2016 2nd International Conference on Science in Information Technology (ICSITech)最新文献

筛选
英文 中文
Big data properties designed for customer engagement information via multi-channel digital services 通过多渠道数字服务为客户参与信息设计的大数据属性
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852635
Panant Krairojananan, Sakuna Anuvareepong
{"title":"Big data properties designed for customer engagement information via multi-channel digital services","authors":"Panant Krairojananan, Sakuna Anuvareepong","doi":"10.1109/ICSITECH.2016.7852635","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852635","url":null,"abstract":"The growth of Big Data plays an important role to transform data generated by online consumers in valuable assets. This paper aims to explore the design of big data properties, which are composed of volume, velocity, variety, and veracity, for managing customer engagement information; including intrinsic, extrinsic, and economic drive. Accordingly, the customer engagement information is derived from customer activities via multi-channel digital services comprised social media, blogs, and Webboards. The implications of this study lead to be used as the useful information for the big data infrastructure enablers. The results from the study reveal that most of single female in higher education whose average income at 10,000 – 30,000 Thai Baht were respondents who used Facebook and LINE app everyday at night time. Besides, the result also shows the significance of big data properties to support customer engagement.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User difficulties in e-learning system 电子学习系统中的用户困难
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852626
Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil
{"title":"User difficulties in e-learning system","authors":"Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil","doi":"10.1109/ICSITECH.2016.7852626","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852626","url":null,"abstract":"An interface is very effective to encourage the users intention and engage them to achieve their destination in e-learning process. This research aims to explore the user needs through learner experience on using e-learning interface. The case study is needed to identify and to collect the learner problem in e-learning, especially in User Interface. It took three months to get the user interface problems, such as login page, choice menus, and table of contents, content presentation, interactive media, and presentation of exercises, example solutions, and self-assessment. The research took three months data collection of forty-seven students in Mulawarman University. Based on this research, it shows that the communicativeness of the interface is the most difficult part, followed by choices menu, and self-assessment. Meanwhile, the example solutions and login page are among the least difficult of the menu.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of the Cellular Automata Algorithm for developing an educational game 元胞自动机算法在教育游戏开发中的实现
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852628
N. Fauzia, D. Rohendi, L. Riza
{"title":"Implementation of the Cellular Automata Algorithm for developing an educational game","authors":"N. Fauzia, D. Rohendi, L. Riza","doi":"10.1109/ICSITECH.2016.7852628","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852628","url":null,"abstract":"During the past two decades, game developments have been increasing rapidly. In developing these games, there are various algorithms involved. The objective of this research is to develop an educational game by using the Cellular Automata Algorithm (CAA) to construct areas in the game. It is used for generating a dynamic labyrinth, so that it always changes in every game play. Therefore, it basically is a labyrinth game involving some obstacles for representing tasks that should be done in order to finish it. In this game, four types of educational evaluations are included, as follows: multiple choice, briefings answer, arranging the code, and filling in the blank. For the case study, this game contains the Fundamental Programming subject, focused on the Looping chapter. According to the experiment, it is capable in increasing student's comprehension with 0.37 gain. Finally, it can be used to increase cognitive comprehension for Vocational High School students.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A system to diagnose learning disability in children of special need 诊断有特殊需要的儿童的学习障碍的系统
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852606
M. Rasim, Chepy Cahyadi, L. Riza
{"title":"A system to diagnose learning disability in children of special need","authors":"M. Rasim, Chepy Cahyadi, L. Riza","doi":"10.1109/ICSITECH.2016.7852606","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852606","url":null,"abstract":"There are many factors that led to the occurrence of learning disability, namely impaired concentration, memory, dyslexia, dyscalculia, and the environment. The difficulty to determine solution and find out the cause of the learning disability occurrence is the problem of the research. Dempster-Shafer method is used to build an expert system in diagnosing learning disability. Interference engine used to calculate the value of belief function and the results of children diagnosis against symptoms. The result found that 15 of the 25 people inquired are known to experience learning disability while others are normal. Further development of the system which focuses on the characteristics of learning disability in more detail is needed.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicle detection and tracking based on corner and lines adjacent detection features 基于拐角和直线相邻检测特征的车辆检测与跟踪
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852641
M. D. Enjat Munajat, D. H. Widyantoro, R. Munir
{"title":"Vehicle detection and tracking based on corner and lines adjacent detection features","authors":"M. D. Enjat Munajat, D. H. Widyantoro, R. Munir","doi":"10.1109/ICSITECH.2016.7852641","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852641","url":null,"abstract":"This paper discusses a new method in detecting moving objects, which is differ from most of the methods used such as Gaussian Mixture Model, and Haar-Like approach. The focus is on utilizing corner detection and line adjacent detection features through thresholding process creating black and white images to detect the corner of each object in each frame. The process divides a frame length into 4 parts, whereas the first part acted as initiation process of moving object recognition while the rest of the frame functioning as vehicle tracking, speed measurement, and number of vehicles calculation. The initiation process started by identifying corner spots of the moving objects that must be recognized as a single object. The lines surpassing through two points are later identified to determine whether those spots have dark color (0) or light color (1). The moving objects is represented by light color (1) and the walking objects is represented by dark color (0). A group of corner spots, identified and connected by two-point-line equation to be recognized as one unified object by using corner and line adjacent method. The identified vehicle objects can be more easily tracked and identified by the average speed in order to obtain the number of passing vehicles. The research result shows that in the initiation phase, the corner and line adjacent features able to detect moving object and distinguish it with different objects. Furthermore, in tracking phase, system is able to track the vehicle position, measuring the speed and number of vehicles. The system is proven to be able to recognize the moving objects quickly and accurately resulting in the more feasible process of speed measurement and tracking.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy and security of sharing referral medical record for health care system 卫生保健系统转诊病历共享的隐私与安全
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852639
Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie
{"title":"Privacy and security of sharing referral medical record for health care system","authors":"Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie","doi":"10.1109/ICSITECH.2016.7852639","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852639","url":null,"abstract":"Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical ID-Based Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can access the referral medical record. The result of performance testing shows that the average percentage increase from length of cipher text is 75%, with the smallest percentage increase is 22.80% and the largest is 236%.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Path analysis method to identify factors affecting consumer interest on online shopping 路径分析法识别影响消费者网上购物兴趣的因素
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852601
R. Purwaningsih, Belan Adison
{"title":"Path analysis method to identify factors affecting consumer interest on online shopping","authors":"R. Purwaningsih, Belan Adison","doi":"10.1109/ICSITECH.2016.7852601","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852601","url":null,"abstract":"Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are to understand what factors affect consumer intention to shop in a virtual world and to analyze the relationships among these factors. Particularly, this study explores consumer innovativeness (consumer novelty seeking and consumer independent judgment making) as an external variable that influences consumer intention indirectly through its effects on consumer experiences with the virtual world application (ease of use, control, concentration, and enjoyment). Path analysis method is used to identify the variable given significant influence to consumer intention to shop. The finding indicates that independent variables Consumer Novelty Seeking and Consumer Independent Judgment Making have influence to Perceived concentration, Perceived enjoyment, and Ease of Use. These three variables give significant influence to consumer intention to shop.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud computing sensitive data protection using multi layered approach 云计算敏感数据保护采用多层方法
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852610
Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah
{"title":"Cloud computing sensitive data protection using multi layered approach","authors":"Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah","doi":"10.1109/ICSITECH.2016.7852610","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852610","url":null,"abstract":"Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Car detection based on road direction on traffic surveillance image 基于道路方向的交通监控图像车辆检测
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852660
A. Prahara, Murinto
{"title":"Car detection based on road direction on traffic surveillance image","authors":"A. Prahara, Murinto","doi":"10.1109/ICSITECH.2016.7852660","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852660","url":null,"abstract":"One of the challenges in car detection is to be able to detect car in any viewpoint from traffic surveillance camera. The size, shape, and appearance of car are different if they are viewed from various viewpoint of traffic surveillance cameras. Car also has the most variety of models compared to the other vehicle. However, car poses usually follow road direction. Therefore, this research proposes a method to detect car based on road direction. The method utilizes 3D car models to generate car poses, groups them into four pairs of viewpoint orientation: 1) front / back view, 2) top left / bottom right view, 3) top right / bottom left view, and 4) left side / right side view, then builds car detectors corresponding to each orientation. On traffic surveillance image, road area is extracted to localize the detection area and road direction is estimated to determine the car detector that will be used by Linear-Support Vector Machine (Linear-SVM). Finally, SVM classifies the features extracted by Histogram of Oriented Gradients (HOG) to detect cars. The test result on various viewpoints of traffic surveillance image gives 0.9098 of Balance Accuracy (BAC).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"19 814 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The determinants affecting e-loyalty: Hospitality industry in Indonesia 影响电子忠诚度的决定因素:印度尼西亚的酒店业
2016 2nd International Conference on Science in Information Technology (ICSITech) Pub Date : 2016-10-01 DOI: 10.1109/ICSITECH.2016.7852621
V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho
{"title":"The determinants affecting e-loyalty: Hospitality industry in Indonesia","authors":"V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho","doi":"10.1109/ICSITECH.2016.7852621","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852621","url":null,"abstract":"The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality had an influence on e-satisfaction. E-satisfaction had an influence on e-loyalty. E-marketing and e-service did not influence e-loyalty. Based on the results of this study, we suggested that hotels should develop their website with interesting and detailed features for e-marketing and also provide live chat service for increasing e-service quality. E-satisfaction can be supported by customer satisfaction surveys on a regular basis or to be a part of the standard operating procedure, whereas customer loyalty programs need to be developed in the near future to build customers' e-loyalty.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信