{"title":"Adaptive edge detection and Histogram color segmentation for centralized vision of soccer robot","authors":"A. Aribowo, Giorgy Gunawan, H. Tjahyadi","doi":"10.1109/IAC.2016.7905688","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905688","url":null,"abstract":"In this paper an adaptive algorithm to detect arena of a soccer robot, and the position, role and orientation of robots are proposed. Adaptive edge detection using Otsu's method is used in arena detection and adaptive color segmentation using Histogram is utilized in robot detection. The proposed method is shown to be able to detect arena and robots in dynamic environment. The experiment results show that the adaptive edge detection method is able to 100% detect the arena regardless the changes in camera displacement and lighting condition. Furthermore, the histogram color segmentation successfully recognizes every significant color that exists in the arena. In the real time fashion of soccer robot, those methods give an average of 2.295% and 0.656% of error in x-axis and y-axis, respectively.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of sea wave height based on radar image texture feature of radar images: An introduction","authors":"Harwikarya, Sabar Rudiarto","doi":"10.1109/IAC.2016.7905740","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905740","url":null,"abstract":"This paper proposed a texture's feature of gray-level co-occurrence matrix (GLCM) as a calibrator of the sea wave height. Texture in Synthetic Aperture Radar (SAR) images represent the surface roughness of the sea or the wave height. As an archipelago country which has 70% sea of entire region, Indonesia needs and must have early warning system to provide transportation and fisherman safety circumvent the accident. Object of research are the P band full polarization Synthetic Aperture Radar (SAR) image acquired from coastal of East Kalimantan. These polarization are; horizontal-horizontal, horizontal-vertical, vertical-horizontal and vertical-vertical. Extraction of feature is done under observation angle 0° and adjacent pixels is 1. The results showed homogeneity is a consistent and toughest feature in horizontally-vertically polarization and vertical-vertical polarization and this feature can be used as a calibrator.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conceptual green-ICT implementation model based-on ZEN and G-readiness framework","authors":"Marcel","doi":"10.1109/IAC.2016.7905697","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905697","url":null,"abstract":"ICT is no longer simply be a supporting tool, but as an integral part of the business itself, a strategic role. As well as for the education area, higher education institution (HEI) is one-of that use fairly large of the ICT solution. Since there is a positive correlation between ICT usage and economic growth potential, arising new issues to the environment. There is an urge to balance between the usage of ICT and environmental awareness. Indonesia as one of the emerging economic powers want to participate in the greening movement, but the problem arises when there is still no formal regulation / framework yet. Furthermore, ICT also has not been seen as one of the aspects that need to be given a special attention in greening movement. There are several frameworks available for green-IT, but the question is how can we adopt it for HEI case in Indonesia? This paper as a preliminary study, try to correlate one of the green-IT framework, named G-readiness framework with ZEN framework, an Indonesia national framework for ICT adoption in HEI. The study found that both the frameworks are mutually relevant. The derived model use 5 domains of G-readiness that represent critical success factors for green-IT initiatives correlate with ZEN framework attributes as practical implementation checklist. From the correlation process, we add one new domain, named ‘Value’, so the derived model has total six domains (Attitude, Policy, Practice, Technology, Governance and Value).","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors affecting knowledge sharing and knowledge utilization behavior in an Indonesian airline company","authors":"M. R. Shihab, Wahyu Budi Anggoro, A. Hidayanto","doi":"10.1109/IAC.2016.7905694","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905694","url":null,"abstract":"In recent years, knowledge is considered to be a valued and important asset within an organization. However, knowledge sharing in many organizations is deemed a challenge and an obstacle to overcome. This research was prepared to explore the predecessors that influence knowledge sharing and knowledge utilization behavior. The underlying research model was developed using Social Cognitive Theory alongside with Information System Success Model. A total of 108 samples were obtained from the employees of a leading airline company in Indonesia, who use Knowledge Management System exhaustively. Data was analyzed using Partial Least Square Structural Equational Modeling, aided with SmartPLS 2.0 software. The results of this study denote that enjoyment in helping others, interpersonal trust, norm of reciprocity, top management support, and system quality, to be factors that influence knowledge sharing behavior. Finally, research results also indicate that knowledge contributing and collecting behaviors concertedly influence knowledge utilization.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126485625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shifa Manaruliesya Anggriane, S. M. Nasution, Fairuz Azmi
{"title":"Advanced e-voting system using Paillier homomorphic encryption algorithm","authors":"Shifa Manaruliesya Anggriane, S. M. Nasution, Fairuz Azmi","doi":"10.1109/IAC.2016.7905741","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905741","url":null,"abstract":"The increase of technology usage, especially in online storage data with cloud system, makes data security become one of the most important requirements for the user. One of the ways to protect the data is with encryption process, it as a process to change a data form into a new one that can only be read by the chosen recipient. This technology has been carried out in the election process with e-voting system. The high risk of security problem makes data encryption applied in the e-voting system. Thus, the ballot won't be interrupted by the insider or the outsider. The purpose of this research is to prove the effectiveness of the Paillier algorithm and its homomorphic property that implemented in an e-voting system. With homomorphic property, the system can calculate the sum of votes in ciphertext form without revealing the choice of the voters. The resulting ciphertext values will be different each other even though the same plaintext is encrypted, with a size of 4 times larger than the plaintext size. The success ratio for the system is 100% with the maximum number of messages that can be processed is 3.287.937.778 messages.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inculcating Secure Coding for beginners","authors":"N. A. Aziz, S. Z. Shamsuddin, N. A. Hassan","doi":"10.1109/IAC.2016.7905709","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905709","url":null,"abstract":"This paper describes an implementation of a Secure Coding learning package for Undergraduate students in the Kulliyyah of Information and Communication Technology (KICT) at the International Islamic University Malaysia. The learning package consists of three components which are SCALT, WebGoat and notes on several vulnerabilities in programming languages. This work aims to create awareness among the KICT community on the importance of secure coding in any application development. This package teaches individuals on how hackers take advantage on vulnerabilities that exist on web applications and allows students to experience within the WebGoat environment. Tips on handling vulnerabilities when coding in C, C++ and Java are also provided for students' reference. This learning package is an effort to inculcate students at an early age of software developers, to produce secure applications.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kamaruddin, A. Rahman, Khairul Ikhwan Mohamad Halim, Muhammad Hafiq Iqmal Mohd Noh
{"title":"Driver behavior state recognition based on silence removal speech","authors":"N. Kamaruddin, A. Rahman, Khairul Ikhwan Mohamad Halim, Muhammad Hafiq Iqmal Mohd Noh","doi":"10.1109/IAC.2016.7905713","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905713","url":null,"abstract":"Numerous researches have linked driver behavior to the cause of accident and some studies are concentrated into different input providing practical preventive measures. Nonetheless speech has been found to be a suitable input source in understanding and analyzing driver's behavior state due to the underlying emotional information when the driver speaks and such changes can be measured. However, the massive amount of driving speech data may hinder optimal performance of processing and analyzing the data due to the computational complexity and time constraint. This paper presents a silence removal approach using Short Term Energy (STE) and Zero Crossing Rate (ZCR) prior to extracting the relevant features in order to reduce the computational time in a vehicular environment. Mel Frequency Cepstral Coefficient (MFCC) feature extraction method coupled with Multi Layer Perceptron (MLP) classifier are employed to get the driver behavior state recognition performance. Experimental results demonstrated that the proposed approach is able to obtain comparable performance with accuracy ranging between 58.7% and 76.6% to differentiate four driver behavior states, namely; talking through cell telephone phone, out-burst laughing, sleepy and normal driving. It is envisages that such engine can be extended for a more comprehensive driver behavior identification system that may acts as an embedded warning system for sleepy driver.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-business adoption and application portfolio management in remanufacturing small and medium enterprises","authors":"Y. A. Fatimah, P. Putra, Z. Hasibuan","doi":"10.1109/IAC.2016.7905743","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905743","url":null,"abstract":"The role of e-business or the use of information and communication technology (ICT) for business activities in advancing sustainable industrial development is well acknowledged. As one of the key drivers in manufacturing growth, e-business can potentially enable increased productivity and industrial competitiveness. The adoption of e-business in remanufacturing, an emerging strategy in sustainable manufacturing, has been lagging especially among small and medium enterprises (SMEs) in developing countries. SMEs face challenges in capitalizing on growth opportunity in remanufacturing, which include demand forecasting and inventory management. These challenges, if left unaddressed, could pose threats to SMEs business viability. Exploratory in nature, this study presents the state-of-the-art in e-business for remanufacturing industries including accounts on the hurdles that contribute to the lack of adoption. A number of factors have been identified as potential hurdles to adoption include, among others, knowledge and competencies in e-business and financial support. To address the issue of lack of adoption, potential strategies are also discussed. Furthermore, a value chain analysis of a remanufacturing SME is used to provide latest insights into how e-business applications portfolio could be used to counter aforementioned challenges faced by remanufacturing SMEs.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tresna Maulana Fahrudin, I. Syarif, Ali Ridho Barakbah
{"title":"Feature selection algorithm using information gain based clustering for supporting the treatment process of breast cancer","authors":"Tresna Maulana Fahrudin, I. Syarif, Ali Ridho Barakbah","doi":"10.1109/IAC.2016.7905680","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905680","url":null,"abstract":"Breast cancer is the second highest cancer type that attacked Indonesia women. The high breast cancer patients in Indonesia also have an impact on their life expectancy to recover by treatment routinely. Malignancies and death probability are some factor of many determinants of breast cancer patient's recovery. This research examines the determinant factor of breast cancer patient treatment based on the latest condition. The dataset was originally taken from one of oncology hospital in East Java, Indonesia, which is consist of 1907 samples, 18 attributes and 2 classes. We used information gain as feature selection technique by using the entropy formula to select the best attributes that have great contribution to the data. We used clustering algorithm to get the number of attributes can be removed that available from ranking attributes by Information Gain. This clustering algorithm used Hierarchical K-means (K-means optimization) categorized patients into two groups which are normal and cancer. Our experiments show that the information gain method selected 12 of 18 attributes that have the highest contribution factor of the breast cancer patient treatment based on the last condition. The clustering algorithm error ratio was slighly decreased from 44.48% (using 18 original attributes) to 21.42% (using 12 most important attributes).","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"179 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster visualization of student's entrance score using Smoothed Data Histograms","authors":"K. C. Dewi, P. Ciptayani","doi":"10.1109/IAC.2016.7905684","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905684","url":null,"abstract":"Student's entrance score was an indicator of student's academic ability. Bali State Polytechnics (BSP) is a vocational college in Bali. Each year BSP accepts students through three stages, namely PMDK, UMPN and TBS. Examinees who are passed the assessment then divided into several classes. The accuracy of student's distribution would affect learning outcomes. Therefore, it useful to make clustering of student's entrance score in order to used as a basis in determining the student class. The goal of this study was to show the distribution of student's academic ability based on their entrance score parameter. This study performed clustering of BSP student's entrance score then visualized the cluster become islands of students. Dataset was built from database of student's entrance scores in 2014 stage UMPN and TBS of Business Administration and International Business Management department. Student's entrance score were normalized before the clustering process. Clustering process done by Self Organizing Map method. Cluster visualization can be done using Smoothed Data Histograms method. The SDH created islands of students in accordance with the similarity of student's entrance score. The display was look more attractive with the concept of islands of students. Students with similar academic ability were shown in the same color. Certainly it will facilitate the top-level management to show the distribution of student's academic ability.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}