2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

筛选
英文 中文
Analysis of the Effect of Trust on Purchase Intention in E-Commerce Integration for Vendors & Event Organizer 供应商&活动组织者电子商务整合中信任对购买意愿的影响分析
Dina Ikramina Setiani, Sfenrianto Sfenrianto, Gunawan Wang
{"title":"Analysis of the Effect of Trust on Purchase Intention in E-Commerce Integration for Vendors & Event Organizer","authors":"Dina Ikramina Setiani, Sfenrianto Sfenrianto, Gunawan Wang","doi":"10.1109/ICITISEE48480.2019.9003965","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003965","url":null,"abstract":"Event Organizer is a professional service provider of organizing events in order to organize the entire series of events to suit the expected goals. This research aims to determine the Event Organizer integrated with e-commerce such as Tokopedia, Bukalapak, Blibli, Lazada and Shopee, so that it can be accessed by customers and vendors providing event needs easily. Some factors that influence customer behavior so that they are interested in using Event Organizer services are by using Perceived Value, Service Quality, User Satisfaction, Trust, and Purchase Intention variables. This research produces several hypotheses that will illustrate the interrelationship between variables and the effect on variables. The hypothesis will be validated using an online survey involving 100 respondents. The results of the questionaire will be tested using SmartPLS software so that it is accurate. This research shows that many factors influence customers in deciding to use Event Organizer services. The results showed that the influence of trust has a positive effect on purchase intention.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114719637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Cacao Pod Detection Under Outdoor Condition Using Computer Vision 基于计算机视觉的室外条件下可可荚自动检测
Yulia Ekawaty, Indrabayu, I. Areni
{"title":"Automatic Cacao Pod Detection Under Outdoor Condition Using Computer Vision","authors":"Yulia Ekawaty, Indrabayu, I. Areni","doi":"10.1109/ICITISEE48480.2019.9003733","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003733","url":null,"abstract":"This study aims to detect and count cacao pods on trees using a 4K resolution drone. The image was taken with the difference in distances and illumination in the plantation area which affect the color variation of the object’s surface. The data variation is a challenge in this study. There are 85 images of cacao fruit on trees were taken with three variations of distance, which are 50 cm, 100 cm, and 150 cm. For each distance, all images processed through several stages, i.e. image quality improvement using image enhancement at the preprocessing stage, image segmentation using the K-means method, and BLOB analysis method to detect and count the number of cacao pods on the tree. The result shows that the best distance between the camera and the object is 50 cm with an average accuracy of 93.3%.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116094156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid Encryption Technique using Cyclic Bit Shift and RC4 基于循环位移和RC4的混合加密技术
Dina Evita Sari, Happy Niti Noor Muchsin, D. Setiadi, C. A. Sari, E. H. Rachmawanto
{"title":"Hybrid Encryption Technique using Cyclic Bit Shift and RC4","authors":"Dina Evita Sari, Happy Niti Noor Muchsin, D. Setiadi, C. A. Sari, E. H. Rachmawanto","doi":"10.1109/ICITISEE48480.2019.9003848","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003848","url":null,"abstract":"Data security is an important aspect when data is sent over public networks such as the internet. Securing data can use cryptographic techniques. In symmetric cryptographic techniques, there are permutation and stream techniques, where each technique has its own weaknesses and strengths. This research combines two techniques into a hybrid technique to get stronger encryption. The proposed permutation technique is cyclic bit shift, while the proposed stream technique is RC4. The results of the combination of two methods are then performed performance tests using the avalanche effect (AE), bit error ratio (BER), the time required for decryption encryption and character error rate (CER). Based on the results of testing the proposed method is superior compared to the method that has been previously proposed.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Device orientation for Visible Light Communication in Closed Room 设备方向对封闭室内可见光通信的影响
Amirullah Wijayanto, K. Sujatmoko, Brian Pamukti
{"title":"Impact of Device orientation for Visible Light Communication in Closed Room","authors":"Amirullah Wijayanto, K. Sujatmoko, Brian Pamukti","doi":"10.1109/ICITISEE48480.2019.9003931","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003931","url":null,"abstract":"This paper evaluates the impact of device orientation in Visible Light Communication (VLC) with the Bit Error Rate (BER) as the main parameter of measurement. Most studies on optical wireless communications have neglected the effect of random orientation in their performance analysis. In this paper, we analyze the device orientation and assess its importance on system performance. The device orientation are we use equal to 0°, 15°, and 35°. To support the simulation, we use the OOKNRZ modulation techniques with the threshold Bit Error Rate (BER) around 10-5. Each of the device orientation has the value of a wide range of communication coverage. The smaller of device orientation, the coverage will be wider. With using the biggest device orientation, the communication coverage is decreased of 11,04% while the smallest device orientation is 98.08% coverage area.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Source Routing and optimized Link State Routing Performance in Multipath Fading Environment with Dynamic Network Topology 动态网络拓扑下多径衰落环境下的动态源路由和优化链路状态路由性能
Istikmal, A. Subekti, D. Perdana, N. Ridha Muldina, I. ArifIndra, Sussi
{"title":"Dynamic Source Routing and optimized Link State Routing Performance in Multipath Fading Environment with Dynamic Network Topology","authors":"Istikmal, A. Subekti, D. Perdana, N. Ridha Muldina, I. ArifIndra, Sussi","doi":"10.1109/ICITISEE48480.2019.9003887","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003887","url":null,"abstract":"In wireless adhoc network, routing protocol plays an important role establish and to maintain end-to-end communication path. Effects of propagation environment and mobility of the nodes have to be considered in the routing protocol. In this research, we investigated proactive and reactive routing protocol performance in a more realistic environment with dynamic network topology scenarios. We proposed a more realistic model scenario which includes Rician and Rayleigh multipath fading. Performance evaluation using the proposed model has been performed for two routing protocols, Dynamic Source Routing (DSR) as reactive routing protocol and a proactive routing protocol optimized Link State Routing (OLSR). Considering the dynamic nature of the wireless adhoc network architecture, we focus on network topology change scenarios by increasing number of nodes and behavior of the node. The results show that OLSR give more advantages of higher throughput and smaller end-to-end delay compare to DSR in Rician and Rayleigh environments due to multipoint replying (MPR) strategy. However, DSR have more efficient in packet routing control with smaller normalized routing load. For dynamic topology change in Rician and Rayleigh fading, OLSR performs more stable and can gain higher performance than DSR.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122840807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Adaptive Scaling Factor for Multiple Watermarking Scheme 基于自适应比例因子的多重水印算法
Dhani Ariatmanto, F. Ernawan
{"title":"An Adaptive Scaling Factor for Multiple Watermarking Scheme","authors":"Dhani Ariatmanto, F. Ernawan","doi":"10.1109/ICITISEE48480.2019.9003948","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003948","url":null,"abstract":"This paper presents an adaptive scaling factor for multiple watermarking scheme. Watermarks are inserted into the red and green channels with lowest variance of the cover image. DCT is applied on each selected block for transforming image pixels to DCT coefficients. This experiment examines DCT coefficients in the middle frequency to obtain adaptive scaling factor for embedding a watermark. The proposed algorithm used the impact of selected DCT coefficients to imperceptibility and robustness for generating adaptive scaling factor. Arnold transform is used to provide additional security and secrecy of the embedded watermark image. The experimental results reported that our scheme achieves higher invisibility performance for multiple watermarks compared to existing schemes.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Pornographic Image Classification based on Texture, Color, and Shape Features 基于纹理、颜色和形状特征的色情图像分类比较
I. W. P. Swardiana, A. Setyanto, Sudarmawan
{"title":"Comparison of Pornographic Image Classification based on Texture, Color, and Shape Features","authors":"I. W. P. Swardiana, A. Setyanto, Sudarmawan","doi":"10.1109/ICITISEE48480.2019.9003842","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003842","url":null,"abstract":"Content filtering application on the internet is very important to protect children from various negative content such as pornography and violence. It is necessary to find a detection tool for pornographic images with high accuracy and fairly low computational time. The classification algorithm is responsible for distinguishing pornographic images and non-pornographic images. This research aims to find the optimum classifier among available algorithms. To achieve these objectives, we compare the existing classification algorithm namely: K Nearest Neighbors (KNN), Logistic Regression (LR), Linear Discriminant Analysis (LDA), Decision Tree (DT), Random Forest (RF), Multi Layers Perceptron (MLP), and Support Vector Machine (SVM). Classification algorithm needs features as the input. Therefore we need a feature extraction algorithm to do so. In this study, we evaluate some features which are Haralick texture (texture features), Color Histogram (color features), and Hu Moment (shape features). The test results show that the most suitable method for classification of pornographic images is the Random Forest (RF) with an accuracy of 91.04% and the computational time per image is 0.80 ms.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natural Disaster Application on Big Data and Machine Learning: A Review 自然灾害在大数据和机器学习中的应用综述
Rania Rizki Arinta, Emanuel Andi W.R.
{"title":"Natural Disaster Application on Big Data and Machine Learning: A Review","authors":"Rania Rizki Arinta, Emanuel Andi W.R.","doi":"10.1109/ICITISEE48480.2019.9003984","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003984","url":null,"abstract":"Natural disasters are events that are difficult to avoid. There are several ways of reducing the risks of natural disasters. One of them is implementing disaster reduction programs. There are already several developed countries that apply the concept of disaster reduction. In addition to disaster reduction programs, there are several ways to predict or reducing the risks using artificial intelligence technology. One of them is big data, machine learning, and deep learning. By utilizing this method at the moment, it facilitates tasks in visualizing, analyzing, and predicting natural disaster. This research will focus on conducting a review process and understanding the purpose of machine learning and big data in the area of disaster management and natural disaster. The result of this paper is providing insight and the use of big data, machine learning, and deep learning in 6 disaster management area. This 6-disaster management area includes early warning damage, damage assessment, monitoring and detection, forecasting and predicting, and post-disaster coordination, and response, and long-term risk assessment and reduction.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Essential Blockchain Technology Adoption factors in Pharmaceutical Industry 制药行业采用区块链技术的基本因素
Surjandy, Erick Fernando, Meyliana
{"title":"Essential Blockchain Technology Adoption factors in Pharmaceutical Industry","authors":"Surjandy, Erick Fernando, Meyliana","doi":"10.1109/ICITISEE48480.2019.9003997","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003997","url":null,"abstract":"Blockchain the new technology that rapidly develop contemporary beyond the cryptocurrency. Several researches reported the adoption of Blockchain Technology for health, pharmacy, logistic, and education sector. However, the report research in education sector that adopt Blockchain Technology for pharmacy very rare, therefore this research tries to explore on how the Blockchain technology influence the four critical success factors of pharmacy industry which are people, process, technology and organization factors or commonly known as Leavitt diamond model. The systematic literature review used in this research and found a thousand and two hundred ten (1210) papers from eight (8) reputable publishers and an index such as Taylor and Francis, IEEExplore Online Library, MDPI, ACM, Science Direct, Wiley Online, Emerald Inside and Scopus as Index paper publication. Eighteen (18) papers were selected, 23 critical factors found that will influence to people, process, technology, and organization.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Overclock Ram Galax Hall Of Fame For Daily Needs 超频Ram Galax名人堂日常需求分析
Rizqi Sukma Kharisma, Miko Kastomo Putro
{"title":"Analysis of Overclock Ram Galax Hall Of Fame For Daily Needs","authors":"Rizqi Sukma Kharisma, Miko Kastomo Putro","doi":"10.1109/ICITISEE48480.2019.9003923","DOIUrl":"https://doi.org/10.1109/ICITISEE48480.2019.9003923","url":null,"abstract":"Nowadays, everyone needs a computer or PC to help them run daily errands or work. Any device on a PC has its own performance level, and can be maximized through a method called overclocking. Memory or commonly known as RAM is the easiest device to overclock. By using Memory Try-It feature in BIOS, user can obtain a better performance compared to its default condition. The authors used RAM Galax Hall Of Fame 16 GB. HWBOT Realbench benchmark was performed to observe the increased performance of RAM during overclock condition. Benchmark test results a system score which can be utilized as a reference for the user to understand the increased performance of a device (in percentage) after being overclocked.","PeriodicalId":380472,"journal":{"name":"2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信