Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho
{"title":"Route Discovery to Avoid Congestion in Software Defined Networks","authors":"Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho","doi":"10.1109/ICSITech49800.2020.9392049","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392049","url":null,"abstract":"In computer networks, a centralized control plane model of Software Defined Network (SDN) often suffers from congestion because of this centralized characteristic. Fortunately, some congestion avoidance mechanisms have been introduced, one of which reduces the size of packets to send. However, this is considered less useful because it is longer due to the relatively small number of packets. This paper proposes a route discovery mechanism to find the best routes for packet forwarding to avoid congestion. The method explores Johnson’s algorithm because it is able to take advantage of the previous Dijkstra and Bellman-Ford algorithms. The performance of the networks measured by latency, throughput, and response time shows an improvement.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"74 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[ICSITech 2020 Front Cover]","authors":"","doi":"10.1109/icsitech49800.2020.9392037","DOIUrl":"https://doi.org/10.1109/icsitech49800.2020.9392037","url":null,"abstract":"","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Tooth and Background Segmentation in Dental X-ray Using U-Net Convolution Network","authors":"A. Fariza, A. Arifin, E. Astuti","doi":"10.1109/ICSITech49800.2020.9392039","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392039","url":null,"abstract":"Tooth and background segmentation in dental X-ray is used to produce an area of a tooth by removing areas of tissue and other neighboring teeth. This presents challenges due to a large number of superimposed (overlapping) images of teeth between the adjacent teeth and the difficulty of determining the area of the tooth with other tissues automatically. This study proposes a new approach for the automatic segmentation of dental X-ray images using the U-Net convolution network. The stages used in the training process consist of data augmentation, pre-processing with Contrast Limited Adequate Histogram Equalization (CLAHE) and gamma adjustment, and training with the U-Net architecture. While the testing process consists of pre-processing, prediction, and removing small areas in the background. The experimental results show the average accuracy of the proposed U-Net convolutional network segmentation accuracy achieves excellent results, 97.61% compared to spatial Fuzzy C-means with gaussian kernel-based of 65.55%. It shows the proposed method achieves superior automatic tooth and background segmentation. The experiment result among 1907 image testing, there are 14.58% producing segmentation because of biased boundaries on the tissue at the root of the tooth and overlapping images on the enamel.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca
{"title":"Design and Prototyping of a Scalable IoT Solution Based on LoRaWAN to Improve the Service of School Routes in the South West Location of Barranquilla","authors":"Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca","doi":"10.1109/ICSITech49800.2020.9392062","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392062","url":null,"abstract":"The Internet of things (IoT) has quickly been introduced into wireless networks and systems, opening several possibilities in terms of connectivity. IoT arises from the vast need to monitor, manage, and configure “things” remotely. Different industrial or residential applications can use IoT to obtain or send data, such as remote control of alarms, water meters, simple traffic, and light points. This research project focuses on the IoT implementation of devices LoRa that uses the LoRaWAN protocol. LoRaWAN is a network infrastructure that could be applied to monitor different variables in environments where IoT wireless technology is implemented. The current project involves designing a LoRaWAN network to support IoT in transporting school routes in Barranquilla’s southwest. The project incorporates a prototype that allows the vehicle monitoring, geographical location in real-time, percentage of the occupation, arrivals, and departures times, among other variables. Implementing this technology in the chosen sector will benefit families that require the school transport service because they will monitor the operation of the service provided. This paper details the devices and technology to be implemented in the final prototype, specifying their topology, application, technical specification, operating characteristics, and their configuration and work logic under different scenarios. For the development of the project, the guidelines defined in each of the Top-Down network design methodology phases are applied. Finally, two essential aspects are shown, such as analyzing the results obtained in the tests and the future work to be carried out based on the research.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi
{"title":"Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application","authors":"Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi","doi":"10.1109/ICSITech49800.2020.9392034","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392034","url":null,"abstract":"Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportunities, including message sabotation. The use of cryptography was one of the right methods to maintain data or information security while a communication occurred. Message security was done by combining a symmetric encryption algorithm with a digital signature algorithm. Combination of AES and ECDSA is done as a method of securing messages. AES is used for message encryption, ECDSA is used as an identifier for the sender of the message. Confidentiality and data integrity is guaranteed through encrypting messages in the database and with carrying out digital signatures.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122105820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred
{"title":"A Performance Comparison of Euclidean, Manhattan and Minkowski Distances in K-Means Clustering","authors":"Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred","doi":"10.1109/ICSITech49800.2020.9392053","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392053","url":null,"abstract":"The Indonesian police department has a role in maintaining security and law enforcement under the Republic of Indonesia Law Number 2 of 2002. In this study, data on the crime rate in the Bontang City area has been analyzed. It becomes the basis for the Police in anticipating various crimes. The K-Means algorithm is used for data analysis. Based on the test results, there are three levels of crime: high, medium, and low. According to the analysis, the high crime rate in the Bontang City area is special case theft and vehicle theft. Furthermore, it becomes the police program to maintain personal and vehicle safety.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio
{"title":"ITaCaS: a serious game and an expert system to support the teaching of sexual-health and hygiene for youth with intellectual disability","authors":"Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio","doi":"10.1109/ICSITech49800.2020.9392068","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392068","url":null,"abstract":"In Ecuador, according to the National Council for Disability Equality (CONADIS, acronym in Spanish) there are 485,325 people with disabilities, being the intellectual disability the one with the highest incidence, with a prevalence of 108,312 people. In developing countries, there are still insufficient resources for teaching Sexual Health and Hygiene (SHH) to people with disabilities. Thus, it is essential to apply strategies that help teenagers with intellectual disabilities to learn about sexual health and self-care. Therefore, this article presents an educational game and an expert system called “I take care of myself” (ITaCaS) which aims to assist in the teaching of the SHH for young people with intellectual disabilities, with ages between 12 and 17 years old. The expert system helps to determine educational activities to be carried out by the teacher with the teenager, based on their profile and prior knowledge of 13 SHH educational topics. The pictures of the game were specially designed for disabled people. The proposal was validated through a study that was carried out in two special education centers with 30 experts in the field of special education. The obtained results are encouraging since they show great acceptance by the participants of this experiment.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
{"title":"What Users Want for Gig Economy Platforms: Sentiment Analysis Approach","authors":"Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICSITech49800.2020.9392060","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392060","url":null,"abstract":"Gig economy-based mobile applications are increasingly in demand by the public. An increment in the number of users rises the number of downloads and reviews. However, the number of reviews makes it difficult for developers to understand the information contained in reviews. Besides, one review can have a variety of information. This study proposes a model that can categorize content and sentiment reviews using Support Vector Machine (SVM), Multinomial Naïve Bayes, Complement Naïve Bayes classifier, and Binary Relevance, Classifier Chain, and Label Power Sets as the data transformation method. This study used the reviews contained in the Gojek, Sampingan, and Ruang Guru applications, with 10,123 reviews. This study found the review text’s length influenced accuracy based on the evaluation of Gojek application. Generally, this study results showed that the SVM algorithm (both in the classification of sentiment reviews and review categorization) and Label Power Sets as the transformation method, yielded the best accuracy.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation Artificial Neural Network on Microcontroller for Student Attention Level Monitoring Device Using EEG","authors":"D. Lestari, Pradareza S.T. Muhammad, I. A. Zaini","doi":"10.1109/ICSITech49800.2020.9392043","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392043","url":null,"abstract":"The ability to concentrate is needed by students in the learning process. Also, the level of concentration required by each employee when they want to do various kinds of work. Monitoring and evaluating a person’s concentration conditions is not easy, one of which is obtained from the information signal Electroencephalography (EEG). This study aims to detect the condition of whether someone is concentrating when doing activities or not. The method used in this study is for Backpropagation Type Neural Networks. Inputs from Artificial Neural Networks are EEG waves with Theta, Low Beta, and High Beta types. The identification system outputs are two classes, namely the full concentration class and the low concentration class. The ANN model obtained through training is then implemented into the Arduino Microcontroller so that it can be used as portable device. So, the classification results obtained are suitable with the output.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of QoS parameters measurement applying packet scheduling algorithms on Cisco 2800 Router with Static Routing","authors":"Malena Castro, Luz E. Márquez, J. Márquez","doi":"10.1109/ICSITech49800.2020.9392032","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392032","url":null,"abstract":"This work provides some criteria that allow network administrators to measure the impact of different network configurations have on voice, data, and video applications quality of service offered to the different users. For that, this project implemented tests to measure parameters such as packet loss, delay and jitter using static routing, different packet scheduling algorithms (Custom Queuing, Priority Queuing, and Weighted First Queuing), different services (voice, data, and video), and connection speeds using Cisco 2800 Routers and D-ITG traffic generator in conjunction with the Network Time Protocol synchronizer. A comparative analysis of sensitive parameters for Quality of Service was conducted to describe network behavior for each service. The implemented services presented performances according to quality requirements, reported in the literature. Specifically, the data service presented delay and jitter within the levels considered acceptable for this application and zero packet loss. For its part, the video service presented levels of delay and jitter according to the quality requirements for streaming. Finally, the voice service presented the best configuration performance with the Priority Queuing algorithm, for all measured service quality parameters.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}