{"title":"Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)","authors":"S. Julianto, R. Munir","doi":"10.1109/ICOIACT.2018.8350742","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350742","url":null,"abstract":"The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"1 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89759254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio beam steering with phased array method using Arduino Due Microcontroller","authors":"Amaro Da Silva Gaviola, M. Rivai, Hendra Kusuma","doi":"10.1109/ICOIACT.2018.8350683","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350683","url":null,"abstract":"The audio system requires a large amount of power to transmit sound energy to all areas both inside and outside the room. Sound waves can propagate in the air and undergo great absorption in their propagation. Often people or audiences only exist in areas with a certain distance and direction, so much of the sound energy is wasted. The focusing technique can be applied to transmit sound energy to the audience area with a certain direction and distance. Thus, this technique can save energy significantly. Audio steering system with mechanical process, requires high electric driving power and takes a long time. In this research, a sound energy guiding system from four loudspeaker series has been done with phase difference or phased array method. So, there is no mechanical loudspeaker modifiers are needed. The computer is used as a Graphical User Interface to determine the direction and distance of the audience who will receive the sound, by generating the delay configuration pattern of each path using Arduino Due Microcontroller. So this process can work automatically in directing the sound energy. The test results show that the sound intensity generated by the system is greater at the selected or target angle than the others. Beam Steering audio is expected to be used for large meeting rooms or outdoors, where the sound energy is only sent towards the desired power depending on the area and distance of the audience.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"35 1","pages":"597-600"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra
{"title":"Introducing TAMEx model for availability of e-exam in wireless environment","authors":"G. Sukadarmika, R. S. Hartati, Linawati, Nyoman Putra Sastra","doi":"10.1109/ICOIACT.2018.8350741","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350741","url":null,"abstract":"Computer Base Test (CBT) or e-exam is often used to evaluate the achievement of learning process in e-learning system. E-exam services become more popular to be implemented by Massive Open Online Courses, TOEFL, IELTS etc. However, the security of e-exam is still debatable. Many researches related to e-exam security on the aspect of authority and confidentiality have been done. However, there are not many researches founded relate to availability aspect especially for implementation of e-exam in wireless environment. Here is introduced Time Adaptive for Mobile E-Exam (TAMEx) model. This model is designed for improving availability of e-exam which is implemented in wireless network especially in WLAN IEEE.802.11. This model deploys Netsh command to provide data of Wireless Local Area Network interfaces then integrate it with e-exam application. Here is used RSSI and received data rate to identify connection status of the client. In case of connection problem due to the RSSI or received data rate below the required standard, this model provides additional time automatically corresponding to duration of connection interruption to a certain user who has experienced of loss connection during the exam. Therefore, implementing TAMEx model in e-exam services should improve reliability of e-exam in wireless environment due to its availability, fairness and accountability.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"30 6 1","pages":"163-167"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77511674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disturbance compensation using CTC with NDOB for formation control of mobile robots","authors":"A. Kusumawardana, T. Agustinah","doi":"10.1109/ICOIACT.2018.8350703","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350703","url":null,"abstract":"This paper proposed CTC (Computed Torque Control) with NDOB (Non-linear Disturbance Observer) to compensate disturbance for formation control of mobile robot. The kinematics models of robot is used to solve the formation control problem. The robot formation was formed using the SBC (Separation-Bearing Control) approach. However, in this paper also used SSC (Separation-Separation Control), because SSC approach can avoid collision between follower if one of the follower affected by disturbance. In this case, CTC is used to control the dynamics of the robot, but the controller has poor performance when the robot was affected by disturbance, consequently the formation that has been formed is interrupted when tracking trajectory. Under these conditions, NDOB is designed to estimate disturbance in robots. The simulation results show that CTC with NDOB succeeds to reducing the effect of disturbance on the robot so that the formation can be maintained when any follower was affected by disturbance.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"3 1","pages":"673-678"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91041940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of feedback control system","authors":"Faiq Ahmad Khan, Shibli Nisar","doi":"10.1109/ICOIACT.2018.8350714","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350714","url":null,"abstract":"Feedback control system is one of the most significant and challenging area in this modern era. Almost in every technical program it is being taught. Different research work has been done on the analysis of feedback control systems. But all the previous research work is on analysis of system based on stability, initial and final value theorem, state space representation or based on root locus and bode plot individually. In this paper the complete analysis of feedback control systems has been carried out that includes transfer functions, poles and zeros, stability of a system, initial and final values, state space representations, different responses of a system, time response of first and second order systems, Routh-Hurwitz criterion, root locus and Bode plot together using MATLAB.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"10 1","pages":"16-24"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74270477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text mining based on tax comments as big data analysis using SVM and feature selection","authors":"Mihuandayani, Ema Utami, E. T. Luthfi","doi":"10.1109/ICOIACT.2018.8350743","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350743","url":null,"abstract":"The tax gives an important role for the contributions of the economy and development of a country. The improvements to the taxation service system continuously done in order to increase the State Budget. One of consideration to know the performance of taxation particularly in Indonesia is to know the public opinion as for the object service. Text mining can be used to know public opinion about the tax system. The rapid growth of data in social media initiates this research to use the data source as big data analysis. The dataset used is derived from Facebook and Twitter as a source of data in processing tax comments. The results of opinions in the form of public sentiment in part of service, website system, and news can be used as consideration to improve the quality of tax services. In this research, text mining is done through the phases of text processing, feature selection and classification with Support Vector Machine (SVM). To reduce the problem of the number of attributes on the dataset in classifying text, Feature Selection used the Information Gain to select the relevant terms to the tax topic. Testing is used to measure the performance level of SVM with Feature Selection from two data sources. Performance measured using the parameters of precision, recall, and F-measure.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"25 1","pages":"537-542"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77607817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adewasti, R. Febriani, Sholihin, Eka Susanti, Emilia Hesti
{"title":"Xbee pro module application in to organize and monitoring earthquake disaster location with the robot control system","authors":"Adewasti, R. Febriani, Sholihin, Eka Susanti, Emilia Hesti","doi":"10.1109/ICOIACT.2018.8350811","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350811","url":null,"abstract":"In Indonesia, the earthquake disaster is a disaster that often happens and cause a lot of damage and casualties, so researchers will try to design a Robot control system to monitor the Earthquake Disaster Location Using Xbee Pro Based Arduino. Initial robot formation, how to design a tool in the form of robot is one that must be considered for the tool produced in this case a robot can be useful for the community and can help the work of the SAR team in terms of monitoring the location of earthquakes. Researchers only limit the subject matter only to the set of receivers and monitoring devices. In order to monitor the state of the earthquake disaster site, this robot is equipped with a camera as a monitoring tool. This tool uses Arduino as Microcontroller, Xbee Pro as communication medium between remote and robot, Driver Motor as DC motor drive, DC Motor as a robot drive, Servo Motor as camera drive, Wireless Camera and Mobile as monitoring device. As a result the robot is able to walk and receive commands up to a distance of more than 20 meters while in the room, and stay connected to the phone to monitor the location of the earthquake.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"5 1","pages":"651-655"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79662426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxpayer compliance classification using C4.5, SVM, KNN, Naive Bayes and MLP","authors":"M. Jupri, R. Sarno","doi":"10.1109/ICOIACT.2018.8350710","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350710","url":null,"abstract":"Tax revenue has a very important role to fund the State's finances. In order for the optimal tax revenue, the tax authorities must perform tax supervision to the taxpayers optimally. By using the self-assessment taxation system that is taxpayers calculation, pay and report their own tax obligations added with the data of other parties will create a very large data. Therefore, the tax authorities are required to immediately know the taxpayer non-compliance for further audit. This research uses the classification algorithm C4.5, SVM (Support Vector Machine), KNN (K-Nearest Neighbor), Naive Bayes and MLP (Multilayer Perceptron) to classify the level of taxpayer compliance with four goals that are corporate taxpayers comply formally and materially required, corporate taxpayers comply formally required, corporate taxpayers comply materially required and corporate taxpayers not comply formally and materially required. The classification results of each algorithm are compared and the best algorithm chosen based on criteria F-Score, Accuracy and Time taken to build the model by using fuzzy TOPSIS method. The final result shows that C4.5 algorithm is the best algorithm to classify taxpayer compliance level compared to other algorithms.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"8 1","pages":"297-303"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81133614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving accuracy of C4.5 algorithm using split feature reduction model and bagging ensemble for credit card risk prediction","authors":"M. A. Muslim, A. Nurzahputra, B. Prasetiyo","doi":"10.1109/ICOIACT.2018.8350753","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350753","url":null,"abstract":"Giving credit to prospective debtor is determined by the existence of credit scoring. The accuracy of credit scoring to classify the debtor data is very important. The method that can be applied is classification and one of the classification method is decision tree. One of the decision tree algorithm that can be used is C4.5 algorithm. In this paper, the problem that discussed is how to increase the accuracy of C4.5 algorithm to predict credit receipts. The increasing accuracy is conducted by applying the Split Feature Reduction Model and Bagging Ensemble. Split Feature Reduction Model is applied in the preprocessing process which split datasets to the amount of n. In this paper, datasets split into 4 splits. Split 1 consists of 16 features, Split 2 consists of 12 features, Split 3 consists of 8 features, and Split 4 consists of 4 features. Then, C4.5 algorithm is applied to every splits. The best accuracy result by applying split feature reduction model with C4.5 algorithm is in Split 3 amount 73.1%. Then, the best accuracy results obtained by applying the split feature reduction model and bagging ensemble with C4.5 algorithm is in Split 3 amount 75.1%. In comparison to the accuracy of C4.5 algorithm stand alone, the applying of split feature reduction model and bagging ensemble obtained increased accuracy by 4.6%.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"31 1","pages":"141-145"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81546473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yudit Arum Mekarsari, D. Setiadi, C. A. Sari, E. H. Rachmawanto, Muljono
{"title":"Non-blind RGB image watermarking technique using 2-level discrete wavelet transform and singular value decomposition","authors":"Yudit Arum Mekarsari, D. Setiadi, C. A. Sari, E. H. Rachmawanto, Muljono","doi":"10.1109/ICOIACT.2018.8350793","DOIUrl":"https://doi.org/10.1109/ICOIACT.2018.8350793","url":null,"abstract":"The main problem in using various watermarking methods to secure digital images is how to optimize the trade-off between robustness watermarked image against the effect of distortion and imperceptibility on watermark insertion. This research proposes a watermark insertion method to protect copyright in true color (RGB) images by combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) algorithms. DWT process will be done as much as 2 levels then selected subband LL2 to inserted watermark by Singular Value Decomposition (SVD) method. Measuring tool in this research using MSE, PSNR, SSI M for imperceptibility and NC quality measurement for robustness measurement. The results show that the proposed scheme can optimize the trade-off between imperceptibility and robustness. Some attacks are used such as Gaussian noise, salt & pepper noise, crop, blur and rotate for watermarked image resilience. The PSNR and SSIM values produced from this method are fairly stable values above 40 dB for PSNR and above 0.99 for SSIM. While the average value of NC resulting from this method is 1.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"122 1","pages":"623-627"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89874010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}