2016 International Conference on Informatics and Computing (ICIC)最新文献

筛选
英文 中文
Adaptive edge detection and Histogram color segmentation for centralized vision of soccer robot 足球机器人集中视觉的自适应边缘检测和直方图颜色分割
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905688
A. Aribowo, Giorgy Gunawan, H. Tjahyadi
{"title":"Adaptive edge detection and Histogram color segmentation for centralized vision of soccer robot","authors":"A. Aribowo, Giorgy Gunawan, H. Tjahyadi","doi":"10.1109/IAC.2016.7905688","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905688","url":null,"abstract":"In this paper an adaptive algorithm to detect arena of a soccer robot, and the position, role and orientation of robots are proposed. Adaptive edge detection using Otsu's method is used in arena detection and adaptive color segmentation using Histogram is utilized in robot detection. The proposed method is shown to be able to detect arena and robots in dynamic environment. The experiment results show that the adaptive edge detection method is able to 100% detect the arena regardless the changes in camera displacement and lighting condition. Furthermore, the histogram color segmentation successfully recognizes every significant color that exists in the arena. In the real time fashion of soccer robot, those methods give an average of 2.295% and 0.656% of error in x-axis and y-axis, respectively.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study of sea wave height based on radar image texture feature of radar images: An introduction 基于雷达图像纹理特征的海浪高度研究
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905740
Harwikarya, Sabar Rudiarto
{"title":"Study of sea wave height based on radar image texture feature of radar images: An introduction","authors":"Harwikarya, Sabar Rudiarto","doi":"10.1109/IAC.2016.7905740","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905740","url":null,"abstract":"This paper proposed a texture's feature of gray-level co-occurrence matrix (GLCM) as a calibrator of the sea wave height. Texture in Synthetic Aperture Radar (SAR) images represent the surface roughness of the sea or the wave height. As an archipelago country which has 70% sea of entire region, Indonesia needs and must have early warning system to provide transportation and fisherman safety circumvent the accident. Object of research are the P band full polarization Synthetic Aperture Radar (SAR) image acquired from coastal of East Kalimantan. These polarization are; horizontal-horizontal, horizontal-vertical, vertical-horizontal and vertical-vertical. Extraction of feature is done under observation angle 0° and adjacent pixels is 1. The results showed homogeneity is a consistent and toughest feature in horizontally-vertically polarization and vertical-vertical polarization and this feature can be used as a calibrator.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A conceptual green-ICT implementation model based-on ZEN and G-readiness framework 基于ZEN和G-readiness框架的绿色ict概念性实施模型
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905697
Marcel
{"title":"A conceptual green-ICT implementation model based-on ZEN and G-readiness framework","authors":"Marcel","doi":"10.1109/IAC.2016.7905697","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905697","url":null,"abstract":"ICT is no longer simply be a supporting tool, but as an integral part of the business itself, a strategic role. As well as for the education area, higher education institution (HEI) is one-of that use fairly large of the ICT solution. Since there is a positive correlation between ICT usage and economic growth potential, arising new issues to the environment. There is an urge to balance between the usage of ICT and environmental awareness. Indonesia as one of the emerging economic powers want to participate in the greening movement, but the problem arises when there is still no formal regulation / framework yet. Furthermore, ICT also has not been seen as one of the aspects that need to be given a special attention in greening movement. There are several frameworks available for green-IT, but the question is how can we adopt it for HEI case in Indonesia? This paper as a preliminary study, try to correlate one of the green-IT framework, named G-readiness framework with ZEN framework, an Indonesia national framework for ICT adoption in HEI. The study found that both the frameworks are mutually relevant. The derived model use 5 domains of G-readiness that represent critical success factors for green-IT initiatives correlate with ZEN framework attributes as practical implementation checklist. From the correlation process, we add one new domain, named ‘Value’, so the derived model has total six domains (Attitude, Policy, Practice, Technology, Governance and Value).","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Factors affecting knowledge sharing and knowledge utilization behavior in an Indonesian airline company 影响印度尼西亚航空公司知识共享和知识利用行为的因素
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905694
M. R. Shihab, Wahyu Budi Anggoro, A. Hidayanto
{"title":"Factors affecting knowledge sharing and knowledge utilization behavior in an Indonesian airline company","authors":"M. R. Shihab, Wahyu Budi Anggoro, A. Hidayanto","doi":"10.1109/IAC.2016.7905694","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905694","url":null,"abstract":"In recent years, knowledge is considered to be a valued and important asset within an organization. However, knowledge sharing in many organizations is deemed a challenge and an obstacle to overcome. This research was prepared to explore the predecessors that influence knowledge sharing and knowledge utilization behavior. The underlying research model was developed using Social Cognitive Theory alongside with Information System Success Model. A total of 108 samples were obtained from the employees of a leading airline company in Indonesia, who use Knowledge Management System exhaustively. Data was analyzed using Partial Least Square Structural Equational Modeling, aided with SmartPLS 2.0 software. The results of this study denote that enjoyment in helping others, interpersonal trust, norm of reciprocity, top management support, and system quality, to be factors that influence knowledge sharing behavior. Finally, research results also indicate that knowledge contributing and collecting behaviors concertedly influence knowledge utilization.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126485625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced e-voting system using Paillier homomorphic encryption algorithm 采用Paillier同态加密算法的先进电子投票系统
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905741
Shifa Manaruliesya Anggriane, S. M. Nasution, Fairuz Azmi
{"title":"Advanced e-voting system using Paillier homomorphic encryption algorithm","authors":"Shifa Manaruliesya Anggriane, S. M. Nasution, Fairuz Azmi","doi":"10.1109/IAC.2016.7905741","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905741","url":null,"abstract":"The increase of technology usage, especially in online storage data with cloud system, makes data security become one of the most important requirements for the user. One of the ways to protect the data is with encryption process, it as a process to change a data form into a new one that can only be read by the chosen recipient. This technology has been carried out in the election process with e-voting system. The high risk of security problem makes data encryption applied in the e-voting system. Thus, the ballot won't be interrupted by the insider or the outsider. The purpose of this research is to prove the effectiveness of the Paillier algorithm and its homomorphic property that implemented in an e-voting system. With homomorphic property, the system can calculate the sum of votes in ciphertext form without revealing the choice of the voters. The resulting ciphertext values will be different each other even though the same plaintext is encrypted, with a size of 4 times larger than the plaintext size. The success ratio for the system is 100% with the maximum number of messages that can be processed is 3.287.937.778 messages.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Inculcating Secure Coding for beginners 向初学者灌输安全编码
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905709
N. A. Aziz, S. Z. Shamsuddin, N. A. Hassan
{"title":"Inculcating Secure Coding for beginners","authors":"N. A. Aziz, S. Z. Shamsuddin, N. A. Hassan","doi":"10.1109/IAC.2016.7905709","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905709","url":null,"abstract":"This paper describes an implementation of a Secure Coding learning package for Undergraduate students in the Kulliyyah of Information and Communication Technology (KICT) at the International Islamic University Malaysia. The learning package consists of three components which are SCALT, WebGoat and notes on several vulnerabilities in programming languages. This work aims to create awareness among the KICT community on the importance of secure coding in any application development. This package teaches individuals on how hackers take advantage on vulnerabilities that exist on web applications and allows students to experience within the WebGoat environment. Tips on handling vulnerabilities when coding in C, C++ and Java are also provided for students' reference. This learning package is an effort to inculcate students at an early age of software developers, to produce secure applications.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Driver behavior state recognition based on silence removal speech 基于消声语音的驾驶员行为状态识别
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905713
N. Kamaruddin, A. Rahman, Khairul Ikhwan Mohamad Halim, Muhammad Hafiq Iqmal Mohd Noh
{"title":"Driver behavior state recognition based on silence removal speech","authors":"N. Kamaruddin, A. Rahman, Khairul Ikhwan Mohamad Halim, Muhammad Hafiq Iqmal Mohd Noh","doi":"10.1109/IAC.2016.7905713","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905713","url":null,"abstract":"Numerous researches have linked driver behavior to the cause of accident and some studies are concentrated into different input providing practical preventive measures. Nonetheless speech has been found to be a suitable input source in understanding and analyzing driver's behavior state due to the underlying emotional information when the driver speaks and such changes can be measured. However, the massive amount of driving speech data may hinder optimal performance of processing and analyzing the data due to the computational complexity and time constraint. This paper presents a silence removal approach using Short Term Energy (STE) and Zero Crossing Rate (ZCR) prior to extracting the relevant features in order to reduce the computational time in a vehicular environment. Mel Frequency Cepstral Coefficient (MFCC) feature extraction method coupled with Multi Layer Perceptron (MLP) classifier are employed to get the driver behavior state recognition performance. Experimental results demonstrated that the proposed approach is able to obtain comparable performance with accuracy ranging between 58.7% and 76.6% to differentiate four driver behavior states, namely; talking through cell telephone phone, out-burst laughing, sleepy and normal driving. It is envisages that such engine can be extended for a more comprehensive driver behavior identification system that may acts as an embedded warning system for sleepy driver.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-business adoption and application portfolio management in remanufacturing small and medium enterprises 再制造中小企业中的电子商务采用和应用程序组合管理
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905743
Y. A. Fatimah, P. Putra, Z. Hasibuan
{"title":"E-business adoption and application portfolio management in remanufacturing small and medium enterprises","authors":"Y. A. Fatimah, P. Putra, Z. Hasibuan","doi":"10.1109/IAC.2016.7905743","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905743","url":null,"abstract":"The role of e-business or the use of information and communication technology (ICT) for business activities in advancing sustainable industrial development is well acknowledged. As one of the key drivers in manufacturing growth, e-business can potentially enable increased productivity and industrial competitiveness. The adoption of e-business in remanufacturing, an emerging strategy in sustainable manufacturing, has been lagging especially among small and medium enterprises (SMEs) in developing countries. SMEs face challenges in capitalizing on growth opportunity in remanufacturing, which include demand forecasting and inventory management. These challenges, if left unaddressed, could pose threats to SMEs business viability. Exploratory in nature, this study presents the state-of-the-art in e-business for remanufacturing industries including accounts on the hurdles that contribute to the lack of adoption. A number of factors have been identified as potential hurdles to adoption include, among others, knowledge and competencies in e-business and financial support. To address the issue of lack of adoption, potential strategies are also discussed. Furthermore, a value chain analysis of a remanufacturing SME is used to provide latest insights into how e-business applications portfolio could be used to counter aforementioned challenges faced by remanufacturing SMEs.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feature selection algorithm using information gain based clustering for supporting the treatment process of breast cancer 基于信息增益的聚类特征选择算法支持乳腺癌的治疗过程
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905680
Tresna Maulana Fahrudin, I. Syarif, Ali Ridho Barakbah
{"title":"Feature selection algorithm using information gain based clustering for supporting the treatment process of breast cancer","authors":"Tresna Maulana Fahrudin, I. Syarif, Ali Ridho Barakbah","doi":"10.1109/IAC.2016.7905680","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905680","url":null,"abstract":"Breast cancer is the second highest cancer type that attacked Indonesia women. The high breast cancer patients in Indonesia also have an impact on their life expectancy to recover by treatment routinely. Malignancies and death probability are some factor of many determinants of breast cancer patient's recovery. This research examines the determinant factor of breast cancer patient treatment based on the latest condition. The dataset was originally taken from one of oncology hospital in East Java, Indonesia, which is consist of 1907 samples, 18 attributes and 2 classes. We used information gain as feature selection technique by using the entropy formula to select the best attributes that have great contribution to the data. We used clustering algorithm to get the number of attributes can be removed that available from ranking attributes by Information Gain. This clustering algorithm used Hierarchical K-means (K-means optimization) categorized patients into two groups which are normal and cancer. Our experiments show that the information gain method selected 12 of 18 attributes that have the highest contribution factor of the breast cancer patient treatment based on the last condition. The clustering algorithm error ratio was slighly decreased from 44.48% (using 18 original attributes) to 21.42% (using 12 most important attributes).","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"179 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cluster visualization of student's entrance score using Smoothed Data Histograms 使用平滑数据直方图的学生入学分数聚类可视化
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905684
K. C. Dewi, P. Ciptayani
{"title":"Cluster visualization of student's entrance score using Smoothed Data Histograms","authors":"K. C. Dewi, P. Ciptayani","doi":"10.1109/IAC.2016.7905684","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905684","url":null,"abstract":"Student's entrance score was an indicator of student's academic ability. Bali State Polytechnics (BSP) is a vocational college in Bali. Each year BSP accepts students through three stages, namely PMDK, UMPN and TBS. Examinees who are passed the assessment then divided into several classes. The accuracy of student's distribution would affect learning outcomes. Therefore, it useful to make clustering of student's entrance score in order to used as a basis in determining the student class. The goal of this study was to show the distribution of student's academic ability based on their entrance score parameter. This study performed clustering of BSP student's entrance score then visualized the cluster become islands of students. Dataset was built from database of student's entrance scores in 2014 stage UMPN and TBS of Business Administration and International Business Management department. Student's entrance score were normalized before the clustering process. Clustering process done by Self Organizing Map method. Cluster visualization can be done using Smoothed Data Histograms method. The SDH created islands of students in accordance with the similarity of student's entrance score. The display was look more attractive with the concept of islands of students. Students with similar academic ability were shown in the same color. Certainly it will facilitate the top-level management to show the distribution of student's academic ability.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信