2016 International Conference on Informatics and Computing (ICIC)最新文献

筛选
英文 中文
3D reconstruction of dynamic vehicles using sparse 3D-laser-scanner and 2D image fusion 基于稀疏三维激光扫描仪和二维图像融合的动态车辆三维重建
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 2016-10-28 DOI: 10.1109/IAC.2016.7905690
Dennis Christie, Cansen Jiang, D. Paudel, C. Demonceaux
{"title":"3D reconstruction of dynamic vehicles using sparse 3D-laser-scanner and 2D image fusion","authors":"Dennis Christie, Cansen Jiang, D. Paudel, C. Demonceaux","doi":"10.1109/IAC.2016.7905690","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905690","url":null,"abstract":"Map building becomes one of the most interesting research topic in computer vision field nowadays. To acquire accurate large 3D scene reconstructions, 3D laser scanners are recently developed and widely used. They produce accurate but sparse 3D point clouds of the environments. However, 3D reconstruction of rigidly moving objects along side with the large-scale 3D scene reconstruction is still lack of interest in many researches. To achieve a detailed object-level 3D reconstruction, a single scan of point cloud is insufficient due to their sparsity. For example, traditional Iterative Closest Point (ICP) registration technique or its variances are not accurate and robust enough to registered the point clouds, as they are easily trapped into the local minima. In this paper, we propose an 3-Point RANSAC with ICP refinement algorithm to build 3D reconstruction of rigidly moving objects, such as vehicles, using 2D-3D camera setup. Results show that the proposed algorithm can robustly and accurately registered the sparse 3D point cloud.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Real-time monitoring system of electrical quantities on ICT Centre building University of Lampung based on Embedded Single Board Computer BCM2835 基于嵌入式单片机BCM2835的楠榜大学ICT中心大楼电量实时监控系统
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 2016-10-11 DOI: 10.1109/IAC.2016.7905751
G. F. Nama, D. Despa, Mardiana
{"title":"Real-time monitoring system of electrical quantities on ICT Centre building University of Lampung based on Embedded Single Board Computer BCM2835","authors":"G. F. Nama, D. Despa, Mardiana","doi":"10.1109/IAC.2016.7905751","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905751","url":null,"abstract":"University of Lampung (Unila) as an academic institution should provide the internet service for thousands of users, monitoring the condition of electricity (Voltage, Current, Power factor, Power, and Energy consumption measurement) at ICT center building has an important role, as a part of maintenance lifecycle to make sure the internet services running well, system monitoring implemented in order to know the quality of electricity supply in the system, identifying disruption events, and to calculate the amount of electrical energy usage periodically. In this research we made an application to monitor the electrical quantities in real time, and shown the statistic reports through web interface. This research was conducted on the 3-Phase electricity network at ICT center building Unila. Monitoring of voltage was done by using a step-down transformator as voltage sensor, and Current Transformer SCT-013 100A as current sensor. Energy, Power, and Power Factor value was obtained by some of scientific calculation. Python programming language was used to develop the application, mainly for data acquisition and calculation that run on BCM2835 Embedded Single Board Computer. The result of this research shown that energy consumption for each Phase was not in balance, 1st and 2nd Phase mostly high load during working hours only, while 3rd Phase energy consumption relatively stable at all time, this happen because 3rd Phase connected to Data Center which consist of several server and network equipment that always online for 24 hours.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
VisUN-3D: User navigation with visualized 3D maps for mobile users VisUN-3D:为移动用户提供可视化3D地图的用户导航
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 2016-10-01 DOI: 10.1109/IAC.2016.7905748
T. Mantoro, M. A. Ayu, Umran Azziz, Midhat Muhic, Moaz AbdulBagi, Adamu I. Abubakar
{"title":"VisUN-3D: User navigation with visualized 3D maps for mobile users","authors":"T. Mantoro, M. A. Ayu, Umran Azziz, Midhat Muhic, Moaz AbdulBagi, Adamu I. Abubakar","doi":"10.1109/IAC.2016.7905748","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905748","url":null,"abstract":"Mis-orientation in unfamiliar domain is a common problem for new visitors when they visit a new location. This study proposes a unique solution by visualizing the real world to 3D model similarly (congruent) while the visitor on the move. Our approach provides visualization of 3D maps in virtual 3D workspace environments which assist a user to navigate to a target location to meet with others. This paper presents a mobile based prototype with a 3D model for navigating users in an unfamiliar environment. This prototype can accommodate more than 2 users to navigate in a 3D-walk space in a real time. It shows the users their where-about in the form of visualized 3D maps. The 3D map also shows to the user her/hir location on the scene relative to the location of another user that she/he wants to meet on the same image plane. This method of relative location will help the users to navigate around the location to reach their target easier.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114249888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stegano-image as a digital signature to improve security authentication system in mobile computing 隐写图像作为数字签名,改进移动计算中的安全认证系统
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 2016-10-01 DOI: 10.1109/IAC.2016.7905708
T. Mantoro, Didit Dwi Permadi, Adamu I. Abubakar
{"title":"Stegano-image as a digital signature to improve security authentication system in mobile computing","authors":"T. Mantoro, Didit Dwi Permadi, Adamu I. Abubakar","doi":"10.1109/IAC.2016.7905708","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905708","url":null,"abstract":"Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. This techniques has some limitations and drawbacks. When users choose meaningful words from dictionaries, by using brute force attacks, it makes textual passwords vulnerable to dictionary and easy to break. To overcome the drawbacks, a new authenticate technique is proposed in this paper in order to provide for more security authentication system. In this paper the textual password will be hidden in an image using steganography technique. All data and critical information like passwords are stored in encrypted manner used image as carrier so it's difficult for brute force attack to crack it. Steganography is used to hide secret information onside some carrier. The most basic and important image steganography technique is Least Significant Bit (LSB) embedding technique. In this technique, data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. LSB steganography is combined with AES cryptography to hide textual password, in order to provide high level security on authentication system that run under Android.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Business Process Automation of Document Filing Based Alfresco for Referral BPJS Patient (case study: BPJS Center of Dharmais Cancer Hospital) 基于Alfresco的BPJS转诊业务流程自动化(以达美肿瘤医院BPJS中心为例)
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 2016-04-24 DOI: 10.1109/IAC.2016.7905753
Nurhayati, Diana Fitrisari
{"title":"Business Process Automation of Document Filing Based Alfresco for Referral BPJS Patient (case study: BPJS Center of Dharmais Cancer Hospital)","authors":"Nurhayati, Diana Fitrisari","doi":"10.1109/IAC.2016.7905753","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905753","url":null,"abstract":"PT. BPJS (Persero) is a State Owned Enterprise (SOE) are specifically assigned by the government to hold health insurance for civil servants, civil servants Pension Recipients, and other business entities. The health insurance got from PT. BPJS (Persero). The participants must submit some documents as requirements. Broadly speaking, the process to get bail on health insurance is a government health agency referral and information filing patient medical records from health centers and hospitals that have cooperated with PT. BPJS (Persero). Dharmais Cancer Hospital is one of hospitals in cooperation with PT. BPJS (Persero). The process of referral and information filing medical records, patient health insurance participants in the Cancer Hospital Dharmais have not a computerized document management system. Filing referral and medical record information is still performed manually by the patient's health insurance participants. In addition, there are many patients who do not know the health insurance participants filing referral procedure. Seeing the problems occurred, the author intends to automate the process of filing documents business BPJS patient referral based alfresco. A system development method used by the author is the Business Process Methodology. The procedure used in this study using the referral procedure that had been running on BPJS Dharmais Cancer Center Hospital. Finally, this system is expected to facilitate the process of filing and referral of patients' health insurance can improve the efficiency of time and cost.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relationship between compressed image quality and Quality of Experience for wireless file sharing 无线文件共享中压缩图像质量与体验质量的关系
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905682
Regina Lionnie, Agus Pristiawan, B. Prasetyo, Rizal Broer Bahaweres, M. Alaydrus
{"title":"Relationship between compressed image quality and Quality of Experience for wireless file sharing","authors":"Regina Lionnie, Agus Pristiawan, B. Prasetyo, Rizal Broer Bahaweres, M. Alaydrus","doi":"10.1109/IAC.2016.7905682","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905682","url":null,"abstract":"As one of the top ten countries that has highest internet users, Indonesia is a land of opportunities for service provider companies to grow their market. Indonesian people also love to use their gadget and grow attach to them. To maintain the customers' satisfaction, the service provider companies need to balance the quality of product and the quality perceived by the customers, especially when using the compression process for sending and receiving the digital image file. This study presented in this paper built the relation between image compressed quality, Quality of Service parameters and Quality of Experience in Mean Opinion Score form. The compression technique used in this paper was Embedded Zerotreee Wavelet with Haar basis with variations in level of decomposition and number of loop. From the research results, we analyzed that when we used level 1, 3 and 5 of decomposition, the results of Mean Opinion Score from 30 respondents was that the respondents could not tell the differences between original image and compressed images. From the Quality of Service parameters results, the compression processes did not interfere with the ability of the network to send and receive the images.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast cancer identification on digital mammogram using Evolving Connectionist Systems 使用进化连接系统在数字乳房x光检查中识别乳腺癌
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905703
E. Nababan, M. Iqbal, R. Rahmat
{"title":"Breast cancer identification on digital mammogram using Evolving Connectionist Systems","authors":"E. Nababan, M. Iqbal, R. Rahmat","doi":"10.1109/IAC.2016.7905703","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905703","url":null,"abstract":"This research aims to develop a system which can help radiologists to identify the symptoms of breast cancer, using Evolving Connectionist Systems (ECoS). Breast cancer identification is done by using Breast Imaging Reporting and Database System as a standard system. In this study, medical images will be enhanced by using computer image processing techniques. Then, the enhanced image will be classified, and the result will be given to the radiologist for further medical diagnosis. Region of Interest (ROI) Segmentation is applied in this system, followed by image enhancement using Contrast Limited Adaptive Histogram Equalization (CLAHE). For the extraction of textural features, Gray Level Co-occurrence matrix (GLCM)is applied. Then features parameter is employed to identify the ROIs as either masses or calcification and then classify them into three categories, they are normal, benign and malignant. Three layers Simple Evolving Connectionist Systems (SECoS) with sixteen features was proposed for classifying the marked regions into BI-RADS 2 (benign) or BI-RADS 5 (malignant). 75.00% sensitivity and 88.89% specificity is achieved on INbreast dataset. Wisconsin Breast Cancer dataset is also used in this paper, 96.20% sensitivity and 99.24% specificity is achieved.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Architecture vision for Indonesian Integrated Agriculture Information Systems using TOGAF framework 使用TOGAF框架的印尼综合农业信息系统的架构远景
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905691
R. Delima, H. B. Santoso, J. Purwadi
{"title":"Architecture vision for Indonesian Integrated Agriculture Information Systems using TOGAF framework","authors":"R. Delima, H. B. Santoso, J. Purwadi","doi":"10.1109/IAC.2016.7905691","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905691","url":null,"abstract":"Agriculture is an important sector for Indonesia. Indonesia as an agrarian country, most of the society work as a farmer. In modern agriculture / modern farming, communication and information technology plays important role to increase farmer's productivity. Thus, an Integrated Agriculture Information System (IAIS) is urgent to be developed in Indonesia. As a complex system, IAIS needs a blueprint which is going to be a reference to develop system gradually and sustainable. An approach to develop system blueprint is Enterprise Architecture (EA) using The Open Group Architecture Framework (TOGAF). In TOGAF, there are some activities which have to be done gradually. This paper discusses two early activities to develop IAIS blueprint, Preliminary Phase and Architecture Vision Phase.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A file undelete with Aho-Corasick algorithm in file recovery 一个文件删除与Aho-Corasick算法在文件恢复
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905757
O. S. Sitompul, A. Handoko, R. Rahmat
{"title":"A file undelete with Aho-Corasick algorithm in file recovery","authors":"O. S. Sitompul, A. Handoko, R. Rahmat","doi":"10.1109/IAC.2016.7905757","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905757","url":null,"abstract":"In this research, a file undelete method is proposed by which the file recovery system retrieved the file metadata through a parsing process from the master file table (MFT) attributes. Using the Aho-Corasick algorithm, the process is then continued with a filtering process in which keywords are matched with file names. The result obtained shows that the proposed method is able to perform recovery of files that has been deleted from the file system. The experiment is performed four times with various file condition which had been overwritten 0%, 18.98%, 32.21% and 59.77% from their original size. The rate of the average file recovery success is 87.50% and the average time required is 0.32 second for string matching on file names.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The effective noise removal techniques and illumination effect in face recognition using Gabor and Non-Negative Matrix Factorization 研究了Gabor和非负矩阵分解在人脸识别中的有效去噪技术和光照效果
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905685
I. Budiman, Herlianto, Derwin Suhartono, Fredy Purnomo, M. Shodiq
{"title":"The effective noise removal techniques and illumination effect in face recognition using Gabor and Non-Negative Matrix Factorization","authors":"I. Budiman, Herlianto, Derwin Suhartono, Fredy Purnomo, M. Shodiq","doi":"10.1109/IAC.2016.7905685","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905685","url":null,"abstract":"There is always noise inside the digital images. Noise is an unwanted component of the image. The existence of noise in a face image can degrade the accuracy of a face recognition. Therefore, we need a proper method that can cope noise or restore the quality of the image. The best method to overcome noise in the image is to use smoothing (filter). In this research, we discuss some techniques to overcome noise in face recognition task using Gabor and Non-Negative Matrix Factorization (NMF), as it is stated in the previous research that it still cannot handle images with noise yet. The noises discussed in this research consist of impulse noise (salt-and-pepper), additive noise (Gaussian) and multiplicative noise (speckle). The experiment was conducted by using two face databases; they were ORL and Extended Yale B. The result said that mean filter is the best coping technique for Gabor and NMF face recognition methods. We used K-Nearest Neighbors (KNN) as the classifier and it achieved 90.83% accuracy rate.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信