2016 International Conference on Knowledge Creation and Intelligent Computing (KCIC)

15-17 Nov. 2016

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (333 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Committee

    Publication Year: 2016, Page(s):5 - 7
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Speech from director of Manado State Polytechnic

    Publication Year: 2016, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Welcome message from program chair

    Publication Year: 2016, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Opening message from IEEE Indonesia

    Publication Year: 2016, Page(s):11 - 13
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Technical program

    Publication Year: 2016, Page(s):14 - 21
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Keynote talk — 1: Sensing-based information system in the era of IoT, cloud services and smartphones

    Publication Year: 2016, Page(s): 22
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Keynote talk — 2: Developing language resources for under-resourced languages in Indonesia

    Publication Year: 2016, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s): 265
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE
  • Design model material requirement of coconut flour production and performance testing based multi user in North Sulawesi

    Publication Year: 2016, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB) | HTML iconHTML

    There has been many previous studies that discuss the control for the production of coconut flour and raw material inventory. But a system or a computer-based model for coconut flour industry in North Sulawesi has not or does not exist. For that reason, coconut flour industries also require tools on in running the business as developed in this study. The problem in this research is how to make the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing the PodRacle, spherical mode rolling locomotion on flat surface

    Publication Year: 2016, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1885 KB) | HTML iconHTML

    The ability of a robot to be able to change the shape is not something impossible to do. This research introduce such changeable shape robot named PodRacle, which has two basic forms; a form of a six-legged robot and a form of spherical robot. Combining the two basic forms, the PodRacle robot can result in increasing efficiency of a six-legged robot motion on a flat surface by means of rolling mov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimization of SQL injection in scheduling application development

    Publication Year: 2016, Page(s):14 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    SQL (structure query language) injection is one of threat to the application connected to the database. By implementing SQL injection attacker can gain full access to the application or database so that it can remove even significant data irresponsibly. Applications that do not validate the user's input appropriately make them vulnerable against SQL injection. Various methods have been developed t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarity-ranking method based on semantic computing for a context-aware system

    Publication Year: 2016, Page(s):21 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (827 KB) | HTML iconHTML

    Among the enormous variety of data in recent years, transportation data contain significant potential for understanding the information requirements and intention of passengers. In this paper, we propose a new information ranking method for passenger intention prediction and service recommendation. The method includes three main features, which include (1) predicting the intention of a used based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic image search system of madurese cultural batik with impression, color and shape features

    Publication Year: 2016, Page(s):28 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1284 KB)

    Batik is one of Indonesian cultural products in the form of traditional fabrics which has many motifs. One of famous batik is madurese batik. Here, Madura is one of Indonesia islands which has a distinctive motif in terms of colors and motif characteristic that distinguishes it from other regions in Indonesia, but the Madurese communities themselves have not understood the meaning of Madurese bati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D heart image reconstruction and visualization with marching cubes algorithm

    Publication Year: 2016, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2190 KB) | HTML iconHTML

    Heart image taken using a CT-scan or MRI is a two-dimensional image. Information obtained from these images is very limited and it takes a lot of pictures from various sides to be able to determine the condition of the heart as a whole. This may slow the process of diagnosis of the heart condition of a patient. This study aims to solve these problems by developing a 3D reconstruction system. Some ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auto cropping on iris image for iridology using histogram analysis

    Publication Year: 2016, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4377 KB) | HTML iconHTML

    Iridology is the science that allows a health practitioner or non expert to learn the signs in the iris of the eye that is capable of indicating the presence of abnormalities in the body, including basic genetics, toxin deposition, dam circulation, and other weaknesses. Research on computerized iridology had been done before This research proposes a new approach for detecting the iris area in orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved segmentation of cardiac image using triangle and partial Monte Carlo

    Publication Year: 2016, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB) | HTML iconHTML

    In this paper, the segmentation of cardiac image for heart diseases is proposed. The method used Median High Boost Filter, Triangle Equation and Partial Monte Carlo. The first step is applying Median High Boost filter to eliminate noise. The second step is Triangle Equation to detect cardiac cavity and reconstruct the imprecise border. The third step is Partial Monte Carlo to measure the area of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-based pathloss exponential modeling for indoor positioning in wireless sensor network

    Publication Year: 2016, Page(s):53 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB) | HTML iconHTML

    GPS (Global Positioning System) cannot be used for localization object in indoor environments. Even though, estimation of localization is an important requirement in wireless sensor networks to determine the position of the object. Localization based on RSSI (Received Signal Strength Indicator) has low accuracy because of attenuation of the transmitted signal as a function of the distance between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile cooperative tracking with RSSI ranging in EKF algorithm for indoor wireless sensor network

    Publication Year: 2016, Page(s):60 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    Target tracking is an application in WSN (Wireless Sensor Network) that estimating directly the mobile target position. However, in indoor location with large coverage area it is difficult to get the precision estimation, especially using RSSI (received strength signal indicator) with poor accuracy. The condition of an indoor location with many walls, obstacle, pillar, doors, multipath fading, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduce complexity computation of MIMO decomposition based on single RF using Kalman filter

    Publication Year: 2016, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB) | HTML iconHTML

    Multiple Input Multiple Output (MIMO) systems based on single radio frequency (RF) receiver have been shown to achieve high data rates due to the exploitation of spatial diversity with the use of multiple antennas at the transmitters and/or receivers. However, exploiting the full multiplexing gain of the MIMO channel requires a RF front end and analog to digital converters for each antenna to proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure data sensor access using attribute-based encryption with revocation for environmental monitoring

    Publication Year: 2016, Page(s):73 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1624 KB) | HTML iconHTML

    In Internet of Things (IoT) era, everybody can access data anytime and anywhere. Information in a data center can be accessed by users using end-user devices such as a laptop, smartphone, and Personal Computer. The data should be secured and cannot be accessed by illegal users from the environment monitoring. To secure and prevent the sensor data from illegal access by the user then it is required... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.