2014 International Conference on Advanced Computer Science and Information System最新文献

筛选
英文 中文
Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means 基于智能核k均值的非线性可分数据的完全无监督聚类
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065891
Teny Handhayani, Ito Wasito
{"title":"Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means","authors":"Teny Handhayani, Ito Wasito","doi":"10.1109/ICACSIS.2014.7065891","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065891","url":null,"abstract":"Intelligent Kernel K-Means is a fully unsupervised clustering technique. This technique is developed by combining Intelligent K-Means and Kernel K-Means. Intelligent Kernel K-Means used to cluster kernel matrix without any information about the number of clusters. The goal of this research is to evaluate the performance of Intelligent Kernel K-Means for clustering nonlinearly separable data. Various artificial nonlinearly separable data are used in this experiment. The best result is the clustering often ring datasets. It produces Adjusted Rand Index (ARI) = 1.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia 支持南南及三方合作项目的综合信息系统规范:印尼政府南南及三方合作国家协调小组的案例研究
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065862
A. Fadhilah, Y. G. Sucahyo, Denny
{"title":"Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia","authors":"A. Fadhilah, Y. G. Sucahyo, Denny","doi":"10.1109/ICACSIS.2014.7065862","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065862","url":null,"abstract":"In the international community. Indonesia is one of the country that quite active involved in international cooperation forums. One of the forums is South-South and Triangular Cooperation (SSTC), a new cooperation framework in political, economic, social, cultural and technical area between at least two developing countries and one developed country. In order to support SSTC, the Government of Indonesia formed the National Coordination Team on SSTC. In its implementation, the National Coordination Team (NCT) on SSTC has not shown satisfactory results due to the lack of coordination among the Ministry involved. As a result, the programs that exist today are mostly not linked to each other, not sustainable, and not providing the maximum impact for Indonesia. To make coordination in NCT easier, we proposed to create an integrated information system that supports all of cooperation process. This research tries to design an integrated information system software that can support SSTC program in Indonesia, using RUP (Rational Unified Process) method. The results of this research will be presented as a draft of system specification, and ready to use as an initial design of the software. With the implementation of integrated information system software, we expect that all cooperation programs conducted by Indonesia can linked to each other, sustainable, and bring maximum impact for the Indonesian progress.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Element extraction and evaluation of packaging design using computational Kansei Engineering approach 基于感性工学的包装设计元素提取与评价
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065861
Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani
{"title":"Element extraction and evaluation of packaging design using computational Kansei Engineering approach","authors":"Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani","doi":"10.1109/ICACSIS.2014.7065861","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065861","url":null,"abstract":"Currently packaging design needs more a computational processing roles and became the fundamental selling art of products. Design of packaging is very subjective and company needs to understand customer's behavior, perception and attractiveness. Challenges arise when marketing in fast moving consumer goods is getting very dynamic and competitive. Computational needs to identify customer's perception and attractiveness is unavoidable. In this paper we proposed new methodology to extract and evaluate information elements of packaging design from customer preferences using computational Kansei Engineering (KE) approach. The elements of packaging design were extracted from group discussion and evaluate centrality and novelty metrics using Key Element Extraction (KEE) algorithm. Correlation of packaging design elements and Kansei words was obtained with association rule mining (ARM). This formulation enabled us to define which packaging design elements are strongly correlated with each Kansei/affective words and gives recommendation to designer what kind of packaging to design. In short this proposed methods become a quantification of the art of packaging design that ease a reliable design.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection 开发印尼大学下一代防火墙原型和访问控制与深度包检测
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065869
Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin
{"title":"Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection","authors":"Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin","doi":"10.1109/ICACSIS.2014.7065869","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065869","url":null,"abstract":"Currently there are dozens of internet based applications. Each of these applications can be accessed by their user on the same application layer protocols but different pattern of payloads. For example social network applications like Facebook, Twitter and Google Plus. Each of them can be accessed using HTTPS protocol, but with different payload for each applications. It also possible to access a service in internet by using tunneled protocol, for example Bit Torrent protocol can be tunneled on top HTTP access. These kind of access modes make standard firewalls obsolete to regulate our university internet access control. In this research, we are aiming to prove whether an application layer access control can be developed using Deep Packet Inspection Method. With the deep packet inspection method, it is possible to identify applications based on their application signature. If the application signature can be identified, we can construct more robust rules to regulate university internet access control. We are developing a prototype of application layer access control using several number of free/open source software components. One of these components is Deep Packet Inspection Library - nDPI - which will become our main focus. This research also will explain the way to assemble those software components in order to perform access control functions. We are also performing a test against nDPI payload detection mechanism and the results are reported in this paper.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"78 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A system analysis and design for sorghum based nano-composite film production 高粱基纳米复合膜生产的系统分析与设计
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065870
Belladini Lovely, Taufik Djatna
{"title":"A system analysis and design for sorghum based nano-composite film production","authors":"Belladini Lovely, Taufik Djatna","doi":"10.1109/ICACSIS.2014.7065870","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065870","url":null,"abstract":"The existence of process complexity and higher inter-dependency within production system of biodegradable sorghum-based nanocomposite film are obviously required for system analysis and design. In this paper, nanocomposite film production was simulated in Business Process Modeling Notation (BPMN) model to assist researchers in decision making. The system was designed by using 2 processing variables as the model input, namely hydrolysis time and plasticizer ratio. Then by modifying and controlling value of these variables, researcher would determine their influences on 3 nanocomposite film crucial physical and thermal properties, such as Water Vapor Permeability (WVP), X-Ray Diffraction (XRD) and Derivative Thermo-gravimetric (DTG). Numerical examples were implemented in order to illustrate the related issues. Model verification result showed that the model succeeded conducting an improvement for all film properties compared to other various composites. Therefore this system is potentially possible to simulate sorghum-based nanocomposite film production in a simpler and fully controllable model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"37 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citation sentence identification and classification for related work summarization 引用句识别和分类,进行相关工作总结
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065871
D. H. Widyantoro, Imaduddin Amin
{"title":"Citation sentence identification and classification for related work summarization","authors":"D. H. Widyantoro, Imaduddin Amin","doi":"10.1109/ICACSIS.2014.7065871","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065871","url":null,"abstract":"Scientific article summarization is an important problem because it can be of helpful for researchers, particularly for those who start a new research topic. In this paper, we address the problem of related work summarization from scientific papers. The process of summarization comprises of extracting citation sentence followed by classifying the rhetorical category of citation sentence. Citation sentence extraction is performed by combining regular expression-based patterns, co-reference system, evidence-based approach and additional extraction rule. Citation sentence is represented as feature vectors containing term frequency, sentence length, thematic word and cue phrase feature groups. The learning of classification model is explored using Naïve Bayes, Complement Naïve Bayes and Decision Tree. Experiment results reveal that the approaches adopted for citation sentence extraction and rhetorical category classification is promising to provide the ground work for related work summarization.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Tourism recommendation based on vector space model using composite social media extraction 基于向量空间模型的复合社交媒体提取旅游推荐
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065894
H. Khotimah, Taufik Djatna, Yani Nurhadryani
{"title":"Tourism recommendation based on vector space model using composite social media extraction","authors":"H. Khotimah, Taufik Djatna, Yani Nurhadryani","doi":"10.1109/ICACSIS.2014.7065894","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065894","url":null,"abstract":"Intentionally or not, social media users likely to share others recommendation about things, included tourism activities. In this paper we proposed a technique which was able to structure the joint recommendation of composite social media and extract them into knowledge about the tourist sites by deploying the vector space model. We included advice seeking technique to not only calculate recommendations obtained from the profile itself but also recommendations by social network users. This is a potential solution to handle sparsity problem that usually appears in conventional recommender systems. We further formulated an approach to normalize the unstructured text data of social media to obtain appropriate recommendation. We experimented the real world data from various source of social media in R language. We evaluated our result with Spearman's rank correlation and showed that our formulation has diversity recommendation with positive correlation to user's profile.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Model prediction for accreditation of public junior high school in Bogor using spatial decision tree 基于空间决策树的茂物公立初中认证模型预测
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065831
Endang Purnama Giri, A. M. Arymurthy
{"title":"Model prediction for accreditation of public junior high school in Bogor using spatial decision tree","authors":"Endang Purnama Giri, A. M. Arymurthy","doi":"10.1109/ICACSIS.2014.7065831","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065831","url":null,"abstract":"Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios (training set as testing set, leave one out, and 3-fold cross validation) using conventional decision tree (ID3) the accuracy level reach 97.14%, 40%, and 51.51% respectively. On the other hand, using spatial decision tree (SDT) the accuracy reach level 97.14%, 54.29%, and 54.28%. Based on the accuracy level and the structure of tree that was constructed, SDT produce better result. These facts will imply that quality level of public junior high schools on Bogor have correlation with characteristics of geographic area. However, SDT need much more computation time to construct decision tree rather than ID3, so for big number of data and big number of attributes, SDT will not appropriate.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image 基于遥感影像的森林砍伐模糊c均值识别
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065848
Setiawan Afandi, Y. Herdiyeni, L. Prasetyo
{"title":"Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image","authors":"Setiawan Afandi, Y. Herdiyeni, L. Prasetyo","doi":"10.1109/ICACSIS.2014.7065848","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065848","url":null,"abstract":"This research report about Fuzzy C-Means for Deforestation Identification Based On Remote Sensing Image. Deforestation means that changes forest area into another functions. Clustering is a method of classify objects into related groups (clusters). While, Fuzzy C-Means clustering is a technique that each data is determined by the degree of membership. In this research, the data used are MODIS EVI 250 m in 2000 and 2012 to identify deforestation rate in Java island. MODIS EVI is one of kind MODIS image which is able to detect vegetation based on photosynthesis rate and vegetation density. The number of clusters used were 13 clusters. This research had succeeded to classify areas based on the value of EVI like areas who had a high EVI values (forests, plantations, grass land), moderate values (agricultural area), and low values (build up area, mining area, pond, and other land cover). But, EVI value is only influenced by photosynthesis rate and vegetation density. Thus, EVI value is not well to identify forest areas, this is because the value of EVI in forest areas are almost same with plantations, savanna, etc.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending V-model practices to support SRE to build secure web application 扩展v模型实践以支持SRE构建安全的web应用程序
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065838
Ala A. Abdulrazeg, N. Norwawi, N. Basir
{"title":"Extending V-model practices to support SRE to build secure web application","authors":"Ala A. Abdulrazeg, N. Norwawi, N. Basir","doi":"10.1109/ICACSIS.2014.7065838","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065838","url":null,"abstract":"Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信