2017 International Conference on Electrical Engineering and Computer Science (ICECOS)最新文献

筛选
英文 中文
Designing gamification framework to support social media application based on game elements and cutting-edge technology 基于游戏元素和前沿技术,设计支持社交媒体应用的游戏化框架
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167118
Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji
{"title":"Designing gamification framework to support social media application based on game elements and cutting-edge technology","authors":"Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji","doi":"10.1109/ICECOS.2017.8167118","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167118","url":null,"abstract":"Gamification is widely applied in various fields, such as business, marketing, education and social media. Gamification is predicted to be used by many companies. Therefore, gamification is still being developed. Nowadays, social media application also growing rapidly and make a new social media application must have new methods to penetrate the global market. This research is assembled from various literature about game elements used in gamification products and it is discovered that there are twenty-five game elements that can be used in a gamification product. The research also describe some cutting-edge technologies are used to improve the benefits of gamification products and affect the habit of the users. This research aims to describe game elements and technologies that can be applied in gamification products. Based on the research, a simple and generic gamification framework is designed to support gamification in social media applications by considering three different perspectives, the developer, the user and the beneficiaries.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"1 1","pages":"125-130"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of A∗ and Iterative Deepening A∗ algorithms for non-player character in Role Playing Game 角色扮演游戏中非玩家角色的A∗与迭代深化A∗算法的比较
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167134
Anggina Primanita, Rusdi Effendi, Wahyu Hidayat
{"title":"Comparison of A∗ and Iterative Deepening A∗ algorithms for non-player character in Role Playing Game","authors":"Anggina Primanita, Rusdi Effendi, Wahyu Hidayat","doi":"10.1109/ICECOS.2017.8167134","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167134","url":null,"abstract":"Role Playing Game (RPG) needs realistic Artificial Intelligence, pathfinding is one of the requirements to achieve it. One of the popular algorithm for pathfinding is A∗, but A∗ still has problem about its memory usage. Iterative Deepening A∗ (IDA∗) is an algorithm like A∗ that uses Depth First Search to prevent the large memory usage. This research develops a game that implements pathfinding method to enemy character using A∗ and IDA∗ algorithms to compare their memory and time usages for pathfinding. Heuristic function that used is Manhattan Distance. This research uses 3 different types of map (without obstacle, simple obstacle, and complex obstacle) with 3 different samples in each type of map as tool for comparing the memory and time usage by A∗ and IDA∗. The conclusion of this research are memory and time usage for A∗ and IDA∗ is affected by the size of map (node quantity), position of the obstacles on map, and the obstacle quantity. Then, IDA∗ Algorithm is generally better than A∗ in case of memory and time usage especially if the map doesn't have any obstacle, but IDA∗ can be worse if the enemy character and player are at the parallel position that covered by obstacle.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"3 1","pages":"202-205"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84592622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Odor classification using Support Vector Machine 基于支持向量机的气味分类
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167170
N. Husni, A. Handayani, S. Nurmaini, I. Yani
{"title":"Odor classification using Support Vector Machine","authors":"N. Husni, A. Handayani, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167170","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167170","url":null,"abstract":"This paper discusses about the process of classifying odor using Support Vector Machine. The training data was taken using a robot that ran in indoor room. The odor was sensed by 3 gas sensors, namely: TGS 2600, TGS 2602, and TGS 2620. The experimental environment was controlled and conditioned. The temperature was kept between 27.5 0C to 30.5 0C and humidity was in the range of 65%–75 %. After simulation testing in Matlab, the classification was then done in real experiment using one versus others technique. The result shows that the classification can be achieved using simulation and real experiment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"89 1","pages":"71-76"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86448733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel three-tier SQLi detection and mitigation scheme for cloud environments 针对云环境的一种新颖的三层SQLi检测和缓解方案
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167160
Wahid Rajeh, Alshreef Abed
{"title":"A novel three-tier SQLi detection and mitigation scheme for cloud environments","authors":"Wahid Rajeh, Alshreef Abed","doi":"10.1109/ICECOS.2017.8167160","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167160","url":null,"abstract":"Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which is certainly one of the top ranking vulnerabilities in cloud systems, is addressed in this paper. Also, a novel three-tier system for detection and mitigation of SQLi attacks is proposed. The methodology is involved over dynamic, static and runtime prevention and detection mechanisms. Moreover, it removes malicious queries and ensures the system is prepared for an environment that is secure despite being focused on the database server only. For the three-tier architecture, the first approach involves detection and prevention that follows the client logic access and data server (three-tier) organization to access, process and exchange queries. Furthermore, it makes sure no vulnerable code is executed that might affect the hosted operating system either partially or entirely. Experimental evaluation schemes demonstrate the efficiency and superiority of the scheme compared with existing approaches.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84300000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A critical review of blockchain and its current applications 对区块链及其当前应用的批判性回顾
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167115
Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, K. Rhee
{"title":"A critical review of blockchain and its current applications","authors":"Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, K. Rhee","doi":"10.1109/ICECOS.2017.8167115","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167115","url":null,"abstract":"Blockchain technology has been known as a digital currency platform since the emergence of Bitcoin, the first and the largest of the cryptocurrencies. Hitherto, it is used for the decentralization of markets more generally, not exclusively for the decentralization of money and payments. The decentralized transaction ledger of blockchain could be employed to register, confirm, and send all kinds of contracts to other parties in the network. In this paper, we thoroughly review state-of-the-art blockchain-related applications emerged in the literature. A number of published works were carefully included based on their contributions to the blockchain's body of knowledge. Several remarks are explored and discussed in the last section of the paper.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"94 1","pages":"109-113"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77211557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 166
Formation control design for real swarm robot using fuzzy logic 基于模糊逻辑的真实群体机器人群体控制设计
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167171
A. Handayani, N. Husni, S. Nurmaini, I. Yani
{"title":"Formation control design for real swarm robot using fuzzy logic","authors":"A. Handayani, N. Husni, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167171","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167171","url":null,"abstract":"This paper presents is to design swarm formation control using behavior-based for real robots. It's consists of two behavior are avoiding obstacles and formation keeping. During formation, the robots are also desired to coordinate among themselves to avoid collisions and keep formation the desired distance between each other. This design is using Fuzzy Logic Controller System. In this work a fuzzy logic controller has been used successfully in control system for the obstacle avoidance and formation keeping.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"6 1","pages":"77-82"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86862788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spatio-temporal analysis of South Sumatera hotspot distribution 南苏门答腊热点分布的时空分析
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167133
Firdaus, Septriani, Alsella Meiriza, R. F. Malik, S. Nurmaini
{"title":"Spatio-temporal analysis of South Sumatera hotspot distribution","authors":"Firdaus, Septriani, Alsella Meiriza, R. F. Malik, S. Nurmaini","doi":"10.1109/ICECOS.2017.8167133","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167133","url":null,"abstract":"This paper presents the analysis of South Sumatera hotspots distribution pattern from 2005–2015 based on spatial and temporal aspects. The hotspot distribution data used is FIRMS MODIS Fires data. The spatial aspect is represented by the attribute of latitude and longitude as the location of the occurrence of hotspots and the temporal is represented by the date attribute. DBSCAN clustering is used to analyze spatial aspect. The results show that Tulung Selapan subdistrict is on high fire-prone region. Air Sugihan, Cengal, Bayung Lencir is on medium and the others is low. For temporal aspect, the result shows most hotspots occurred on August, September and October.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"198-201"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82928485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image enhancement using the image sharpening, contrast enhancement, and Standard Median Filter (Noise Removal) with pixel-based and human visual system-based measurements 图像增强使用图像锐化,对比度增强和标准中值滤波器(噪声去除)与基于像素和人类视觉系统的测量
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167116
Erwin, Adam Nevriyanto, D. Purnamasari
{"title":"Image enhancement using the image sharpening, contrast enhancement, and Standard Median Filter (Noise Removal) with pixel-based and human visual system-based measurements","authors":"Erwin, Adam Nevriyanto, D. Purnamasari","doi":"10.1109/ICECOS.2017.8167116","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167116","url":null,"abstract":"In this paper, we explained the three methods of image enhancement: Image Sharpening by sharpening the edges, Contrast Enhancement using Standard Histogram Equalization and Standard Median Filtering where noise is filtered using these methods first and finally noise is eliminated. Then we put on the measurement parameters using a calculation based on the image quality of the pixel MSE and PSNR and calculations based on human vision system (HVS) that SSIM. The dataset we use is BSDS300 Berkeley and the environment is Matlab 2016a. We can state that the image quality measurement is good where the results are accurate so that we can determine the best methods too. We got SSIM value is close to 1 and the value obtained MSE and PSNR is minimum in Image Sharpening which is mean Image Sharpening is best of basic methods in Image Enhancement.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"6 1","pages":"114-119"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76623905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Smart monitoring apps for salvaging neolissochillus thienemanni sumateranus (batak heritage) from extinction 智能监测应用程序,用于拯救濒临灭绝的新巨鳄(batak遗产)
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167166
Richad Harianja, Nickholas Pangaribuan, Lambok Sinaga, Kisno, Pandapotan Siagian, E. R. Sembiring
{"title":"Smart monitoring apps for salvaging neolissochillus thienemanni sumateranus (batak heritage) from extinction","authors":"Richad Harianja, Nickholas Pangaribuan, Lambok Sinaga, Kisno, Pandapotan Siagian, E. R. Sembiring","doi":"10.1109/ICECOS.2017.8167166","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167166","url":null,"abstract":"Ihan or Ikan Batak (Neolissochillus thienemanni sumateranus), the heritage of Batak tribe, is considered as vulnerable species of freshwater fish in Indonesia, especially at Lake Toba. This study aims to introduce SMAFIB application that is environment-friendly and helps the salvage of the fish from extinction. An application is built based on Django framework using Phyton programming language, which interacts with Raspberry pi through the internet to monitor the fish breeding and carries out all operations needed for fish conservation. A 14-day-experiment was carried out on 15 Ihan seed in a tailored aquarium equipped with the smart application. After two weeks, the result indicated that the success rate of breeding the endangered species using this system was 100% where all the fish put were survived. The implementation of the embedded system which is realized through mobile application has been successful in breeding the endangered species by considering and monitoring the essential aspects such as pH, temperature, feeding, water condition, and health risks. Time efficiency and yields are getting increased which reflect the increase in the economy for the farmers. SMAFIB application increases the efficiency of feeding time, monitoring time, and helps the salvage of the species in order to restore the custom and tradition of the Batak community as well as helps the improvement of the farmers' income without endangering the environment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"34 1","pages":"56-60"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73971459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of grounding system for AC substation using sub-ground (SG) software for novice professionals: Interpretation based on IEEE Std. 80-1986 用地下(SG)软件评价交流变电站接地系统的新手:基于IEEE标准80-1986的解释
2017 International Conference on Electrical Engineering and Computer Science (ICECOS) Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167158
M. Jambak, H. Ahmad, M. A. H. Mohammed, S. A. Jumaat, M. Sidik
{"title":"Evaluation of grounding system for AC substation using sub-ground (SG) software for novice professionals: Interpretation based on IEEE Std. 80-1986","authors":"M. Jambak, H. Ahmad, M. A. H. Mohammed, S. A. Jumaat, M. Sidik","doi":"10.1109/ICECOS.2017.8167158","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167158","url":null,"abstract":"Grounding system plays very important role in AC substation station for person and equipment safety. Proper design of grounding system is achievable by following IEEE Std-80 on safety in AC substation grounding but novice professionals find it not easy to use. The advantage of this paper presents evaluation of grounding system for AC substation by case studies presentation thus easing the understanding of IEEE Std-80 and its usage. This was carried out by using homegrown Sub-ground software with capability to identify the safety status of a grounding system design procedures. The grounding system is evaluated with six different cases. Different parameter is changed in each case to observe the result of the grounding system. The result shows that there are several important parameters in designing a grounding system. The parameters are grounding grid size, number of parallel rod, level of fault current, crush rock layer, cross sectional area of ground rod and level of soil resistivity. The tolerable and calculated step and touch voltage as well as the mesh voltage of the grounding system are presented in manner to tutor novice professionals on AC grounding system design. Last but not least the software developed in the laboratory useful for novice professionals training for AC substation grounding system.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"29 1","pages":"321-327"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91135271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信