender system based on ontological profiling under the IPTV domain. Ontological approach improves user profiling process and thus improving the accuracy of a recommendation system. Experimental evaluations indicate that COHRS is able to overcome the drawbacks such as over specialization, data sparsity and inefficiency issue of most traditional recommender systems.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Lightweight Semantic-Based Medical Document Retrieval 轻量级的基于语义的医学文档检索
Dhomas Hatta Fudholi, Lalu Mutawalli
{"title":"A Lightweight Semantic-Based Medical Document Retrieval","authors":"Dhomas Hatta Fudholi, Lalu Mutawalli","doi":"10.1109/ICOICT.2018.8528781","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528781","url":null,"abstract":"Medical information is valuable for a health care professional to empower diagnosis and clinical decision process. In addition, it can also support communities with health knowledge to support healthy living. Ontology-based information retrieval supports the retrieval of such information with the semantically better result. In this paper, we propose a framework of lightweight semantic-based medical document retrieval in Bahasa Indonesia. The medical information is focused on diagnosis, etiology, epidemiology, clinical manifestation, and guidelines. The framework firstly annotates queries' by using the ontology, analyse the information networks within the ontology and extracts the context of the queries. When a query falls within one context of disease information, a modified search query will be then generated and passed to an existing keyword-based search result. The framework is evaluated using a case study in infectious tropical disease domain. The evaluation results show that the framework could perform well with precision equals or more than 0.9 to find the relevant medical document through the semantic networks and the enhancement process.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardening the Virtual Password Authentication Scheme 虚拟密码认证方案加固
Mohammad Zakie Faiz Rahiemy, Parman Sukarno, E. Jadied
{"title":"Hardening the Virtual Password Authentication Scheme","authors":"Mohammad Zakie Faiz Rahiemy, Parman Sukarno, E. Jadied","doi":"10.1109/ICOICT.2018.8528757","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528757","url":null,"abstract":"Although Internet has become one of most important parts and mostly needed by societies, that does not mean Internet is a safe place to share sensitive data. One of many unsolved Internet attacks is key-logger which is used to steal victim's data such as passwords. Researchers have done a lot of research to overcome these attacks. However, the authentication system still lacks password complexities which can be compromised with short cracking time and limited generated passwords. Therefore, we proposed a virtual password method that has the following rules: i) has minimum and maximum limit of password and ii) the generated passwords are not limited only to letters, but also numbers and symbols. With those rules, by using Kaspersky Lab secure password measurement, the cracking time can be significantly increased to 9 centuries on the conficker botnet with 10 million cores of processors. Moreover, by using Password Meter the proposed method gets score of 171.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132996328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Implementation of Smart Bath Water Heater Using Arduino 基于Arduino的智能洗浴热水器设计与实现
Muhammad Dio Khairunnas, Endro Ariyanto, Sidik Prabowo
{"title":"Design and Implementation of Smart Bath Water Heater Using Arduino","authors":"Muhammad Dio Khairunnas, Endro Ariyanto, Sidik Prabowo","doi":"10.1109/ICOICT.2018.8528772","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528772","url":null,"abstract":"The use of hot water used for bathing is one type of utilization of technology that has been developed. By using a Water Heater tool, one can get water with a higher temperature. However, to achieve the desired temperature and fill the tub for ready use, water heater takes a long time. In this system has been designed an automatic faucet that can be active in accordance with the temperature of water that is in the main tub with the help of temperature sensors, ultrasonic sensors and water pumps. Both sensors utilize a machine to machine system with MQTT protocols controlled by an Arduino Mega2560-based Android microcontroller. Based on the test, the level of accuracy of temperature obtained has a value of 97.60% with the average performance time obtained to achieve the desired temperature on the main tube is for 18 minutes 30 seconds. The test has been done using the main tub with the volume of water to be filled is ± 12.320 cm3, with the volume of hot water provided is ± 9.240 cm3, In addition, several factors affecting the time to reach the desire d temperature include the type of pump used, the power used by the water heater, and the size of the main tubing container used as a container for mixing hot water temperatures and normal water temperature.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信