{"title":"Improving Node Popularity Calculation Using Kalman Filter in Opportunistic Mobile Social Networks","authors":"B. Soelistijanto","doi":"10.1109/ICOICT.2018.8528780","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528780","url":null,"abstract":"Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry messages to the destinations. Routing algorithms in these networks typically favour the most popular individuals (nodes) as optimal carriers for message transfers to achieve high delivery performance. The state-of-the-art routing protocol BubbleRap uses a cumulative moving average technique (called C-Window) to identify a node's popularity level, measured in node degree, in a time window. However, our study found that node degree in real-life OMSNs varies quickly and significantly in time, and C-Window moreover slowly adapts to this node degree changes. To tackle this problem, we propose a new method of node degree computation based on the Kalman-filter theory. Using simulation, driven by real human contact traces, we showed that our approach can increase BubbleRap's performance, in terms of delivery ratio and traffic (load) distribution fairness.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Protection Profile on Smart Card System Using ISO 15408 Case Study: Indonesia Health Insurance Agency","authors":"Yoso Adi Setyoko, Rahmat Yasirandi","doi":"10.1109/ICOICT.2018.8528804","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528804","url":null,"abstract":"Indonesia Health Assurance Agency also called BPJS is the most important part of the Indonesian people as a health insurance agency. BPJS want to improve the quality of healthcare by applying information technology. One way to improve the quality of service BPJS is implementing smart card technology. this new system, BPJS smart card system, is consisted of two part, there are a smart card and smart card reader. Beside it can be searching BPJS members faster and easier than before (offline system), every card member has a temporary storage enough to save nominal of their own insurance premium. Therefore, smart card system needs security requirements to make sure data in every card member is still secure and confidential when implementing this smart card technology. With that problem, this research creates security design proposal from Protection Profile document by evaluating smart card system of BPJS using Common Criteria Framework (ISO 15408). And then this methodology research is using (ISO 15446) to guide the development of Protection Profile document. Common Criteria Framework for the security of smart card make security design becomes more systematic. This research is consisting of 3 steps, first analyzing threats, second designing security objectives, the last designing security function requirements. Threats assessment and analysis in this research has result 10 threats. From previous step then designed 12 points security objectives. At third step, the security functional requirements need to be analyzed and founded, has 36 security functional requirements from 12 points security objectives before. Prototype has built based on all of security functional requirements that already recommended. The evaluate result shows that all of system use case has been tested according system functional requirement.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Capacitive Model of Water Salinity Wireless Sensor System Based on WIFI-Microcontroller","authors":"S. Suryono, S. Putro, W. Widowati, S. Sunarno","doi":"10.1109/ICOICT.2018.8528796","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528796","url":null,"abstract":"Monitoring for water salinity is very important in many industries, especially fishery and farming. Therefore, it is necessary to build a wireless water salinity sensor system capable of tackling obstacles in the field. This research proposes a low-cost wireless water salinity sensor system using parallel capacitive plate model. Capacitance effect that is proportional to salinity value is transformed into digital pulses using a circuit of an a-stable multivibrator. Frequency of these pulses is counted using a WIFI-microcontroller and inverse transform is carried out according to the relationship characteristics of salinity and frequency. Water Salinity data acquired by the WIFI-microcontroller are then transmitted to the Control Station Unit (CSU) via gateway WIFI. Testing results show maximum coverage range of 30 meters to the gateway. Nonetheless, the use gateway WIFI can increase the coverage range of this wireless water salinity sensor. Calibration tests also indicate an error of 2.3% in water salinity measurement by the instrument developed here.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of Wireless Maintenance System Monitoring: A Case Study of an Automatic Filling Machine at SB Company","authors":"Fransiskus Tatas Dwi Atmaji, J. Alhilman","doi":"10.1109/ICOICT.2018.8528722","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528722","url":null,"abstract":"This paper proposes a framework for wireless maintenance system monitoring for manufacturing machine and equipment using several sensor and cloud-based technology. The aim is to minimize the full wire connection and monitoring process where the access will be more convenient and efficient. A proposed scheme of wireless maintenance monitoring for the SR125 automatic filling machine at SB Company introduced. By utilization of this proposed framework, the current condition of manufacturing machine and equipment could be monitored for 24 hours and accessed anywhere and anytime even though we are not in local area network of machine or equipment. This system is beneficial as an early warning for the maintenance department to prevent the sudden breakdown as well as minimize the worst case like as explosion. Therefore, the maintenance team would be possible to make a quick decision and action, whether it need a corrective, preventive or other special maintenance action. By this concept, it does not only increase the reliability, availability, and maintainability of the manufacturing machine and equipment; but also will decrease the maintenance cost in overall as well.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri
{"title":"Enhancing Online Classroom Towards Personalized Learning Environment","authors":"D. D. J. Suwawi, K. A. Laksitowening, Irwinda Putri","doi":"10.1109/ICOICT.2018.8528728","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528728","url":null,"abstract":"E-Learning is a process of learning combines self-motivation, communication, efficiency, and technology. One of the first innovations in practicing the concept of e-learning is by implementing Learning Management System (LMS) to place courses online so students' progress is trackable and discussions in real-time manner is possible. However, LMS has some drawbacks particularly in presenting and selecting learning materials or resources. On LMS, students are given only learning materials or learning resources that have been structured by the facilitator. On the other side, the idea of Personal Learning Environment (PLE) arises. PLE represents a different perspective on how students decide where are they going to learn, because they act as subjects and owners of their own learning process, not as objects. PLE enables students to collaborate through service or learning resources outside their predefined online classroom page. This research proposes the idea to embed the concept of PLE into LMS. The objective is to provide online learning environment that combines structured learning that is identical to the LMS with the flexibility and personalization that PLE offers.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman
{"title":"Increasing SDN Network Performance Using Load Balancing Scheme on Web Server","authors":"I. P. A. Suwandika, M. A. Nugroho, Maman Abdurahman","doi":"10.1109/ICOICT.2018.8528803","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528803","url":null,"abstract":"In this paper, we propose to test Least Connection and IP Hash load balancing algorithm to be applied to web servers over SDN networks. The use of load balancing on web servers over SDN networks began to attract many researchers. The problem of using appropriate load balancing algorithms for this case is still debatable. One of the problems is determining the correct algorithm for web server which has bound function (session). Load balancing algorithm that can provide stable performance is a static algorithm. However, this algorithm does not have a function bound to a server, so it is not possible to apply to a web server with bound functions, such as login session function. Therefore, a possible algorithm was developed for the function Two examples of algorithms that have the potential to be an effective algorithm for the case of this web server is the Hash and Least Connection IP algorithm. We have implemented and tested the load balancing performance using Least Connection and IP Hash algorithm. In this test, both algorithms will be tested with some crucial parameters for a web server. These parameters are Response Time, Throughput and Resource Utilization. The result of the test with the parameters is IP Hash algorithm gives performance response time 17% more optimal, 10% more optimal throughput and 8% usage memory more efficient than Least Connection algorithm.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu
{"title":"Fatigue Monitoring Based on Yawning and Head Movement","authors":"K. J. Raman, A. Azman, Venosha Arumugam, S. Z. Ibrahim, S. Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, A. H. Muhamad Amin, Kalaiarasi Sonaimuthu","doi":"10.1109/ICOICT.2018.8528759","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528759","url":null,"abstract":"Driver fatigue is one of the main reasons causing traffic accidents. Yawning is an important character of driver fatigue. Mouth geometric character represents state of driver. So driver's mouth detection and information extraction is especially important. This paper proposes to locate and track driver's yawning based on mouth using camera to detect driver's fatigue in driving environment. Then contour algorithm features to detect driver's yawning and track it according to historical position. At last, yawning is detected by the ratio of mouth in the name of dark region as when he mouth is widely open. Through this method the resolution ratios which are transferred to percentage of driver's mouth is higher than one camera and the feature information to be more accuracy. The head movement is partially a phase where the fatigue would be detected by using face detection itself to detect the head movement. In order to get a clear vision of driver's fatigue, yawning and head movement activity will be the best to detect in a driving environment since it provides a better basis for driver fatigue judging.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123606550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm","authors":"Erwin Eko Wahyudi, Reza Pulungan","doi":"10.1109/ICOICT.2018.8528754","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528754","url":null,"abstract":"An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform some operations to obtain the original message. Dolev et al. proposed an algorithm to check the security of ping-pong protocols using nondeterministic finite automata. In this paper, we propose an algorithm for generating counterexamples of unsecure protocols by storing the counterexamples using dynamic programming technique.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah
{"title":"Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototype","authors":"Satrio Adi Nugroho, Endro Ariyanto, A. Rakhmatsyah","doi":"10.1109/ICOICT.2018.8528741","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528741","url":null,"abstract":"The government has required public transport provider to equip their fleets with information tools if their fleets get in an accident. Currently, the collection of evidence of motor vehicle accidents by the authorities has not included data on the condition of the vehicle before the occurrence of the accident. Unlike an aircraft accident investigation that includes aircraft condition data derived from various sensors recorded in Flight Data Recorder (FDR). The recording data in FDR can be the evidence of the accident and it is expected to add to the accuracy of an accident investigation. Car Data Recorder Prototype is a system capable of recording the condition of four-wheeled vehicles and notify if there has been an accident. Vehicle condition recording utilizes Onboard Diagnostic-II (OBD-II) feature with parameter recording: gas pedal position, engine speed, vehicle speed, and engine temperature. Accident detection utilizes the ADXL345 accelerometer sensor and the condition of open or non-open airbag vehicles monitored by Diagnostic Trouble Code (DTC). If there is an indication of an accident, notification in the form of SMS will be sent by using GSM SIM800L module. Testing the data recording feature prototype car data recorder performed on city car is able to take advantage of features OBD-II to record the parameters that have been determined. Recorded data is processed into graphical information showing the position of the gas pedal, engine speed, vehicle speed, and engine temperature within a specified time range. There is a 5-second delay in recording data of engine speed and speed of the vehicle, but the data pattern of recording engine rotation is identical with 84.8% accuracy while the data of vehicle speed recording is also synonymous with 74.4% accuracy. Based on the accident simulation results, the ADXL345 and DTC accelerometer can detect frontal collisions and airbag conditions, which triggers GSM SIM800L to send SMS notification.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132460023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Indonesian Spammer on Twitter","authors":"E. B. Setiawan, D. H. Widyantoro, K. Surendro","doi":"10.1109/ICOICT.2018.8528773","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528773","url":null,"abstract":"Nowadays, Twitter is one of the most popular social media today. However, Twitter has several problems that have negative impacts to the users, one of which is spam. We introduce a different approach compared to previous research are the scope of Indonesian-language Twitter, crawling automatically for user and tweets data, as well as the addition of new features. We use two features dimension, i.e., user-based and tweet-based. In this paper, we detect Indonesian spammers on Twitter using four classification algorithms, namely Naïve Bayes (NB), Support Vector Machine (SVM), Logistic Regression (Logit), and J48. The results are confirmed for having better accuracy that of the existing. The highest accuracy of 93,67% is achieved using Logistic Regression (Logit).","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113940255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}