2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

筛选
英文 中文
Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks 基于卡尔曼滤波的机会移动社交网络节点人气计算改进
B. Soelistijanto
{"title":"Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks","authors":"B. Soelistijanto","doi":"10.1109/ICOICT.2018.8528780","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528780","url":null,"abstract":"Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry messages to the destinations. Routing algorithms in these networks typically favour the most popular individuals (nodes) as optimal carriers for message transfers to achieve high delivery performance. The state-of-the-art routing protocol BubbleRap uses a cumulative moving average technique (called C-Window) to identify a node's popularity level, measured in node degree, in a time window. However, our study found that node degree in real-life OMSNs varies quickly and significantly in time, and C-Window moreover slowly adapts to this node degree changes. To tackle this problem, we propose a new method of node degree computation based on the Kalman-filter theory. Using simulation, driven by real human contact traces, we showed that our approach can increase BubbleRap's performance, in terms of delivery ratio and traffic (load) distribution fairness.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Protection Profile on Smart Card System Using ISO 15408 Case Study: Indonesia Health Insurance Agency 使用ISO 15408智能卡系统的安全保护概况案例研究:印度尼西亚健康保险局
Yoso Adi Setyoko, Rahmat Yasirandi
{"title":"Security Protection Profile on Smart Card System Using ISO 15408 Case Study: Indonesia Health Insurance Agency","authors":"Yoso Adi Setyoko, Rahmat Yasirandi","doi":"10.1109/ICOICT.2018.8528804","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528804","url":null,"abstract":"Indonesia Health Assurance Agency also called BPJS is the most important part of the Indonesian people as a health insurance agency. BPJS want to improve the quality of healthcare by applying information technology. One way to improve the quality of service BPJS is implementing smart card technology. this new system, BPJS smart card system, is consisted of two part, there are a smart card and smart card reader. Beside it can be searching BPJS members faster and easier than before (offline system), every card member has a temporary storage enough to save nominal of their own insurance premium. Therefore, smart card system needs security requirements to make sure data in every card member is still secure and confidential when implementing this smart card technology. With that problem, this research creates security design proposal from Protection Profile document by evaluating smart card system of BPJS using Common Criteria Framework (ISO 15408). And then this methodology research is using (ISO 15446) to guide the development of Protection Profile document. Common Criteria Framework for the security of smart card make security design becomes more systematic. This research is consisting of 3 steps, first analyzing threats, second designing security objectives, the last designing security function requirements. Threats assessment and analysis in this research has result 10 threats. From previous step then designed 12 points security objectives. At third step, the security functional requirements need to be analyzed and founded, has 36 security functional requirements from 12 points security objectives before. Prototype has built based on all of security functional requirements that already recommended. The evaluate result shows that all of system use case has been tested according system functional requirement.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Capacitive Model of Water Salinity Wireless Sensor System Based on WIFI-Microcontroller 基于wifi单片机的水盐度无线传感器系统电容式模型
S. Suryono, S. Putro, W. Widowati, S. Sunarno
{"title":"A Capacitive Model of Water Salinity Wireless Sensor System Based on WIFI-Microcontroller","authors":"S. Suryono, S. Putro, W. Widowati, S. Sunarno","doi":"10.1109/ICOICT.2018.8528796","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528796","url":null,"abstract":"Monitoring for water salinity is very important in many industries, especially fishery and farming. Therefore, it is necessary to build a wireless water salinity sensor system capable of tackling obstacles in the field. This research proposes a low-cost wireless water salinity sensor system using parallel capacitive plate model. Capacitance effect that is proportional to salinity value is transformed into digital pulses using a circuit of an a-stable multivibrator. Frequency of these pulses is counted using a WIFI-microcontroller and inverse transform is carried out according to the relationship characteristics of salinity and frequency. Water Salinity data acquired by the WIFI-microcontroller are then transmitted to the Control Station Unit (CSU) via gateway WIFI. Testing results show maximum coverage range of 30 meters to the gateway. Nonetheless, the use gateway WIFI can increase the coverage range of this wireless water salinity sensor. Calibration tests also indicate an error of 2.3% in water salinity measurement by the instrument developed here.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework of Wireless Maintenance System Monitoring: A Case Study of an Automatic Filling Machine at SB Company 无线维护系统监控框架——以SB公司自动灌装机为例
Fransiskus Tatas Dwi Atmaji, J. Alhilman
{"title":"A Framework of Wireless Maintenance System Monitoring: A Case Study of an Automatic Filling Machine at SB Company","authors":"Fransiskus Tatas Dwi Atmaji, J. Alhilman","doi":"10.1109/ICOICT.2018.8528722","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528722","url":null,"abstract":"This paper proposes a framework for wireless maintenance system monitoring for manufacturing machine and equipment using several sensor and cloud-based technology. The aim is to minimize the full wire connection and monitoring process where the access will be more convenient and efficient. A proposed scheme of wireless maintenance monitoring for the SR125 automatic filling machine at SB Company introduced. By utilization of this proposed framework, the current condition of manufacturing machine and equipment could be monitored for 24 hours and accessed anywhere and anytime even though we are not in local area network of machine or equipment. This system is beneficial as an early warning for the maintenance department to prevent the sudden breakdown as well as minimize the worst case like as explosion. Therefore, the maintenance team would be possible to make a quick decision and action, whether it need a corrective, preventive or other special maintenance action. By this concept, it does not only increase the reliability, availability, and maintainability of the manufacturing machine and equipment; but also will decrease the maintenance cost in overall as well.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Online Classroom Towards Personalized Learning Environment 强化网络课堂,打造个性化学习环境
D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri
{"title":"Enhancing Online Classroom Towards Personalized Learning Environment","authors":"D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri","doi":"10.1109/ICOICT.2018.8528728","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528728","url":null,"abstract":"E-Learning is a process of learning combines self-motivation, communication, efficiency, and technology. One of the first innovations in practicing the concept of e-learning is by implementing Learning Management System (LMS) to place courses online so students' progress is trackable and discussions in real-time manner is possible. However, LMS has some drawbacks particularly in presenting and selecting learning materials or resources. On LMS, students are given only learning materials or learning resources that have been structured by the facilitator. On the other side, the idea of Personal Learning Environment (PLE) arises. PLE represents a different perspective on how students decide where are they going to learn, because they act as subjects and owners of their own learning process, not as objects. PLE enables students to collaborate through service or learning resources outside their predefined online classroom page. This research proposes the idea to embed the concept of PLE into LMS. The objective is to provide online learning environment that combines structured learning that is identical to the LMS with the flexibility and personalization that PLE offers.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing SDN Network Performance Using Load Balancing Scheme on Web Server 通过Web服务器负载均衡方案提高SDN网络性能
I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman
{"title":"Increasing SDN Network Performance Using Load Balancing Scheme on Web Server","authors":"I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman","doi":"10.1109/ICOICT.2018.8528803","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528803","url":null,"abstract":"In this paper, we propose to test Least Connection and IP Hash load balancing algorithm to be applied to web servers over SDN networks. The use of load balancing on web servers over SDN networks began to attract many researchers. The problem of using appropriate load balancing algorithms for this case is still debatable. One of the problems is determining the correct algorithm for web server which has bound function (session). Load balancing algorithm that can provide stable performance is a static algorithm. However, this algorithm does not have a function bound to a server, so it is not possible to apply to a web server with bound functions, such as login session function. Therefore, a possible algorithm was developed for the function Two examples of algorithms that have the potential to be an effective algorithm for the case of this web server is the Hash and Least Connection IP algorithm. We have implemented and tested the load balancing performance using Least Connection and IP Hash algorithm. In this test, both algorithms will be tested with some crucial parameters for a web server. These parameters are Response Time, Throughput and Resource Utilization. The result of the test with the parameters is IP Hash algorithm gives performance response time 17% more optimal, 10% more optimal throughput and 8% usage memory more efficient than Least Connection algorithm.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fatigue Monitoring Based on Yawning and Head Movement 基于打哈欠和头部运动的疲劳监测
K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu
{"title":"Fatigue Monitoring Based on Yawning and Head Movement","authors":"K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu","doi":"10.1109/ICOICT.2018.8528759","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528759","url":null,"abstract":"Driver fatigue is one of the main reasons causing traffic accidents. Yawning is an important character of driver fatigue. Mouth geometric character represents state of driver. So driver's mouth detection and information extraction is especially important. This paper proposes to locate and track driver's yawning based on mouth using camera to detect driver's fatigue in driving environment. Then contour algorithm features to detect driver's yawning and track it according to historical position. At last, yawning is detected by the ratio of mouth in the name of dark region as when he mouth is widely open. Through this method the resolution ratios which are transferred to percentage of driver's mouth is higher than one camera and the feature information to be more accuracy. The head movement is partially a phase where the fatigue would be detected by using face detection itself to detect the head movement. In order to get a clear vision of driver's fatigue, yawning and head movement activity will be the best to detect in a driving environment since it provides a better basis for driver fatigue judging.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123606550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm 乒乓协议安全检测算法的反例生成
Erwin Eko Wahyudi, Reza Pulungan
{"title":"Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm","authors":"Erwin Eko Wahyudi, Reza Pulungan","doi":"10.1109/ICOICT.2018.8528754","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528754","url":null,"abstract":"An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform some operations to obtain the original message. Dolev et al. proposed an algorithm to check the security of ping-pong protocols using nondeterministic finite automata. In this paper, we propose an algorithm for generating counterexamples of unsecure protocols by storing the counterexamples using dynamic programming technique.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototype 车载诊断II (OBD-II)在四轮汽车数据记录仪样机中的应用
Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah
{"title":"Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototype","authors":"Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah","doi":"10.1109/ICOICT.2018.8528741","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528741","url":null,"abstract":"The government has required public transport provider to equip their fleets with information tools if their fleets get in an accident. Currently, the collection of evidence of motor vehicle accidents by the authorities has not included data on the condition of the vehicle before the occurrence of the accident. Unlike an aircraft accident investigation that includes aircraft condition data derived from various sensors recorded in Flight Data Recorder (FDR). The recording data in FDR can be the evidence of the accident and it is expected to add to the accuracy of an accident investigation. Car Data Recorder Prototype is a system capable of recording the condition of four-wheeled vehicles and notify if there has been an accident. Vehicle condition recording utilizes Onboard Diagnostic-II (OBD-II) feature with parameter recording: gas pedal position, engine speed, vehicle speed, and engine temperature. Accident detection utilizes the ADXL345 accelerometer sensor and the condition of open or non-open airbag vehicles monitored by Diagnostic Trouble Code (DTC). If there is an indication of an accident, notification in the form of SMS will be sent by using GSM SIM800L module. Testing the data recording feature prototype car data recorder performed on city car is able to take advantage of features OBD-II to record the parameters that have been determined. Recorded data is processed into graphical information showing the position of the gas pedal, engine speed, vehicle speed, and engine temperature within a specified time range. There is a 5-second delay in recording data of engine speed and speed of the vehicle, but the data pattern of recording engine rotation is identical with 84.8% accuracy while the data of vehicle speed recording is also synonymous with 74.4% accuracy. Based on the accident simulation results, the ADXL345 and DTC accelerometer can detect frontal collisions and airbag conditions, which triggers GSM SIM800L to send SMS notification.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132460023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting Indonesian Spammer on Twitter 检测印尼垃圾邮件在Twitter上
E. B. Setiawan, D. H. Widyantoro, K. Surendro
{"title":"Detecting Indonesian Spammer on Twitter","authors":"E. B. Setiawan, D. H. Widyantoro, K. Surendro","doi":"10.1109/ICOICT.2018.8528773","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528773","url":null,"abstract":"Nowadays, Twitter is one of the most popular social media today. However, Twitter has several problems that have negative impacts to the users, one of which is spam. We introduce a different approach compared to previous research are the scope of Indonesian-language Twitter, crawling automatically for user and tweets data, as well as the addition of new features. We use two features dimension, i.e., user-based and tweet-based. In this paper, we detect Indonesian spammers on Twitter using four classification algorithms, namely Naïve Bayes (NB), Support Vector Machine (SVM), Logistic Regression (Logit), and J48. The results are confirmed for having better accuracy that of the existing. The highest accuracy of 93,67% is achieved using Logistic Regression (Logit).","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信