2018 6th International Conference on Information and Communication Technology (ICoICT)最新文献

筛选
英文 中文
Mongoloid and Non-Mongoloid Race Classification from Face Image Using Local Binary Pattern Feature Extractions 利用局部二值模式特征提取人脸图像进行蒙古人种和非蒙古人种分类
Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie
{"title":"Mongoloid and Non-Mongoloid Race Classification from Face Image Using Local Binary Pattern Feature Extractions","authors":"Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie","doi":"10.1109/ICOICT.2018.8528783","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528783","url":null,"abstract":"One of the areas on the human body that has the most dominant racial trait is the face. This research build the classification system for Mongoloid and non-Mongoloid race based on the area in the periorbital area of facial image. We use Local Binary Pattern to extract texture features on periorbital facial area. To classify the LBP features, we use Support Vector Machine classifier. The accuracy obtained from the system is 99.38%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Preliminary Study on Detection System for Assessing Children and Foster Parents Suitability 儿童及养父母适宜性评估检测系统初步研究
R. Andreswari, I. Darmawan, Warih Puspitasari
{"title":"A Preliminary Study on Detection System for Assessing Children and Foster Parents Suitability","authors":"R. Andreswari, I. Darmawan, Warih Puspitasari","doi":"10.1109/ICOICT.2018.8528785","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528785","url":null,"abstract":"The adoption process is conducted in society aiming to give the right of foster children to get parents who can guarantee the welfare of children's life in the future. In Indonesia, the adoption process is regulated by law binding both from the side of foster parents and children. In fact, there are still some instances of adoption that are carried out outside of the provisions of the law and cause violations that harm foster children. Based on these problems, it is necessary to build a system that accommodates the needs both psychologically and materially from the side of children and parents. The existence of a detection system to assess the suitability between the two is to reduce the risk of violence in foster children. To build the system, it needs an algorithm capable of formulating several related factors. In this case, CARTs algorithm is an algorithm capable of predicting an optimal match that supports successful adoption of foster children.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Cyber-Physical System-Based Automation on Plant Chemical Process: Study Case Mini Batch Distillation Column 基于信息物理系统的工厂化工过程自动化设计与实现——以小型间歇精馏塔为例
Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief
{"title":"Design and Implementation of Cyber-Physical System-Based Automation on Plant Chemical Process: Study Case Mini Batch Distillation Column","authors":"Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief","doi":"10.1109/ICOICT.2018.8528798","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528798","url":null,"abstract":"Nowadays network application system (internet) is widely used not only for information system but also for automation system. This technology brings new paradigm in managing manufacture that we know as industry 4.0 or Smart Manufacture System (SMS). One of the architecture of SMS is Cyber-Physical System (CPS). Applying CPS on automation system becomes a challenge because there are not standard for integrating this architecture yet. Existing automation system today uses pyramid architecture for integration system from field level (level 0) to business level (level 4). CPS-based automation can replace the pyramid architecture, where on the CPS-based automation each layer on pyramid architecture seems to be able to communicate directly using network from field level through business level. In this paper, CPS-based automation is proposed using MQTT protocol on mini batch distillation column to separate mix liquid between alcohol and water. To apply CPS-based automation, it necessary develops embedded systems that meet the three disciplines of communication, computer, and control. To implement CPS-based automation, MQTT protocol is used for communication system. Modification on sensors and actuators are necessary to connect physical and cyber system over MQTT protocol. Database system is also required for data acquisition in a form of historian data. In terms of controlling, a local automation system is built for system startup.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of Vehicle Traffic Analysis Using Background Subtraction in the Internet of Things (IoT) Architecture 物联网(IoT)架构中基于背景减法的车辆交通分析实现
A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda
{"title":"Implementation of Vehicle Traffic Analysis Using Background Subtraction in the Internet of Things (IoT) Architecture","authors":"A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda","doi":"10.1109/ICOICT.2018.8528739","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528739","url":null,"abstract":"Vehicle traffic analysis is one of the features that are provided in a smart city application. A camera is used to capture vehicles that are moving through on the road. Background subtraction is applied in order to detect the moving object, i.e., Gaussian Mixture Model. The system is developed under the Internet of Things (IoT) architecture, which all devices are associated using Internet connection. The calculated value is transmitted into cloud and received at the virtual server. Data are saved to a database and are able to be accessed through a web interface. We observe the applied system provides a good performance in terms of average accuracy exceeds 95.64%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Visual Based Fire Detection System Using Speeded Up Robust Feature and Support Vector Machine 基于加速鲁棒特征和支持向量机的视觉火灾探测系统
Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani
{"title":"Visual Based Fire Detection System Using Speeded Up Robust Feature and Support Vector Machine","authors":"Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani","doi":"10.1109/ICOICT.2018.8528752","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528752","url":null,"abstract":"This paper proposed a fire detection system using video captured from camera. We built the system using Speeded Up Robust Feature (SURF) feature extraction on three orthogonal plane to obtain the spatial and temporal features. We used Support Vector Machine (SVM) algorithm to classify the features as the fire or non-fire object. Using SURF threshold value 0, number of cluster 5 and gaussian SVM kernel, the system generated accuracy 81,25%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127781114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System 基于端口敲门和入侵检测的SSH蜜罐体系结构
Ridho Maulana Arifianto, Parman Sukarno, E. Jadied
{"title":"An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System","authors":"Ridho Maulana Arifianto, Parman Sukarno, E. Jadied","doi":"10.1109/ICOICT.2018.8528787","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528787","url":null,"abstract":"This paper proposes an architecture of Secure Shell (SSH) honeypot using port knocking and Intrusion Detection System (IDS) to learn the information about attacks on SSH service and determine proper security mechanisms to deal with the attacks. Rapid development of information technology is directly proportional to the number of attacks, destruction, and data theft of a system. SSH service has become one of the popular targets from the whole vulnerabilities which is existed. Attacks on SSH service have various characteristics. Therefore, it is required to learn these characteristics by typically utilizing honeypots so that proper mechanisms can be applied in the real servers. Various attempts to learn the attacks and mitigate them have been proposed, however, attacks on SSH service are kept occurring. This research proposes a different and effective strategy to deal with the SSH service attack. This is done by combining port knocking and IDS to make the server keeps the service on a closed port and open it under user demand by sending predefined port sequence as an authentication process to control the access to the server. In doing so, it is evident that port knocking is effective in protecting SSH service. The number of login attempts obtained by using our proposed method is zero.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling User Interface of First-Aid Application Game Using User Centered Design (UCD) Method 基于用户中心设计(UCD)方法的急救应用游戏用户界面建模
Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan
{"title":"Modeling User Interface of First-Aid Application Game Using User Centered Design (UCD) Method","authors":"Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan","doi":"10.1109/ICOICT.2018.8528747","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528747","url":null,"abstract":"Children aged 10–12 years old are considered able to know and do first-aid. At those ages, children have been exposed to various learning medias. One of learning medias is game applications. Based on preliminary observations, by testing usability of existing game apps, User Interface is considered not good. Therefore, the users cannot use the application properly. This is caused by several factors. They are effectiveness, productivity, accessibility and universality. Applications that have low usability can be caused by the imperfection or insufficient of the application suitability with the needs of the user. In order to fit the user interface to the needs of the user, it is necessary to model the user interface of the first-aid application game using User Centered Design (UCD) method. Using UCD is used to generate a User Interface model that fits to the needs of the user. The modeling of the game application is formed in a prototype. After that, a test is conducted to the user to measure the usability of the game by using Quality in Use Integrated Measurement (QUIM). The results of usability testing is 81.05%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empowering Wearable Sensor Generated Data to Predict Changes in Individual's Sleep Quality 赋予可穿戴传感器生成的数据以预测个人睡眠质量的变化
W. Hidayat, Toufan D. Tambunan, Reza Budiawan
{"title":"Empowering Wearable Sensor Generated Data to Predict Changes in Individual's Sleep Quality","authors":"W. Hidayat, Toufan D. Tambunan, Reza Budiawan","doi":"10.1109/ICOICT.2018.8528750","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528750","url":null,"abstract":"Wearable sensors found in popular wrist wearable device are both generating sales profit and constantly generating vast amount of data. Some of these wearable sensors are able to record physical activity and sleep trends, both are being mainly used to give insight to its users about their current and past health and well-being. We proposed a method of data preprocessing and machine learning using simple k-nearest neighbor classifier to furthermore empower the usage of such data to predict changes in one's sleep quality based on his or her current physical activity level. Our method were challenged to predict changes in five medically-approved sleep quality indicators, using data generated by commercially available consumer-grade wrist wearable device. The experiment result shows that the successful prediction of changes in sleep quality using wearable sensor generated data can be achieved by successfully selecting and sometimes combining the right input parameter(s). Each sleep quality indicators calls for different input parameter or combined parameters. By selecting and combining the right parameter(s), our method had successfully predict changes in both sleep duration and sleep efficiency with accuracy of 68% and 64%, respectively.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Evaluation of E-Readiness Cloud Computing Service Model Adoption on Indonesian Higher Education 印尼高等教育采用E-Readiness云计算服务模式的评估
Fajar Surya G Soni, Heru Nugroho
{"title":"An Evaluation of E-Readiness Cloud Computing Service Model Adoption on Indonesian Higher Education","authors":"Fajar Surya G Soni, Heru Nugroho","doi":"10.1109/ICOICT.2018.8528766","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528766","url":null,"abstract":"The adoption rate of cloud computing technology in Indonesia is still low. In fact, Indonesia is still considered in the early stages of adopting (early adopter). One of the requirements for a successful digital transformation program can be seen in the cloud adoption rate. Already many industries, businesses and government institutions that adopt cloud technology, but higher education are not optimal in utilizing it. Higher Education known the potential benefits of using cloud computing. This allows higher education to avoid providing excessive Information Technology (IT) infrastructure and reduce maintenance costs. With the development of technology and services in cloud computing, higher education must be ready and courageous in utilizing this technology. The previous research mentions that the factors that determine the adoption of IT in higher education are the Impact and Benefits of IT Products for Higher Education, Infrastructure Availability, Intercultural Competition, IT Knowledge Academic Civitas, Civitas Academic Participation, IT Leadership, Technology Trend, and the existence of Blue Print IT. Another study related to e-readiness of Cloud Computing Service states that the factors that greatly affect the process of readiness of cloud computing adoption in higher education are the availability of IT Infrastructure and good IT Planning. The problem arises when the concept of e-readiness is combined with the adoption of information technology in this case cloud computing. This paper will present the results of the evaluation of the e-readiness cloud computing adoption service model at higher education. The research method used is Design Science Research Method (DSRM) from Peffers with statistical data processing using SPSS software tools. The result of data processing shows that the measurement of e-readiness adoption of cloud computing service model in higher education is influenced by the availability and competence of IT staff, Infrastructure Availability, and the existence of good IT planning.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology) 软件定义网络体系结构中Dijkstra和Bellman-Ford算法的链路故障仿真(以电信大学拓扑为例)
Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho
{"title":"Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology)","authors":"Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho","doi":"10.1109/ICOICT.2018.8528809","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528809","url":null,"abstract":"In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined Network (SDN) that can overcome the link failure by configuring the controller in order to move to alternative links that have been provided with OpenFlow. This architecture separates the control plane and data plane, so it is centralized and programmable. To look for alternative links when a link failure occurs, the shortest path algorithm is Dijkstra and Bellman-Ford algorithms. The test parameters performed in this research are functionality to determine whether the two algorithms can determine the path or not, and convergence time to find out how long it takes to form the path from source to destination. Scenario of the test is done before and after the link failure occurs by using Ryu as controller and Mininet as emulator. Based on the results of the tests conducted, it was found that Dijkstra and Bellman-Ford algorithm can be applied well on link failure emulation in accordance with the scenario and topology used in the test. In addition to convergence time parameters obtained that Dijkstra algorithm is superior compared to Bellman-Ford algorithm. The difference gained in both scenarios has a value that is not so great the difference.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信