{"title":"Collision algorithms for breaking megrelishvili protocol: Theory and numerical experiments","authors":"Muhammad Arzaki, Bambang Ari Wahyudi","doi":"10.1109/ICACSIS.2016.7872728","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872728","url":null,"abstract":"Megrelishvili protocol is a linear algebraic-based key exchange procedure between two parties. Unlike the well-known Diffie-Hellman protocol or its variants, the security of this protocol does not rely on the generic discrete logarithm problem in a particular group. In this article we investigate Megrelishvili Vector-Matrix Problem (MVMP) as a computational problem that underlies the security of Megrelishvili protocol. We propose two types of collision algorithms which solve MVMP faster than the exhaustive search approach. In particular, we prove that the running time of our algorithms asymptotically outperforms that of the exhaustive search approach in solving the MVMP in FJ by a factor of (1/n logg) · qn/2. Moreover, we also conducted numerical experiments to test the actual running time of our algorithms. The results from theoretical and experimental analyses show that our algorithms are generally faster than the brute-force approach.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated document search using hybrid peer-to-peer network for plagiarism detection","authors":"Widyanto Bagus Priambodo, G. Guarddin","doi":"10.1109/ICACSIS.2016.7872748","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872748","url":null,"abstract":"Detecting plagiarism between two papers located on different institutions cannot be done as long as there are institutions refusing to open their collection for public fearing them being plagiarized. This research developed a prototype of a cross-institutional federated document search using API-based hybrid peer-to-peer network. This approach enables searching for documents without institutions opening their collections for public. Secure link and PDF watermarking are implemented as access control methods to prevent document misuse. Emulation of text similarity detection are done using Elasticsearch. Based on the test result, we can conclude that the prototype fulfills the required business process.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twitter sentiment analysis of online transportation service providers","authors":"Sonia Anastasia, I. Budi","doi":"10.1109/ICACSIS.2016.7872807","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872807","url":null,"abstract":"GO-JEK and Grab are two most popular online transportation service providers in Indonesia. The competition between the two is tight to acquire new customers and provide the best service. No official survey has been conducted in measuring customer satisfaction at both companies to give insight which company offers better service quality. This study aims to measure GO-JEK and Grab customer satisfaction through sentiment analysis of Twitter's data. Both companies use Twitter to reach their customers and promote their service. We collect 126,405 tweets from February to March 2016 containing GO-JEK and Grab keywords. Then, we pre-process the tweets and label manually before they are classified using three algorithms: Support Vector Machine, Naïve Bayes, and Decision Tree. We made and compared several classification schemes with different keywords, dataset, and k-fold cross validation techniques. Finally, we calculate Net Sentiment Score which correlates with customer satisfaction using classification results. The experiments shows that Grab's customer satisfaction is higher than GO-JEK's. The study also shows that customers tend to mention both companies Twitter account for bad experiences and not mentioning company's account for positive comments.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Indonesian adaptation of the System Usability Scale (SUS)","authors":"Zahra Sharfina, H. Santoso","doi":"10.1109/ICACSIS.2016.7872776","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872776","url":null,"abstract":"As a key aspect of product development, usability of a product is needed to be assessed by conducting usability evaluation. Within the usability evaluation methods, there are several usability assessment questionnaires; one of the most commonly used is the System Usability Scale (SUS). However, the SUS is originally developed in English and there had not been any study conducted to develop the Indonesian version of SUS. The adapted version is expected to help usability researchers and practitioners in Indonesia while conducting usability product evaluation. Therefore, this study was carried out to adapt the original SUS into the Indonesian version by using cross-cultural adaptation and reliability test. The Cronbach's Alpha of the Indonesian adaptation of SUS was 0.841, which concludes that this version is reliable to be used by usability practitioners.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"81 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient texture image retrieval of improved completed robust local binary pattern","authors":"A. Kurniawardhani, A. E. Minarno, Fitri Bimantoro","doi":"10.1109/ICACSIS.2016.7872781","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872781","url":null,"abstract":"Improved Completed Robust Local Binary Pattern is one of the robust texture extraction for image retrieval that rotation invariant (ICRLBP). ICRLBP has proven that can increase the precision, recall, and computation time from its previous work by 21.14%, 20.03%, and 56 times, respectively, on four different texture image dataset. ICRLBP, however, has a lot of feature, thus require more time during recognition process. Moreover, it leads to high time consuming and curse of dimensionality. To overcome those issues, in this paper, we try to reduce insignificant or unnecessary ICRLBP attributes and examine the effect of reducing number of attributes on precision and recall of the retrieving images. The methods we used to reduce the ICRLBP attributes are Correlation-based Feature Selection (CFS) and Pearson's-based Correlation. The experiment results show that those feature selections not only can reduce number of attributes but also can improve precision, recall, and computation time. For S_M_C feature (sign, magnitude, and center features of ICRLBP are ploted on histogram jointly), CFS can reduce up to 95% number of attributes and improve precision, recall, computation time up to 7.5%, 7.1%, 11.42 times, respectively. For M_C feature (magnitude and center features of ICRLBP are ploted on histogram jointly), CFS can reduce up to 4.2% number of attributes and improve precision, recall, computation time up to 4.2%, 4%, 1.1 times, respectively. It indicated that Correlation-based Feature Selection (CFS) and Pearson's-based Correlation can reduce the ICRLBP attributes effectively.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134138569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Term weighting based class indexes using space density for Al-Qur'an relevant meaning ranking","authors":"Kurniawati, A'la Syauqi","doi":"10.1109/ICACSIS.2016.7872753","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872753","url":null,"abstract":"Nowadays information retrieval based on specific queries is already used in computer system. One of the popular methods is document ranking using Vector Space Model (SVM) based on TF.IDF term-weighting. In this paper TF.IDF.ICSδF term-weighting based class-indexing is proposed, afterward comparing its effectiveness to TF.IDF and TF.IDF.ICF term weighting. Each method is investigated through Al-Qur'an dataset. Al-Qur'an consist many verses, each verse of the Al-Qur'an is a single document which is ranked based on user query. The experimental show that the proposed method can be implemented on document ranking and the performance is better than previous methods with accurate value 93%.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors analysis that affecting the user acceptance towards IPv6 transition","authors":"Medi K Putri, Y. G. Sucahyo","doi":"10.1109/ICACSIS.2016.7872782","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872782","url":null,"abstract":"As IPv4 capacity is running out, it is an obvious need for changing to next generation IP technology which is IPv6. This study aims at analyzing the factors that support the acceptance of network users to use IPv6. This study analyzed user experience of users who comes from academic background, enterprise practitioners, and also internet service providers. Key factors on the success and failure of IPv6 deployment were synthesized from findings from those audiences. This research utilizes mixed method, qualitative and quantitative approach. Focus group discussion chosen for the qualitative approach while survey to 286 respondents using Likert scale is being used as the data collection method for the quantitative approach. In the focus group discussion, there were experts who are working in government institutions, service providers, universities, and also network practitioner communities. Unified Theory of Acceptance and Use of Technology (UTAUT) and Structural Equation Modelling (SEM) guidelines are followed for better end results. Findings upon data collected and processing along with the information gathered from focus group discussion reveal several significant factors which affect IPv6 implementation project such as experience, facilitating condition, system trust, social influence, perceived of usefulness and perceived ease of use. Based on the findings, there are recommendation for the ISP to change the mindset and strategies for the implementation of IPv6 is totally different from IPv4 in terms of capacity, complexity, and the way of handling incident or service interruption. To provide clear reference and guidance for IPv6 transition and implementation, government is expected to collaborate with the network providers, academia, community, and practitioners to develop set of standards and detailed transition roadmap. Subsidy program to upgrade the network infrastructure that supports IPv6 should also be considered by the government in annual budget planning.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Jati, A. A. Gunawan, S. W. Lestari, W. Jatmiko, M. Hilman
{"title":"Multi-sperm tracking using Hungarian Kalman Filter on low frame rate video","authors":"G. Jati, A. A. Gunawan, S. W. Lestari, W. Jatmiko, M. Hilman","doi":"10.1109/ICACSIS.2016.7872796","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872796","url":null,"abstract":"One factor of human sperm health is sperm motility. Motility is the ability of sperm to move. Sperm with healthy motility move forward promptly, not inactive and not moving in circles. In this paper, we would like to analyse sperm motility by considering the problem of multi object tracking in video sequences of human sperms. The challenges in multi-sperm tracking are many human sperms have fast and unpredictable movement In addition, the sperm have similar size and shape comparing by each others. To solve this problem, we used sperm detection in each video sequence to get the position of sperms. In the same time, the estimated sperm position is calculated based on previous tracking by using Kalman Filter. Finally the positions of detected sperms are compared to estimation results by using Hungarian assignment method. In this way, the trajectory of each sperm can be conclude. This paper analyze sperm motility qualitatively based on the resulted sperm trajectories. The experiment results were conducted on both open video data and our own low-frame-rate video data. The experiment results shows that the proposed method can handle the challenges in multi sperm tracking, create their trajectory and then analyze their behaviors.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of Taiwan information security center and its research on privacy","authors":"Yennun Huang, Szu-Chuang Li","doi":"10.1109/ICACSIS.2016.7872716","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872716","url":null,"abstract":"The Taiwan Information Security Center (TWISC) was initiated as a research program in April 2005 and funded by the Ministry of Science and Technology for the past few years. TWISC pulls together experts in information security from various universities and research institutes in Taiwan with an aim to boost research and development activities in information security, promote public awareness, and foster partnership among government, academia, and the private sector. Its research topics cover data/software/hardware/network security and security management. TWISC has become the hub of security research in Taiwan and have been making significant impact through publishing and creating of toolkits. Recently privacy also becomes one of the main focuses of TWISC. The research team at CITI, Academia has been working on a toolkit to enable privacy-preserved release of open data. Preliminary research result will be presented in this paper.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elliptic curve cryptography based key management for the M2M local cloud platform","authors":"Bayu Anggorojati, N. Prasad, R. Prasad","doi":"10.1109/ICACSIS.2016.7872754","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872754","url":null,"abstract":"Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for the M2M local cloud platform which consists of multiple gateways, which provides scalability to the distributed architecture of the platform while suitable for the low powered device. The scheme has been implemented as part of the M2M platform and its performance has been evaluated. The analysis of the evaluation results in terms of processing time to perform various operations will be discussed.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"2003 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128213643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}