首页 > 最新文献

2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)最新文献

英文 中文
Recovery System using SDN Technology for Cyber Attack Solution 基于SDN技术的网络攻击恢复系统解决方案
R. Umar, Ridho Surya Kusuma
Corporate organizations, governments and public services seek to protect their valuable assets such as databases from cyberattacks. Attacks on security systems allow breaches, theft, and manipulation of data. Therefore, a system is needed to reduce vulnerabilities and threats. The security model implemented is the implementation of laws that guarantee data protection, blockchain, and authentication. This study offers designers a recovery system prototype that uses network management based on Software-Defined Networking (SDN) technology. The SDN technology applied is Ryu Controller, which allows access to specific databases in a specially programmed network. This research phase begins with needs analysis, virtual environment, examination, analysis, and cyber-attack testing. The results obtained in this study successfully implemented a recovery system with a total time for backing up four servers in one period was ±90 minutes, and the recovery time was ±90 minutes. Based on this, this research is fit for the purpose and can be used to reduce cyberattacks.
企业组织、政府和公共服务机构都在寻求保护其数据库等宝贵资产免受网络攻击。对安全系统的攻击允许破坏、盗窃和操纵数据。因此,需要一个系统来减少漏洞和威胁。实施的安全模型是实施保证数据保护、区块链和身份验证的法律。本研究为设计人员提供了一个使用基于软件定义网络(SDN)技术的网络管理的恢复系统原型。应用的SDN技术是Ryu Controller,它允许访问特定编程网络中的特定数据库。这个研究阶段从需求分析、虚拟环境、检查、分析和网络攻击测试开始。本研究结果成功实现了一个恢复系统,一个周期内备份4台服务器的总时间为±90分钟,恢复时间为±90分钟。基于此,本研究符合目的,可以用于减少网络攻击。
{"title":"Recovery System using SDN Technology for Cyber Attack Solution","authors":"R. Umar, Ridho Surya Kusuma","doi":"10.23919/eecsi53397.2021.9624278","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624278","url":null,"abstract":"Corporate organizations, governments and public services seek to protect their valuable assets such as databases from cyberattacks. Attacks on security systems allow breaches, theft, and manipulation of data. Therefore, a system is needed to reduce vulnerabilities and threats. The security model implemented is the implementation of laws that guarantee data protection, blockchain, and authentication. This study offers designers a recovery system prototype that uses network management based on Software-Defined Networking (SDN) technology. The SDN technology applied is Ryu Controller, which allows access to specific databases in a specially programmed network. This research phase begins with needs analysis, virtual environment, examination, analysis, and cyber-attack testing. The results obtained in this study successfully implemented a recovery system with a total time for backing up four servers in one period was ±90 minutes, and the recovery time was ±90 minutes. Based on this, this research is fit for the purpose and can be used to reduce cyberattacks.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Multi-Controller Locations in SDWAN using Various Method 基于多种方法的SDWAN多控制器位置优化
Victor Lamboy Sinaga, R. F. Sari
Software Define Wide Area Network (SDWAN) is a solution for utilizing technology in sending information. SDWAN is designed by separating the control plane and data plane by applying the Software Define Network (SDN) concept; therefore, it can use physical devices more effectively and efficiently. With many nodes and spread, node grouping is needed to facilitate control and supervision that requires a controller in each cluster. Installing many nodes on SDWAN will require several controllers to make it more effective and efficient placement. Optimal controller placement will improve the performance of the network. In this study, determining the optimal controller location requires various methods that are interconnected with each other. The algorithms used are the Haversine method, Johnson's Algorithm, Partition Around Medoids (PAM), and Silhouette Analysis. The number of nodes and locations obtained from Zootopology in this research using the Indonesia Biznet network, therefore the recommendation for the optimal number of controllers is obtained using the Silhouette, Gap, Calinski-Harabasz, and Davies-Bouldien evaluation methods. The algorithms aim to get the optimal point by determining the number of controllers and recommendations for the optimal number of controllers as an initial recommendation for a company that uses this method. In this study, the most optimal number of controllers on the Biznet network with 29 nodes were two controllers and an average value of Silhouette analysis calculation of 0.51846.
软件定义广域网(SDWAN)是一种利用技术发送信息的解决方案。SDWAN采用软件定义网络(SDN)的概念,将控制平面和数据平面分离;因此,它可以更有效和高效地利用物理设备。由于节点众多且分布广泛,因此需要对节点进行分组,以便于在每个集群中都需要一个控制器的控制和监督。在SDWAN上安装许多节点将需要几个控制器,以使其更有效和高效地放置。最优的控制器布局将提高网络的性能。在本研究中,确定最优控制器位置需要多种方法相互联系。所使用的算法是Haversine方法、Johnson算法、围绕媒质分割(PAM)和轮廓分析。本研究使用印度尼西亚Biznet网络从Zootopology中获得的节点数量和位置,因此使用Silhouette, Gap, Calinski-Harabasz和Davies-Bouldien评估方法获得最佳控制器数量的建议。该算法的目标是通过确定控制器的数量来获得最优点,并将最优控制器数量作为对使用该方法的公司的初始推荐。在本研究中,在29个节点的Biznet网络中,最优控制器数为2个控制器,剪影分析计算的平均值为0.51846。
{"title":"Optimization of Multi-Controller Locations in SDWAN using Various Method","authors":"Victor Lamboy Sinaga, R. F. Sari","doi":"10.23919/eecsi53397.2021.9624264","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624264","url":null,"abstract":"Software Define Wide Area Network (SDWAN) is a solution for utilizing technology in sending information. SDWAN is designed by separating the control plane and data plane by applying the Software Define Network (SDN) concept; therefore, it can use physical devices more effectively and efficiently. With many nodes and spread, node grouping is needed to facilitate control and supervision that requires a controller in each cluster. Installing many nodes on SDWAN will require several controllers to make it more effective and efficient placement. Optimal controller placement will improve the performance of the network. In this study, determining the optimal controller location requires various methods that are interconnected with each other. The algorithms used are the Haversine method, Johnson's Algorithm, Partition Around Medoids (PAM), and Silhouette Analysis. The number of nodes and locations obtained from Zootopology in this research using the Indonesia Biznet network, therefore the recommendation for the optimal number of controllers is obtained using the Silhouette, Gap, Calinski-Harabasz, and Davies-Bouldien evaluation methods. The algorithms aim to get the optimal point by determining the number of controllers and recommendations for the optimal number of controllers as an initial recommendation for a company that uses this method. In this study, the most optimal number of controllers on the Biznet network with 29 nodes were two controllers and an average value of Silhouette analysis calculation of 0.51846.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
n-gram Effect in Malware Detection Using Multilayer Perceptron (MLP) 基于多层感知器(MLP)的n-gram效应恶意软件检测
Benni Purnama, D. Stiawan, Darmawijoyo Hanapi, E. Winanto, R. Budiarto, Mohd Yazid Bin Idris
Malware is a threat that can compromise cyber security. Currently, the development of malware is becoming increasingly complex and difficult to detect. One way to improve detection accuracy is to implement the n-gram feature extraction. n-gram is one of method to analyze malware, by capturing the frequency of string/opcode which often appear from malware. This work aims to improve the performance of malware detection by evaluating the best number of n-grams to extract the opcode. Selection of n number in n-gram process will be very influencing in malware classification result. This research work investigates the effect the n value of n-gram on the accuracy detection by varying the value n = 1 to n = 5. The best accuracy detection in the experiments using Multilayer Perceptron (MLP) classifier reaches 89 percent.
恶意软件是一种危害网络安全的威胁。目前,恶意软件的开发正变得越来越复杂和难以检测。提高检测精度的一种方法是实现n-gram特征提取。N-gram是一种分析恶意软件的方法,通过捕获恶意软件中经常出现的字符串/操作码的频率来分析恶意软件。本工作旨在通过评估提取操作码的最佳n-gram数来提高恶意软件检测的性能。n-gram过程中n个数的选择对恶意软件分类结果有很大影响。本研究通过改变n = 1到n = 5的值,探讨n-gram的n值对准确率检测的影响。在实验中,多层感知器(MLP)分类器的检测准确率达到89%。
{"title":"n-gram Effect in Malware Detection Using Multilayer Perceptron (MLP)","authors":"Benni Purnama, D. Stiawan, Darmawijoyo Hanapi, E. Winanto, R. Budiarto, Mohd Yazid Bin Idris","doi":"10.23919/eecsi53397.2021.9624273","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624273","url":null,"abstract":"Malware is a threat that can compromise cyber security. Currently, the development of malware is becoming increasingly complex and difficult to detect. One way to improve detection accuracy is to implement the n-gram feature extraction. n-gram is one of method to analyze malware, by capturing the frequency of string/opcode which often appear from malware. This work aims to improve the performance of malware detection by evaluating the best number of n-grams to extract the opcode. Selection of n number in n-gram process will be very influencing in malware classification result. This research work investigates the effect the n value of n-gram on the accuracy detection by varying the value n = 1 to n = 5. The best accuracy detection in the experiments using Multilayer Perceptron (MLP) classifier reaches 89 percent.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Chili Plant Origin by Using Multilayer Perceptron Neural Network 基于多层感知器神经网络的辣椒植物来源分类
D. K. Agustika, N. Ariyanti, I Nyoman Kusuma Wardana, D. Iliescu, M. Leeson
The geographical origin of the plants can affect the growth and hence the quality of the plants. In this research, the origin of the chili plants has been investigated by using Fourier transform infrared (FTIR) spectroscopy. The spectroscopy generated 3734 data with a wavenumber range from 4000–400 cm−1. The pre-processing of the spectra was done by using baseline correction and vector normalization. The analysis was then taken in the biofingerprint area of 1800–900 cm−1 range which has 934 data points. Feature extraction for dimension reduction was achieved using principal component analysis (PCA). The PC scores from PCA were then fed into a k-means and a multilayer perceptron neural network (MLPNN). The k-means clustering shows that the samples can be distinguished into three different groups. Meanwhile, for the MLPNN, the number of the hidden layer's neurons and the learning rate of the system were optimized to get the best classification result. A hidden layer with twenty neurons had the highest accuracy, while a learning rate of 0.001 had the highest value of 100%.
植物的地理产地可以影响植物的生长,从而影响植物的质量。本研究利用傅里叶变换红外光谱(FTIR)对辣椒植物的起源进行了研究。光谱产生3734个波数范围为4000 - 400cm−1的数据。利用基线校正和矢量归一化对光谱进行预处理。然后在1800-900 cm−1范围内的生物指纹区域进行分析,该区域有934个数据点。利用主成分分析(PCA)实现降维特征提取。然后将PCA的PC分数输入到k均值和多层感知器神经网络(MLPNN)中。k-means聚类表明样本可以分为三个不同的组。同时,对于MLPNN,对隐层神经元的数量和系统的学习率进行了优化,以获得最佳的分类结果。具有20个神经元的隐藏层具有最高的准确率,而学习率为0.001的隐藏层具有最高的100%。
{"title":"Classification of Chili Plant Origin by Using Multilayer Perceptron Neural Network","authors":"D. K. Agustika, N. Ariyanti, I Nyoman Kusuma Wardana, D. Iliescu, M. Leeson","doi":"10.23919/eecsi53397.2021.9624228","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624228","url":null,"abstract":"The geographical origin of the plants can affect the growth and hence the quality of the plants. In this research, the origin of the chili plants has been investigated by using Fourier transform infrared (FTIR) spectroscopy. The spectroscopy generated 3734 data with a wavenumber range from 4000–400 cm−1. The pre-processing of the spectra was done by using baseline correction and vector normalization. The analysis was then taken in the biofingerprint area of 1800–900 cm−1 range which has 934 data points. Feature extraction for dimension reduction was achieved using principal component analysis (PCA). The PC scores from PCA were then fed into a k-means and a multilayer perceptron neural network (MLPNN). The k-means clustering shows that the samples can be distinguished into three different groups. Meanwhile, for the MLPNN, the number of the hidden layer's neurons and the learning rate of the system were optimized to get the best classification result. A hidden layer with twenty neurons had the highest accuracy, while a learning rate of 0.001 had the highest value of 100%.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Heater and Mixer Machine With Control System for Biodiesel Production 生物柴油生产用加热混合机及控制系统的研制
M. Rahmawaty, H. Hendriko, Engla Puspita Haryanisa
Biodiesel is one of the renewable energies that is environmentally friendly. Generally, it is made from renewable materials that consisting of fatty acids. Biodiesel can also be made from vegetable oil, animal oil and waste cooking oil. Producing biodiesel is divided into three stages: heating and stirring process, cooling and washing process, and drying and filtration process. In this study, a machine for the first stage processing of biodiesel-based waste cooking oil was made. The machine is used for heating and mixing waste cooking oil and catalyst materials. The developed machine is equipped with a control system that is aimed for detecting the temperature of mixture materials. The data obtained by the sensor is then used to regulate the flow rate of the gas. The flow of the gas is controlled by a valve that is actuated by a servo motor. Several tests have been carried out. The tests were aimed to determine several control parameters that is used in programming. Moreover, the objective of the tests is also to determine the effectiveness of the machine in producing fatty acid methyl ester (FAME). The test results show that the gas flow rate should be reduced when the temperature of mixture material reaches 55 Celsius. The gas flow rate was reduced by changing the gas valve angle from 90 to 13. The machine's ability in producing FAME has been tested using three different volumes of waste cooking oil. The results showed that the amount of FAME produced is quite large.
生物柴油是一种环保的可再生能源。一般来说,它是由脂肪酸组成的可再生材料制成的。生物柴油也可以由植物油、动物油和废食用油制成。生物柴油的生产分为三个阶段:加热搅拌过程、冷却洗涤过程、干燥过滤过程。本研究研制了一种用于生物柴油基废食用油一级处理的机器。本机用于加热和混合废食用油和催化剂材料。所开发的机器配有用于检测混合物料温度的控制系统。传感器获得的数据然后用于调节气体的流量。气体的流量由一个由伺服电机驱动的阀门控制。已经进行了几次试验。这些测试旨在确定编程中使用的几个控制参数。此外,测试的目的还在于确定该机器在生产脂肪酸甲酯(FAME)方面的有效性。试验结果表明,当混合材料温度达到55℃时,气体流速应减小。将气阀角度从90°改变为13°,降低了气体流量。这台机器生产FAME的能力已经用三种不同体积的废食用油进行了测试。结果表明,产生的FAME量相当大。
{"title":"Development of Heater and Mixer Machine With Control System for Biodiesel Production","authors":"M. Rahmawaty, H. Hendriko, Engla Puspita Haryanisa","doi":"10.23919/eecsi53397.2021.9624315","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624315","url":null,"abstract":"Biodiesel is one of the renewable energies that is environmentally friendly. Generally, it is made from renewable materials that consisting of fatty acids. Biodiesel can also be made from vegetable oil, animal oil and waste cooking oil. Producing biodiesel is divided into three stages: heating and stirring process, cooling and washing process, and drying and filtration process. In this study, a machine for the first stage processing of biodiesel-based waste cooking oil was made. The machine is used for heating and mixing waste cooking oil and catalyst materials. The developed machine is equipped with a control system that is aimed for detecting the temperature of mixture materials. The data obtained by the sensor is then used to regulate the flow rate of the gas. The flow of the gas is controlled by a valve that is actuated by a servo motor. Several tests have been carried out. The tests were aimed to determine several control parameters that is used in programming. Moreover, the objective of the tests is also to determine the effectiveness of the machine in producing fatty acid methyl ester (FAME). The test results show that the gas flow rate should be reduced when the temperature of mixture material reaches 55 Celsius. The gas flow rate was reduced by changing the gas valve angle from 90 to 13. The machine's ability in producing FAME has been tested using three different volumes of waste cooking oil. The results showed that the amount of FAME produced is quite large.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"64 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence IoT based EEG Application using Deep Learning for Movement Classification 基于人工智能物联网的脑电应用,使用深度学习进行运动分类
Widhi Winata Sakti, K. Anam, Satryo B Utomo, B. Marhaenanto, Safri Nahela
People with disabilities such as hand amputations have limited motor activity. Several robotic prosthetic arms were developed to help them. The challenge arises when the robot's control source comes from the user's wishes extracted from brain signals via electroencephalography (EEG) signals. This research develops a raspberry-based embedded system device that is connected to EEG electrodes and functions as an artificial intelligence internet of things (AIoT) so that it can be controlled via the internet in real-time. The deep learning model used is convolutional neural networks (CNN) and autonomous deep learning (ADL). The results of the training with 5-fold cross-validation achieved an accuracy of about 98% in the four classes. The results of real-time testing over the network produce a pretty good response time of about 1 second.
手部截肢等残疾人士的运动活动有限。一些机器人假肢被开发出来帮助他们。当机器人的控制源来自于通过脑电图(EEG)信号从用户的大脑信号中提取的愿望时,挑战就出现了。本研究开发了一种基于覆盆子的嵌入式系统设备,该设备与脑电图电极相连,具有人工智能物联网(AIoT)的功能,可以通过互联网实时控制。使用的深度学习模型是卷积神经网络(CNN)和自主深度学习(ADL)。5倍交叉验证的训练结果在四个类中达到了98%左右的准确率。通过网络进行实时测试的结果产生了大约1秒的相当好的响应时间。
{"title":"Artificial Intelligence IoT based EEG Application using Deep Learning for Movement Classification","authors":"Widhi Winata Sakti, K. Anam, Satryo B Utomo, B. Marhaenanto, Safri Nahela","doi":"10.23919/eecsi53397.2021.9624269","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624269","url":null,"abstract":"People with disabilities such as hand amputations have limited motor activity. Several robotic prosthetic arms were developed to help them. The challenge arises when the robot's control source comes from the user's wishes extracted from brain signals via electroencephalography (EEG) signals. This research develops a raspberry-based embedded system device that is connected to EEG electrodes and functions as an artificial intelligence internet of things (AIoT) so that it can be controlled via the internet in real-time. The deep learning model used is convolutional neural networks (CNN) and autonomous deep learning (ADL). The results of the training with 5-fold cross-validation achieved an accuracy of about 98% in the four classes. The results of real-time testing over the network produce a pretty good response time of about 1 second.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Study of CNN and YOLOv3 in Public Health Face Mask Detection CNN与YOLOv3在公共卫生口罩检测中的比较研究
N. Setyawan, Tri Septiana Nadia Puspita Putri, Mohamad Al Fikih, N. Kasan
Coronavirus Disease (COVID-19) is gaining special concern from entire world population. The transmission of the COVID-19 virus is spreading almost in whole the world, including Indonesia which undergoing a crisis, especially in the health and economic sector. In prevention, the government is implementing Large-Scale Social Restrictions which public services or public places require people to wear masks. During this time, the detection of masks is done manually with observations from security personnel, which is time consuming. This study will apply a mask detection system (Face Mask Detection) using deep learning image processing. This study apply the most popular deep learning model which consist Convolutional Neural Networks (CNN) and You Only Look Once (YOLOv3) method. In training step, the datasets taken vary with images of faces that using head attribute such as hijabs, hats, and not using attributes. In addition, the images were taken from various countries such as Asia including Indonesia mostly, Europe, and the Americas. The system used a combination of object detection classification, image, and object tracking to develop a system that detects using a mask or not using a mask faces in images or camera videos. From the comparative analysis which developed in training and deploying step with image and camera video stream, YOLOv3 can detect accurately and faster with 4.8 FPS than CNN.
冠状病毒病(COVID-19)正受到全世界人民的特别关注。COVID-19病毒的传播几乎在全世界蔓延,包括正在经历危机的印度尼西亚,特别是在卫生和经济部门。在预防方面,政府正在实施大规模的社会限制,公共服务或公共场所要求人们戴口罩。在此期间,口罩的检测是由安保人员手工观察完成的,耗时较长。本研究将应用深度学习图像处理的面具检测系统(Face mask detection)。本研究采用了目前最流行的深度学习模型,包括卷积神经网络(CNN)和You Only Look Once (YOLOv3)方法。在训练步骤中,使用头部属性(如hijab, hats)和不使用属性的人脸图像所获取的数据集有所不同。此外,这些照片主要拍摄于印度尼西亚等亚洲、欧洲、美洲等多个国家。该系统将目标检测分类、图像和目标跟踪相结合,开发了一种检测图像或摄像机视频中使用掩模或不使用掩模人脸的系统。通过对图像和摄像机视频流在训练和部署阶段进行的对比分析,YOLOv3能够以4.8 FPS的速度比CNN更快准确地进行检测。
{"title":"Comparative Study of CNN and YOLOv3 in Public Health Face Mask Detection","authors":"N. Setyawan, Tri Septiana Nadia Puspita Putri, Mohamad Al Fikih, N. Kasan","doi":"10.23919/eecsi53397.2021.9624247","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624247","url":null,"abstract":"Coronavirus Disease (COVID-19) is gaining special concern from entire world population. The transmission of the COVID-19 virus is spreading almost in whole the world, including Indonesia which undergoing a crisis, especially in the health and economic sector. In prevention, the government is implementing Large-Scale Social Restrictions which public services or public places require people to wear masks. During this time, the detection of masks is done manually with observations from security personnel, which is time consuming. This study will apply a mask detection system (Face Mask Detection) using deep learning image processing. This study apply the most popular deep learning model which consist Convolutional Neural Networks (CNN) and You Only Look Once (YOLOv3) method. In training step, the datasets taken vary with images of faces that using head attribute such as hijabs, hats, and not using attributes. In addition, the images were taken from various countries such as Asia including Indonesia mostly, Europe, and the Americas. The system used a combination of object detection classification, image, and object tracking to develop a system that detects using a mask or not using a mask faces in images or camera videos. From the comparative analysis which developed in training and deploying step with image and camera video stream, YOLOv3 can detect accurately and faster with 4.8 FPS than CNN.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strawberry Fruit Quality Assessment for Harvesting Robot using SSD Convolutional Neural Network 基于SSD卷积神经网络的草莓果实采摘机器人品质评价
Muhammad Fauzan Ridho, Irwan
Strawberry has a tremendous economic value as well as being visually appealing. Therefore, strawberry farmers need to ensure that they only harvest good quality strawberries. However, assessing the quality of strawberries is not an easy problem, especially for local plantations which do not have enough human resources. As robotics becomes accessible and widely used for agriculture work such as harvesting fruit, the real-time embedded system computation power becomes much more powerful nowadays. This paper discusses the harvesting robot's ability to distinguish the quality of strawberries in realtime detection using computer vision technology in the form of object detection by utilizing a deep neural network in a single board computer (SBC). The robot software is built on Robot Operating System (ROS) framework. The proposed method is tested on a robot equipped with a monocular camera. The learning process shows that the robot can detect and differentiate between good and bad quality strawberries with 90% accuracy and maintain a high frame rate.
草莓具有巨大的经济价值和视觉吸引力。因此,草莓种植者需要确保他们只收获优质的草莓。然而,评估草莓的质量并不是一个容易的问题,特别是对于没有足够人力资源的当地种植园。随着机器人技术在收获水果等农业工作中的普及和广泛应用,嵌入式系统的实时计算能力变得越来越强大。本文利用单板计算机(SBC)中的深度神经网络,以物体检测的形式,讨论了利用计算机视觉技术实时检测草莓质量的收获机器人的能力。机器人软件基于机器人操作系统(ROS)框架。在一个安装了单目摄像机的机器人上进行了实验。学习过程表明,机器人能够以90%的准确率检测和区分草莓的好坏,并保持较高的帧率。
{"title":"Strawberry Fruit Quality Assessment for Harvesting Robot using SSD Convolutional Neural Network","authors":"Muhammad Fauzan Ridho, Irwan","doi":"10.23919/eecsi53397.2021.9624311","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624311","url":null,"abstract":"Strawberry has a tremendous economic value as well as being visually appealing. Therefore, strawberry farmers need to ensure that they only harvest good quality strawberries. However, assessing the quality of strawberries is not an easy problem, especially for local plantations which do not have enough human resources. As robotics becomes accessible and widely used for agriculture work such as harvesting fruit, the real-time embedded system computation power becomes much more powerful nowadays. This paper discusses the harvesting robot's ability to distinguish the quality of strawberries in realtime detection using computer vision technology in the form of object detection by utilizing a deep neural network in a single board computer (SBC). The robot software is built on Robot Operating System (ROS) framework. The proposed method is tested on a robot equipped with a monocular camera. The learning process shows that the robot can detect and differentiate between good and bad quality strawberries with 90% accuracy and maintain a high frame rate.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121591924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Denial of Service Attacks Detection on SCADA Network IEC 60870-5-104 using Machine Learning 基于机器学习的SCADA网络拒绝服务攻击检测
M. M. Arifin, D. Stiawan, Susanto, J. Rejito, Mohd Yazid Bin Idris, R. Budiarto
SCADA was designed to be used in an isolated area however, in modern SCADA, its connection to the Internet has become essential due to performance and commercial needs. This extended SCADA interconnection creates new vulnerabilities in the SCADA network. One of the attacks that may occur caused by the extended interconnection of SCADA networks to heterogeneous networks is Denial of Service attacks (DoS). DoS attack is launched by sending many messages from nodes. The development of easily accessible and simple DoS tools has increased the frequency of attacks. Ease of access and use of DoS tools made reduced the level of expertise needed to launch an attack. This study uses a SCADA dataset containing DoS attacks and running IEC 60870-5-104 protocol where this protocol will be encapsulated into TCP/IP protocol before being transmitted so that the treatment in detecting DoS attack in SCADA networks using the IEC 104 protocol is not much different from a traditional computer network. This study implements three machine learning approaches, i.e.: Decision Tree, Support Vector Machine, and Gaussian Naïve Bayes in creating an Intrusion Detection System (IDS) model to recognize DoS attack on the SCADA Network. Experimental results show that the performance of the Decision Tree approach has the best performance detection on the Testing dataset and Training dataset with an accuracy of 99.99% in all experiments.
SCADA被设计用于一个孤立的区域,然而,在现代SCADA中,由于性能和商业需求,它与互联网的连接已经变得必不可少。这种扩展的SCADA互连在SCADA网络中产生了新的漏洞。由于SCADA网络与异构网络的扩展互联,可能导致的攻击之一是拒绝服务攻击(DoS)。DoS攻击是通过在节点上发送大量消息来发起的。易于访问和简单的DoS工具的开发增加了攻击的频率。易于访问和使用DoS工具降低了发动攻击所需的专业知识水平。本研究使用包含DoS攻击的SCADA数据集并运行IEC 60870-5-104协议,该协议在传输之前将被封装到TCP/IP协议中,因此使用IEC 104协议检测SCADA网络中的DoS攻击的处理与传统计算机网络没有太大区别。本研究采用决策树、支持向量机和高斯Naïve贝叶斯三种机器学习方法创建入侵检测系统(IDS)模型,用于识别SCADA网络上的DoS攻击。实验结果表明,决策树方法在测试数据集和训练数据集上的检测性能最好,准确率达到99.99%。
{"title":"Denial of Service Attacks Detection on SCADA Network IEC 60870-5-104 using Machine Learning","authors":"M. M. Arifin, D. Stiawan, Susanto, J. Rejito, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/eecsi53397.2021.9624255","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624255","url":null,"abstract":"SCADA was designed to be used in an isolated area however, in modern SCADA, its connection to the Internet has become essential due to performance and commercial needs. This extended SCADA interconnection creates new vulnerabilities in the SCADA network. One of the attacks that may occur caused by the extended interconnection of SCADA networks to heterogeneous networks is Denial of Service attacks (DoS). DoS attack is launched by sending many messages from nodes. The development of easily accessible and simple DoS tools has increased the frequency of attacks. Ease of access and use of DoS tools made reduced the level of expertise needed to launch an attack. This study uses a SCADA dataset containing DoS attacks and running IEC 60870-5-104 protocol where this protocol will be encapsulated into TCP/IP protocol before being transmitted so that the treatment in detecting DoS attack in SCADA networks using the IEC 104 protocol is not much different from a traditional computer network. This study implements three machine learning approaches, i.e.: Decision Tree, Support Vector Machine, and Gaussian Naïve Bayes in creating an Intrusion Detection System (IDS) model to recognize DoS attack on the SCADA Network. Experimental results show that the performance of the Decision Tree approach has the best performance detection on the Testing dataset and Training dataset with an accuracy of 99.99% in all experiments.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Suitability of FPS and DPS in NOMA for Real-Time and Non-Real Time Applications NOMA中FPS和DPS在实时和非实时应用中的适用性
Moontasir Rafique, Abdullah Alavi, Aadnan Farhad, M. T. Kawser
Non-Orthogonal Multiple Access (NOMA) is a popular solution for supporting a high number of users and along with significant bandwidth in 5G cellular communication. By using a technique called cooperative relaying, the same data is sent to all the users, and one user can relay data to the other. In order to provide enough power for the users, energy harvesting techniques have been introduced with Simultaneous Wireless Information and Power Transfer (SWIPT) coming to prominence in recent times. In this paper, analysis has been made comparing two different power allocation schemes in NOMA, Fixed Power allocation Scheme (FPS) and Dynamic Power allocation Scheme (DPS). The comparisons were made in terms of their performance and characteristics while undergoing SWIPT. It has been found that by using DPS, an almost 25% increase in peak spectral efficiency can be obtained compared to FPS. However, DPS suffers from a higher outage probability as the increase of power causes the signal bandwidth to drop below the target rate a significant number of times. Based on the detailed results, conclusions were drawn as to which power allocation coefficient scheme would be used in real-time and non-real time communication standards, respectively. The results suggest that for real-time communication, FPS is more suitable while for non-real time communication, DPS appears to work better than FPS.
非正交多址(NOMA)是一种流行的解决方案,用于支持5G蜂窝通信中的大量用户和大量带宽。通过使用一种称为协作中继的技术,将相同的数据发送给所有用户,并且一个用户可以将数据转发给另一个用户。为了给用户提供足够的电力,能量收集技术被引入,同时无线信息和电力传输技术(SWIPT)近年来受到重视。本文对NOMA中两种不同的功率分配方案——固定功率分配方案(FPS)和动态功率分配方案(DPS)进行了分析比较。比较了它们在进行SWIPT时的性能和特点。研究发现,与FPS相比,使用DPS可以获得近25%的峰值光谱效率提高。然而,由于功率的增加导致信号带宽多次低于目标速率,DPS遭受更高的中断概率。在此基础上,得出了在实时通信标准和非实时通信标准中分别采用何种功率分配系数方案的结论。结果表明,对于实时通信,FPS更适合,而对于非实时通信,DPS似乎比FPS更好。
{"title":"Suitability of FPS and DPS in NOMA for Real-Time and Non-Real Time Applications","authors":"Moontasir Rafique, Abdullah Alavi, Aadnan Farhad, M. T. Kawser","doi":"10.23919/eecsi53397.2021.9624291","DOIUrl":"https://doi.org/10.23919/eecsi53397.2021.9624291","url":null,"abstract":"Non-Orthogonal Multiple Access (NOMA) is a popular solution for supporting a high number of users and along with significant bandwidth in 5G cellular communication. By using a technique called cooperative relaying, the same data is sent to all the users, and one user can relay data to the other. In order to provide enough power for the users, energy harvesting techniques have been introduced with Simultaneous Wireless Information and Power Transfer (SWIPT) coming to prominence in recent times. In this paper, analysis has been made comparing two different power allocation schemes in NOMA, Fixed Power allocation Scheme (FPS) and Dynamic Power allocation Scheme (DPS). The comparisons were made in terms of their performance and characteristics while undergoing SWIPT. It has been found that by using DPS, an almost 25% increase in peak spectral efficiency can be obtained compared to FPS. However, DPS suffers from a higher outage probability as the increase of power causes the signal bandwidth to drop below the target rate a significant number of times. Based on the detailed results, conclusions were drawn as to which power allocation coefficient scheme would be used in real-time and non-real time communication standards, respectively. The results suggest that for real-time communication, FPS is more suitable while for non-real time communication, DPS appears to work better than FPS.","PeriodicalId":259450,"journal":{"name":"2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1