2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)最新文献

筛选
英文 中文
Collision algorithms for breaking megrelishvili protocol: Theory and numerical experiments 破解megreishvili协议的碰撞算法:理论与数值实验
Muhammad Arzaki, Bambang Ari Wahyudi
{"title":"Collision algorithms for breaking megrelishvili protocol: Theory and numerical experiments","authors":"Muhammad Arzaki, Bambang Ari Wahyudi","doi":"10.1109/ICACSIS.2016.7872728","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872728","url":null,"abstract":"Megrelishvili protocol is a linear algebraic-based key exchange procedure between two parties. Unlike the well-known Diffie-Hellman protocol or its variants, the security of this protocol does not rely on the generic discrete logarithm problem in a particular group. In this article we investigate Megrelishvili Vector-Matrix Problem (MVMP) as a computational problem that underlies the security of Megrelishvili protocol. We propose two types of collision algorithms which solve MVMP faster than the exhaustive search approach. In particular, we prove that the running time of our algorithms asymptotically outperforms that of the exhaustive search approach in solving the MVMP in FJ by a factor of (1/n logg) · qn/2. Moreover, we also conducted numerical experiments to test the actual running time of our algorithms. The results from theoretical and experimental analyses show that our algorithms are generally faster than the brute-force approach.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Federated document search using hybrid peer-to-peer network for plagiarism detection 基于混合点对点网络的联合文档搜索抄袭检测
Widyanto Bagus Priambodo, G. Guarddin
{"title":"Federated document search using hybrid peer-to-peer network for plagiarism detection","authors":"Widyanto Bagus Priambodo, G. Guarddin","doi":"10.1109/ICACSIS.2016.7872748","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872748","url":null,"abstract":"Detecting plagiarism between two papers located on different institutions cannot be done as long as there are institutions refusing to open their collection for public fearing them being plagiarized. This research developed a prototype of a cross-institutional federated document search using API-based hybrid peer-to-peer network. This approach enables searching for documents without institutions opening their collections for public. Secure link and PDF watermarking are implemented as access control methods to prevent document misuse. Emulation of text similarity detection are done using Elasticsearch. Based on the test result, we can conclude that the prototype fulfills the required business process.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter sentiment analysis of online transportation service providers 在线交通服务提供商的Twitter情绪分析
Sonia Anastasia, I. Budi
{"title":"Twitter sentiment analysis of online transportation service providers","authors":"Sonia Anastasia, I. Budi","doi":"10.1109/ICACSIS.2016.7872807","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872807","url":null,"abstract":"GO-JEK and Grab are two most popular online transportation service providers in Indonesia. The competition between the two is tight to acquire new customers and provide the best service. No official survey has been conducted in measuring customer satisfaction at both companies to give insight which company offers better service quality. This study aims to measure GO-JEK and Grab customer satisfaction through sentiment analysis of Twitter's data. Both companies use Twitter to reach their customers and promote their service. We collect 126,405 tweets from February to March 2016 containing GO-JEK and Grab keywords. Then, we pre-process the tweets and label manually before they are classified using three algorithms: Support Vector Machine, Naïve Bayes, and Decision Tree. We made and compared several classification schemes with different keywords, dataset, and k-fold cross validation techniques. Finally, we calculate Net Sentiment Score which correlates with customer satisfaction using classification results. The experiments shows that Grab's customer satisfaction is higher than GO-JEK's. The study also shows that customers tend to mention both companies Twitter account for bad experiences and not mentioning company's account for positive comments.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
An Indonesian adaptation of the System Usability Scale (SUS) 印尼版系统可用性量表(SUS)
Zahra Sharfina, H. Santoso
{"title":"An Indonesian adaptation of the System Usability Scale (SUS)","authors":"Zahra Sharfina, H. Santoso","doi":"10.1109/ICACSIS.2016.7872776","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872776","url":null,"abstract":"As a key aspect of product development, usability of a product is needed to be assessed by conducting usability evaluation. Within the usability evaluation methods, there are several usability assessment questionnaires; one of the most commonly used is the System Usability Scale (SUS). However, the SUS is originally developed in English and there had not been any study conducted to develop the Indonesian version of SUS. The adapted version is expected to help usability researchers and practitioners in Indonesia while conducting usability product evaluation. Therefore, this study was carried out to adapt the original SUS into the Indonesian version by using cross-cultural adaptation and reliability test. The Cronbach's Alpha of the Indonesian adaptation of SUS was 0.841, which concludes that this version is reliable to be used by usability practitioners.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"81 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Efficient texture image retrieval of improved completed robust local binary pattern 改进的完整鲁棒局部二值模式的高效纹理图像检索
A. Kurniawardhani, A. E. Minarno, Fitri Bimantoro
{"title":"Efficient texture image retrieval of improved completed robust local binary pattern","authors":"A. Kurniawardhani, A. E. Minarno, Fitri Bimantoro","doi":"10.1109/ICACSIS.2016.7872781","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872781","url":null,"abstract":"Improved Completed Robust Local Binary Pattern is one of the robust texture extraction for image retrieval that rotation invariant (ICRLBP). ICRLBP has proven that can increase the precision, recall, and computation time from its previous work by 21.14%, 20.03%, and 56 times, respectively, on four different texture image dataset. ICRLBP, however, has a lot of feature, thus require more time during recognition process. Moreover, it leads to high time consuming and curse of dimensionality. To overcome those issues, in this paper, we try to reduce insignificant or unnecessary ICRLBP attributes and examine the effect of reducing number of attributes on precision and recall of the retrieving images. The methods we used to reduce the ICRLBP attributes are Correlation-based Feature Selection (CFS) and Pearson's-based Correlation. The experiment results show that those feature selections not only can reduce number of attributes but also can improve precision, recall, and computation time. For S_M_C feature (sign, magnitude, and center features of ICRLBP are ploted on histogram jointly), CFS can reduce up to 95% number of attributes and improve precision, recall, computation time up to 7.5%, 7.1%, 11.42 times, respectively. For M_C feature (magnitude and center features of ICRLBP are ploted on histogram jointly), CFS can reduce up to 4.2% number of attributes and improve precision, recall, computation time up to 4.2%, 4%, 1.1 times, respectively. It indicated that Correlation-based Feature Selection (CFS) and Pearson's-based Correlation can reduce the ICRLBP attributes effectively.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134138569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Term weighting based class indexes using space density for Al-Qur'an relevant meaning ranking 基于词权的类指数空间密度古兰经相关意义排序
Kurniawati, A'la Syauqi
{"title":"Term weighting based class indexes using space density for Al-Qur'an relevant meaning ranking","authors":"Kurniawati, A'la Syauqi","doi":"10.1109/ICACSIS.2016.7872753","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872753","url":null,"abstract":"Nowadays information retrieval based on specific queries is already used in computer system. One of the popular methods is document ranking using Vector Space Model (SVM) based on TF.IDF term-weighting. In this paper TF.IDF.ICSδF term-weighting based class-indexing is proposed, afterward comparing its effectiveness to TF.IDF and TF.IDF.ICF term weighting. Each method is investigated through Al-Qur'an dataset. Al-Qur'an consist many verses, each verse of the Al-Qur'an is a single document which is ranked based on user query. The experimental show that the proposed method can be implemented on document ranking and the performance is better than previous methods with accurate value 93%.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Factors analysis that affecting the user acceptance towards IPv6 transition 影响用户接受IPv6转换的因素分析
Medi K Putri, Y. G. Sucahyo
{"title":"Factors analysis that affecting the user acceptance towards IPv6 transition","authors":"Medi K Putri, Y. G. Sucahyo","doi":"10.1109/ICACSIS.2016.7872782","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872782","url":null,"abstract":"As IPv4 capacity is running out, it is an obvious need for changing to next generation IP technology which is IPv6. This study aims at analyzing the factors that support the acceptance of network users to use IPv6. This study analyzed user experience of users who comes from academic background, enterprise practitioners, and also internet service providers. Key factors on the success and failure of IPv6 deployment were synthesized from findings from those audiences. This research utilizes mixed method, qualitative and quantitative approach. Focus group discussion chosen for the qualitative approach while survey to 286 respondents using Likert scale is being used as the data collection method for the quantitative approach. In the focus group discussion, there were experts who are working in government institutions, service providers, universities, and also network practitioner communities. Unified Theory of Acceptance and Use of Technology (UTAUT) and Structural Equation Modelling (SEM) guidelines are followed for better end results. Findings upon data collected and processing along with the information gathered from focus group discussion reveal several significant factors which affect IPv6 implementation project such as experience, facilitating condition, system trust, social influence, perceived of usefulness and perceived ease of use. Based on the findings, there are recommendation for the ISP to change the mindset and strategies for the implementation of IPv6 is totally different from IPv4 in terms of capacity, complexity, and the way of handling incident or service interruption. To provide clear reference and guidance for IPv6 transition and implementation, government is expected to collaborate with the network providers, academia, community, and practitioners to develop set of standards and detailed transition roadmap. Subsidy program to upgrade the network infrastructure that supports IPv6 should also be considered by the government in annual budget planning.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-sperm tracking using Hungarian Kalman Filter on low frame rate video 基于匈牙利卡尔曼滤波的低帧率视频多精子跟踪
G. Jati, A. A. Gunawan, S. W. Lestari, W. Jatmiko, M. Hilman
{"title":"Multi-sperm tracking using Hungarian Kalman Filter on low frame rate video","authors":"G. Jati, A. A. Gunawan, S. W. Lestari, W. Jatmiko, M. Hilman","doi":"10.1109/ICACSIS.2016.7872796","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872796","url":null,"abstract":"One factor of human sperm health is sperm motility. Motility is the ability of sperm to move. Sperm with healthy motility move forward promptly, not inactive and not moving in circles. In this paper, we would like to analyse sperm motility by considering the problem of multi object tracking in video sequences of human sperms. The challenges in multi-sperm tracking are many human sperms have fast and unpredictable movement In addition, the sperm have similar size and shape comparing by each others. To solve this problem, we used sperm detection in each video sequence to get the position of sperms. In the same time, the estimated sperm position is calculated based on previous tracking by using Kalman Filter. Finally the positions of detected sperms are compared to estimation results by using Hungarian assignment method. In this way, the trajectory of each sperm can be conclude. This paper analyze sperm motility qualitatively based on the resulted sperm trajectories. The experiment results were conducted on both open video data and our own low-frame-rate video data. The experiment results shows that the proposed method can handle the challenges in multi sperm tracking, create their trajectory and then analyze their behaviors.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Overview of Taiwan information security center and its research on privacy 台湾资讯安全中心概况与隐私权研究
Yennun Huang, Szu-Chuang Li
{"title":"Overview of Taiwan information security center and its research on privacy","authors":"Yennun Huang, Szu-Chuang Li","doi":"10.1109/ICACSIS.2016.7872716","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872716","url":null,"abstract":"The Taiwan Information Security Center (TWISC) was initiated as a research program in April 2005 and funded by the Ministry of Science and Technology for the past few years. TWISC pulls together experts in information security from various universities and research institutes in Taiwan with an aim to boost research and development activities in information security, promote public awareness, and foster partnership among government, academia, and the private sector. Its research topics cover data/software/hardware/network security and security management. TWISC has become the hub of security research in Taiwan and have been making significant impact through publishing and creating of toolkits. Recently privacy also becomes one of the main focuses of TWISC. The research team at CITI, Academia has been working on a toolkit to enable privacy-preserved release of open data. Preliminary research result will be presented in this paper.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elliptic curve cryptography based key management for the M2M local cloud platform 基于椭圆曲线密码的M2M本地云平台密钥管理
Bayu Anggorojati, N. Prasad, R. Prasad
{"title":"Elliptic curve cryptography based key management for the M2M local cloud platform","authors":"Bayu Anggorojati, N. Prasad, R. Prasad","doi":"10.1109/ICACSIS.2016.7872754","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872754","url":null,"abstract":"Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for the M2M local cloud platform which consists of multiple gateways, which provides scalability to the distributed architecture of the platform while suitable for the low powered device. The scheme has been implemented as part of the M2M platform and its performance has been evaluated. The analysis of the evaluation results in terms of processing time to perform various operations will be discussed.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"2003 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128213643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信