{"title":"TPP and the future of the Digital Economy in the Asia Pacific Region","authors":"J. Foster","doi":"10.1109/ICACSIS.2016.7872713","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872713","url":null,"abstract":"The implications of the Trans Pacific Partnership (TPP) Agreement for promoting innovation and growth in the Digital Economy of the Asia-Pacific Region are examined. The Treaty is the first multilateral agreement to specifically take up economic and trade issues related to the Internet and includes ground-breaking provisions with respect to online privacy, cybersecurity, promotion of cross-border data flows and competition policy. These are being closely examined by non-parties to the agreement, such as Indonesia, China and India and could evolve into a defacto framework for the regional Digital Economy. TPP may not be sufficient to deal with challenges to greater regional cooperation on issues such as the still growing “digital divide” and persistent security tensions in the region, but its success could evidence the utility of relying on trade-based mechansims to address isssues associatd with regional Internet governance within a well-established and understood multilateral framework.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115312578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview the development of tele health and mobile health application in Indonesia","authors":"B. Wiweko, Aulia Zesario, Prince Gusti Agung","doi":"10.1109/ICACSIS.2016.7872714","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872714","url":null,"abstract":"Telemedicine is one of interaction model between physician and patients in the era of globalization. All of the countries in the world are now in position of aggressive establishment of telemedicine especially huge country such Indonesia. In Indonesia, there's a great disparity of healthcare coverage. According to survey in 2013, almost 94.1% of households is located more than 5 km from the nearest healthcare facility. In contrast, Indonesia has one of the better broadband penetration in South East Asia. It is projected that 66% of Indonesian population will be reached by broadband access in 2017. This create a perfect opportunity for telehealth services to enable greater coverage for healthcare services for patients in Indonesia. Implementation of telehealth in Indonesia has begun with tele-ECG and tele-radiology program initiated by Harapan Kita and Dr. Cipto Mangunkusumo General Hospital. The development of telehealth has changed a new paradigm on interaction between patients and doctors. Patients doesn't need to go to the hospital for asking the treatment for their diseases. Now patients gain easily a lot of health information through advancement of information, communication and technology everywhere, anywhere and whatever they want according to their needs. The concept of consumer health informatics should bring health information closer into patients than health provider's perspectives. Many mobile health applications which is one of technology fulfilled this enquires was developed in Indonesia. This development of telemedicine and mobile health has raising a lot of issues on medical ethics, confidentiality, and medico-legal that should be regulated by government. In the future, the government should establish a good standard of care among the patients and setting standard for health-care workers readiness in preparing the development of telemedicine and mobile health application in Indonesia.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. P. Setiawan, G. A. Krisnahadi, M. Iman, M. Hanif, I. Subrata, S. Widodo
{"title":"Development of a laser-based localization system in an outdoor setting: Design and performance evaluation of transmitter and receiver component","authors":"R. P. Setiawan, G. A. Krisnahadi, M. Iman, M. Hanif, I. Subrata, S. Widodo","doi":"10.1109/ICACSIS.2016.7872768","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872768","url":null,"abstract":"The Global Positioning System (GPS) has been widely used as guidance for autonomous vehicles and robots, especially in outdoor environments. For such application a high accuracy of GPS is required (e.g. using a Real-Time Kinematics Differential GPS). however, it is costly. This paper discuss about development of a laser-based localization system in outdoor setting which works based on triangulation as an alternative of positioning system as a guidance of agricultural machinery operation in a specified field operation such as fertilizer application or chemical sprayer operation. More specific this paper discuss about design and performance analysis of laser transmitter and receiver component of the proposed system. The main challenges in designing those components is that the system should be capable of dealing with influencing factors exist in outdoor environment, especially ambient light. Here, modulation technique applied to the transmitter combined with high pass filter applied to the receiver is used to address that issue. The experiment results showed that using transmitter with laser modulated at 2.7 kHz and receiver with 1.5 kHz cut-off high pass filter worked best on 50% duty cycle. The developed transmitter-receiver system was capable of reaching up to 200 m distance and worked well on a various ambient light conditions. This result suggested that the developed prototype can be used to further develop the proposed laser based localization system.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A case study: Adoption of agile in Thailand","authors":"Aziz Nanthaamornphong, Rattana Wetprasit","doi":"10.1109/ICACSIS.2016.7872732","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872732","url":null,"abstract":"Agile methods are attracting increasing industry and research interest; however, among studies that have investigated the use of agile methods, most have focused on developed countries (e.g., North America, Europe). The use of agile methods in Asian countries, particularly Thailand, is poorly understood and requires additional investigation. This paper presents findings on the adoption of agile methods among software developers within Thailand, and the data are based on in-person interviews. The primary objective of this study is to determine how the use of agile methods for software development projects is perceived in Thailand. The results of this study will provide insights into the Thai software developer community.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogi Kurniawan, L. Rahmania, T. Ahmad, W. Wibisono, R. Ijtihadie
{"title":"Hiding secret data by using modulo function in quad difference expansion","authors":"Yogi Kurniawan, L. Rahmania, T. Ahmad, W. Wibisono, R. Ijtihadie","doi":"10.1109/ICACSIS.2016.7872741","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872741","url":null,"abstract":"In this digital era, protecting sensitive data, such as military and financial data, has been an important factor for preventing attackers from illegally disclosing them. This protection can be done by hiding the secret into digital data (e.g., image, audio) which act as a cover. So, the secret messages cannot be seen easily. It is intended that the attacker is not able to detect the presence of the secret messages, while the authorized receiver is able to get it easily by using the extraction algorithm. A popular method for steganography is Difference Expansion (DE) whose common problem, similar to other methods, is the capacity of the secret which can be hidden and the quality of the stego data. In this paper, we propose to change the secret message into a series of base three numbers and compare it with modulo three of the difference between each quad pixel. The new pixel value is relatively close to its original one because the changes are limited between −2 to +2. The experimental result shows that the image is able to accommodate more secret messages while still maintaining the quality.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121465526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of memory-based and model-based collaborative filtering on the implementation of recommender system for E-commerce in Indonesia: A case study PT X","authors":"P. Aditya, I. Budi, Q. Munajat","doi":"10.1109/ICACSIS.2016.7872755","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872755","url":null,"abstract":"The increasing growth of e-commerce industry in Indonesia motivates e-commerce sites to provide better services to its customer. One of the strategies to improves e-commerce services is by providing personal recommendation, which can be done using recommender systems. However, there is still lack of studies exploring the best technique to implement recommender systems for e-commerce in Indonesia. This study compares the performance of two implementation approaches of collaborative filtering, which are memory-based and model-based, using data sample of PT X e-commerce. The performance of each approach was evaluated using offline testing and user-based testing. The result of this study indicates that the model-based recommender system is better than memory-based recommender system in three aspects: a) the accuracy of recommendation, b) computation time, and c) the relevance of recommendation. For number of transaction less than 300,000 in database, respondents perceived that the computation time of memory-based recommender system is tolerable, even though the computational time is longer than model-based.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handling illumination variation in face recognition using multiscale retinex","authors":"A. A. Gunawan, Hendry Setiadi","doi":"10.1109/ICACSIS.2016.7872757","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872757","url":null,"abstract":"Face recognition has an important role in the age of information technology to improve comfort and security. Various face recognition algorithms are proven to be effective if done under a controlled environment. However, recognition performance will decrease significantly in the uncontrolled environment, for example caused by illumination variation. This paper discusses the approach to deal with varying illumination on face recognition with Multi-Scale Retinex method. To verify accuracy of this algorithm, it is used Principal Component Analysis (PCA) and Eulidean distance as algorithms to identify faces. In the experiments, Multi-Scale Retinex is also compared to other normalization methods, such as gamma correction, histogram equalization, Retinex, and Single-Scale Retinex. Based on several face recognition dataset, that is Extended Yale B, Faces95, and Grimace, it can be concluded that the Multi-Scale Retinex method with one scale (Single-Scale Retinex) can properly normalize the illumination on the face image in term of speed and performance.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer social experience as antecedents of social commerce: Insights from Kaskus","authors":"Dahru Dzahaban, M. R. Shihab","doi":"10.1109/ICACSIS.2016.7872766","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872766","url":null,"abstract":"The rapid growth of Internet users becomes an opportunity for e-commerce company to develop its business. However, there are challenges which e-commerce company have to face. Indonesia, despite having a significant growth of its Internet users, only 27% of its Internet users who have already used online shopping. The participation of Indonesian society can be enforced by providing social interaction in e-commerce. This triggers the emergence of e-commerce business model in the form of social commerce, which emphasizes on its social interaction. The social interaction drives customers experience, so they are willing to participate in online purchasing activities. This study uses three forms of experience that can be perceived by its customers, namely social support, social presence, and flow. The analysis result of 308 respondents demonstrate that social commerce constructs have influence to customer experiences. Meanwhile, customer experiences have influence to social shopping and sharing intention.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving fuzzy multi-objective optimization using non-dominated sorting genetic algorithm II","authors":"Trisna, Marimin Marimin, Y. Arkeman","doi":"10.1109/ICACSIS.2016.7872798","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872798","url":null,"abstract":"This paper presents the stages for solving fuzzy multi-objective optimization problems using genetic algorithm approach. Before applying non-dominated sorting genetic algorithm II (NSGA II) techniques to obtain optimal solution, first multi-objective possibilistic (fuzzy) programming was converted into an equivalent auxiliary crisp model to form deterministic programming model. To determine the best solution from Pareto set, we implied feasibility degree of decision variable and satisfaction degree of decision maker. The best optimal solution is the intersection between α-feasibility degree and satisfaction degree of the decision makers that has the highest fuzzy membership degree. For numerical experiment, we used simple formulation in multi-objective fuzzy linear programming model with three maximum objective functions, three decision variables, and six constraints. The comparison of the results shows that our results are better for two objectives than that of compromising programming.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aries Fitriawan, Ito Wasito, A. F. Syafiandini, Mukhlis Amien, Arry Yanuar
{"title":"Deep belief networks using hybrid fingerprint feature for virtual screening of drug design","authors":"Aries Fitriawan, Ito Wasito, A. F. Syafiandini, Mukhlis Amien, Arry Yanuar","doi":"10.1109/ICACSIS.2016.7872737","DOIUrl":"https://doi.org/10.1109/ICACSIS.2016.7872737","url":null,"abstract":"Virtual screening (VS) is a computational technique used in drug discovery. VS process usually works by identifying the ability of structures to bind each other. One of the structure interpretation is molecular fingerprints. Molecular fingerprints are used for computational drug discovery as feature for VS. A variety of fingerprint types has been introduced. Combining two or more fingerprints into a hybrid fingerprints has been found to improve the performance of VS. Furthermore, machine learning techniques have helped to improve the performance of VS. The purpose of this research is to find a new Deep Belief Networks (DBN) architecture approach for hybrid fingerprint features. In this paper, there were two different approaches for combining two fingerprints feature for DBN, then called initial combining and latter combining. This research used six protein target classes as same as the previous research about DBN for VS. The experiments result show that the best way to combine the fingerprints for DBN architecture is initial combining.","PeriodicalId":267924,"journal":{"name":"2016 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}