2020 6th International Conference on Science in Information Technology (ICSITech)最新文献

筛选
英文 中文
Route Discovery to Avoid Congestion in Software Defined Networks 软件定义网络中避免拥塞的路由发现
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392049
Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho
{"title":"Route Discovery to Avoid Congestion in Software Defined Networks","authors":"Akbar Pandu Segara, R. Ijtihadie, T. Ahmad, Pascal Maniriho","doi":"10.1109/ICSITech49800.2020.9392049","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392049","url":null,"abstract":"In computer networks, a centralized control plane model of Software Defined Network (SDN) often suffers from congestion because of this centralized characteristic. Fortunately, some congestion avoidance mechanisms have been introduced, one of which reduces the size of packets to send. However, this is considered less useful because it is longer due to the relatively small number of packets. This paper proposes a route discovery mechanism to find the best routes for packet forwarding to avoid congestion. The method explores Johnson’s algorithm because it is able to take advantage of the previous Dijkstra and Bellman-Ford algorithms. The performance of the networks measured by latency, throughput, and response time shows an improvement.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"74 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[ICSITech 2020 Front Cover] [ICSITech 2020年封面]
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/icsitech49800.2020.9392037
{"title":"[ICSITech 2020 Front Cover]","authors":"","doi":"10.1109/icsitech49800.2020.9392037","DOIUrl":"https://doi.org/10.1109/icsitech49800.2020.9392037","url":null,"abstract":"","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Tooth and Background Segmentation in Dental X-ray Using U-Net Convolution Network 基于U-Net卷积网络的牙科x射线图像中牙齿和背景的自动分割
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392039
A. Fariza, A. Arifin, E. Astuti
{"title":"Automatic Tooth and Background Segmentation in Dental X-ray Using U-Net Convolution Network","authors":"A. Fariza, A. Arifin, E. Astuti","doi":"10.1109/ICSITech49800.2020.9392039","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392039","url":null,"abstract":"Tooth and background segmentation in dental X-ray is used to produce an area of a tooth by removing areas of tissue and other neighboring teeth. This presents challenges due to a large number of superimposed (overlapping) images of teeth between the adjacent teeth and the difficulty of determining the area of the tooth with other tissues automatically. This study proposes a new approach for the automatic segmentation of dental X-ray images using the U-Net convolution network. The stages used in the training process consist of data augmentation, pre-processing with Contrast Limited Adequate Histogram Equalization (CLAHE) and gamma adjustment, and training with the U-Net architecture. While the testing process consists of pre-processing, prediction, and removing small areas in the background. The experimental results show the average accuracy of the proposed U-Net convolutional network segmentation accuracy achieves excellent results, 97.61% compared to spatial Fuzzy C-means with gaussian kernel-based of 65.55%. It shows the proposed method achieves superior automatic tooth and background segmentation. The experiment result among 1907 image testing, there are 14.58% producing segmentation because of biased boundaries on the tissue at the root of the tooth and overlapping images on the enamel.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Prototyping of a Scalable IoT Solution Based on LoRaWAN to Improve the Service of School Routes in the South West Location of Barranquilla 基于LoRaWAN的可扩展物联网解决方案的设计和原型,以改善巴兰基亚西南地区学校路线的服务
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392062
Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca
{"title":"Design and Prototyping of a Scalable IoT Solution Based on LoRaWAN to Improve the Service of School Routes in the South West Location of Barranquilla","authors":"Leonel Hernandez, Luz E. Márquez, Stefany Correa, Tarcila Simanca","doi":"10.1109/ICSITech49800.2020.9392062","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392062","url":null,"abstract":"The Internet of things (IoT) has quickly been introduced into wireless networks and systems, opening several possibilities in terms of connectivity. IoT arises from the vast need to monitor, manage, and configure “things” remotely. Different industrial or residential applications can use IoT to obtain or send data, such as remote control of alarms, water meters, simple traffic, and light points. This research project focuses on the IoT implementation of devices LoRa that uses the LoRaWAN protocol. LoRaWAN is a network infrastructure that could be applied to monitor different variables in environments where IoT wireless technology is implemented. The current project involves designing a LoRaWAN network to support IoT in transporting school routes in Barranquilla’s southwest. The project incorporates a prototype that allows the vehicle monitoring, geographical location in real-time, percentage of the occupation, arrivals, and departures times, among other variables. Implementing this technology in the chosen sector will benefit families that require the school transport service because they will monitor the operation of the service provided. This paper details the devices and technology to be implemented in the final prototype, specifying their topology, application, technical specification, operating characteristics, and their configuration and work logic under different scenarios. For the development of the project, the guidelines defined in each of the Top-Down network design methodology phases are applied. Finally, two essential aspects are shown, such as analyzing the results obtained in the tests and the future work to be carried out based on the research.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application 即时通讯应用中加密消息AES和ECDSA的实现
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392034
Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi
{"title":"Implementation of AES and ECDSA for Encrypted Message in Instant Messaging Application","authors":"Muhammad Nursalman, P. R. R. Judie, Ammar Ashshiddiqi","doi":"10.1109/ICSITech49800.2020.9392034","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392034","url":null,"abstract":"Instant messaging was one of the communication technologies that were widely used by the public. The amount of mobile instant messaging users could open up crime opportunities, including message sabotation. The use of cryptography was one of the right methods to maintain data or information security while a communication occurred. Message security was done by combining a symmetric encryption algorithm with a digital signature algorithm. Combination of AES and ECDSA is done as a method of securing messages. AES is used for message encryption, ECDSA is used as an identifier for the sender of the message. Confidentiality and data integrity is guaranteed through encrypting messages in the database and with carrying out digital signatures.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122105820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Comparison of Euclidean, Manhattan and Minkowski Distances in K-Means Clustering 欧氏距离、曼哈顿距离和闵可夫斯基距离在k均值聚类中的性能比较
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392053
Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred
{"title":"A Performance Comparison of Euclidean, Manhattan and Minkowski Distances in K-Means Clustering","authors":"Haviluddin, M. Iqbal, Gubtha Mahendra Putra, N. Puspitasari, H. J. Setyadi, F. Dwiyanto, A. Wibawa, Rayner Alfred","doi":"10.1109/ICSITech49800.2020.9392053","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392053","url":null,"abstract":"The Indonesian police department has a role in maintaining security and law enforcement under the Republic of Indonesia Law Number 2 of 2002. In this study, data on the crime rate in the Bontang City area has been analyzed. It becomes the basis for the Police in anticipating various crimes. The K-Means algorithm is used for data analysis. Based on the test results, there are three levels of crime: high, medium, and low. According to the analysis, the high crime rate in the Bontang City area is special case theft and vehicle theft. Furthermore, it becomes the police program to maintain personal and vehicle safety.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ITaCaS: a serious game and an expert system to support the teaching of sexual-health and hygiene for youth with intellectual disability ITaCaS:一个严肃的游戏和一个专家系统,支持对智障青年进行性健康和卫生教育
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392068
Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio
{"title":"ITaCaS: a serious game and an expert system to support the teaching of sexual-health and hygiene for youth with intellectual disability","authors":"Jéssica Salinas-Escobar, Karina Panamá-Mazhenda, Y. Robles-Bykbaev, V. Robles-Bykbaev, Hernán Tenorio-Carpio","doi":"10.1109/ICSITech49800.2020.9392068","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392068","url":null,"abstract":"In Ecuador, according to the National Council for Disability Equality (CONADIS, acronym in Spanish) there are 485,325 people with disabilities, being the intellectual disability the one with the highest incidence, with a prevalence of 108,312 people. In developing countries, there are still insufficient resources for teaching Sexual Health and Hygiene (SHH) to people with disabilities. Thus, it is essential to apply strategies that help teenagers with intellectual disabilities to learn about sexual health and self-care. Therefore, this article presents an educational game and an expert system called “I take care of myself” (ITaCaS) which aims to assist in the teaching of the SHH for young people with intellectual disabilities, with ages between 12 and 17 years old. The expert system helps to determine educational activities to be carried out by the teacher with the teenager, based on their profile and prior knowledge of 13 SHH educational topics. The pictures of the game were specially designed for disabled people. The proposal was validated through a study that was carried out in two special education centers with 30 experts in the field of special education. The obtained results are encouraging since they show great acceptance by the participants of this experiment.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Users Want for Gig Economy Platforms: Sentiment Analysis Approach 零工经济平台的用户需求:情感分析方法
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392060
Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
{"title":"What Users Want for Gig Economy Platforms: Sentiment Analysis Approach","authors":"Nadina Adelia Indrawan, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICSITech49800.2020.9392060","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392060","url":null,"abstract":"Gig economy-based mobile applications are increasingly in demand by the public. An increment in the number of users rises the number of downloads and reviews. However, the number of reviews makes it difficult for developers to understand the information contained in reviews. Besides, one review can have a variety of information. This study proposes a model that can categorize content and sentiment reviews using Support Vector Machine (SVM), Multinomial Naïve Bayes, Complement Naïve Bayes classifier, and Binary Relevance, Classifier Chain, and Label Power Sets as the data transformation method. This study used the reviews contained in the Gojek, Sampingan, and Ruang Guru applications, with 10,123 reviews. This study found the review text’s length influenced accuracy based on the evaluation of Gojek application. Generally, this study results showed that the SVM algorithm (both in the classification of sentiment reviews and review categorization) and Label Power Sets as the transformation method, yielded the best accuracy.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation Artificial Neural Network on Microcontroller for Student Attention Level Monitoring Device Using EEG 基于脑电图的学生注意力水平监测装置的微控制器人工神经网络实现
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392043
D. Lestari, Pradareza S.T. Muhammad, I. A. Zaini
{"title":"Implementation Artificial Neural Network on Microcontroller for Student Attention Level Monitoring Device Using EEG","authors":"D. Lestari, Pradareza S.T. Muhammad, I. A. Zaini","doi":"10.1109/ICSITech49800.2020.9392043","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392043","url":null,"abstract":"The ability to concentrate is needed by students in the learning process. Also, the level of concentration required by each employee when they want to do various kinds of work. Monitoring and evaluating a person’s concentration conditions is not easy, one of which is obtained from the information signal Electroencephalography (EEG). This study aims to detect the condition of whether someone is concentrating when doing activities or not. The method used in this study is for Backpropagation Type Neural Networks. Inputs from Artificial Neural Networks are EEG waves with Theta, Low Beta, and High Beta types. The identification system outputs are two classes, namely the full concentration class and the low concentration class. The ANN model obtained through training is then implemented into the Arduino Microcontroller so that it can be used as portable device. So, the classification results obtained are suitable with the output.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Analysis of QoS parameters measurement applying packet scheduling algorithms on Cisco 2800 Router with Static Routing 基于静态路由的Cisco 2800路由器分组调度算法对QoS参数测量的比较分析
2020 6th International Conference on Science in Information Technology (ICSITech) Pub Date : 2020-10-21 DOI: 10.1109/ICSITech49800.2020.9392032
Malena Castro, Luz E. Márquez, J. Márquez
{"title":"A Comparative Analysis of QoS parameters measurement applying packet scheduling algorithms on Cisco 2800 Router with Static Routing","authors":"Malena Castro, Luz E. Márquez, J. Márquez","doi":"10.1109/ICSITech49800.2020.9392032","DOIUrl":"https://doi.org/10.1109/ICSITech49800.2020.9392032","url":null,"abstract":"This work provides some criteria that allow network administrators to measure the impact of different network configurations have on voice, data, and video applications quality of service offered to the different users. For that, this project implemented tests to measure parameters such as packet loss, delay and jitter using static routing, different packet scheduling algorithms (Custom Queuing, Priority Queuing, and Weighted First Queuing), different services (voice, data, and video), and connection speeds using Cisco 2800 Routers and D-ITG traffic generator in conjunction with the Network Time Protocol synchronizer. A comparative analysis of sensitive parameters for Quality of Service was conducted to describe network behavior for each service. The implemented services presented performances according to quality requirements, reported in the literature. Specifically, the data service presented delay and jitter within the levels considered acceptable for this application and zero packet loss. For its part, the video service presented levels of delay and jitter according to the quality requirements for streaming. Finally, the voice service presented the best configuration performance with the Priority Queuing algorithm, for all measured service quality parameters.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信