2016 2nd International Conference on Science in Information Technology (ICSITech)最新文献

筛选
英文 中文
UCPabc as an integration model for software cost estimation UCPabc作为软件成本估算的集成模型
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852631
R. S. Dewi, Grandys Frieska Prassida, Sholiq, A. P. Subriadi
{"title":"UCPabc as an integration model for software cost estimation","authors":"R. S. Dewi, Grandys Frieska Prassida, Sholiq, A. P. Subriadi","doi":"10.1109/ICSITECH.2016.7852631","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852631","url":null,"abstract":"This study aims to construct a scientific model in estimating effort and cost of software development projects. Use Case Points (UCP) is very important method to estimate the total effort in software development projects. While the technique of Activity-based Costing (ABC) serves as the calculation of costs in each of the activities, especially the allocation of project resources. ABC technique consists of five stages are estimates based on the allocation of its resources, by having the total of UCP first. The result of this research is a proposed model of integration between UCP and ABC method or also called UCPabc. UCPabc model testing performed on five software development project small-medium scales. The results of test evaluations UCPabc estimation model with the company's actual cost turned out to be quite impressive, which the deviation only 2.16 percent. Meanwhile, the company forecast profit margin of 30.4 percent between total project contract value with cost estimation by using UCPabc.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123063689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new approach on prediction of fever disease by using a combination of Dempster Shafer and Naïve bayes 利用Dempster Shafer和Naïve bayes联合预测发热疾病的新方法
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852664
Y. Mulyani, E. F. Rahman, Herbert, L. Riza
{"title":"A new approach on prediction of fever disease by using a combination of Dempster Shafer and Naïve bayes","authors":"Y. Mulyani, E. F. Rahman, Herbert, L. Riza","doi":"10.1109/ICSITECH.2016.7852664","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852664","url":null,"abstract":"Health is an important aspect of human life. Symptom of fever is one of the symptoms that can interfere with human health. The symptoms are common in human, but for handling errors sometimes occur diagnosis that can lead to death. Such errors can occur due to lack of expertise or reluctance of patients to check themselves since the symptom fever is common. By considering the issues, we conduct a study to design an application that can help patients with the fever symptom. The research was conducted by combining two following concepts: expert systems (i.e., Dempster Shafer) and machine learning (i.e., Naïve bayes). By combining the methods, we can obtain a single solution considering knowledge formulated by human experts and extracted from data training. Moreover, the application is implemented by an R package connecting R language with PHP, which is RShinny. A case study was taken by using medical records from the hospital Muhammadiyah, Bandung, West Java, Indonesia. To determine the level of accuracy of the system, we carried out two experimental stages, namely the fitting and testing steps. For the fitting step, we obtained the accuracy of 70.67 percent while 56.25 percent is the accuracy of the testing stage.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126803017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A proposed method for predicting US presidential election by analyzing sentiment in social media 一种通过分析社交媒体上的情绪来预测美国总统大选的方法
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852647
A. Wicaksono, Suyoto, Pranowo
{"title":"A proposed method for predicting US presidential election by analyzing sentiment in social media","authors":"A. Wicaksono, Suyoto, Pranowo","doi":"10.1109/ICSITECH.2016.7852647","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852647","url":null,"abstract":"US Presidential election is an event anticipated by US citizens and people around the world. By utilizing the big data provided by social media, this research aims to make a prediction of the party or candidate that will win the US presidential election 2016. This paper proposes two stages in research methodology which is data collection and implementation. Data used in this research are collected from Twitter. The implementation stage consists of preprocessing, sentiment analysis, aggregation, and implementation of Electoral College system to predict the winning party or candidate. The implementation of Electoral College will be limited only by using winner take all basis for all states. The implementations are referring from previous works with some addition of methods. The proposed method still unable to use real time data due to random user location value gathered from Twitter REST API, and researchers will be working on it for future works.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A framework of fuzzy partition based on Artificial Bee Colony for categorical data clustering 基于人工蜂群的模糊划分框架用于分类数据聚类
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852644
I. R. Yanto, Younes Saadi, D. Hartama, Dewi Pramudi Ismi, A. Pranolo
{"title":"A framework of fuzzy partition based on Artificial Bee Colony for categorical data clustering","authors":"I. R. Yanto, Younes Saadi, D. Hartama, Dewi Pramudi Ismi, A. Pranolo","doi":"10.1109/ICSITECH.2016.7852644","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852644","url":null,"abstract":"Fuzzy k-partition (FkP) is an effective clustering technique, which is mathematical model based. Thus, the objective function of FkP is a nonlinear function. Membership random selection is featured by an iterative process, which results in local optima traps easily. It is important to find global optimal consider to nonlinear objective function of the problem. Moreover, Artificial Bee colony (ABC) has ability and efficiently used for multivariable, multinomial function optimization. To this, this paper proposes the hybridization of FkP based on Artificial Bee colony (ABC) a population based algorithm. Some of benchmarks data sets have been elaborated to test the proposed approach. The experiment shows that FkP ABC obtains better results in term of the dun index validity clustering as compared to the baseline algorithm.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic generation of Content Security Policy to mitigate cross site scripting 自动生成内容安全策略以减轻跨站点脚本
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852656
Samer Attallah Mhana, J. Din, R. Atan
{"title":"Automatic generation of Content Security Policy to mitigate cross site scripting","authors":"Samer Attallah Mhana, J. Din, R. Atan","doi":"10.1109/ICSITECH.2016.7852656","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852656","url":null,"abstract":"Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help site administers to overcome these limitations in order to utilize the full benefits of CSP mechanism which leads to more immune sites from XSS. The algorithm is implemented as a plugin. It does not interfere with the web application original code. The plugin can be “installed” on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The effect of task technology fit toward individual performance on the Generation X (1956–1980) using information technology 任务技术对使用信息技术的X一代(1956-1980)个人绩效的契合效应
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852630
P. P. Widagdo, Ramadiani, T. D. Susanto
{"title":"The effect of task technology fit toward individual performance on the Generation X (1956–1980) using information technology","authors":"P. P. Widagdo, Ramadiani, T. D. Susanto","doi":"10.1109/ICSITECH.2016.7852630","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852630","url":null,"abstract":"The generation is defined as a group of individuals who were born in the same birth ranges, which at that time had formed the uniqueness of the experience, history or the same era. The rapidly evolving technological developments lead to Generation X (1956–1980) having different perspectives, thoughts, ideas in using information technology to complete its work. This study aims to the relationship between the task-technology fit (TTF) affecting utilization and individual performance impact on Generation X in the usage of information technology. The method that is used is PLS-SEM with 101 respondents from Generation X in Mulawarman University. The results showed the empirical model is able to explain 64.7% of the variance of individual performance impact on Generation X in using of information technology at the Mulawarman University. The research proves task-technology fit are factors that affect the generation x in the use information technology services, task-technology fit and utilization is a factor that has a significant positive relationship effects on individual performance improvement the generation x in using of information technology services at the Mulawarman University. The results of this study revealed that the better the suitability of the information technology to the user's tasks (task-technology fit) in Generation x at the Mulawarman University, influence in increasing the utilization and improving the performance of individuals impact on generation x in using information technology.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128406274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory 基于深度长短期记忆流量预测的动态带宽管理
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852655
T. W. Cenggoro, I. Siahaan
{"title":"Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory","authors":"T. W. Cenggoro, I. Siahaan","doi":"10.1109/ICSITECH.2016.7852655","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852655","url":null,"abstract":"In dynamic bandwidth management based on traffic prediction, the traffic flows can be modeled as time-series data. State-of-the-art technique used in modeling this traffic flows is by using a linear model. In contrast, Recurrent Neural Network (RNN) has been the state-of-the-art technique in speech recognition, which data is also time-series. Therefore, we conjecture that the use of RNN can improve performance in dynamic bandwidth management based on traffic prediction. In this paper, we employ a variant of RNN called Deep Long Short Term Memory (DLSTM), which is common to be used in speech recognition. The result of this work shows that DLSTM is suitable for traffic prediction and is able to decrease packet loss ratio of a network system simulated using Network Simulator 3 (NS3).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A wireless sensor networks localization using geometric triangulation scheme for object tracking in urban search and rescue application 一种基于几何三角定位的无线传感器网络定位方案在城市搜救目标跟踪中的应用
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852643
P. Kristalina, Aries Pratiarso, T. Badriyah, E. Putro
{"title":"A wireless sensor networks localization using geometric triangulation scheme for object tracking in urban search and rescue application","authors":"P. Kristalina, Aries Pratiarso, T. Badriyah, E. Putro","doi":"10.1109/ICSITECH.2016.7852643","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852643","url":null,"abstract":"Wireless sensor networks (WSNs) have been widely used for monitoring, tracking or object navigating whether stationer or mobile object. The system could be implemented in indoor or outdoor area. Disaster activity in urban area such as earthquake, tornado even militant activity inside the building need an object tracking in order to carry out search and rescue procedure for the victims or rescuers. Localization technique in indoor area encounters some problems which related to environment characteristics such as building material, multipath, reflection and other parameters which will decrease the accuracy of estimated object position. We propose a geometric triangulation scheme as an alternative way of calculating the estimated position of the object, based on the angle of arrival between an object node and its references. This scheme is free from environment problem. The simulation result shows that using least square method through the average of position error the estimated position accuracy will be increased up to 22.27% better than the previous triangulation scheme.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Soft Maximal Association Rule for web user mining 用于web用户挖掘的软最大关联规则
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852659
I. R. Yanto, Arif Rahman, Youes Saaadi
{"title":"Soft Maximal Association Rule for web user mining","authors":"I. R. Yanto, Arif Rahman, Youes Saaadi","doi":"10.1109/ICSITECH.2016.7852659","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852659","url":null,"abstract":"Association rule mining of the web user transaction is one of important techniques for extracting information from web data, including its content, link, and user information using data mining tool. This technique finds a pattern and causal relation between items on given databases. The Maximal Association Rule is a data mining tools to determine the association rule the rough set theory based. Accordingly, the rough set can be defined in a form of soft set. This paper presents an implementation of Soft Maximal Association Rule which is the soft set theory based for web mining. The experiment shows that the computation of the proposed technique outperforms comparing to the baseline technique.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring quality of service for mobile internet services 测量移动互联网服务的服务质量
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852652
E. Budiman, Oki Wicaksono
{"title":"Measuring quality of service for mobile internet services","authors":"E. Budiman, Oki Wicaksono","doi":"10.1109/ICSITECH.2016.7852652","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852652","url":null,"abstract":"Quality of Service is an important thing in maintaining the performance of the service to the customer. Not only for marketing purposes, the quality of services can also bridge the gap between the promise given by the service provider and what the customers get. This study aims to get the quality of service for internet data usage of several mobile operators in the city Samarinda. The study was conducted using a mobile device and implemented in seven districts and four points in every district in the city of Samarinda. Measurements using the standard quality of TIPHON with some parameters such end-to-end delay, jitter, packet loss probability and throughput. From the measurement results, based on standard QoS TIPHON, the average value of packet loss are in the good category. Latency delay value is very high, above 400 ms, which is a bad category. Delay variation (jitter) of each ISP is different, with the average value of jitter is more than 50 ms. The measurement results show that the jitter at each site are in a bad category.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信