Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712094
Koredianto Usman, H. Gunawan, A. B. Suksmono
Recently, there are a lot of study of direction of arrival (DoA) estimation using compressive sensing (CS). As CS is a new paradigm in signal processing, there are many aspects of this method that can be investigated. In the case of DoA estimation in noisy measurement, it is important to correctly determine a correct threshold of CS reconstruction, particularly when CS reconstruction is implemented using L1-norm minimization. Too small threshold value will make the correct DoA does not lies in CS reconstruction searching area, while too large threshold value will burden CS iteration to select a solution from a large number of possible solutions. In this paper, we derived an optimal threshold value for CS reconstruction for DoA estimation mathematically and verified the result using computer simulation. Using Gaussian noise model, we obtain the chi-square distribution of euclidean distance of noisy and noiseless received vector. We introduce the thresholding index κ to scale the standard deviation of chi-square distribution to determine the CS reconstruction threshold and simulate this value for various SNR. We find that the optimal κ value 0.5 to 1 for high noise environment, and optimal κ value 1 to 2 in low noise environment.
{"title":"Optimal Thresholding for Direction of Arrival Estimation using Compressive Sensing","authors":"Koredianto Usman, H. Gunawan, A. B. Suksmono","doi":"10.1109/ICCEREC.2018.8712094","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712094","url":null,"abstract":"Recently, there are a lot of study of direction of arrival (DoA) estimation using compressive sensing (CS). As CS is a new paradigm in signal processing, there are many aspects of this method that can be investigated. In the case of DoA estimation in noisy measurement, it is important to correctly determine a correct threshold of CS reconstruction, particularly when CS reconstruction is implemented using L1-norm minimization. Too small threshold value will make the correct DoA does not lies in CS reconstruction searching area, while too large threshold value will burden CS iteration to select a solution from a large number of possible solutions. In this paper, we derived an optimal threshold value for CS reconstruction for DoA estimation mathematically and verified the result using computer simulation. Using Gaussian noise model, we obtain the chi-square distribution of euclidean distance of noisy and noiseless received vector. We introduce the thresholding index κ to scale the standard deviation of chi-square distribution to determine the CS reconstruction threshold and simulate this value for various SNR. We find that the optimal κ value 0.5 to 1 for high noise environment, and optimal κ value 1 to 2 in low noise environment.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8711989
Muthia Dwifarina Arza, Yuyun Siti Rohmah, R. Anwar
Recently the development of technology in telecommunications system, especially Digital Television (DTV), is growing very rapidly. In Indonesia, the adopted technology is Digital Video Broadcasting Terrestrial Second generation (DVB-T2) and has been utilized since 2012. It uses the UHF frequency range that is same with analog television. One device that is used to support DVB-T2 application is the antenna. It should inherit wide enough bandwidth as well as high gain to obtain good performance in receiving the DTV signal. In this paper, design of a linear triangular microstrip patch array antenna for DTV application is proposed. The design is adopting CPW-fed, parasitic patch and air gap methods to obtain wide bandwidth and relatively high gain. The proposed antenna has been fabricated and measured. The actual obtained bandwidth of this antenna is about 400.2 MHz. The value of VSWR, return loss and gain is of about 1.25, −18.79 dB, 3.21 dBi respectively, and has a unidirectional radiation pattern with elliptical polarization. The proposed antenna has been used to receive DTV signals and showed good results.
{"title":"Design and Realization of Linear Array Triangular Patch Microstrip Antenna for Digital Television","authors":"Muthia Dwifarina Arza, Yuyun Siti Rohmah, R. Anwar","doi":"10.1109/ICCEREC.2018.8711989","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8711989","url":null,"abstract":"Recently the development of technology in telecommunications system, especially Digital Television (DTV), is growing very rapidly. In Indonesia, the adopted technology is Digital Video Broadcasting Terrestrial Second generation (DVB-T2) and has been utilized since 2012. It uses the UHF frequency range that is same with analog television. One device that is used to support DVB-T2 application is the antenna. It should inherit wide enough bandwidth as well as high gain to obtain good performance in receiving the DTV signal. In this paper, design of a linear triangular microstrip patch array antenna for DTV application is proposed. The design is adopting CPW-fed, parasitic patch and air gap methods to obtain wide bandwidth and relatively high gain. The proposed antenna has been fabricated and measured. The actual obtained bandwidth of this antenna is about 400.2 MHz. The value of VSWR, return loss and gain is of about 1.25, −18.79 dB, 3.21 dBi respectively, and has a unidirectional radiation pattern with elliptical polarization. The proposed antenna has been used to receive DTV signals and showed good results.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8711988
Simon Siregar, Ismail bin Ibrahim, Muhammad Ikhsan Sani, Marlindia Ike Sari
Wheeled robot soccer is a soccer robot that moves with wheels with several capabilities, such as detecting, catching, dribbling, and kicking a ball. A robot soccer requires a system or sensor to detect a ball. The development of computer vision technology enables a computer system to detect a ball using computer vision algorithm. In this research, the system consisting of a camera and a single board computer. The camera is used to capture an image and the single board computer is used to process the image to get ball position on the image. The ball position information is then processed to map the position of the ball. After that, the information of mapping is sent to the robot controller and process it into a movement. Experiments result show that the robot with the designed system is function as designed.
{"title":"Design of Computer Vision Based Ball Detection System on Wheeled Robot Soccer","authors":"Simon Siregar, Ismail bin Ibrahim, Muhammad Ikhsan Sani, Marlindia Ike Sari","doi":"10.1109/ICCEREC.2018.8711988","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8711988","url":null,"abstract":"Wheeled robot soccer is a soccer robot that moves with wheels with several capabilities, such as detecting, catching, dribbling, and kicking a ball. A robot soccer requires a system or sensor to detect a ball. The development of computer vision technology enables a computer system to detect a ball using computer vision algorithm. In this research, the system consisting of a camera and a single board computer. The camera is used to capture an image and the single board computer is used to process the image to get ball position on the image. The ball position information is then processed to map the position of the ball. After that, the information of mapping is sent to the robot controller and process it into a movement. Experiments result show that the robot with the designed system is function as designed.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122752962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712098
V. Suryani, S. Sulistyo, Widyawan
The Internet of Things (IoT) objects can behave as a harmless or a harmful object while interacting with other. Harmful behavior can be described as an object launching a trust-based attack or an on-off attack to other. In trust management environment, the detection of harmless and harmful behavior of an object is an important issue to create a safe IoT environment. In this paper, we propose a method to detect the on-off attacks for IoT objects. The proposed method consists of the process of detecting a trust-based attack and on-off attack that might be carried out by an object, process of limiting the number of those attacks, and finally blocking the attacker object. The simulation results showed that this method is quite feasible to be applied to IoT objects and capable of producing a fairly short detection time.
{"title":"The Detection of On-Off Attacks for the Internet of Things Objects","authors":"V. Suryani, S. Sulistyo, Widyawan","doi":"10.1109/ICCEREC.2018.8712098","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712098","url":null,"abstract":"The Internet of Things (IoT) objects can behave as a harmless or a harmful object while interacting with other. Harmful behavior can be described as an object launching a trust-based attack or an on-off attack to other. In trust management environment, the detection of harmless and harmful behavior of an object is an important issue to create a safe IoT environment. In this paper, we propose a method to detect the on-off attacks for IoT objects. The proposed method consists of the process of detecting a trust-based attack and on-off attack that might be carried out by an object, process of limiting the number of those attacks, and finally blocking the attacker object. The simulation results showed that this method is quite feasible to be applied to IoT objects and capable of producing a fairly short detection time.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125685735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712106
Koredianto Usman, R. Magdalena, M. Ramdhani
Sparse-based reconstruction for direction of arrival estimation (DoA) offers an advantage of small data size compared to the conventional DoA estimation algorithm such as MVDR, MUSIC, or ESPRIT. Sparse-based reconstruction algorithm can even estimated the DoA using one snapshot. Given this advantage, the sparse-based reconstruction algorithms such as $L$1-norm minimization using CVX-programming or greedy algorithm usually suffers in high noise environment (low SNR) which manifest by a lot of false spikes in DoA estimation spectrum. In this paper we proposed two-stages sparse reconstruction method to estimate the DoA to mitigate this problem. In this scheme, DoA is estimated twice using a greedy based algorithm to get a high resolution DoA estimate, and then the false spikes are removed using the L1 - L2 algorithm. Compared to the conventional method, the proposed method has advantage of much smaller data and robust in low noise condition.
{"title":"Direction of Arrival Estimation in Low SNR Environment using Two Stages Sparse Reconstruction","authors":"Koredianto Usman, R. Magdalena, M. Ramdhani","doi":"10.1109/ICCEREC.2018.8712106","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712106","url":null,"abstract":"Sparse-based reconstruction for direction of arrival estimation (DoA) offers an advantage of small data size compared to the conventional DoA estimation algorithm such as MVDR, MUSIC, or ESPRIT. Sparse-based reconstruction algorithm can even estimated the DoA using one snapshot. Given this advantage, the sparse-based reconstruction algorithms such as $L$1-norm minimization using CVX-programming or greedy algorithm usually suffers in high noise environment (low SNR) which manifest by a lot of false spikes in DoA estimation spectrum. In this paper we proposed two-stages sparse reconstruction method to estimate the DoA to mitigate this problem. In this scheme, DoA is estimated twice using a greedy based algorithm to get a high resolution DoA estimate, and then the false spikes are removed using the L1 - L2 algorithm. Compared to the conventional method, the proposed method has advantage of much smaller data and robust in low noise condition.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712089
S. N. Indriani, Pinto Anugrah
The objective of this study is to analyse the feasibility study of off-grid photovoltaic (PV) system to replace diesel generator in remote areas. Sungai Cemara village in Jambi, Indonesia was chosen as a case study to represent a remote area where there is no access to electricity from the main grid. A model is developed using HOMER software to calculate the optimum theoretical power output of PV system as well as PV sizing and arrays. An economic analysis was also performed in this study including the payback period calculation. Results showed that 132 kWp off-grid PV system is able to electrify 105 households in Sungai Cemara village with annual load 92.7 MWh. With a payback time period of 13 years, it is proved that installing PV system to replace diesel generator is financially feasible for the village.
{"title":"Design and Economic Analysis of Off-grid PV System for Diesel Abatement in Remote Areas: Case Study of Indonesia","authors":"S. N. Indriani, Pinto Anugrah","doi":"10.1109/ICCEREC.2018.8712089","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712089","url":null,"abstract":"The objective of this study is to analyse the feasibility study of off-grid photovoltaic (PV) system to replace diesel generator in remote areas. Sungai Cemara village in Jambi, Indonesia was chosen as a case study to represent a remote area where there is no access to electricity from the main grid. A model is developed using HOMER software to calculate the optimum theoretical power output of PV system as well as PV sizing and arrays. An economic analysis was also performed in this study including the payback period calculation. Results showed that 132 kWp off-grid PV system is able to electrify 105 households in Sungai Cemara village with annual load 92.7 MWh. With a payback time period of 13 years, it is proved that installing PV system to replace diesel generator is financially feasible for the village.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712107
I. Wijayanto, S. Hadiyoso, Teguh Musaharpa Gunawan
Recently, three dimensional (3D) scanner is a continuous developing scanning technology. There are several approaches used in this technology. The first approach is by using a depth camera and the second approach is by using laser and a standard camera. Previous research had been done to develop a dual laser 3D scanner which able to scan an object with maximum size is 15×15×15 cm. By using cloud to cloud merging method, the result is quite satisfying, and it can scan a physical object and convert it to a 3D digital object with the level of size precision is more than 98%. In this research, we improve the prototype to achieve faster time processing. We change the main scanning method from using image per step into video recording. We make some adjustment to signal processing algorithm, and in result, we achieve better time processing. The time processing is reduced more than 50% of the previous research and the scale precision also getting better.
{"title":"Video Processing for Dual Laser 3D Scanner Prototype based on Cloud to Cloud Method","authors":"I. Wijayanto, S. Hadiyoso, Teguh Musaharpa Gunawan","doi":"10.1109/ICCEREC.2018.8712107","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712107","url":null,"abstract":"Recently, three dimensional (3D) scanner is a continuous developing scanning technology. There are several approaches used in this technology. The first approach is by using a depth camera and the second approach is by using laser and a standard camera. Previous research had been done to develop a dual laser 3D scanner which able to scan an object with maximum size is 15×15×15 cm. By using cloud to cloud merging method, the result is quite satisfying, and it can scan a physical object and convert it to a 3D digital object with the level of size precision is more than 98%. In this research, we improve the prototype to achieve faster time processing. We change the main scanning method from using image per step into video recording. We make some adjustment to signal processing algorithm, and in result, we achieve better time processing. The time processing is reduced more than 50% of the previous research and the scale precision also getting better.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8711993
Nandya Alfarisi Nugraha, Budhi Irawan, Anggunmeka Luhur Prasasti
Singapore became one of the favorite tourist destinations, this is because any destination can be provided in Singapore such as shopping, culinary, history, and festivals. Not only that, in Singapore the crime rate is low. For the first travelers to Singapore, it is difficult to distinguish the authenticity of Singapore banknotes, especially if the traveler is a person with a disability like visually impaired person. In this research designed an android based mobile application using Oriented FAST and Rotated BRIEF (ORB) method which can introduce the banknotes of singapore and also know the authenticity of the banknotes. The information provided to users includes the nominal, names, and authenticity of banknotes in Indonesian in the form of text and sound. With this application users can recognize and know the currency of singapore in a relatively easier way. Based on the test, the application has an accuracy of 83% and has an average response time of 6 seconds.
{"title":"Singapore Dollar Recognition Using ORB Feature Based on Android","authors":"Nandya Alfarisi Nugraha, Budhi Irawan, Anggunmeka Luhur Prasasti","doi":"10.1109/ICCEREC.2018.8711993","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8711993","url":null,"abstract":"Singapore became one of the favorite tourist destinations, this is because any destination can be provided in Singapore such as shopping, culinary, history, and festivals. Not only that, in Singapore the crime rate is low. For the first travelers to Singapore, it is difficult to distinguish the authenticity of Singapore banknotes, especially if the traveler is a person with a disability like visually impaired person. In this research designed an android based mobile application using Oriented FAST and Rotated BRIEF (ORB) method which can introduce the banknotes of singapore and also know the authenticity of the banknotes. The information provided to users includes the nominal, names, and authenticity of banknotes in Indonesian in the form of text and sound. With this application users can recognize and know the currency of singapore in a relatively easier way. Based on the test, the application has an accuracy of 83% and has an average response time of 6 seconds.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117231371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8712096
Chris Joseph Sagario, Benjamin Quidlat, Kister Genesis Jimenez, Ingrid B. Escabal, A. Lowaton, J. Hora
This paper focuses on the bit lines in the design of a single-poly flash memory cell during program operation. A conventional flash memory cell uses a floating gate transistor where an extra layer is added between the gate and substrate of the standard MOSFET. This incurs additional process step during fabrication, increasing the cost of the design. The single poly embedded flash memory cell is quite an attractive solution for non-volatile memory applications since it doesn't require any additional process steps. A 5T single-poly flash memory cell was implemented under TSMC 65nm CMOS Process. During program mode of a single-poly flash memory, all the pull-up PMOS of every single cell are turned on even if some of the cells are not to be programmed, causing a short path between the source and ground thus generating static power dissipation. In this paper, power gating technique was being applied to the bit lines. The size of the PMOS were taken for both design and it was found out that in power-gated, the size of the PMOS didn't really affect the power dissipated. The results from comparing each design showed that with power gating method, the static power dissipation was transformed into dynamic power dissipation, reducing power consumption by about 80%. The cell's dimensions are 14.015 µm x 1.930 µm, achieving an area of 27.05 µm2.
本文重点研究了单多晶快闪存储单元在程序操作过程中的位线设计。传统的闪存单元使用浮栅晶体管,在标准MOSFET的栅极和衬底之间增加一层。这在制造过程中产生了额外的工艺步骤,增加了设计成本。对于非易失性存储器应用来说,单聚嵌入式闪存单元是一个非常有吸引力的解决方案,因为它不需要任何额外的工艺步骤。采用台积电65nm CMOS工艺实现了5T单聚快闪存储单元。在单多晶快闪记忆体编程模式下,即使部分单元不进行编程,但每个单元的所有上拉PMOS都导通,造成源地间短路,产生静态功耗。本文将功率门控技术应用于位线。两种设计都采用了PMOS的尺寸,并发现在功率门控中,PMOS的尺寸并没有真正影响功耗。对比各设计结果表明,采用功率门控方法,将静态功耗转化为动态功耗,功耗降低80%左右。电池的尺寸为14.015 μ m x 1.930 μ m,面积为27.05 μ m2。
{"title":"Design of Single Poly Flash Memory Cell with Power Reduction Technique at Program Mode in 65nm CMOS Process","authors":"Chris Joseph Sagario, Benjamin Quidlat, Kister Genesis Jimenez, Ingrid B. Escabal, A. Lowaton, J. Hora","doi":"10.1109/ICCEREC.2018.8712096","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8712096","url":null,"abstract":"This paper focuses on the bit lines in the design of a single-poly flash memory cell during program operation. A conventional flash memory cell uses a floating gate transistor where an extra layer is added between the gate and substrate of the standard MOSFET. This incurs additional process step during fabrication, increasing the cost of the design. The single poly embedded flash memory cell is quite an attractive solution for non-volatile memory applications since it doesn't require any additional process steps. A 5T single-poly flash memory cell was implemented under TSMC 65nm CMOS Process. During program mode of a single-poly flash memory, all the pull-up PMOS of every single cell are turned on even if some of the cells are not to be programmed, causing a short path between the source and ground thus generating static power dissipation. In this paper, power gating technique was being applied to the bit lines. The size of the PMOS were taken for both design and it was found out that in power-gated, the size of the PMOS didn't really affect the power dissipated. The results from comparing each design showed that with power gating method, the static power dissipation was transformed into dynamic power dissipation, reducing power consumption by about 80%. The cell's dimensions are 14.015 µm x 1.930 µm, achieving an area of 27.05 µm2.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICCEREC.2018.8711992
Desdwyatma Wahyu Wibawa, Muhammad Nasrun, C. Setianingsih
In today's modern era, social media is very close to people's lives. For each person can have up to more than 2 accounts for each social media such as Twitter, Instagram, Facebook, LINE, Path, and so forth. This makes the social media as the largest data collection of opinion from the public or internet users. To be able to retrieve data and draw conclusions of positive and negative values of an opinion on social media then do analysis of sentiment. The author analyzed the sentiments on the satisfaction of the telecommunication operator service users to the telecommunication service provider in Indonesia from each of their own official accounts or by using keywords related to telecommunication service providers in Indonesia. In performing the analysis, the author will use K-Nearest Neighbor (K-NN) analysis method with TF-IDF and Part-of-Speech (POS) Tagging. The results of this study obtained the average value of Precision 92,21 %, Recall 93,74%, F1-score 92,20%, and Accuracy 98,94%.
{"title":"Sentiment Analysis on User Satisfaction Level of Cellular Data Service Using the K-Nearest Neighbor (K-NN) Algorithm","authors":"Desdwyatma Wahyu Wibawa, Muhammad Nasrun, C. Setianingsih","doi":"10.1109/ICCEREC.2018.8711992","DOIUrl":"https://doi.org/10.1109/ICCEREC.2018.8711992","url":null,"abstract":"In today's modern era, social media is very close to people's lives. For each person can have up to more than 2 accounts for each social media such as Twitter, Instagram, Facebook, LINE, Path, and so forth. This makes the social media as the largest data collection of opinion from the public or internet users. To be able to retrieve data and draw conclusions of positive and negative values of an opinion on social media then do analysis of sentiment. The author analyzed the sentiments on the satisfaction of the telecommunication operator service users to the telecommunication service provider in Indonesia from each of their own official accounts or by using keywords related to telecommunication service providers in Indonesia. In performing the analysis, the author will use K-Nearest Neighbor (K-NN) analysis method with TF-IDF and Part-of-Speech (POS) Tagging. The results of this study obtained the average value of Precision 92,21 %, Recall 93,74%, F1-score 92,20%, and Accuracy 98,94%.","PeriodicalId":250054,"journal":{"name":"2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}