首页 > 最新文献

Jurnal Nasional Teknik Elektro dan Teknologi Informasi最新文献

英文 中文
Citra Tekstur Terbaik Untuk Gaussian Naïve Bayes Dengan Interpolasi Nearest Neighbor 高斯奈维贝叶斯与近邻插值的最佳纹理图像
Pub Date : 2024-02-28 DOI: 10.22146/jnteti.v13i1.8730
I. Santoso, Shoffin Nahwa Utama, Supriyono
Salah satu faktor yang berpengaruh terhadap kinerja Gaussian naive Bayes classifier (GNBC) dalam klasifikasi citra tekstur adalah ukuran (dimensi) citra. Ukuran citra adalah salah satu kriteria citra tekstur terbaik di samping nilai pikselnya. Pada penelitian ini, diusulkan metode untuk mendapatkan ukuran citra tekstur terbaik terhadap GNBC dengan optimalisasi interpolasi nearest neighbor (NN). Ukuran citra tekstur terbaik dengan nilai piksel hasil interpolasi tersebut membuat GNBC mampu membedakan citra tekstur pada setiap kelasnya dengan kinerja paling tinggi. Langkah pertama metode usulan tersebut adalah menentukan ukuran citra tekstur untuk pelatihan melalui kombinasi ukuran baris dan kolom pada proses optimalisasi. Pengubahan ukuran (resizing) semua citra tekstur asal dengan interpolasi NN adalah langkah penting berikutnya untuk mendapatkan citra tekstur baru. Langkah selanjutnya adalah membangun GNBC berdasarkan citra baru hasil interpolasi dan menentukan akurasi klasifikasinya. Langkah terakhir yaitu memilih ukuran citra tekstur terbaik berdasarkan nilai akurasi klasifikasi terbesar sebagai kriteria pertama dan ukuran citra sebagai kriteria kedua. Evaluasi terhadap metode yang diusulkan tersebut dilakukan menggunakan data citra tekstur dari dataset publik CVonline dengan melibatkan beberapa skenario uji coba dan metode interpolasi. Hasil uji coba menunjukkan bahwa pada skenario yang melibatkan lima kelas citra tekstur, GNBC dengan interpolasi NN memberikan nilai akurasi klasifikasi terkecil 89% dan terbesar 100% pada ukuran citra terbaik, masing-masing 14 × 32 dan 47 × 42. Pada skenario yang melibatkan jumlah kelas kecil hingga besar, GNBC dengan interpolasi NN memberikan akurasi klasifikasi 81,6% - 95%. Dari hasil tersebut, GNBC dengan optimalisasi NN memberikan hasil lebih baik daripada metode interpolasi nonadaptif lainnya (bilinear, bicubic, dan lanczos) dan principal component analysis (PCA). 
在纹理图像分类中,影响高斯天真贝叶斯分类器(GNBC)性能的一个因素是图像尺寸(维度)。除了像素值之外,图像尺寸也是最佳纹理图像的标准之一。本研究提出了一种通过优化近邻(NN)插值来获得 GNBC 最佳纹理图像尺寸的方法。最佳纹理图像大小加上插值像素值使得 GNBC 能够以最高性能区分每一类纹理图像。建议方法的第一步是在优化过程中通过行和列大小的组合来确定用于训练的纹理图像大小。下一个重要步骤是使用 NN 插值重新调整所有原始纹理图像的大小,以获得新的纹理图像。下一步是根据新的插值图像建立 GNBC,并确定分类精度。最后一步是以分类准确率最大值为第一标准,图像大小为第二标准,选择最佳纹理图像大小。我们使用 CVonline 公共数据集中的纹理图像数据对所提出的方法进行了评估,涉及多个测试场景和插值方法。测试结果表明,在涉及五类纹理图像的场景中,采用 NN 插值的 GNBC 分类准确率最小,为 89%;在最佳图像尺寸 14 × 32 和 47 × 42 时,分类准确率最大,分别为 100%。 在涉及少量到大量类别的场景中,采用 NN 插值的 GNBC 分类准确率为 81.6% - 95%。从这些结果来看,采用 NN 优化的 GNBC 比其他非自适应插值方法(双线性、双三次和 Lanczos)和主成分分析(PCA)效果更好。
{"title":"Citra Tekstur Terbaik Untuk Gaussian Naïve Bayes Dengan Interpolasi Nearest Neighbor","authors":"I. Santoso, Shoffin Nahwa Utama, Supriyono","doi":"10.22146/jnteti.v13i1.8730","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.8730","url":null,"abstract":"Salah satu faktor yang berpengaruh terhadap kinerja Gaussian naive Bayes classifier (GNBC) dalam klasifikasi citra tekstur adalah ukuran (dimensi) citra. Ukuran citra adalah salah satu kriteria citra tekstur terbaik di samping nilai pikselnya. Pada penelitian ini, diusulkan metode untuk mendapatkan ukuran citra tekstur terbaik terhadap GNBC dengan optimalisasi interpolasi nearest neighbor (NN). Ukuran citra tekstur terbaik dengan nilai piksel hasil interpolasi tersebut membuat GNBC mampu membedakan citra tekstur pada setiap kelasnya dengan kinerja paling tinggi. Langkah pertama metode usulan tersebut adalah menentukan ukuran citra tekstur untuk pelatihan melalui kombinasi ukuran baris dan kolom pada proses optimalisasi. Pengubahan ukuran (resizing) semua citra tekstur asal dengan interpolasi NN adalah langkah penting berikutnya untuk mendapatkan citra tekstur baru. Langkah selanjutnya adalah membangun GNBC berdasarkan citra baru hasil interpolasi dan menentukan akurasi klasifikasinya. Langkah terakhir yaitu memilih ukuran citra tekstur terbaik berdasarkan nilai akurasi klasifikasi terbesar sebagai kriteria pertama dan ukuran citra sebagai kriteria kedua. Evaluasi terhadap metode yang diusulkan tersebut dilakukan menggunakan data citra tekstur dari dataset publik CVonline dengan melibatkan beberapa skenario uji coba dan metode interpolasi. Hasil uji coba menunjukkan bahwa pada skenario yang melibatkan lima kelas citra tekstur, GNBC dengan interpolasi NN memberikan nilai akurasi klasifikasi terkecil 89% dan terbesar 100% pada ukuran citra terbaik, masing-masing 14 × 32 dan 47 × 42. Pada skenario yang melibatkan jumlah kelas kecil hingga besar, GNBC dengan interpolasi NN memberikan akurasi klasifikasi 81,6% - 95%. Dari hasil tersebut, GNBC dengan optimalisasi NN memberikan hasil lebih baik daripada metode interpolasi nonadaptif lainnya (bilinear, bicubic, dan lanczos) dan principal component analysis (PCA). ","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"131 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140417703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Analysis of IndoBERT Hyperparameter Tuning in Fake News Detection 假新闻检测中的 IndoBERT 超参数调整研究与分析
Pub Date : 2024-02-28 DOI: 10.22146/jnteti.v13i1.8532
Anugerah Simanjuntak, Rosni Lumbantoruan, Kartika Sianipar, Rut Gultom, Mario Simaremare, Samuel Situmeang, Erwin Panggabean
The rapid advancement of communication technology has transformed how information is shared, but it has also brought concerns about the proliferation of false information. A recent report by the Ministry of Communication and Informatics in Indonesia revealed that around 800,000 websites were involved in spreading false information, underscoring the seriousness of the problem. To combat this issue, researchers have focused on developing techniques to detect and combat fake news. This research centers on using IndoBERT-base-p1 for fake news detection and aims to enhance its performance through three methods to tune the hyperparameter value of the model namely: Bayesian optimization, grid search, and random search. After comparing the outcomes of the three hyperparameter tuning methods, Bayesian Optimization emerged as the most effective approach. Achieving a precision of 88.79%, recall of 94.5%, and F1-score of 91.56% for the “fake” label, Bayesian Optimization outperformed the other hyperparameter tuning methods as well as the model using the fine-tuning hyperparameter value. These findings emphasize the importance of hyperparameter tuning in improving the accuracy of fake news detection models. Utilizing Bayesian Optimization and optimizing the specified hyperparameters, the model demonstrated superior performance in accurately identifying instances of fake news, providing a valuable tool in the ongoing battle against disinformation in the digital realm.
通信技术的飞速发展改变了信息共享的方式,但也带来了对虚假信息泛滥的担忧。印度尼西亚通信和信息部最近的一份报告显示,约有 80 万个网站参与传播虚假信息,这凸显了问题的严重性。为解决这一问题,研究人员重点开发了检测和打击假新闻的技术。本研究主要使用 IndoBERT-base-p1 进行假新闻检测,旨在通过三种方法(即贝叶斯优化法、网格搜索法)调整模型的超参数值来提高其性能:贝叶斯优化、网格搜索和随机搜索。在比较了三种超参数调整方法的结果后,贝叶斯优化法成为最有效的方法。对于 "假 "标签,贝叶斯优化法的精确度为 88.79%,召回率为 94.5%,F1 分数为 91.56%,优于其他超参数调整方法以及使用微调超参数值的模型。这些发现强调了超参数调整在提高假新闻检测模型准确性方面的重要性。利用贝叶斯优化和优化指定的超参数,该模型在准确识别假新闻实例方面表现出了卓越的性能,为正在进行的打击数字领域虚假信息的斗争提供了宝贵的工具。
{"title":"Research and Analysis of IndoBERT Hyperparameter Tuning in Fake News Detection","authors":"Anugerah Simanjuntak, Rosni Lumbantoruan, Kartika Sianipar, Rut Gultom, Mario Simaremare, Samuel Situmeang, Erwin Panggabean","doi":"10.22146/jnteti.v13i1.8532","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.8532","url":null,"abstract":"The rapid advancement of communication technology has transformed how information is shared, but it has also brought concerns about the proliferation of false information. A recent report by the Ministry of Communication and Informatics in Indonesia revealed that around 800,000 websites were involved in spreading false information, underscoring the seriousness of the problem. To combat this issue, researchers have focused on developing techniques to detect and combat fake news. This research centers on using IndoBERT-base-p1 for fake news detection and aims to enhance its performance through three methods to tune the hyperparameter value of the model namely: Bayesian optimization, grid search, and random search. After comparing the outcomes of the three hyperparameter tuning methods, Bayesian Optimization emerged as the most effective approach. Achieving a precision of 88.79%, recall of 94.5%, and F1-score of 91.56% for the “fake” label, Bayesian Optimization outperformed the other hyperparameter tuning methods as well as the model using the fine-tuning hyperparameter value. These findings emphasize the importance of hyperparameter tuning in improving the accuracy of fake news detection models. Utilizing Bayesian Optimization and optimizing the specified hyperparameters, the model demonstrated superior performance in accurately identifying instances of fake news, providing a valuable tool in the ongoing battle against disinformation in the digital realm.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"22 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140420059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms 使用 RSA 和哈希算法实现 QR 码考勤安全系统
Pub Date : 2024-02-23 DOI: 10.22146/jnteti.v13i1.4395
Arif Indra Irawan, Iman Hedi Santoso, Maya Rahayu, Arif Indra, Irawan
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency.
基于快速反应(QR)代码的考勤应用程序有助于减少纸张使用量和考勤输入错误。然而,在万隆一所学校的实施过程中,基于 QR 码的考勤显示出了一些弱点。缺席的学生可以为自己或朋友伪造考勤。这种攻击被称为生成假二维码。本研究提出了一种使用 Rivest-Shamir-Adleman (RSA) 加密算法和安全散列算法 1 (SHA-1) 的安全认证系统,以确保基于二维码的考勤应用程序免受假冒二维码生成攻击。RSA 算法对二维码数据进行加密以维护隐私,而 SHA-1 算法则确保数据的完整性。基于这种方法,学生生成的二维码数据与教师的考勤读取应用程序之间可以建立起相互认证过程。一系列测试结果表明,Madrasah Aliyah (MA) Al-Mukhlishin 的学生考勤记录应用程序中的安全系统能够检测和防止伪造二维码生成攻击。测试是通过改变密钥长度对 RSA-1024 位和 RSA-2048 位的影响进行的。结果表明,RSA-1024 位的能耗为 0.14 J,时间为 1.66 s,比 RSA-2048 位的能耗 0.19 J,时间 2.09 s 更有效率。
{"title":"Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms","authors":"Arif Indra Irawan, Iman Hedi Santoso, Maya Rahayu, Arif Indra, Irawan","doi":"10.22146/jnteti.v13i1.4395","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.4395","url":null,"abstract":"The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"15 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140435361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog Computing-Based System for Decentralized Smart Parking System by Using Firebase 使用 Firebase 实现基于雾计算的分散式智能停车系统
Pub Date : 2024-02-22 DOI: 10.22146/jnteti.v13i1.10095
Haposan Yoga, Pradika Napitupulu, I. Gde, Dharma Nugraha
The growth of vehicle number is unavoidable whilst the availability of parking is not directly proportional with this condition. Nowadays, many shopping centers do not have sufficient parking spot, causing customers to have difficulty in finding available parking spots. Research has been conducted to tackle the issue of finding available parking spots. Much of this research proposed the narrowband-Internet of things (NB-IoT) as a fog node. For communication purposes, this NB-IoT-based fog node has some shortcomings, such as security and privacy, lower data rate, higher cost in development, dependency with wireless system, and only covers one area. In this research, the fog computing was proposed to decentralize smart parking system by using Firebase to cover several areas or malls in one system and interface. Instead of using NB-IoT, this research employed decentralized local server as a fog node to deliver a fast data exchange. Firestore database (Firebase) was also used to secure, manage, and analyze the data in the cloud. Conjunctively, the Android application was created as a user interface to book and find the availability of parking spots. The Android application was built using Android Studio and implemented authentication to keep the data access secure and private. The testing scenario was done following the design unified modeling language (UML). The research results confirmed that the fog computing system successfully supported the decentralized smart parking system and was able to be implemented for covering several areas or malls in one system.
车辆数量的增长是不可避免的,而停车位的供应却与这种情况不成正比。如今,许多购物中心没有足够的停车位,导致顾客很难找到可用的停车位。针对寻找可用停车位的问题,已经开展了一些研究。这些研究大多提出将窄带物联网(NB-IoT)作为雾节点。就通信目的而言,这种基于 NB-IoT 的雾节点存在一些不足,如安全性和隐私性、较低的数据传输速率、较高的开发成本、与无线系统的依赖性以及只能覆盖一个区域。在这项研究中,提出了利用 Firebase 将雾计算分散到智能停车系统中,在一个系统和界面中覆盖多个区域或商场。本研究没有使用 NB-IoT,而是采用了分散的本地服务器作为雾节点,以提供快速的数据交换。此外,还使用了 Firestore 数据库(Firebase)来保护、管理和分析云中的数据。同时,还创建了安卓应用程序,作为预订和查找停车位可用性的用户界面。该安卓应用程序使用 Android Studio 构建,并实施了身份验证,以确保数据访问的安全性和私密性。测试场景是按照统一建模语言(UML)设计完成的。研究结果证实,雾计算系统成功地支持了分散式智能停车系统,并且能够在一个系统中覆盖多个区域或商场。
{"title":"Fog Computing-Based System for Decentralized Smart Parking System by Using Firebase","authors":"Haposan Yoga, Pradika Napitupulu, I. Gde, Dharma Nugraha","doi":"10.22146/jnteti.v13i1.10095","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.10095","url":null,"abstract":"The growth of vehicle number is unavoidable whilst the availability of parking is not directly proportional with this condition. Nowadays, many shopping centers do not have sufficient parking spot, causing customers to have difficulty in finding available parking spots. Research has been conducted to tackle the issue of finding available parking spots. Much of this research proposed the narrowband-Internet of things (NB-IoT) as a fog node. For communication purposes, this NB-IoT-based fog node has some shortcomings, such as security and privacy, lower data rate, higher cost in development, dependency with wireless system, and only covers one area. In this research, the fog computing was proposed to decentralize smart parking system by using Firebase to cover several areas or malls in one system and interface. Instead of using NB-IoT, this research employed decentralized local server as a fog node to deliver a fast data exchange. Firestore database (Firebase) was also used to secure, manage, and analyze the data in the cloud. Conjunctively, the Android application was created as a user interface to book and find the availability of parking spots. The Android application was built using Android Studio and implemented authentication to keep the data access secure and private. The testing scenario was done following the design unified modeling language (UML). The research results confirmed that the fog computing system successfully supported the decentralized smart parking system and was able to be implemented for covering several areas or malls in one system.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"9 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140439208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pemantauan dan Pengendalian Parameter Greenhouse Berbasis IoT Dengan Protokol MQTT 利用 MQTT 协议进行基于物联网的温室参数监测和控制
Pub Date : 2024-02-19 DOI: 10.22146/jnteti.v13i1.8564
Eni Dwi Wardihani, Eka Ulia Sari, Helmy, Ari Sriyanto Nugroho, Yusnan Badruzzaman, Arif Nursyahid, Thomas Agung Setyawan, M. Fitri, I. Nugraha
Modernisasi pada sektor pertanian diharapkan berpengaruh pada peningkatan kualitas, jumlah produksi, dan kontinuitas suplai hasil tani. Saat ini banyak dikembangkan pertanian cerdas (smart agriculture) dalam greenhouse. Namun, beberapa parameter greenhouse harus diperhatikan supaya pertumbuhan tanaman berlangsung secara optimal. Pada penelitian ini dibuat sebuah sistem pemantauan dan pengendalian beberapa parameter greenhouse berbasis internet of things (IoT) yang memungkinkan petani melakukan pemantauan dan pengendalian kapan pun dan di mana pun. Hal ini juga dapat meningkatkan efisiensi kerja petani dalam melakukan pemantauan dan pengendalian, terlebih jika greenhouse yang dipantau dan dikendalikan lebih dari satu. Data-data hasil pemantauan greenhouse dapat dilihat secara real-time dan tersimpan di server, sehingga memudahkan petani melakukan evaluasi terhadap greenhouse dan tanaman. Beberapa parameter yang dipantau adalah suhu greenhouse, kelembapan greenhouse, dan intensitas cahaya dalam greenhouse, sedangkan parameter yang dikendalikan adalah suhu greenhouse dan kelembapan greenhouse, dengan menggunakan exhaust fan. Proses pengiriman data pemantauan dan pengendalian parameter greenhouse dilakukan menggunakan protokol message queue telemetry transport (MQTT). Pengujian data loss dan delay pada sistem diperlukan untuk mengetahui keandalan alat dalam proses pengiriman dan penerimaan data. Hasil pengujian quality of service (QoS) adalah sebagai berikut: rata-rata data loss pemantauan Gateway-Server sebesar 10,6 %, rata-rata delay pemantauan gateway-server sebesar 1,9 s, dan rata-rata delay pengendalian server-gateway sebesar 7,1 s. Saat nilai parameter suhu greenhouse kurang dari batas ambang maksimal yang ditentukan, sistem akan menyalakan drum fan agar suhu mencapai nilai minimal pada batas ambang.
农业部门的现代化预计将对提高农产品的质量、产量和供应的连续性产生影响。目前,智能农业正在温室中发展。然而,为了使植物生长达到最佳状态,必须考虑多个温室参数。本研究创建了一个基于物联网(IoT)的温室参数监测和控制系统,农民可以随时随地监测和控制温室参数。这还能提高农民的监控工作效率,尤其是在监控多个温室的情况下。温室监控的数据可以实时查看并存储在服务器上,方便农民对温室和植物进行评估。监测的一些参数包括温室温度、温室湿度和温室内的光照强度,而控制的参数则是温室温度和温室湿度,使用的是排气扇。发送监测数据和控制温室参数的过程是通过消息队列遥测传输(MQTT)协议进行的。需要对系统进行数据丢失和延迟测试,以确定工具在发送和接收数据过程中的可靠性。服务质量(QoS)测试结果如下:网关-服务器监控的平均数据丢失率为 10.6%,网关-服务器监控的平均延迟时间为 1.9 秒,服务器-网关控制的平均延迟时间为 7.1 秒。当温室温度参数值小于指定的最大阈值限制时,系统将打开滚筒风扇,使温度达到阈值限制的最小值。
{"title":"Pemantauan dan Pengendalian Parameter Greenhouse Berbasis IoT Dengan Protokol MQTT","authors":"Eni Dwi Wardihani, Eka Ulia Sari, Helmy, Ari Sriyanto Nugroho, Yusnan Badruzzaman, Arif Nursyahid, Thomas Agung Setyawan, M. Fitri, I. Nugraha","doi":"10.22146/jnteti.v13i1.8564","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.8564","url":null,"abstract":"Modernisasi pada sektor pertanian diharapkan berpengaruh pada peningkatan kualitas, jumlah produksi, dan kontinuitas suplai hasil tani. Saat ini banyak dikembangkan pertanian cerdas (smart agriculture) dalam greenhouse. Namun, beberapa parameter greenhouse harus diperhatikan supaya pertumbuhan tanaman berlangsung secara optimal. Pada penelitian ini dibuat sebuah sistem pemantauan dan pengendalian beberapa parameter greenhouse berbasis internet of things (IoT) yang memungkinkan petani melakukan pemantauan dan pengendalian kapan pun dan di mana pun. Hal ini juga dapat meningkatkan efisiensi kerja petani dalam melakukan pemantauan dan pengendalian, terlebih jika greenhouse yang dipantau dan dikendalikan lebih dari satu. Data-data hasil pemantauan greenhouse dapat dilihat secara real-time dan tersimpan di server, sehingga memudahkan petani melakukan evaluasi terhadap greenhouse dan tanaman. Beberapa parameter yang dipantau adalah suhu greenhouse, kelembapan greenhouse, dan intensitas cahaya dalam greenhouse, sedangkan parameter yang dikendalikan adalah suhu greenhouse dan kelembapan greenhouse, dengan menggunakan exhaust fan. Proses pengiriman data pemantauan dan pengendalian parameter greenhouse dilakukan menggunakan protokol message queue telemetry transport (MQTT). Pengujian data loss dan delay pada sistem diperlukan untuk mengetahui keandalan alat dalam proses pengiriman dan penerimaan data. Hasil pengujian quality of service (QoS) adalah sebagai berikut: rata-rata data loss pemantauan Gateway-Server sebesar 10,6 %, rata-rata delay pemantauan gateway-server sebesar 1,9 s, dan rata-rata delay pengendalian server-gateway sebesar 7,1 s. Saat nilai parameter suhu greenhouse kurang dari batas ambang maksimal yang ditentukan, sistem akan menyalakan drum fan agar suhu mencapai nilai minimal pada batas ambang.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"26 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140450253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Mask Use Detection With SVM and Haar Cascade in OpenCV 利用 SVM 和 Haar Cascade 在 OpenCV 中实现掩码使用检测
Pub Date : 2024-02-12 DOI: 10.22146/jnteti.v13i1.9292
Hustinawaty, Muhammad Farell
Despite a decline in global COVID-19 cases, the persisting threat of SARS-CoV-2 coupled with waning public awareness of the virus threat has raised concerns. A notable number of individuals disregard mask usage or do so incorrectly. It is particularly concerning given that COVID-19 has high transmissibility, especially in crowded areas like shopping centers. Enforcement officers often face challenges in identifying those wearing masks improperly. Herein lies the significance of automated mask detection to aid enforcement officers in containing the spread of the virus. Hence, this paper aims to highlight the importance of automated mask detection in combatting COVID-19 transmission. Previous mask detection algorithms were intricate because they relied heavily on resource-intensive machine learning algorithms and libraries. These algorithms, however, failed to address the problem of incorrect mask usage adequately. Therefore, despite the apparent usage of masks, the virus managed to find transmission pathways. In contrast, this research focuses on creating algorithms that pinpoint improper mask usage and optimize resource utilization without compromising detection quality. The Haar cascade algorithm was utilized to detect faces and the support vector machine (SVM) was used to train the dataset. The model attained an average accuracy of 95.8%, precision of 99.7%, recall of 92.3%, and F1-score of 93.7%. The metrics aligned with prior studies, affirming their reliability. Nevertheless, limitations exist as the model faces challenges in detecting obscured facial features, requiring further research to enhance its detection capabilities. This research contributes to ongoing efforts to improve mask detection technology for more effective virus containment.
尽管全球 COVID-19 病例有所下降,但 SARS-CoV-2 的持续威胁以及公众对病毒威胁认识的减弱引起了人们的关注。相当多的人无视口罩的使用或使用不当。鉴于 COVID-19 的高传播性,尤其是在购物中心等人群密集的地方,这种情况尤其令人担忧。执法人员在识别不正确佩戴口罩者时经常面临挑战。因此,自动口罩检测对于帮助执法人员遏制病毒传播具有重要意义。因此,本文旨在强调自动口罩检测对遏制 COVID-19 传播的重要性。以前的掩码检测算法非常复杂,因为它们严重依赖于资源密集型机器学习算法和库。然而,这些算法未能充分解决不正确使用掩码的问题。因此,尽管表面上使用了掩码,病毒仍能找到传播途径。与此相反,本研究的重点是创建算法,在不影响检测质量的前提下,准确定位不正确的掩码使用并优化资源利用。我们利用 Haar 级联算法来检测人脸,并使用支持向量机(SVM)来训练数据集。该模型的平均准确率为 95.8%,精确率为 99.7%,召回率为 92.3%,F1 分数为 93.7%。这些指标与之前的研究结果一致,肯定了其可靠性。然而,由于该模型在检测模糊面部特征方面面临挑战,因此还存在局限性,需要进一步研究以提高其检测能力。这项研究有助于不断改进掩码检测技术,从而更有效地遏制病毒。
{"title":"Implementation of Mask Use Detection With SVM and Haar Cascade in OpenCV","authors":"Hustinawaty, Muhammad Farell","doi":"10.22146/jnteti.v13i1.9292","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.9292","url":null,"abstract":"Despite a decline in global COVID-19 cases, the persisting threat of SARS-CoV-2 coupled with waning public awareness of the virus threat has raised concerns. A notable number of individuals disregard mask usage or do so incorrectly. It is particularly concerning given that COVID-19 has high transmissibility, especially in crowded areas like shopping centers. Enforcement officers often face challenges in identifying those wearing masks improperly. Herein lies the significance of automated mask detection to aid enforcement officers in containing the spread of the virus. Hence, this paper aims to highlight the importance of automated mask detection in combatting COVID-19 transmission. Previous mask detection algorithms were intricate because they relied heavily on resource-intensive machine learning algorithms and libraries. These algorithms, however, failed to address the problem of incorrect mask usage adequately. Therefore, despite the apparent usage of masks, the virus managed to find transmission pathways. In contrast, this research focuses on creating algorithms that pinpoint improper mask usage and optimize resource utilization without compromising detection quality. The Haar cascade algorithm was utilized to detect faces and the support vector machine (SVM) was used to train the dataset. The model attained an average accuracy of 95.8%, precision of 99.7%, recall of 92.3%, and F1-score of 93.7%. The metrics aligned with prior studies, affirming their reliability. Nevertheless, limitations exist as the model faces challenges in detecting obscured facial features, requiring further research to enhance its detection capabilities. This research contributes to ongoing efforts to improve mask detection technology for more effective virus containment.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"14 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140457884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studi Penerapan Power Wheeling Pembangkit Fotovoltaik Dengan Metode MW-km 用兆瓦-公里法研究光伏电站的电力轮转应用
Pub Date : 2024-02-06 DOI: 10.22146/jnteti.v13i1.6332
Muhammad Bhayu Bramantyo, Sasongko Pramonohadi, Sarjiya
Upaya dalam mengurangi emisi karbon pada sektor ketenagalistrikan adalah dengan menerapkan pembangkit energi terbarukan yang lebih ramah lingkungan. Pembangkit fotovoltaik (photovoltaic, PV) sebagai pembangkit terdistribusi (distributed generator, DG) merupakan salah satu pembangkit dari energi terbarukan yang menjadi tren saat ini. DG merupakan pembangkit yang letaknya dekat dengan beban pada jaringan distribusi. Dalam penerapannya, PV DG akan memengaruhi besar rugi daya pada jaringan listrik yang sudah ada (existing), sehingga juga memengaruhi besar biaya rugi energi. Selain itu, ketersediaan lahan yang memadai juga diperlukan dalam pemasangan PV DG.  Hal ini menyebabkan kerja sama antara pelaku usaha penyedia tenaga listrik PV DG dengan partner beban dilakukan secara berjauhan, sehingga menimbulkan masalah penyaluran. Pembangunan saluran distribusi oleh pelaku usaha untuk evakuasi produksi listriknya hampir tidak mungkin dilakukan. Sewa jaringan distribusi menjadi solusi yang menarik, yaitu melalui skema pemanfaatan bersama jaringan distribusi atau power wheeling. Penelitian ini bertujuan untuk melakukan studi penerapan power wheeling pembangkit PV pada sistem jaringan distribusi IEEE 33 bus, dengan mencari lokasi bus penempatan pembangkit wheeling PV yang menghasilkan total biaya rugi energi dan biaya sewa jaringan distribusi terkecil. Metode MW-km digunakan untuk perhitungan biaya sewa jaringan. Ketersediaan lahan tiap bus juga dipertimbangkan dalam penelitian ini. Hasil penelitian menunjukkan bahwa penempatan pembangkit wheeling PV di bus 8 menghasilkan biaya total rugi energi dan biaya sewa jaringan distribusi terkecil selama setahun. Hal tersebut menunjukkan bahwa penempatan pembangkit wheeling PV di sembarang tempat belum tentu menghasilkan total biaya rugi energi dan biaya sewa jaringan distribusi terkecil.
为减少电力行业的碳排放,需要采用更加环保的可再生能源发电。作为分布式发电机(DG)的光伏发电是目前流行的可再生能源发电厂之一。分布式发电机是一种靠近配电网负荷的发电机。在应用过程中,光伏 DG 会影响现有电网的电力损耗量,从而也会影响能源损耗成本。此外,安装光伏 DG 还需要充足的土地。 这就导致光伏 DG 供电商与负荷合作伙伴之间的合作距离较远,造成配电问题。电力公司几乎不可能建设配电线路来疏散其电力生产。通过配电网络共享计划或电力轮转,配电网络租赁是一种有吸引力的解决方案。本研究旨在研究光伏电站电力轮转在 IEEE 33 总线配电网系统中的应用,通过寻找光伏电站轮转的母线位置,使总能量损失成本和配电网租赁成本最小。网络租赁成本的计算采用 MW-km 法。本研究还考虑了每条母线的土地可用性。结果表明,将光伏轮转电站布置在母线 8 上,一年的总能源损耗成本和配电网租赁成本最小。这表明,在任何地方安装轮转光伏电站,都不一定能带来最小的总能源损耗成本和配电网租赁成本。
{"title":"Studi Penerapan Power Wheeling Pembangkit Fotovoltaik Dengan Metode MW-km","authors":"Muhammad Bhayu Bramantyo, Sasongko Pramonohadi, Sarjiya","doi":"10.22146/jnteti.v13i1.6332","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.6332","url":null,"abstract":"Upaya dalam mengurangi emisi karbon pada sektor ketenagalistrikan adalah dengan menerapkan pembangkit energi terbarukan yang lebih ramah lingkungan. Pembangkit fotovoltaik (photovoltaic, PV) sebagai pembangkit terdistribusi (distributed generator, DG) merupakan salah satu pembangkit dari energi terbarukan yang menjadi tren saat ini. DG merupakan pembangkit yang letaknya dekat dengan beban pada jaringan distribusi. Dalam penerapannya, PV DG akan memengaruhi besar rugi daya pada jaringan listrik yang sudah ada (existing), sehingga juga memengaruhi besar biaya rugi energi. Selain itu, ketersediaan lahan yang memadai juga diperlukan dalam pemasangan PV DG.  Hal ini menyebabkan kerja sama antara pelaku usaha penyedia tenaga listrik PV DG dengan partner beban dilakukan secara berjauhan, sehingga menimbulkan masalah penyaluran. Pembangunan saluran distribusi oleh pelaku usaha untuk evakuasi produksi listriknya hampir tidak mungkin dilakukan. Sewa jaringan distribusi menjadi solusi yang menarik, yaitu melalui skema pemanfaatan bersama jaringan distribusi atau power wheeling. Penelitian ini bertujuan untuk melakukan studi penerapan power wheeling pembangkit PV pada sistem jaringan distribusi IEEE 33 bus, dengan mencari lokasi bus penempatan pembangkit wheeling PV yang menghasilkan total biaya rugi energi dan biaya sewa jaringan distribusi terkecil. Metode MW-km digunakan untuk perhitungan biaya sewa jaringan. Ketersediaan lahan tiap bus juga dipertimbangkan dalam penelitian ini. Hasil penelitian menunjukkan bahwa penempatan pembangkit wheeling PV di bus 8 menghasilkan biaya total rugi energi dan biaya sewa jaringan distribusi terkecil selama setahun. Hal tersebut menunjukkan bahwa penempatan pembangkit wheeling PV di sembarang tempat belum tentu menghasilkan total biaya rugi energi dan biaya sewa jaringan distribusi terkecil.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"92 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140461185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penerapan Computation Offloading Pada Sistem Deteksi Pelanggaran Perlintasan Sebidang Berbasis Komputasi Tepi 计算卸载在基于边缘计算的越界违规检测系统中的应用
Pub Date : 2024-02-05 DOI: 10.22146/jnteti.v13i1.8795
Rian Putra Pratama, S. Supangkat
Perlintasan sebidang masih menjadi permasalahan di beberapa kota akibat tingkat pelanggaran yang tinggi. Saat ini, pengawasan di perlintasan sebidang masih dilakukan secara konvensional. Permasalahan di perlintasan sebidang makin kompleks dan solusi konvensional tidak lagi efektif, sehingga diperlukan sistem pengawasan video cerdas sebagai solusi. Penerapan sistem pengawasan video cerdas merupakan tugas yang kompleks dan memerlukan perangkat dengan sumber daya komputasi besar. Penelitian ini bertujuan mengoptimalkan sistem dalam melakukan pemrosesan data secara real-time dengan melakukan komputasi dekat dengan sumber data dan membagi tugas komputasi ke beberapa perangkat tepi (edge device). Sistem pengawasan video cerdas berbasis komputasi tepi (edge computing) dengan metode computation offloading pada perangkat terbatas diusulkan sebagai solusi pada penelitian ini. Penelitian ini terdiri atas dua tahap pengembangan. Tahap pertama mengembangkan model deteksi objek menggunakan dataset perlintasan sebidang di Kota Bandung dan tahap kedua mengembangkan sistem berbasis komputasi tepi dengan menerapkan metode computation offloading pada perangkat komputasi terbatas. Metode komputasi tepi memperluas komputasi awan (cloud computing) ke tepi jaringan untuk melakukan perhitungan dekat dengan sumber data, sedangkan metode computation offloading meningkatkan kinerja komputasi tepi dengan membagi tugas komputasi. Hasil pengujian menunjukkan terjadinya peningkatan kecepatan komputasi sekitar 1,5 kali lebih cepat dengan tingkat akurasi deteksi pelanggaran mencapai 89,4%. Selain itu, terjadi penurunan suhu GPU sebesar 5,50 °C, penggunaan GPU turun 44,05%, penggunaan memori berkurang 301 Mb, dan konsumsi daya menurun 2,28 W. Sistem yang dikembangkan efektif dan efisien dalam mengoptimalkan kinerja sistem deteksi pelanggaran di perlintasan sebidang pada perangkat komputasi terbatas.
由于违规现象严重,平交道口在一些城市仍然是个问题。目前,对平交道口的监管仍采用传统方式。平交道口的问题日益复杂,传统的解决方案已不再有效,因此需要一个智能视频监控系统作为解决方案。智能视频监控系统的实施是一项复杂的任务,需要具备大量计算资源的设备。本研究旨在通过在数据源附近进行计算,并将计算任务分配给多个边缘设备,从而优化系统的实时数据处理。本研究提出了一种基于边缘计算的智能视频监控系统解决方案,该系统在有限的设备上采用计算卸载方法。这项研究包括两个阶段的开发。第一阶段利用万隆市的平交道口数据集开发了一个物体检测模型,第二阶段通过在有限的计算设备上应用计算卸载方法开发了一个基于边缘计算的系统。边缘计算方法将云计算扩展到网络边缘,在靠近数据源的地方执行计算,而计算卸载方法则通过划分计算任务提高边缘计算性能。测试结果表明,计算速度提高了约 1.5 倍,违规检测准确率达到 89.4%。此外,GPU 温度降低了 5.50°C,GPU 使用量降低了 44.05%,内存使用量降低了 301 Mb,功耗降低了 2.28 W。
{"title":"Penerapan Computation Offloading Pada Sistem Deteksi Pelanggaran Perlintasan Sebidang Berbasis Komputasi Tepi","authors":"Rian Putra Pratama, S. Supangkat","doi":"10.22146/jnteti.v13i1.8795","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.8795","url":null,"abstract":"Perlintasan sebidang masih menjadi permasalahan di beberapa kota akibat tingkat pelanggaran yang tinggi. Saat ini, pengawasan di perlintasan sebidang masih dilakukan secara konvensional. Permasalahan di perlintasan sebidang makin kompleks dan solusi konvensional tidak lagi efektif, sehingga diperlukan sistem pengawasan video cerdas sebagai solusi. Penerapan sistem pengawasan video cerdas merupakan tugas yang kompleks dan memerlukan perangkat dengan sumber daya komputasi besar. Penelitian ini bertujuan mengoptimalkan sistem dalam melakukan pemrosesan data secara real-time dengan melakukan komputasi dekat dengan sumber data dan membagi tugas komputasi ke beberapa perangkat tepi (edge device). Sistem pengawasan video cerdas berbasis komputasi tepi (edge computing) dengan metode computation offloading pada perangkat terbatas diusulkan sebagai solusi pada penelitian ini. Penelitian ini terdiri atas dua tahap pengembangan. Tahap pertama mengembangkan model deteksi objek menggunakan dataset perlintasan sebidang di Kota Bandung dan tahap kedua mengembangkan sistem berbasis komputasi tepi dengan menerapkan metode computation offloading pada perangkat komputasi terbatas. Metode komputasi tepi memperluas komputasi awan (cloud computing) ke tepi jaringan untuk melakukan perhitungan dekat dengan sumber data, sedangkan metode computation offloading meningkatkan kinerja komputasi tepi dengan membagi tugas komputasi. Hasil pengujian menunjukkan terjadinya peningkatan kecepatan komputasi sekitar 1,5 kali lebih cepat dengan tingkat akurasi deteksi pelanggaran mencapai 89,4%. Selain itu, terjadi penurunan suhu GPU sebesar 5,50 °C, penggunaan GPU turun 44,05%, penggunaan memori berkurang 301 Mb, dan konsumsi daya menurun 2,28 W. Sistem yang dikembangkan efektif dan efisien dalam mengoptimalkan kinerja sistem deteksi pelanggaran di perlintasan sebidang pada perangkat komputasi terbatas.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"110 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140461825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Fencing Athletes Based on Anthropometric Measurements Using MediaPipe Pose 使用 MediaPipe Pose 根据人体测量结果识别击剑运动员
Pub Date : 2024-02-02 DOI: 10.22146/jnteti.v13i1.8145
Bagas Alif Fimaskoro, S. Aulia, Dery Rimasa
Over time, numerous developments in digital technology have benefited people, including anthropometric measurements that provide information on an athlete’s ability in sports. The use of digital technology in sports must continue, particularly in the National Sports Committee of Indonesia (Komite Olahraga Nasional Indonesia, KONI) of Bandung City. This study proposed a technique for classifying and identifying fencing athletes’ talents. This work developed a methodology for evaluating sports talent based on anthropometric measurements of athletes’ bodies using the posture detection approach. Fencing and nonfencing athletes in KONI Bandung City were categorized using this talent identification. This study used 36 datasets of body posture images from various skills of the sport. These images were in JPEG or JPG format with a resolution of 3,024 × 4,032 and were acquired using a Canon EOS 1300D camera. This study utilized four points landmarks, which are usually used as measurement components in KONI, to categorize fencing athletes. The four points are shoulder (S), elbow (E), index (I), and hip (H) landmarks. The testing was done using three different dataset settings. According to the test results of all scenarios, scenario 2 had the highest accuracy. This scenario was able to categorize fencing and nonfencing athletes with an accuracy rate of 89% and an average processing time of less than 3 s per image.
随着时间的推移,数字技术的众多发展造福了人们,其中包括提供运动员运动能力信息的人体测量技术。必须继续在体育运动中使用数字技术,特别是在万隆市的印度尼西亚国家体育委员会(Komite Olahraga Nasional Indonesia, KONI)。本研究提出了一种对击剑运动员的天赋进行分类和鉴定的技术。这项工作利用姿势检测方法,根据对运动员身体的人体测量结果,开发了一种评估运动天赋的方法。通过这种天赋识别方法,对万隆科尼市的击剑和非击剑运动员进行了分类。本研究使用了 36 个来自不同运动技能的身体姿势图像数据集。这些图像均为 JPEG 或 JPG 格式,分辨率为 3,024 × 4,032 ,使用佳能 EOS 1300D 相机获取。本研究利用 KONI 中通常用作测量组件的四个点地标对击剑运动员进行分类。这四个点分别是肩(S)、肘(E)、食指(I)和髋(H)地标。测试使用了三种不同的数据集设置。根据所有方案的测试结果,方案 2 的准确率最高。该方案能够对击剑和非击剑运动员进行分类,准确率为 89%,每张图像的平均处理时间少于 3 秒。
{"title":"Identification of Fencing Athletes Based on Anthropometric Measurements Using MediaPipe Pose","authors":"Bagas Alif Fimaskoro, S. Aulia, Dery Rimasa","doi":"10.22146/jnteti.v13i1.8145","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.8145","url":null,"abstract":"Over time, numerous developments in digital technology have benefited people, including anthropometric measurements that provide information on an athlete’s ability in sports. The use of digital technology in sports must continue, particularly in the National Sports Committee of Indonesia (Komite Olahraga Nasional Indonesia, KONI) of Bandung City. This study proposed a technique for classifying and identifying fencing athletes’ talents. This work developed a methodology for evaluating sports talent based on anthropometric measurements of athletes’ bodies using the posture detection approach. Fencing and nonfencing athletes in KONI Bandung City were categorized using this talent identification. This study used 36 datasets of body posture images from various skills of the sport. These images were in JPEG or JPG format with a resolution of 3,024 × 4,032 and were acquired using a Canon EOS 1300D camera. This study utilized four points landmarks, which are usually used as measurement components in KONI, to categorize fencing athletes. The four points are shoulder (S), elbow (E), index (I), and hip (H) landmarks. The testing was done using three different dataset settings. According to the test results of all scenarios, scenario 2 had the highest accuracy. This scenario was able to categorize fencing and nonfencing athletes with an accuracy rate of 89% and an average processing time of less than 3 s per image.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"87 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single-Phase Shift Modulation of DAB Converter in Typhoon HIL Simulation 台风 HIL 仿真中的单相移位调制 DAB 转换器
Pub Date : 2024-01-30 DOI: 10.22146/jnteti.v13i1.6876
Yohan Fajar Sidik, F. Danang Wijaya, Roni Irnawan, Muhammad Ridwan, Kevin Gausultan, Sriyono
Solid-state transformer (SST) could be a solution for a future distribution system, in which many renewable energy sources (RES) are integrated. The SST consists of a single-phase dual-active bridge (DAB) converter, which is scale-down the dc voltage level. The control objective of the DAB converter used in the SST is to control its output voltage. This control strategy consists of a proportional-integral (PI) controller and a single-phase shift (SPS) modulation. Numerous literatures have mentioned about the SPS modulation for the DAB converter. However, they do not provide procedures in implementing the SPS modulation in the real controller. This paper aims to develop the SPS modulation in the real controller of the STM32F446RE microcontroller. The proposed SPS modulation is based on a master-slave timer feature, which is available in the STM32 microcontroller. The development process and testing of the complete control strategy of the DAB converter were carried out in the hardware-in-the-loop (HIL) simulation using Typhoon HIL. This scheme speeds up the development of process and reduces the costs. The experiment in the HIL environment shows that proposed control strategy of the DAB converter consisting of the PI controller and the SPS modulation is successfully implemented in the real microcontroller of the STM32F446RE. The proposed control strategy of the DAB converter is capable of bidirectional power flow, which is useful for integrating distributed generators in the load side. Moreover, this control strategy can reject the disturbance caused by loads.
固态变压器(SST)是未来配电系统的一种解决方案,该系统集成了多种可再生能源(RES)。固态变压器由一个单相双有源桥(DAB)转换器组成,可降低直流电压水平。SST 中使用的 DAB 转换器的控制目标是控制其输出电压。该控制策略由比例积分(PI)控制器和单相移位(SPS)调制组成。许多文献都提到了 DAB 转换器的 SPS 调制。但是,它们并没有提供在实际控制器中实施 SPS 调制的程序。本文的目的是在 STM32F446RE 微控制器的实际控制器中开发 SPS 调制。建议的 SPS 调制基于 STM32 微控制器中可用的主从定时器功能。DAB 转换器完整控制策略的开发过程和测试是在使用 Typhoon HIL 进行的硬件在环 (HIL) 仿真中完成的。该方案加快了开发过程并降低了成本。HIL 环境下的实验表明,由 PI 控制器和 SPS 调制组成的 DAB 转换器控制策略已在 STM32F446RE 的实际微控制器中成功实现。所提出的 DAB 转换器控制策略能够实现双向功率流,这对于在负载侧集成分布式发电机非常有用。此外,这种控制策略还能抑制负载造成的干扰。
{"title":"Single-Phase Shift Modulation of DAB Converter in Typhoon HIL Simulation","authors":"Yohan Fajar Sidik, F. Danang Wijaya, Roni Irnawan, Muhammad Ridwan, Kevin Gausultan, Sriyono","doi":"10.22146/jnteti.v13i1.6876","DOIUrl":"https://doi.org/10.22146/jnteti.v13i1.6876","url":null,"abstract":"Solid-state transformer (SST) could be a solution for a future distribution system, in which many renewable energy sources (RES) are integrated. The SST consists of a single-phase dual-active bridge (DAB) converter, which is scale-down the dc voltage level. The control objective of the DAB converter used in the SST is to control its output voltage. This control strategy consists of a proportional-integral (PI) controller and a single-phase shift (SPS) modulation. Numerous literatures have mentioned about the SPS modulation for the DAB converter. However, they do not provide procedures in implementing the SPS modulation in the real controller. This paper aims to develop the SPS modulation in the real controller of the STM32F446RE microcontroller. The proposed SPS modulation is based on a master-slave timer feature, which is available in the STM32 microcontroller. The development process and testing of the complete control strategy of the DAB converter were carried out in the hardware-in-the-loop (HIL) simulation using Typhoon HIL. This scheme speeds up the development of process and reduces the costs. The experiment in the HIL environment shows that proposed control strategy of the DAB converter consisting of the PI controller and the SPS modulation is successfully implemented in the real microcontroller of the STM32F446RE. The proposed control strategy of the DAB converter is capable of bidirectional power flow, which is useful for integrating distributed generators in the load side. Moreover, this control strategy can reject the disturbance caused by loads.","PeriodicalId":31477,"journal":{"name":"Jurnal Nasional Teknik Elektro dan Teknologi Informasi","volume":"368 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140480321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Jurnal Nasional Teknik Elektro dan Teknologi Informasi
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1