2014 International Conference on Advanced Computer Science and Information System最新文献

筛选
英文 中文
Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means 基于智能核k均值的非线性可分数据的完全无监督聚类
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065891
Teny Handhayani, Ito Wasito
{"title":"Fully unsupervised clustering in nonlinearly separable data using intelligent Kernel K-Means","authors":"Teny Handhayani, Ito Wasito","doi":"10.1109/ICACSIS.2014.7065891","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065891","url":null,"abstract":"Intelligent Kernel K-Means is a fully unsupervised clustering technique. This technique is developed by combining Intelligent K-Means and Kernel K-Means. Intelligent Kernel K-Means used to cluster kernel matrix without any information about the number of clusters. The goal of this research is to evaluate the performance of Intelligent Kernel K-Means for clustering nonlinearly separable data. Various artificial nonlinearly separable data are used in this experiment. The best result is the clustering often ring datasets. It produces Adjusted Rand Index (ARI) = 1.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia 支持南南及三方合作项目的综合信息系统规范:印尼政府南南及三方合作国家协调小组的案例研究
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065862
A. Fadhilah, Y. G. Sucahyo, Denny
{"title":"Integrated information system specification to support SSTC (South-South and Triangular Cooperation) program: A case study at national coordination team on SSTC Government of Indonesia","authors":"A. Fadhilah, Y. G. Sucahyo, Denny","doi":"10.1109/ICACSIS.2014.7065862","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065862","url":null,"abstract":"In the international community. Indonesia is one of the country that quite active involved in international cooperation forums. One of the forums is South-South and Triangular Cooperation (SSTC), a new cooperation framework in political, economic, social, cultural and technical area between at least two developing countries and one developed country. In order to support SSTC, the Government of Indonesia formed the National Coordination Team on SSTC. In its implementation, the National Coordination Team (NCT) on SSTC has not shown satisfactory results due to the lack of coordination among the Ministry involved. As a result, the programs that exist today are mostly not linked to each other, not sustainable, and not providing the maximum impact for Indonesia. To make coordination in NCT easier, we proposed to create an integrated information system that supports all of cooperation process. This research tries to design an integrated information system software that can support SSTC program in Indonesia, using RUP (Rational Unified Process) method. The results of this research will be presented as a draft of system specification, and ready to use as an initial design of the software. With the implementation of integrated information system software, we expect that all cooperation programs conducted by Indonesia can linked to each other, sustainable, and bring maximum impact for the Indonesian progress.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Element extraction and evaluation of packaging design using computational Kansei Engineering approach 基于感性工学的包装设计元素提取与评价
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065861
Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani
{"title":"Element extraction and evaluation of packaging design using computational Kansei Engineering approach","authors":"Taufik Djatna, Fajar Munichputranto, N. Hairiyah, E. Febriani","doi":"10.1109/ICACSIS.2014.7065861","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065861","url":null,"abstract":"Currently packaging design needs more a computational processing roles and became the fundamental selling art of products. Design of packaging is very subjective and company needs to understand customer's behavior, perception and attractiveness. Challenges arise when marketing in fast moving consumer goods is getting very dynamic and competitive. Computational needs to identify customer's perception and attractiveness is unavoidable. In this paper we proposed new methodology to extract and evaluate information elements of packaging design from customer preferences using computational Kansei Engineering (KE) approach. The elements of packaging design were extracted from group discussion and evaluate centrality and novelty metrics using Key Element Extraction (KEE) algorithm. Correlation of packaging design elements and Kansei words was obtained with association rule mining (ARM). This formulation enabled us to define which packaging design elements are strongly correlated with each Kansei/affective words and gives recommendation to designer what kind of packaging to design. In short this proposed methods become a quantification of the art of packaging design that ease a reliable design.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection 开发印尼大学下一代防火墙原型和访问控制与深度包检测
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065869
Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin
{"title":"Development of University of Indonesia next generation firewall prototype and access control with deep packet inspection","authors":"Harish Muhammad Nazief, T. A. Sabastian, Alfan Presekal, G. Guarddin","doi":"10.1109/ICACSIS.2014.7065869","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065869","url":null,"abstract":"Currently there are dozens of internet based applications. Each of these applications can be accessed by their user on the same application layer protocols but different pattern of payloads. For example social network applications like Facebook, Twitter and Google Plus. Each of them can be accessed using HTTPS protocol, but with different payload for each applications. It also possible to access a service in internet by using tunneled protocol, for example Bit Torrent protocol can be tunneled on top HTTP access. These kind of access modes make standard firewalls obsolete to regulate our university internet access control. In this research, we are aiming to prove whether an application layer access control can be developed using Deep Packet Inspection Method. With the deep packet inspection method, it is possible to identify applications based on their application signature. If the application signature can be identified, we can construct more robust rules to regulate university internet access control. We are developing a prototype of application layer access control using several number of free/open source software components. One of these components is Deep Packet Inspection Library - nDPI - which will become our main focus. This research also will explain the way to assemble those software components in order to perform access control functions. We are also performing a test against nDPI payload detection mechanism and the results are reported in this paper.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"78 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image 基于遥感影像的森林砍伐模糊c均值识别
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065848
Setiawan Afandi, Y. Herdiyeni, L. Prasetyo
{"title":"Fuzzy C-means for Deforestation Identification Based on Remote Sensing Image","authors":"Setiawan Afandi, Y. Herdiyeni, L. Prasetyo","doi":"10.1109/ICACSIS.2014.7065848","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065848","url":null,"abstract":"This research report about Fuzzy C-Means for Deforestation Identification Based On Remote Sensing Image. Deforestation means that changes forest area into another functions. Clustering is a method of classify objects into related groups (clusters). While, Fuzzy C-Means clustering is a technique that each data is determined by the degree of membership. In this research, the data used are MODIS EVI 250 m in 2000 and 2012 to identify deforestation rate in Java island. MODIS EVI is one of kind MODIS image which is able to detect vegetation based on photosynthesis rate and vegetation density. The number of clusters used were 13 clusters. This research had succeeded to classify areas based on the value of EVI like areas who had a high EVI values (forests, plantations, grass land), moderate values (agricultural area), and low values (build up area, mining area, pond, and other land cover). But, EVI value is only influenced by photosynthesis rate and vegetation density. Thus, EVI value is not well to identify forest areas, this is because the value of EVI in forest areas are almost same with plantations, savanna, etc.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending V-model practices to support SRE to build secure web application 扩展v模型实践以支持SRE构建安全的web应用程序
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065838
Ala A. Abdulrazeg, N. Norwawi, N. Basir
{"title":"Extending V-model practices to support SRE to build secure web application","authors":"Ala A. Abdulrazeg, N. Norwawi, N. Basir","doi":"10.1109/ICACSIS.2014.7065838","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065838","url":null,"abstract":"Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model prediction for accreditation of public junior high school in Bogor using spatial decision tree 基于空间决策树的茂物公立初中认证模型预测
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065831
Endang Purnama Giri, A. M. Arymurthy
{"title":"Model prediction for accreditation of public junior high school in Bogor using spatial decision tree","authors":"Endang Purnama Giri, A. M. Arymurthy","doi":"10.1109/ICACSIS.2014.7065831","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065831","url":null,"abstract":"Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios (training set as testing set, leave one out, and 3-fold cross validation) using conventional decision tree (ID3) the accuracy level reach 97.14%, 40%, and 51.51% respectively. On the other hand, using spatial decision tree (SDT) the accuracy reach level 97.14%, 54.29%, and 54.28%. Based on the accuracy level and the structure of tree that was constructed, SDT produce better result. These facts will imply that quality level of public junior high schools on Bogor have correlation with characteristics of geographic area. However, SDT need much more computation time to construct decision tree rather than ID3, so for big number of data and big number of attributes, SDT will not appropriate.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Citation sentence identification and classification for related work summarization 引用句识别和分类,进行相关工作总结
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065871
D. H. Widyantoro, Imaduddin Amin
{"title":"Citation sentence identification and classification for related work summarization","authors":"D. H. Widyantoro, Imaduddin Amin","doi":"10.1109/ICACSIS.2014.7065871","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065871","url":null,"abstract":"Scientific article summarization is an important problem because it can be of helpful for researchers, particularly for those who start a new research topic. In this paper, we address the problem of related work summarization from scientific papers. The process of summarization comprises of extracting citation sentence followed by classifying the rhetorical category of citation sentence. Citation sentence extraction is performed by combining regular expression-based patterns, co-reference system, evidence-based approach and additional extraction rule. Citation sentence is represented as feature vectors containing term frequency, sentence length, thematic word and cue phrase feature groups. The learning of classification model is explored using Naïve Bayes, Complement Naïve Bayes and Decision Tree. Experiment results reveal that the approaches adopted for citation sentence extraction and rhetorical category classification is promising to provide the ground work for related work summarization.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131113500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A new patients' rights oriented model of EMR access security 以患者权利为导向的EMR访问安全新模型
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065858
Y. B. Dwi Setianto, Yustina Retno Wahyu Utami
{"title":"A new patients' rights oriented model of EMR access security","authors":"Y. B. Dwi Setianto, Yustina Retno Wahyu Utami","doi":"10.1109/ICACSIS.2014.7065858","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065858","url":null,"abstract":"Electronic Medical Records (EMR) is an evolution of the conventional Medical Record files. The evolution is inevitable due to information technology advancement. Electronic format brings flexibility and ease which is potential to better guarantee patients' rights to access the contents of the files in their medical records, according to the laws in Indonesia. This study designed a new model of EMR security access which is patients' rights-oriented and adjusted with the regulations and laws in Indonesia. The architecture of the model uses an Authentication Authorization and Accounting (AAA) server which also functions as EMR Index Server. To improve the data accessibility for patients and physicians authorization is done using Short Message Service in mobile technology.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multicore computation of tactical integration system in the Maritime Patrol Aircraft using Intel Threading Building Block 基于Intel线程构建块的海上巡逻机战术集成系统多核计算
2014 International Conference on Advanced Computer Science and Information System Pub Date : 2014-10-01 DOI: 10.1109/ICACSIS.2014.7065821
M. Fathoni, Bambang Sridadi
{"title":"Multicore computation of tactical integration system in the Maritime Patrol Aircraft using Intel Threading Building Block","authors":"M. Fathoni, Bambang Sridadi","doi":"10.1109/ICACSIS.2014.7065821","DOIUrl":"https://doi.org/10.1109/ICACSIS.2014.7065821","url":null,"abstract":"A Tactical Integration System (TIS) in the Maritime Patrol Aircraft (MPA) is a system that serves to carry out the mission of surveillances, detection, positioning, and identify the objects in the ocean with video streaming. At current computing of video was done sequentially which involves many matrix operations with command repetition (looping) such as: sequential for, assuming that the processor used is one processor. Meanwhile, a multicore computer systems is already in a personal environment. Example: Intel Core 2 Duo (2 cores), i7 (8 core), Haswell. To maximize the performance of computer systems, Intel TBB (Threading Building Blocks) must be used in multicore computing / programming. In this study, has designed and implemented a software for parallel video streaming using Intel TBB framework Programs written in C + + on MS Visual Studio 2010 and run on computers based on Intel Core 2 Duo on MS Windows 7 operating system. System testing is performed sequential and parallel on avi video with compression quality factor (Q = 1, 5, 10). By the Amdahl's law limitation, the average encoder speedup for quality factor Q = 1 is 1.2665, for Q = 5 is 1.2911, and for Q = 10 is 1.3015. Whereas the average decoder speedup for quality factor Q = 1 is 1.3023, for Q = 5 is 1.3558, and for Q = 10 is 1.3776.","PeriodicalId":443250,"journal":{"name":"2014 International Conference on Advanced Computer Science and Information System","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信