2016 International Conference on Informatics and Computing (ICIC)最新文献

筛选
英文 中文
Automatic detection of learning style in adaptive online module system 自适应在线模块系统学习风格的自动检测
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905696
A. Hidayat, V. Utomo
{"title":"Automatic detection of learning style in adaptive online module system","authors":"A. Hidayat, V. Utomo","doi":"10.1109/IAC.2016.7905696","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905696","url":null,"abstract":"Detecting student needs in learning is a challenge, while it is also a necessity in order to provide an adaptive learning. Since students have different learning styles, an adaptive learning is required in their learning styles. This paper explains the development of learning module which adapt to students' learning style according to FSLSM that consists of the following dimensions, perception (sensing or intuitive), input (visual or verbal), processing (active or reflective) and understanding (sequential or global). Students' learning styles is determined using ILS questionnaire and later used as consideration to show appropriate learning module content according to the learning style.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The web security and vulnerability analysis model on Indonesia Higher Education institution 印尼高等教育机构网络安全与漏洞分析模型
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905707
I. Mantra, M. Alaydrus, HM Misni
{"title":"The web security and vulnerability analysis model on Indonesia Higher Education institution","authors":"I. Mantra, M. Alaydrus, HM Misni","doi":"10.1109/IAC.2016.7905707","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905707","url":null,"abstract":"The Information technology has become an important part of life to perform various daily activities. The web site is one of the important technologies both within the enterprise, government, and education. The web site is currently a media both as a source of information, communication, data search, create, process and publication of information, in addition to the web site be a source of great information and important addition to the book and widely used in the media of learning in Higher Education and School by users Internet. This paper will review the analysis vulnerability (VA) and web site security, especially in Indonesia Higher Education to find out more about how web site in filter response attacks. The heart of the web of organizations and universities that do research depends on the individual SQL database, there is a high risk and there is a medium risk, but it is not easy to secure SQL database. Hackers often will damage the SQL database to perform copy, edit and delete the database. This time the hackers smarter to simply copy the SQL database only those with the hope to sell the database to the other party. This study tried to find out the weaknesses and protection against SQL databases in several universities tested. The Sample Attacks that will be tested in form of SQL injection to find vulnerabilities and provide prevention and countermeasures for the owner of the web site.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Indonesian sentiment text based on affective space model (ASM) using electroencephalogram (EEG) signals 基于情感空间模型(ASM)的印尼语情感文本脑电图分析
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905738
K. Hulliyah, A. Wahab, N. Kamaruddin, S. Erdogan, Yusuf Durachman
{"title":"Analysis of Indonesian sentiment text based on affective space model (ASM) using electroencephalogram (EEG) signals","authors":"K. Hulliyah, A. Wahab, N. Kamaruddin, S. Erdogan, Yusuf Durachman","doi":"10.1109/IAC.2016.7905738","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905738","url":null,"abstract":"The affective space model (ASM) based on the valence and arousal (VA) has been used by many researchers in determining the emotional state of an individual. Psychologist uses the self assessment maniquin (SAM) while other researchers uses the facial patterns, voice emotions and also electroencephalogram (EEG) signals to obtain the category of Sentiment analysis (SA) based on VA as the two dimensional approach represents affective state. However, getting affective words with VA scores are still infrequently used, even though these VA lexicon are advantageous resource in creating application of sentiment, especially in the Indonesian language and can be used as a corpus for SA. Thus this paper proposes to design and analyze Indonesian affective lexicons based on affective norm english word (ANEW) for automatic determination of VA rating of words. In this research, we proposed to develop an extensive number of sentiment states in Indonesian language that have been placed in terms of VA using SAM and would be correlated with EEG as a comprehensive tool of Neuro Physiological Signal for the emotion sentiment corpus rating.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remote QR code recognition based on HOG and SVM classifiers 基于HOG和SVM分类器的远程QR码识别
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905704
Hicham Tribak, Salah Moughyt, Y. Zaz, G. Schaefer
{"title":"Remote QR code recognition based on HOG and SVM classifiers","authors":"Hicham Tribak, Salah Moughyt, Y. Zaz, G. Schaefer","doi":"10.1109/IAC.2016.7905704","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905704","url":null,"abstract":"QR codes have become useful and efficient data storage tools which are exploited in many commercial applications including product tracking, website redirection, etc. A QR code is a 2-dimensional barcode localised through three finder patterns (three squares characterised by a series of alternative black and white modules at ratios 1∶1∶3∶1∶1) placed in its three corners. QR codes are generally placed in different environments with complex backgrounds (overlapping text, pictures, etc.), and are often captured under unfavourable conditions such as poor lighting. These factors can significantly affect the recognition ability and thus may hinder correct QR code localisation and identification. In order to appropriately address these issues, in this paper, we present a QR code recognition algorithm based on histogram of oriented gradients (HOG) features combined with support vector machine (SVM) classifiers. Using HOG, we extract gradient features of each extracted pattern. Subsequently, the obtained features are passed to two linear SVM classifiers, one trained with finder patterns and one trained with alignment patterns, to remove irrelevant patterns. QR codes are then conveniently localised according to a pattern closeness constraint. In the last stage, the captured code is enhanced by applying a perspective correction followed by image binarisation and morphological processing. Finally, the patterns are decoded using an accurate 2-d barcode decoder. Our proposed approach is designed for an embedded systems using a Raspberry Pi equipped with a HD camera and a small robot carrying the equipment.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service 在SIKASIR RESTful Web服务上使用JSON Web令牌的基于令牌的身份验证
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905711
Muhamad Haekal, Eliyani
{"title":"Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service","authors":"Muhamad Haekal, Eliyani","doi":"10.1109/IAC.2016.7905711","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905711","url":null,"abstract":"The role of SMEs in the economy of Indonesia is significant. However, the problems faced by the SMEs as less professional management often become an obstacle to the progress of the business. To solve these problems, we need an application that can help small business owners to help manage their business and can also be accessed by a variety of platforms. All these problems can be solved with the application SIKASIR. In order SIKASIR application can be accessed by multiple platforms, it takes a web service that resides on a server. Each application SIKASIR of various platforms to be connected to the service RESTful Web Service so interconnected and synchronized. However, there are some problems when making a multi-platform service, one of them is an authentication problem. In REST architecture, we need authentication methods that are stateless, one of which is a token-based authentication methods. On this occasion, this study will use JSON Web Token. JSON Web Token is the new industry standard based (RFC 7519). JSON Web Token is stateless, so it is suitable to be implemented on a RESTful Web Service application. In this research will be discussed how to implement authentication technique using token-based authentication method with a JSON Web Token, which will produce a secure authentication and make web service SIKASIR be multi-platform.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An analysis of Haar Wavelet Transformation for androgenic hair pattern recognition Haar小波变换在雄性激素发型识别中的应用分析
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905683
Regina Lionnie, M. Alaydrus
{"title":"An analysis of Haar Wavelet Transformation for androgenic hair pattern recognition","authors":"Regina Lionnie, M. Alaydrus","doi":"10.1109/IAC.2016.7905683","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905683","url":null,"abstract":"To identify criminal or pedophile in online child pornography images and video is a challenging task when the faces and other distinguish features are not shown. To address these kind of problems, the system of recognition using androgenic hair pattern is being developed. The system of recognition presented in this paper used three main parts of methods, pre-processing methods, feature extraction with Haar Wavelet Transform level 1 decomposition and classification using Nearest Neighbor. Using 400 images of lower right legs with controlled condition, the system was analyzed. The Haar Wavelet Transformation for level 1 decomposition gave 83.48 % of average recognition precision when using 10-fold cross validation with nearest neighbor classification.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improving the performance of translation process in a statistical machine translator using sequence IRSTLM translation parameters and pruning 利用序列IRSTLM翻译参数和剪枝改进统计机器翻译过程的性能
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905736
T. Mantoro, J. Asian, M. A. Ayu
{"title":"Improving the performance of translation process in a statistical machine translator using sequence IRSTLM translation parameters and pruning","authors":"T. Mantoro, J. Asian, M. A. Ayu","doi":"10.1109/IAC.2016.7905736","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905736","url":null,"abstract":"A translation process, as a critical part of a machine translation, can be put simply as a process of decoding the meaning of the source text and re-encoding the meaning into the target language. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This statistical machine translation uses parallel corpus and statistical machine learning for English and Bahasa Indonesia. This study also evaluated 28 different parameters in IRSTLM language modeling and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence value parameter in translation process, it also has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of AODV and DSDV using SUMO, MOVE and NS2 使用SUMO、MOVE和NS2对AODV和DSDV进行性能分析
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905747
T. Mantoro, M. Reza
{"title":"Performance analysis of AODV and DSDV using SUMO, MOVE and NS2","authors":"T. Mantoro, M. Reza","doi":"10.1109/IAC.2016.7905747","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905747","url":null,"abstract":"VANET is a part of MANET which is specific on communication between vehicle to vehicle or between vehicles to its surrounding environment infrastructure. One of the most widely used routing protocol at VANET implementation are AODV (Ad-hoc On-Demand Distance Vector) and DSDV (Destination Sequence Distance Vector Routing), which are topology based routing protocol. VANET dynamic network architecture and character of the node that always move, require a reliable routing protocol, since it related to safety. This study analyzes the performance of those routing protocol. The main objective of this study is analyzing the performance of AODV compare to DSDV using simulator SUMO, MOVE and NS2.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":" 29","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real time monitoring system for water pollution in Lake Toba 鸟羽湖水污染实时监测系统
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905749
R. Rahmat, Athmanathan, M. F. Syahputra, M. S. Lydia
{"title":"Real time monitoring system for water pollution in Lake Toba","authors":"R. Rahmat, Athmanathan, M. F. Syahputra, M. S. Lydia","doi":"10.1109/IAC.2016.7905749","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905749","url":null,"abstract":"Lake Toba serves as an important tourism attraction in Indonesia, especially in the region of North Sumatera province. As tourism in Lake Toba develops, the possibility of environmental issues in Lake Toba, mainly water quality, is also increased. This condition increases necessity for a system that can monitor environment condition, especially water quality in Lake Toba. In this paper, we propose a design and development to gather and process data about water pollution in Lake Toba in a real-time process. Our proposed design consists of several sensors which record several parameters, such as Dissolved Oxygen Level, pH level, Water Temperature, Air Humidity and Air Temperature. These sensor buoys will be placed on several locations on Lake Toba's surface to increase the effectiveness of measurement, thus improving the measurement result. Finally, the real-time measured values from the sensors will be gathered and processed in one main controller; the experiment result shows that certain area can be monitored effectively.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Multi Agent Hyper-Heuristics based framework for production scheduling problem 基于多智能体超启发式的生产调度框架
2016 International Conference on Informatics and Computing (ICIC) Pub Date : 1900-01-01 DOI: 10.1109/IAC.2016.7905735
C. Nugraheni, L. Abednego
{"title":"Multi Agent Hyper-Heuristics based framework for production scheduling problem","authors":"C. Nugraheni, L. Abednego","doi":"10.1109/IAC.2016.7905735","DOIUrl":"https://doi.org/10.1109/IAC.2016.7905735","url":null,"abstract":"This paper investigates the potential use of hyper-heuristics and multi agent approach for solution of the real single machine production scheduling problem. A framework consisting of six agents is proposed. The agents are Problem Agent, Trainer Agent, Training Dataset Agent, Heuristic Pool Agent, Algorithm Agent, Advisor Agent, and Solver Agent. Three Algorithm Agents are proposed to solve the problem, i.e. Genetic Programming Hyper-Heuristics (GPHH) agent, Genetic Algorithm Hyper-Heuristic (GAHH) agent, and Simulated Annealing Hyper-Heuristics (SAHH) agent. Experimental results show that the performance of GAHH is comparable with SAHH. While GPHH agent outperforms GAHH algorithm agent and SAHH algorithm agent, and also six other benchmark heuristics including MRT, SPT, LPT, EDD, LDD, and MON rules with respect to minimum tardiness and minimum flow time objectives.","PeriodicalId":404904,"journal":{"name":"2016 International Conference on Informatics and Computing (ICIC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信