首页 > 最新文献

2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)最新文献

英文 中文
Software development for ultra wide band radar detector 超宽带雷达探测器软件开发
M. Wahab, Sulistyaningsih, Y. P. Saputera, E. Amin
In this paper, the research and development on display software for a radar detector that has an ability to receive and process data from Ultra-Wide Band (UWB) signals with a frequency range of 2–18 GHz is presented. This software design consists of three parts: processing module software, data logging module software, and data flow module software. The radar detector is able to extract the primary parameter information from the received signal: frequency, pulse width, TOA (time of arrival), direction of arrival (DOA), level, and modulation type.
本文介绍了一种能够接收和处理2-18 GHz超宽带(UWB)信号的雷达探测器显示软件的研发。本软件设计由三部分组成:处理模块软件、数据记录模块软件和数据流模块软件。雷达探测器能够从接收信号中提取主要参数信息:频率、脉宽、TOA(到达时间)、到达方向(DOA)、电平和调制类型。
{"title":"Software development for ultra wide band radar detector","authors":"M. Wahab, Sulistyaningsih, Y. P. Saputera, E. Amin","doi":"10.1109/ICITISEE.2017.8285490","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285490","url":null,"abstract":"In this paper, the research and development on display software for a radar detector that has an ability to receive and process data from Ultra-Wide Band (UWB) signals with a frequency range of 2–18 GHz is presented. This software design consists of three parts: processing module software, data logging module software, and data flow module software. The radar detector is able to extract the primary parameter information from the received signal: frequency, pulse width, TOA (time of arrival), direction of arrival (DOA), level, and modulation type.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wood identification based on histogram of oriented gradient (HOG) feature and support vector machine (SVM) classifier 基于定向梯度直方图特征和支持向量机分类器的木材识别
B. Sugiarto, E. Prakasa, R. Wardoyo, R. Damayanti, Krisdianto, L. M. Dewi, H. Pardede, Y. Rianto
Forest areas in Indonesia covered about 2/3 of total land areas which has about 4000 wood species. Wood identification plays a key role in wood utilization not only for determining appropriate use but also for supporting legal timber trade. However, the identification process requires high expertise and complex method which can be done in the laboratory. In order to simplify the identification process, we develop wood identification using computer vision by using Histogram of Oriented Gradient (HOG) to extract the species of wood and Support Vector Machines (SVM) to classify wood species. These methods combination will improve the accuracy of wood identification process. The result showed that the HOG method can extract the texture of woods and SVM classifier can generate the boundary decision after executing the training process. By doing the testing process of SVM classifier, the result showed that the accuracy from the identification is 70.5% for using positive testing image and 77.5% for using negative testing image. This accuracy value can be reached because the texture for each training image has different texture pattern especially the number and location of vessels.
印度尼西亚的森林面积约占陆地总面积的2/3,拥有约4000种木材。木材鉴定在木材利用中不仅对确定适当用途而且对支持合法木材贸易起着关键作用。然而,鉴定过程需要很高的专业知识和复杂的方法,可以在实验室完成。为了简化木材的识别过程,采用直方图梯度法(HOG)提取木材种类,支持向量机(SVM)对木材种类进行分类,开发了基于计算机视觉的木材识别方法。这些方法的结合将提高木材识别过程的准确性。结果表明,HOG方法可以提取出树木的纹理,SVM分类器在执行训练过程后可以生成边界决策。通过对SVM分类器进行测试,结果表明,使用正检测图像识别准确率为70.5%,使用负检测图像识别准确率为77.5%。之所以能达到这个精度值,是因为每个训练图像的纹理具有不同的纹理模式,特别是血管的数量和位置。
{"title":"Wood identification based on histogram of oriented gradient (HOG) feature and support vector machine (SVM) classifier","authors":"B. Sugiarto, E. Prakasa, R. Wardoyo, R. Damayanti, Krisdianto, L. M. Dewi, H. Pardede, Y. Rianto","doi":"10.1109/ICITISEE.2017.8285523","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285523","url":null,"abstract":"Forest areas in Indonesia covered about 2/3 of total land areas which has about 4000 wood species. Wood identification plays a key role in wood utilization not only for determining appropriate use but also for supporting legal timber trade. However, the identification process requires high expertise and complex method which can be done in the laboratory. In order to simplify the identification process, we develop wood identification using computer vision by using Histogram of Oriented Gradient (HOG) to extract the species of wood and Support Vector Machines (SVM) to classify wood species. These methods combination will improve the accuracy of wood identification process. The result showed that the HOG method can extract the texture of woods and SVM classifier can generate the boundary decision after executing the training process. By doing the testing process of SVM classifier, the result showed that the accuracy from the identification is 70.5% for using positive testing image and 77.5% for using negative testing image. This accuracy value can be reached because the texture for each training image has different texture pattern especially the number and location of vessels.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126806989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Design and implementation of flood detector using wireless sensor network with mamdani's fuzzy logic method 基于mamdani模糊逻辑的无线传感器网络洪水探测器的设计与实现
A. Pratama, R. Munadi, Ratna Mayasari
In this paper, we build the prototype system using Wireless Sensor Network (WSN) for flood detector for flooding area. In a flooding area, power consumption and reliability of network become an important thing. Therefore, the performance of devices and algorithm of this system must work properly. The system is created using Fuzzy Logic to calculate the output, in order to make the system work properly. With Zigbee technology, WSN can be useful for monitoring a small area with many nodes. WSN can be combined with another application, e.g. cloud, android, virtual private network, etc. The objective of this paper is to design flood detector system with WSN on two scenarios that are single hop and multi hop, then find two of these which the best. Single hop means no router node between coordinator node and end node and multi hop means there is router node between coordinator node and end node. After some test, this system has a maximum range in single hop at a distance of 95.1 meters and 185.5 meters when using multi hop's scenario. Error for fuzzy logic compare between manual calculation and prototype system is 3.04417493% and error overall system for its result is 5%. In the examination of the quality of the network, values of throughput obtained fairly stable but the result of delay values is unstable, the further the distance the higher the values of delay, on the contrary values of throughput getting lower. The power consumption is only 0.083 Watt/hour when the system in single hop and 0.06525 Watt/hour when the system in multi hop.
本文利用无线传感器网络(WSN)构建了用于洪涝地区洪水探测器的原型系统。在洪水地区,电网的功耗和可靠性成为一个重要的问题。因此,该系统的设备性能和算法必须正常工作。为了使系统正常工作,采用模糊逻辑对输出进行计算。利用Zigbee技术,无线传感器网络可以用于监控具有许多节点的小区域。WSN可以与其他应用相结合,例如云、android、虚拟专用网等。本文的目标是在单跳和多跳两种场景下设计基于WSN的洪水探测系统,并从中找出两种最优方案。单跳是指协调节点和结束节点之间没有路由器节点,多跳是指协调节点和结束节点之间有路由器节点。经过测试,该系统在使用多跳场景时,最大单跳距离为95.1米,最大单跳距离为185.5米。人工计算与原型系统的模糊逻辑比较误差为3.04417493%,总体误差为5%。在对网络质量的检测中,得到的吞吐量值相当稳定,但时延值的结果却不稳定,距离越远,时延值越高,而吞吐量值则越低。系统单跳时功耗仅为0.083瓦特/小时,多跳时功耗仅为0.06525瓦特/小时。
{"title":"Design and implementation of flood detector using wireless sensor network with mamdani's fuzzy logic method","authors":"A. Pratama, R. Munadi, Ratna Mayasari","doi":"10.1109/ICITISEE.2017.8285493","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285493","url":null,"abstract":"In this paper, we build the prototype system using Wireless Sensor Network (WSN) for flood detector for flooding area. In a flooding area, power consumption and reliability of network become an important thing. Therefore, the performance of devices and algorithm of this system must work properly. The system is created using Fuzzy Logic to calculate the output, in order to make the system work properly. With Zigbee technology, WSN can be useful for monitoring a small area with many nodes. WSN can be combined with another application, e.g. cloud, android, virtual private network, etc. The objective of this paper is to design flood detector system with WSN on two scenarios that are single hop and multi hop, then find two of these which the best. Single hop means no router node between coordinator node and end node and multi hop means there is router node between coordinator node and end node. After some test, this system has a maximum range in single hop at a distance of 95.1 meters and 185.5 meters when using multi hop's scenario. Error for fuzzy logic compare between manual calculation and prototype system is 3.04417493% and error overall system for its result is 5%. In the examination of the quality of the network, values of throughput obtained fairly stable but the result of delay values is unstable, the further the distance the higher the values of delay, on the contrary values of throughput getting lower. The power consumption is only 0.083 Watt/hour when the system in single hop and 0.06525 Watt/hour when the system in multi hop.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classification of intrusion detection system (IDS) based on computer network 基于计算机网络的入侵检测系统分类
D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan
Intrusion Detection System (IDS) is made as one of the solutions to handle security issues on the network in order to remain assured free of attack. IDS's work is developed by 2 models that using signature-based detection, how it works is limited to the pattern of attack behavior that has been defined in the database. The next is the Anomaly-based IDS model. It works by detects unusual activity of network in the normal conditions, but this model gives a lot of false positiv messages. Several previous studies have shown that the IDS approach with machine learning techniques can provide high accuracy results. The first step that must be done in the application of mechine learning technique is preprocessing the selection of features / attributes to optimize the performance of learning algorithms. In this study, intrusion detection system with mechine learning classification technique is proposed by using naivebayes algorithm with NSL-KDD dataset. The processes in this reseach start from normalization of data, discretization features continuous variables with k-means method and the selection of features using Information Gain algorithm. The result of this reseach shows that the application of k-means clustering method for continuous variabe discretization and feature selection can optimize the performance of naivebayes algorithm in classifying intrusion types.
入侵检测系统(IDS)是处理网络安全问题的解决方案之一,以确保网络不受攻击。IDS的工作是由两个模型开发的,使用基于签名的检测,它的工作方式仅限于数据库中定义的攻击行为模式。下一个是基于异常的IDS模型。它的工作原理是在正常情况下检测网络的异常活动,但该模型会产生大量的误报信息。之前的一些研究表明,IDS方法与机器学习技术可以提供高精度的结果。在机器学习技术的应用中必须完成的第一步是对特征/属性的选择进行预处理,以优化学习算法的性能。本文基于NSL-KDD数据集,采用朴素贝叶斯算法,提出了一种机器学习分类技术的入侵检测系统。本研究从数据归一化、用k-means方法对连续变量特征进行离散化、用Information Gain算法对特征进行选择开始。研究结果表明,将k-means聚类方法用于连续变量离散化和特征选择,可以优化朴素贝叶斯算法在入侵类型分类中的性能。
{"title":"Classification of intrusion detection system (IDS) based on computer network","authors":"D. Effendy, Kusrini Kusrini, Sudarmawan Sudarmawan","doi":"10.1109/ICITISEE.2017.8285566","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285566","url":null,"abstract":"Intrusion Detection System (IDS) is made as one of the solutions to handle security issues on the network in order to remain assured free of attack. IDS's work is developed by 2 models that using signature-based detection, how it works is limited to the pattern of attack behavior that has been defined in the database. The next is the Anomaly-based IDS model. It works by detects unusual activity of network in the normal conditions, but this model gives a lot of false positiv messages. Several previous studies have shown that the IDS approach with machine learning techniques can provide high accuracy results. The first step that must be done in the application of mechine learning technique is preprocessing the selection of features / attributes to optimize the performance of learning algorithms. In this study, intrusion detection system with mechine learning classification technique is proposed by using naivebayes algorithm with NSL-KDD dataset. The processes in this reseach start from normalization of data, discretization features continuous variables with k-means method and the selection of features using Information Gain algorithm. The result of this reseach shows that the application of k-means clustering method for continuous variabe discretization and feature selection can optimize the performance of naivebayes algorithm in classifying intrusion types.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster 在计算机集群中使用hadoop-BAM在map-reduce框架中处理下一代测序数据
Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni
Next-Generation Sequencing in bioinformatics produce a massive amount of data volume. Big data technologies are needed to reduce computation time in data processing. In this paper, we implement Hadoop Map-Reduce framework for processing Next-Generation Sequencing using Hadoop-BAM library. Our implementation process a Binary Alignment Map (BAM) file which contains a reference sequence and many aligned/not-aligned reads by spitting the BAM file into Hadoop data blocks. To process the BAM file in a computer cluster, we implement a mapper and a reducer of Hadoop Map-Reduce framework. The mapper processes the BAM file to produce key value pairs. While, the reducer summary the key value pairs into a meaningful output. Here the mapper and reducer are created to summarize the number of bases in a BAM file. We conduct the experiment in a LIPI Hadoop cluster. The cluster consists of 96 CPU cores. The result of our experiments show that our map-reduce implementations are gaining speed-up compare to serial Next-Generation Sequencing with Picard tools.
生物信息学中的下一代测序产生了大量的数据量。需要大数据技术来减少数据处理的计算时间。在本文中,我们使用Hadoop- bam库实现了Hadoop Map-Reduce框架来处理下一代测序。我们的实现过程是一个二进制对齐映射(BAM)文件,它包含一个引用序列和许多对齐/不对齐的读取,方法是将BAM文件放入Hadoop数据块中。为了在计算机集群中处理BAM文件,我们实现了Hadoop Map-Reduce框架的mapper和reducer。映射器处理BAM文件以生成键值对。同时,reducer将键值对汇总为有意义的输出。这里创建了映射器和减速器来汇总BAM文件中的碱基数量。我们在一个LIPI Hadoop集群中进行实验。集群共96个CPU核。我们的实验结果表明,与使用Picard工具的串行下一代测序相比,我们的map-reduce实现获得了更快的速度。
{"title":"Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster","authors":"Rifki Sadikin, Andria Arisal, Rofithah Omar, N. Mazni","doi":"10.1109/ICITISEE.2017.8285542","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285542","url":null,"abstract":"Next-Generation Sequencing in bioinformatics produce a massive amount of data volume. Big data technologies are needed to reduce computation time in data processing. In this paper, we implement Hadoop Map-Reduce framework for processing Next-Generation Sequencing using Hadoop-BAM library. Our implementation process a Binary Alignment Map (BAM) file which contains a reference sequence and many aligned/not-aligned reads by spitting the BAM file into Hadoop data blocks. To process the BAM file in a computer cluster, we implement a mapper and a reducer of Hadoop Map-Reduce framework. The mapper processes the BAM file to produce key value pairs. While, the reducer summary the key value pairs into a meaningful output. Here the mapper and reducer are created to summarize the number of bases in a BAM file. We conduct the experiment in a LIPI Hadoop cluster. The cluster consists of 96 CPU cores. The result of our experiments show that our map-reduce implementations are gaining speed-up compare to serial Next-Generation Sequencing with Picard tools.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm 采用3-DES、DWT和LSB混合方法的安全图像隐写算法
Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto
Public networks such as the Internet are becoming more sophisticated, faster, and cheaper, so that more and more used for information exchange. This may increase the likelihood of confidential information from being stolen and exploited by unauthorized persons. This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons. Messages are encrypted using the 3-DES method. On the other side of the cover image is decomposed into four subbands by using DWT. LH, HL, and HH subbands are chosen to embed encrypted message using LSB method. The last step, done Inverse DWT (IDWT) to get the stego image reconstruction. From the proposed method is then measured its quality with PSNR and MSE. As for message encryption results are measured using entropy. From the experiment results obtained PSNR results with a value of 55.30 dB for image messages size 64 ∗ 64 and 49.23 dB for messages size 128 ∗ 128. The extraction process can also be done perfectly with NC 1 and the average of Entropy of encrypted messages are 7.95754 for 64∗64 and 7.98904 for 128∗128.
Internet等公共网络正变得越来越复杂、更快、更便宜,因此越来越多地用于信息交换。这可能会增加机密信息被未经授权的人窃取和利用的可能性。本研究提出了两个隐写域与密码学的结合,旨在使机密信息更加安全,使未经授权的人无法访问。消息使用3-DES方法加密。另一方面,利用小波变换将封面图像分解为4个子带。采用LSB方法,选择LH、HL和HH子带嵌入加密报文。最后一步,进行逆小波变换(IDWT)得到隐去图像重建。然后用PSNR和MSE测量了该方法的质量。至于消息加密的结果是用熵来衡量的。实验结果表明,对于大小为64 * 64的图像消息,PSNR值为55.30 dB;对于大小为128 * 128的图像消息,PSNR值为49.23 dB。该提取过程也可以完美地使用nc1完成,并且加密消息的平均熵为64 * 64的7.95754和128 * 128的7.98904。
{"title":"Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm","authors":"Giovani Ardiansyah, D. Setiadi, C. A. Sari, E. H. Rachmawanto","doi":"10.1109/ICITISEE.2017.8285505","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285505","url":null,"abstract":"Public networks such as the Internet are becoming more sophisticated, faster, and cheaper, so that more and more used for information exchange. This may increase the likelihood of confidential information from being stolen and exploited by unauthorized persons. This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons. Messages are encrypted using the 3-DES method. On the other side of the cover image is decomposed into four subbands by using DWT. LH, HL, and HH subbands are chosen to embed encrypted message using LSB method. The last step, done Inverse DWT (IDWT) to get the stego image reconstruction. From the proposed method is then measured its quality with PSNR and MSE. As for message encryption results are measured using entropy. From the experiment results obtained PSNR results with a value of 55.30 dB for image messages size 64 ∗ 64 and 49.23 dB for messages size 128 ∗ 128. The extraction process can also be done perfectly with NC 1 and the average of Entropy of encrypted messages are 7.95754 for 64∗64 and 7.98904 for 128∗128.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
MPPT-current fed push pull converter for DC bus source on solar home application mpt馈流推挽变换器在太阳能家用直流母线电源中的应用
Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto
This paper presents the design of MPPT-current fed push-pull converter. Because of the high step-up transformer ratio and the transformer works at high frequencies, the converter is suitable for low voltage photovoltaic applications. Photovoltaic is a renewable energy that has several advantages, i.e., no pollution (no emissions), no noise, little maintenance and an abundant resource. The photovoltaic used in this study was 300Wp with a DC Bus of 400V. To optimize the working of photovoltaic used MPPT technique. The MPPT technique chosen is Perturbation and Observe. In the proposed converter, an inductor installed on the input side serves as a voltage boost so that the transformer ratio is not too high.
本文介绍了mpt馈流推挽变换器的设计。由于变换器的升压比高,且变压器工作频率高,因此适合低压光伏应用。光伏是一种可再生能源,具有无污染(无排放)、无噪音、维护少、资源丰富等优点。本研究使用的光伏为300Wp,直流母线为400V。利用MPPT技术优化光伏的工作。选择的MPPT技术是摄动和观察。在建议的转换器中,安装在输入侧的电感器作为电压升压,使变压器比不会太高。
{"title":"MPPT-current fed push pull converter for DC bus source on solar home application","authors":"Syechu Dwitya Nugraha, O. Qudsi, D. S. Yanaratri, Epyk Sunarno, I. Sudiharto","doi":"10.1109/ICITISEE.2017.8285532","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285532","url":null,"abstract":"This paper presents the design of MPPT-current fed push-pull converter. Because of the high step-up transformer ratio and the transformer works at high frequencies, the converter is suitable for low voltage photovoltaic applications. Photovoltaic is a renewable energy that has several advantages, i.e., no pollution (no emissions), no noise, little maintenance and an abundant resource. The photovoltaic used in this study was 300Wp with a DC Bus of 400V. To optimize the working of photovoltaic used MPPT technique. The MPPT technique chosen is Perturbation and Observe. In the proposed converter, an inductor installed on the input side serves as a voltage boost so that the transformer ratio is not too high.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Arabic speech recognition using MFCC feature extraction and ANN classification 基于MFCC特征提取和ANN分类的阿拉伯语语音识别
E. S. Wahyuni
This research addresses a challenging issue that is to recognize spoken Arabic letters, that are three letters of hijaiyah that have indentical pronounciation when pronounced by Indonesian speakers but actually has different makhraj in Arabic, the letters are sa, sya and tsa. The research uses Mel-Frequency Cepstral Coefficients (MFCC) based feature extraction and Artificial Neural Network (ANN) classification method. The result shows the proposed method obtain a good accuracy with an average acuracy is 92.42%, with recognition accuracy each letters (sa, sya, and tsa) prespectivly 92.38%, 93.26% and 91.63%.
本研究解决了一个具有挑战性的问题,即识别阿拉伯语口语字母,即hijaiyah的三个字母,在印度尼西亚人发音时具有相同的发音,但实际上在阿拉伯语中具有不同的makhraj,字母是sa, sya和tsa。研究采用基于Mel-Frequency倒谱系数(MFCC)的特征提取和人工神经网络(ANN)分类方法。结果表明,该方法获得了较好的准确率,平均准确率为92.42%,其中每个字母(sa、sya和tsa)的识别准确率分别为92.38%、93.26%和91.63%。
{"title":"Arabic speech recognition using MFCC feature extraction and ANN classification","authors":"E. S. Wahyuni","doi":"10.1109/ICITISEE.2017.8285499","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285499","url":null,"abstract":"This research addresses a challenging issue that is to recognize spoken Arabic letters, that are three letters of hijaiyah that have indentical pronounciation when pronounced by Indonesian speakers but actually has different makhraj in Arabic, the letters are sa, sya and tsa. The research uses Mel-Frequency Cepstral Coefficients (MFCC) based feature extraction and Artificial Neural Network (ANN) classification method. The result shows the proposed method obtain a good accuracy with an average acuracy is 92.42%, with recognition accuracy each letters (sa, sya, and tsa) prespectivly 92.38%, 93.26% and 91.63%.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Improving organizational agility of micro, small, and medium enterprises through digital marketing strategy 通过数字营销策略提高中小微企业的组织敏捷性
Sandy Kosasi, Vedyanto, I. Yuliani
The business success of Micro, Small, and Medium Enterprises (MSMEs) is determined by capital assets and capabilities to adopt innovation of social media technology to formulate digital marketing strategy improving organizational agility. The vastly developing content of social media becomes an opportunity ensuring more agile organizations in the accessibility of target markets. Problems of this research proposal are formulated (a) to propose a new research model on influences of innovation adoption of social media technology on digital marketing strategy in improving organizational agility of MSMEs and (b) to design hypothetical tests to cognize the influence of each latent variable. The research aims to identify and analyze to what extent digital marketing strategy can improve organizational agility of MSMEs in Pontianak, Indonesia. The combination of a convergent triangulation model and a follow-up, explanatory design is used. The sample including 55 MSMEs is determined by using Slovin Formula and a simple random sampling technique. 5 informants are selected at a sampling site by using a purposive sampling technique. The novelty of this research is on influences of antecedent variables aiming to improve organizational agility of businesses of MSMEs digitally.
中小微企业(MSMEs)的商业成功取决于资本资产和采用社交媒体技术创新制定数字营销策略的能力,从而提高组织的敏捷性。不断发展的社交媒体内容成为确保更灵活的组织进入目标市场的机会。本研究计划的问题是:(a)提出一个新的研究模型,研究社交媒体技术创新采用对数字营销策略在提高中小微企业组织敏捷性方面的影响;(b)设计假设检验,以认识每个潜在变量的影响。本研究旨在识别和分析数字营销策略在多大程度上可以提高印尼Pontianak中小微企业的组织敏捷性。采用了收敛三角模型和后续解释设计相结合的方法。采用斯洛文公式和简单随机抽样技术确定55家中小微企业样本。通过使用有目的的抽样技术在抽样地点选择举报人。本研究的新颖之处在于前因变量对中小微企业数字化组织敏捷性的影响。
{"title":"Improving organizational agility of micro, small, and medium enterprises through digital marketing strategy","authors":"Sandy Kosasi, Vedyanto, I. Yuliani","doi":"10.1109/ICITISEE.2017.8285561","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285561","url":null,"abstract":"The business success of Micro, Small, and Medium Enterprises (MSMEs) is determined by capital assets and capabilities to adopt innovation of social media technology to formulate digital marketing strategy improving organizational agility. The vastly developing content of social media becomes an opportunity ensuring more agile organizations in the accessibility of target markets. Problems of this research proposal are formulated (a) to propose a new research model on influences of innovation adoption of social media technology on digital marketing strategy in improving organizational agility of MSMEs and (b) to design hypothetical tests to cognize the influence of each latent variable. The research aims to identify and analyze to what extent digital marketing strategy can improve organizational agility of MSMEs in Pontianak, Indonesia. The combination of a convergent triangulation model and a follow-up, explanatory design is used. The sample including 55 MSMEs is determined by using Slovin Formula and a simple random sampling technique. 5 informants are selected at a sampling site by using a purposive sampling technique. The novelty of this research is on influences of antecedent variables aiming to improve organizational agility of businesses of MSMEs digitally.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Heuristic evaluation of online satisfaction survey system for public healthcare service: Applying analytical hierarchical process 公共卫生服务在线满意度调查系统的启发式评价:应用层次分析法
S. Yusoh, Sureena Matayong
This paper aims to evaluate usability factors of online satisfaction survey system for public healthcare service. The evaluation was performed to analyze issues of usability factors, which is relevant to user interface design by applying Analysis Hierarchy Process (AHP) to prioritize their level of challenges. The study focuses on 10 Jakob Nielsen's heuristics principles as main usability factors. Based on main factors, 43 sub-factors are determined. Relevant data was collected through questionnaires by surveying 24 persons, including programmers, system analyst, students, lecturers, and general users. Next, researchers calculated values of data by using Expert Choice. The result shows the first 5 levels of usability factors that are challenges in a form of percentage rate respectively. The factors of recognition rather than recall (81%); help users recognize, diagnose, and recover from errors (78%); match between system and real world (77%); user control and freedom (76%) and consistency and standards (74%). The challenge rate of all usability factors reveal 72% while non-challenge rate is only 28%. From the result of this study we can conclude that existing online applications of satisfaction survey system for public healthcare service need to be improved. The improvement can be taken by prioritizing the usability factors based on level of challenges that found in this study.
本文旨在评价公共卫生服务在线满意度调查系统的可用性因素。运用层次分析法(AHP)对与用户界面设计相关的可用性因素进行排序,分析其存在的问题。该研究将10个Jakob Nielsen的启发式原则作为主要的可用性因素。在主因子的基础上,确定了43个子因子。通过对程序员、系统分析员、学生、讲师、普通用户等24人进行问卷调查,收集相关数据。接下来,研究人员使用Expert Choice计算数据值。结果显示,前5个级别的可用性因素分别以百分比的形式构成挑战。记忆因素为识别因素,而非回忆因素(81%);帮助用户识别、诊断错误并从错误中恢复(78%);系统与现实世界的匹配度(77%);用户控制和自由(76%),一致性和标准(74%)。所有可用性因素的挑战率为72%,而非挑战率仅为28%。从本研究的结果可以看出,现有的公共医疗服务满意度调查系统的在线应用需要改进。改进可以通过根据本研究中发现的挑战级别对可用性因素进行优先级排序来实现。
{"title":"Heuristic evaluation of online satisfaction survey system for public healthcare service: Applying analytical hierarchical process","authors":"S. Yusoh, Sureena Matayong","doi":"10.1109/ICITISEE.2017.8285551","DOIUrl":"https://doi.org/10.1109/ICITISEE.2017.8285551","url":null,"abstract":"This paper aims to evaluate usability factors of online satisfaction survey system for public healthcare service. The evaluation was performed to analyze issues of usability factors, which is relevant to user interface design by applying Analysis Hierarchy Process (AHP) to prioritize their level of challenges. The study focuses on 10 Jakob Nielsen's heuristics principles as main usability factors. Based on main factors, 43 sub-factors are determined. Relevant data was collected through questionnaires by surveying 24 persons, including programmers, system analyst, students, lecturers, and general users. Next, researchers calculated values of data by using Expert Choice. The result shows the first 5 levels of usability factors that are challenges in a form of percentage rate respectively. The factors of recognition rather than recall (81%); help users recognize, diagnose, and recover from errors (78%); match between system and real world (77%); user control and freedom (76%) and consistency and standards (74%). The challenge rate of all usability factors reveal 72% while non-challenge rate is only 28%. From the result of this study we can conclude that existing online applications of satisfaction survey system for public healthcare service need to be improved. The improvement can be taken by prioritizing the usability factors based on level of challenges that found in this study.","PeriodicalId":130873,"journal":{"name":"2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1