{"title":"Designing gamification framework to support social media application based on game elements and cutting-edge technology","authors":"Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji","doi":"10.1109/ICECOS.2017.8167118","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167118","url":null,"abstract":"Gamification is widely applied in various fields, such as business, marketing, education and social media. Gamification is predicted to be used by many companies. Therefore, gamification is still being developed. Nowadays, social media application also growing rapidly and make a new social media application must have new methods to penetrate the global market. This research is assembled from various literature about game elements used in gamification products and it is discovered that there are twenty-five game elements that can be used in a gamification product. The research also describe some cutting-edge technologies are used to improve the benefits of gamification products and affect the habit of the users. This research aims to describe game elements and technologies that can be applied in gamification products. Based on the research, a simple and generic gamification framework is designed to support gamification in social media applications by considering three different perspectives, the developer, the user and the beneficiaries.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"1 1","pages":"125-130"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of A∗ and Iterative Deepening A∗ algorithms for non-player character in Role Playing Game","authors":"Anggina Primanita, Rusdi Effendi, Wahyu Hidayat","doi":"10.1109/ICECOS.2017.8167134","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167134","url":null,"abstract":"Role Playing Game (RPG) needs realistic Artificial Intelligence, pathfinding is one of the requirements to achieve it. One of the popular algorithm for pathfinding is A∗, but A∗ still has problem about its memory usage. Iterative Deepening A∗ (IDA∗) is an algorithm like A∗ that uses Depth First Search to prevent the large memory usage. This research develops a game that implements pathfinding method to enemy character using A∗ and IDA∗ algorithms to compare their memory and time usages for pathfinding. Heuristic function that used is Manhattan Distance. This research uses 3 different types of map (without obstacle, simple obstacle, and complex obstacle) with 3 different samples in each type of map as tool for comparing the memory and time usage by A∗ and IDA∗. The conclusion of this research are memory and time usage for A∗ and IDA∗ is affected by the size of map (node quantity), position of the obstacles on map, and the obstacle quantity. Then, IDA∗ Algorithm is generally better than A∗ in case of memory and time usage especially if the map doesn't have any obstacle, but IDA∗ can be worse if the enemy character and player are at the parallel position that covered by obstacle.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"3 1","pages":"202-205"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84592622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Odor classification using Support Vector Machine","authors":"N. Husni, A. Handayani, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167170","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167170","url":null,"abstract":"This paper discusses about the process of classifying odor using Support Vector Machine. The training data was taken using a robot that ran in indoor room. The odor was sensed by 3 gas sensors, namely: TGS 2600, TGS 2602, and TGS 2620. The experimental environment was controlled and conditioned. The temperature was kept between 27.5 0C to 30.5 0C and humidity was in the range of 65%–75 %. After simulation testing in Matlab, the classification was then done in real experiment using one versus others technique. The result shows that the classification can be achieved using simulation and real experiment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"89 1","pages":"71-76"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86448733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel three-tier SQLi detection and mitigation scheme for cloud environments","authors":"Wahid Rajeh, Alshreef Abed","doi":"10.1109/ICECOS.2017.8167160","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167160","url":null,"abstract":"Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which is certainly one of the top ranking vulnerabilities in cloud systems, is addressed in this paper. Also, a novel three-tier system for detection and mitigation of SQLi attacks is proposed. The methodology is involved over dynamic, static and runtime prevention and detection mechanisms. Moreover, it removes malicious queries and ensures the system is prepared for an environment that is secure despite being focused on the database server only. For the three-tier architecture, the first approach involves detection and prevention that follows the client logic access and data server (three-tier) organization to access, process and exchange queries. Furthermore, it makes sure no vulnerable code is executed that might affect the hosted operating system either partially or entirely. Experimental evaluation schemes demonstrate the efficiency and superiority of the scheme compared with existing approaches.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84300000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, K. Rhee
{"title":"A critical review of blockchain and its current applications","authors":"Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, K. Rhee","doi":"10.1109/ICECOS.2017.8167115","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167115","url":null,"abstract":"Blockchain technology has been known as a digital currency platform since the emergence of Bitcoin, the first and the largest of the cryptocurrencies. Hitherto, it is used for the decentralization of markets more generally, not exclusively for the decentralization of money and payments. The decentralized transaction ledger of blockchain could be employed to register, confirm, and send all kinds of contracts to other parties in the network. In this paper, we thoroughly review state-of-the-art blockchain-related applications emerged in the literature. A number of published works were carefully included based on their contributions to the blockchain's body of knowledge. Several remarks are explored and discussed in the last section of the paper.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"94 1","pages":"109-113"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77211557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formation control design for real swarm robot using fuzzy logic","authors":"A. Handayani, N. Husni, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167171","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167171","url":null,"abstract":"This paper presents is to design swarm formation control using behavior-based for real robots. It's consists of two behavior are avoiding obstacles and formation keeping. During formation, the robots are also desired to coordinate among themselves to avoid collisions and keep formation the desired distance between each other. This design is using Fuzzy Logic Controller System. In this work a fuzzy logic controller has been used successfully in control system for the obstacle avoidance and formation keeping.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"6 1","pages":"77-82"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86862788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firdaus, Septriani, Alsella Meiriza, R. F. Malik, S. Nurmaini
{"title":"Spatio-temporal analysis of South Sumatera hotspot distribution","authors":"Firdaus, Septriani, Alsella Meiriza, R. F. Malik, S. Nurmaini","doi":"10.1109/ICECOS.2017.8167133","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167133","url":null,"abstract":"This paper presents the analysis of South Sumatera hotspots distribution pattern from 2005–2015 based on spatial and temporal aspects. The hotspot distribution data used is FIRMS MODIS Fires data. The spatial aspect is represented by the attribute of latitude and longitude as the location of the occurrence of hotspots and the temporal is represented by the date attribute. DBSCAN clustering is used to analyze spatial aspect. The results show that Tulung Selapan subdistrict is on high fire-prone region. Air Sugihan, Cengal, Bayung Lencir is on medium and the others is low. For temporal aspect, the result shows most hotspots occurred on August, September and October.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"198-201"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82928485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image enhancement using the image sharpening, contrast enhancement, and Standard Median Filter (Noise Removal) with pixel-based and human visual system-based measurements","authors":"Erwin, Adam Nevriyanto, D. Purnamasari","doi":"10.1109/ICECOS.2017.8167116","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167116","url":null,"abstract":"In this paper, we explained the three methods of image enhancement: Image Sharpening by sharpening the edges, Contrast Enhancement using Standard Histogram Equalization and Standard Median Filtering where noise is filtered using these methods first and finally noise is eliminated. Then we put on the measurement parameters using a calculation based on the image quality of the pixel MSE and PSNR and calculations based on human vision system (HVS) that SSIM. The dataset we use is BSDS300 Berkeley and the environment is Matlab 2016a. We can state that the image quality measurement is good where the results are accurate so that we can determine the best methods too. We got SSIM value is close to 1 and the value obtained MSE and PSNR is minimum in Image Sharpening which is mean Image Sharpening is best of basic methods in Image Enhancement.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"6 1","pages":"114-119"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76623905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Richad Harianja, Nickholas Pangaribuan, Lambok Sinaga, Kisno, Pandapotan Siagian, E. R. Sembiring
{"title":"Smart monitoring apps for salvaging neolissochillus thienemanni sumateranus (batak heritage) from extinction","authors":"Richad Harianja, Nickholas Pangaribuan, Lambok Sinaga, Kisno, Pandapotan Siagian, E. R. Sembiring","doi":"10.1109/ICECOS.2017.8167166","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167166","url":null,"abstract":"Ihan or Ikan Batak (Neolissochillus thienemanni sumateranus), the heritage of Batak tribe, is considered as vulnerable species of freshwater fish in Indonesia, especially at Lake Toba. This study aims to introduce SMAFIB application that is environment-friendly and helps the salvage of the fish from extinction. An application is built based on Django framework using Phyton programming language, which interacts with Raspberry pi through the internet to monitor the fish breeding and carries out all operations needed for fish conservation. A 14-day-experiment was carried out on 15 Ihan seed in a tailored aquarium equipped with the smart application. After two weeks, the result indicated that the success rate of breeding the endangered species using this system was 100% where all the fish put were survived. The implementation of the embedded system which is realized through mobile application has been successful in breeding the endangered species by considering and monitoring the essential aspects such as pH, temperature, feeding, water condition, and health risks. Time efficiency and yields are getting increased which reflect the increase in the economy for the farmers. SMAFIB application increases the efficiency of feeding time, monitoring time, and helps the salvage of the species in order to restore the custom and tradition of the Batak community as well as helps the improvement of the farmers' income without endangering the environment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"34 1","pages":"56-60"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73971459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jambak, H. Ahmad, M. A. H. Mohammed, S. A. Jumaat, M. Sidik
{"title":"Evaluation of grounding system for AC substation using sub-ground (SG) software for novice professionals: Interpretation based on IEEE Std. 80-1986","authors":"M. Jambak, H. Ahmad, M. A. H. Mohammed, S. A. Jumaat, M. Sidik","doi":"10.1109/ICECOS.2017.8167158","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167158","url":null,"abstract":"Grounding system plays very important role in AC substation station for person and equipment safety. Proper design of grounding system is achievable by following IEEE Std-80 on safety in AC substation grounding but novice professionals find it not easy to use. The advantage of this paper presents evaluation of grounding system for AC substation by case studies presentation thus easing the understanding of IEEE Std-80 and its usage. This was carried out by using homegrown Sub-ground software with capability to identify the safety status of a grounding system design procedures. The grounding system is evaluated with six different cases. Different parameter is changed in each case to observe the result of the grounding system. The result shows that there are several important parameters in designing a grounding system. The parameters are grounding grid size, number of parallel rod, level of fault current, crush rock layer, cross sectional area of ground rod and level of soil resistivity. The tolerable and calculated step and touch voltage as well as the mesh voltage of the grounding system are presented in manner to tutor novice professionals on AC grounding system design. Last but not least the software developed in the laboratory useful for novice professionals training for AC substation grounding system.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"29 1","pages":"321-327"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91135271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}