首页 > 最新文献

2020 International Electronics Symposium (IES)最新文献

英文 中文
Tile Surface Segmentation Using Deep Convolutional Encoder-Decoder Architecture 基于深度卷积编码器-解码器结构的瓷砖表面分割
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231575
Evianita Dewi Fajrianti, Endah Suryawati Ningrum, Anhar Risnumawan, Kerent Vidia Madalena
Visual inspection systems in industries have increasingly gained a lot of interests. Advances in manufacturing activities have led to mass production in order to reduce overall operational cost. The visual inspection systems provide instant quantitative feedback such as quantity and type of defects. In this paper, we present a visual inspection method of tiles industry using a deep learning approach. The deep learning approach is employed for segmenting cracks and backgrounds in tiles. Due to the small size of the cracks, image segmentation is crucial. Architecture for segmenting semantic objects in a color image is the main inspiration to be applied on this paper. Semantic segmentation is widely applied for image analysis in the real world, one of which is to conduct a visual inspection of tile surfaces where each pixel input of high-resolution images is categorized into a set of semantic labels. In order to test the performance of the segmentation algorithm, SegNet architecture with the DeepLabV3plus were compared. A new dataset named UBIN is also proposed as a training and evaluation data. The training data that we have collected shows promising results on visual inspection when using the proposed algorithm. We believe that this work could improve to a more advanced manufacturing industries.
视觉检测系统在工业中越来越受到人们的关注。制造活动的进步导致了大规模生产,以降低总体运营成本。目视检查系统提供即时的定量反馈,如缺陷的数量和类型。在本文中,我们提出了一种使用深度学习方法的瓷砖行业视觉检测方法。采用深度学习方法对瓷砖中的裂缝和背景进行分割。由于裂纹尺寸小,图像分割是至关重要的。彩色图像中语义对象分割的体系结构是本文应用的主要灵感。语义分割在现实世界中被广泛应用于图像分析,其中一种方法是对瓷砖表面进行视觉检测,将高分辨率图像的每个像素输入分类为一组语义标签。为了测试分割算法的性能,将SegNet架构与DeepLabV3plus进行了比较。本文还提出了一个名为UBIN的新数据集作为训练和评估数据。我们收集的训练数据表明,使用本文提出的算法在视觉检测方面取得了良好的效果。我们相信,这项工作可以提高到一个更先进的制造业。
{"title":"Tile Surface Segmentation Using Deep Convolutional Encoder-Decoder Architecture","authors":"Evianita Dewi Fajrianti, Endah Suryawati Ningrum, Anhar Risnumawan, Kerent Vidia Madalena","doi":"10.1109/IES50839.2020.9231575","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231575","url":null,"abstract":"Visual inspection systems in industries have increasingly gained a lot of interests. Advances in manufacturing activities have led to mass production in order to reduce overall operational cost. The visual inspection systems provide instant quantitative feedback such as quantity and type of defects. In this paper, we present a visual inspection method of tiles industry using a deep learning approach. The deep learning approach is employed for segmenting cracks and backgrounds in tiles. Due to the small size of the cracks, image segmentation is crucial. Architecture for segmenting semantic objects in a color image is the main inspiration to be applied on this paper. Semantic segmentation is widely applied for image analysis in the real world, one of which is to conduct a visual inspection of tile surfaces where each pixel input of high-resolution images is categorized into a set of semantic labels. In order to test the performance of the segmentation algorithm, SegNet architecture with the DeepLabV3plus were compared. A new dataset named UBIN is also proposed as a training and evaluation data. The training data that we have collected shows promising results on visual inspection when using the proposed algorithm. We believe that this work could improve to a more advanced manufacturing industries.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Illumination Invariant Face Recognition for Accessing User Record in Healthcare Kiosk 光照不变人脸识别在医疗服务站用户记录访问中的实现
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231644
Muhammad Rizal Firmanda, Bima Sena Bayu Dewantara, R. Sigit
The availability of health check facilities that are increasingly affordable in terms of cost and distance is very useful for the community. Therefore, the presence of a healthcare kiosk that is installed everywhere will certainly be very beneficial for the wider community. In this paper, we developed a user-login method in the healthcare kiosk without utilizing any additional tools so that it is quite efficient, using face recognition biometric technology. We added the invariant illumination feature to face recognition technology to ensure that the healthcare kiosk system will continue to work even in places with changing lighting. This feature uses the light intensity contrast adjustment in the image automatically by employing the Fuzzy Inference System (FIS) and Genetic Algorithm (GA). Based on the results of testing the user-login system, we get an accuracy of 85.57% with an ideal distance of 30-60 cm. The system works with maximum performance in some experimental conditions such as normal lighting, backlighting, direct-lighting, low-lighting, and dark. Users that use facial recognition as a login method, the facial recognition program will capture the user's face and match it to the database. If the user is registered in the database, the system will inform the user that the user is logged in successfully, otherwise, if the user is not logged in, the system will notify the user as unknown.
在费用和距离方面越来越负担得起的健康检查设施的可用性对社区非常有用。因此,随处安装的医疗保健亭的存在肯定会对更广泛的社区非常有益。在本文中,我们开发了一种在医疗保健亭中不使用任何额外工具的用户登录方法,因此使用面部识别生物识别技术非常高效。我们在人脸识别技术中增加了不变照明功能,以确保医疗亭系统即使在光照变化的地方也能继续工作。该特征利用模糊推理系统(FIS)和遗传算法(GA)自动调节图像中的光强对比度。根据用户登录系统的测试结果,我们得到的准确率为85.57%,理想距离为30-60 cm。该系统在正常照明、背光、直接照明、低光和黑暗等实验条件下均能发挥最大性能。使用面部识别作为登录方式的用户,面部识别程序将捕捉用户的面部并将其与数据库进行匹配。如果用户已在数据库中注册,系统将提示用户登录成功,否则,如果用户未登录,系统将提示用户为未知。
{"title":"Implementation of Illumination Invariant Face Recognition for Accessing User Record in Healthcare Kiosk","authors":"Muhammad Rizal Firmanda, Bima Sena Bayu Dewantara, R. Sigit","doi":"10.1109/IES50839.2020.9231644","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231644","url":null,"abstract":"The availability of health check facilities that are increasingly affordable in terms of cost and distance is very useful for the community. Therefore, the presence of a healthcare kiosk that is installed everywhere will certainly be very beneficial for the wider community. In this paper, we developed a user-login method in the healthcare kiosk without utilizing any additional tools so that it is quite efficient, using face recognition biometric technology. We added the invariant illumination feature to face recognition technology to ensure that the healthcare kiosk system will continue to work even in places with changing lighting. This feature uses the light intensity contrast adjustment in the image automatically by employing the Fuzzy Inference System (FIS) and Genetic Algorithm (GA). Based on the results of testing the user-login system, we get an accuracy of 85.57% with an ideal distance of 30-60 cm. The system works with maximum performance in some experimental conditions such as normal lighting, backlighting, direct-lighting, low-lighting, and dark. Users that use facial recognition as a login method, the facial recognition program will capture the user's face and match it to the database. If the user is registered in the database, the system will inform the user that the user is logged in successfully, otherwise, if the user is not logged in, the system will notify the user as unknown.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of Short Duration Voltage Variations Based on Short Time Fourier Transform and Artificial Neural Network 基于短时傅里叶变换和人工神经网络的短时电压变化识别
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231815
D. O. Anggriawan, E. Wahjono, I. Sudiharto, Aji Akbar Firdaus, Dianing Novita Nurmala Putri, Anang Budikarso
This paper presents the proposed algorithms for identification of short duration voltage variations (SDVV) as voltage sag dan voltage swell. The proposed algorithms are short time fourier transform (STFT) and artificial neural network (ANN). STFT is used to signal analysis of SDVV. However, SDVV have characteristics of non-stationary signal, which it is not can be detected by fast fourier transform (FFT). Moreover, ANN is used to identification of SDVV, which it identifies five types of SDVV such as normal signal, voltage sag, voltage swell, voltage sag combined harmonic and voltage swell combined harmonic. Output STFT is used to ANN for identification. The simulation is conducted by STFT comparing of FFT. Whereas, to evaluate of ANN with variation of neurons. The simulation result show that STFT more accurate compared by FFT to detection of SDVV. Moreover, ANN has good accuracy for SDVV types identification, which ANN with 10 x 10 neurons in hidden layer has accuracy of 100 %.
本文提出了一种短时电压变化(SDVV)的识别算法。提出了短时傅里叶变换(STFT)和人工神经网络(ANN)算法。将STFT用于SDVV的信号分析。然而,SDVV具有非平稳信号的特点,这是快速傅里叶变换(FFT)无法检测到的。利用人工神经网络对SDVV进行识别,识别出正常信号、电压跌落、电压膨胀、电压跌落组合谐波和电压膨胀组合谐波五种SDVV类型。输出STFT用于人工神经网络进行识别。通过STFT与FFT的对比进行仿真。而用神经元的变化来评价人工神经网络。仿真结果表明,与FFT相比,STFT对SDVV的检测更准确。此外,人工神经网络对SDVV类型识别具有良好的准确率,其中隐藏层神经元数为10 × 10的人工神经网络准确率达到100%。
{"title":"Identification of Short Duration Voltage Variations Based on Short Time Fourier Transform and Artificial Neural Network","authors":"D. O. Anggriawan, E. Wahjono, I. Sudiharto, Aji Akbar Firdaus, Dianing Novita Nurmala Putri, Anang Budikarso","doi":"10.1109/IES50839.2020.9231815","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231815","url":null,"abstract":"This paper presents the proposed algorithms for identification of short duration voltage variations (SDVV) as voltage sag dan voltage swell. The proposed algorithms are short time fourier transform (STFT) and artificial neural network (ANN). STFT is used to signal analysis of SDVV. However, SDVV have characteristics of non-stationary signal, which it is not can be detected by fast fourier transform (FFT). Moreover, ANN is used to identification of SDVV, which it identifies five types of SDVV such as normal signal, voltage sag, voltage swell, voltage sag combined harmonic and voltage swell combined harmonic. Output STFT is used to ANN for identification. The simulation is conducted by STFT comparing of FFT. Whereas, to evaluate of ANN with variation of neurons. The simulation result show that STFT more accurate compared by FFT to detection of SDVV. Moreover, ANN has good accuracy for SDVV types identification, which ANN with 10 x 10 neurons in hidden layer has accuracy of 100 %.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling and Simulation of MPPT ZETA Converter Using Human Psychology Optimization Algorithm Under Partial Shading Condition 部分遮阳条件下MPPT ZETA转换器的人心理优化算法建模与仿真
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231890
Fitriyah Fitriyah, M. Z. Efendi, Farid Dwi Murdianto
The increasing development of renewable energy, especially photovoltaic (PV) more applicable in daily use. Unfortunately, PV has the disadvantage that it is vulnerable to shadow exposures that decrease power output depending on the scale of the shadow. The disadvantage includes the shadow of buildings, leaves, trees, etc. Shaded PV surface has two peak power conditions named Global Maximum Power Point (GMPP) and Local Maximum Power Point (LMPP). These conditions cause MPPT to be trapped in the LMPP so that the power obtained is not the actual power. The conventional method can be trapped in LMPP because it cannot distinguish GMPP and LMPP. These problems can be solved by using the Human Psychology Optimization (HPO) algorithm. This algorithm was chosen to overcome the effects of partial shading conditions so that MPPT can reach GMPP without getting stuck in LMPP. This algorithm is connected to ZETA Converter to produce real maximum power points. This research uses four shading patterns with different irradiation. HPO algorithm achieves the highest accuracy 99.99% with a tracking time 0.326 seconds occurring in the first shading pattern.
可再生能源的日益发展,尤其是光伏(PV)在日常使用中更加适用。不幸的是,PV有一个缺点,它很容易受到阴影暴露的影响,这会根据阴影的大小减少功率输出。缺点包括建筑物、树叶、树木等的阴影。遮荫PV面具有全局最大功率点(GMPP)和局部最大功率点(LMPP)两个峰值功率条件。这些情况会导致MPPT被困在LMPP中,从而获得的功率不是实际功率。传统的方法由于无法区分GMPP和LMPP,容易陷入LMPP。这些问题可以通过人类心理优化算法来解决。选择该算法是为了克服部分遮阳条件的影响,使MPPT可以达到GMPP而不会陷入LMPP。该算法与ZETA转换器连接,产生真正的最大功率点。本研究采用四种不同辐照度的遮阳模式。HPO算法达到了最高的准确率99.99%,跟踪时间为0.326秒,发生在第一个阴影模式。
{"title":"Modeling and Simulation of MPPT ZETA Converter Using Human Psychology Optimization Algorithm Under Partial Shading Condition","authors":"Fitriyah Fitriyah, M. Z. Efendi, Farid Dwi Murdianto","doi":"10.1109/IES50839.2020.9231890","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231890","url":null,"abstract":"The increasing development of renewable energy, especially photovoltaic (PV) more applicable in daily use. Unfortunately, PV has the disadvantage that it is vulnerable to shadow exposures that decrease power output depending on the scale of the shadow. The disadvantage includes the shadow of buildings, leaves, trees, etc. Shaded PV surface has two peak power conditions named Global Maximum Power Point (GMPP) and Local Maximum Power Point (LMPP). These conditions cause MPPT to be trapped in the LMPP so that the power obtained is not the actual power. The conventional method can be trapped in LMPP because it cannot distinguish GMPP and LMPP. These problems can be solved by using the Human Psychology Optimization (HPO) algorithm. This algorithm was chosen to overcome the effects of partial shading conditions so that MPPT can reach GMPP without getting stuck in LMPP. This algorithm is connected to ZETA Converter to produce real maximum power points. This research uses four shading patterns with different irradiation. HPO algorithm achieves the highest accuracy 99.99% with a tracking time 0.326 seconds occurring in the first shading pattern.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Improvement Based on Modified Lossless Quantization (MLQ) for Secret Key Generation Extracted from Received Signal Strength 基于改进无损量化(MLQ)的接收信号强度提取密钥生成性能改进
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231640
M. T. Sumadi, Mike Yuliana, Amang Sudarsono
In symmetric cryptography systems have problems in the distribution of secret keys. The two users who will communicate require sharing keys through the public channel. The proposed solution to overcome these problems is to utilize information from the physical layer (e.g. RSS). Received Signal Strength (RSS) is an indicator for measuring the power received by wireless devices. The advantage of secret key extraction using physical layer information from a wireless channel is that it allows both devices within the transmission range to extract the secret key together. In this paper, we propose a secret key generation scheme adopted from an existing scheme with modifications to improve performance. Our proposed system is applied to static and dynamic conditions to test performance. The proposed algorithm is able to obtain a reduction in KDR (Key Disagreement Rate) up to 48.42% and an increase in the KGR (Key Generation Rate) up to 23.35% when compared to the existing scheme. Our proposed system also successfully passed the randomness using the NIST test with the approximate value of entropy generated 0.80 in static conditions and 0.81 in dynamic conditions.
在对称密码系统中存在密钥分配问题。通信的两个用户需要通过公共通道共享密钥。克服这些问题的建议解决方案是利用来自物理层的信息(例如RSS)。接收信号强度(RSS)是衡量无线设备接收功率的指标。使用来自无线信道的物理层信息提取密钥的优点是,它允许传输范围内的两个设备一起提取密钥。在本文中,我们提出了一个密钥生成方案,该方案采用了现有方案,并进行了修改以提高性能。我们提出的系统应用于静态和动态条件下测试性能。与现有方案相比,该算法可将密钥不一致率(KDR)降低48.42%,密钥生成率(KGR)提高23.35%。我们提出的系统也成功地通过了NIST测试,在静态条件下产生的熵的近似值为0.80,在动态条件下产生的熵的近似值为0.81。
{"title":"Performance Improvement Based on Modified Lossless Quantization (MLQ) for Secret Key Generation Extracted from Received Signal Strength","authors":"M. T. Sumadi, Mike Yuliana, Amang Sudarsono","doi":"10.1109/IES50839.2020.9231640","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231640","url":null,"abstract":"In symmetric cryptography systems have problems in the distribution of secret keys. The two users who will communicate require sharing keys through the public channel. The proposed solution to overcome these problems is to utilize information from the physical layer (e.g. RSS). Received Signal Strength (RSS) is an indicator for measuring the power received by wireless devices. The advantage of secret key extraction using physical layer information from a wireless channel is that it allows both devices within the transmission range to extract the secret key together. In this paper, we propose a secret key generation scheme adopted from an existing scheme with modifications to improve performance. Our proposed system is applied to static and dynamic conditions to test performance. The proposed algorithm is able to obtain a reduction in KDR (Key Disagreement Rate) up to 48.42% and an increase in the KGR (Key Generation Rate) up to 23.35% when compared to the existing scheme. Our proposed system also successfully passed the randomness using the NIST test with the approximate value of entropy generated 0.80 in static conditions and 0.81 in dynamic conditions.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114247630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation of Classifiers for Predicting Infection Cases of Dengue Virus Based on Clinical Diagnosis Criteria 基于临床诊断标准的登革热病毒感染病例分类器性能评价
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231728
A. Fahmi, D. Purwitasari, S. Sumpeno, M. Purnomo
Dengue fever caused by dengue virus infection is a severe health threat that can lead to death. In the medical and health field, to classify data, data mining exploitation and classification methods have an essential role in predicting disease. Two main criteria are crucial to diagnosing dengue virus infection, namely the criteria clinical diagnosis and laboratory diagnosis. Dengue infection based on clinical signs and symptoms, as well as laboratory examinations, is made in three clinical diagnosis criteria, which consist of dengue fever (DF), dengue hemorrhagic fever (DHF), and dengue shock syndrome (DSS). This study was conducted with the primary objective to test and evaluate eight different classification algorithms to find the best algorithm in terms of efficiency and effectiveness. Classification algorithm used to predict dengue virus infection cases into three classes of DF, DHF, and DSS based on the performance of accuracy, precision, and recall. The classification algorithm used in this comparison were Neural Networks (NN), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, Naïve Bayes, AdaBoost, and Logistic Regression. The dataset called DBDDKK was collected from the Division of Disease Prevention and Control in the Semarang City Health Office, Central Java, Indonesia. Impute missing values, selection relevant feature, and normalize feature conducted in the preprocessing stage resulted in 14,019 records with 16 attributes for each record. Then the data were split into 70% for training data and 30% for testing data. Cross-validation with the number of folds 10 is applied to validate the accuracy during the dataset training process. The result of the comparison shows that the NN algorithm has the best accuracy that was over other algorithms.
由登革热病毒感染引起的登革热是一种严重的健康威胁,可导致死亡。在医疗卫生领域,对数据进行分类,数据挖掘开发和分类方法对疾病预测具有至关重要的作用。诊断登革热病毒感染的两个主要标准至关重要,即临床诊断标准和实验室诊断标准。根据临床体征和症状以及实验室检查,对登革热感染进行三种临床诊断标准,包括登革热(DF)、登革出血热(DHF)和登革休克综合征(DSS)。本研究的主要目的是测试和评估八种不同的分类算法,以找到在效率和有效性方面最好的算法。基于准确率、精密度和召回率的分类算法,将登革热病毒感染病例分为DF、DHF和DSS三类。在这个比较中使用的分类算法是神经网络(NN)、支持向量机(SVM)、k近邻(KNN)、决策树、随机森林、Naïve贝叶斯、AdaBoost和逻辑回归。名为DBDDKK的数据集是从印度尼西亚中爪哇省三宝垄市卫生办公室疾病预防和控制司收集的。在预处理阶段进行缺失值的输入、相关特征的选取、特征的归一化,得到14019条记录,每条记录有16个属性。然后将数据分成70%的训练数据和30%的测试数据。在数据集训练过程中,采用10次交叉验证来验证准确性。对比结果表明,神经网络算法具有较好的准确率,优于其他算法。
{"title":"Performance Evaluation of Classifiers for Predicting Infection Cases of Dengue Virus Based on Clinical Diagnosis Criteria","authors":"A. Fahmi, D. Purwitasari, S. Sumpeno, M. Purnomo","doi":"10.1109/IES50839.2020.9231728","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231728","url":null,"abstract":"Dengue fever caused by dengue virus infection is a severe health threat that can lead to death. In the medical and health field, to classify data, data mining exploitation and classification methods have an essential role in predicting disease. Two main criteria are crucial to diagnosing dengue virus infection, namely the criteria clinical diagnosis and laboratory diagnosis. Dengue infection based on clinical signs and symptoms, as well as laboratory examinations, is made in three clinical diagnosis criteria, which consist of dengue fever (DF), dengue hemorrhagic fever (DHF), and dengue shock syndrome (DSS). This study was conducted with the primary objective to test and evaluate eight different classification algorithms to find the best algorithm in terms of efficiency and effectiveness. Classification algorithm used to predict dengue virus infection cases into three classes of DF, DHF, and DSS based on the performance of accuracy, precision, and recall. The classification algorithm used in this comparison were Neural Networks (NN), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree, Random Forest, Naïve Bayes, AdaBoost, and Logistic Regression. The dataset called DBDDKK was collected from the Division of Disease Prevention and Control in the Semarang City Health Office, Central Java, Indonesia. Impute missing values, selection relevant feature, and normalize feature conducted in the preprocessing stage resulted in 14,019 records with 16 attributes for each record. Then the data were split into 70% for training data and 30% for testing data. Cross-validation with the number of folds 10 is applied to validate the accuracy during the dataset training process. The result of the comparison shows that the NN algorithm has the best accuracy that was over other algorithms.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ECS: Elderly Care System for Fall and Bedsore Prevention using Non-Constraint Sensor ECS:使用无约束传感器预防跌倒和褥疮的老年护理系统
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231781
G. Pongthanisorn, W. Viriyavit, T. Prakayapan, S. Deepaisam, V. Somlertlamvanich
The Internet of Things (IoT) has become more practical nowadays. Various IoT applications are now being developed and deployed in order to attenuate our daily life problems. The global society is currently suffering problems associate to different aspects and ones that require our concern are regarding the aging society. Many and more countries are entering their aging society era while their healthcare sections have yet effective solutions to overcome the corresponding problems. Therefore, we propose the Elder Care System (ECS) for monitoring behaviours of elderly patients on the bed equipped with our designed system. The system includes notification system, in-bed position prediction system and real-time monitoring system. This paper demonstrates equipment, system architecture and dataflow. The result of our system deployment is discussed.
如今,物联网(IoT)变得越来越实用。现在正在开发和部署各种物联网应用程序,以减轻我们的日常生活问题。全球社会目前正在遭受与不同方面有关的问题,其中需要我们关注的是老龄化社会。越来越多的国家正在进入老龄化社会,而医疗保健部门却没有有效的解决方案来克服相应的问题。因此,我们提出了老年护理系统(ECS),用于监测老年患者在配备我们设计的系统的床上的行为。该系统包括通知系统、床上位置预测系统和实时监控系统。本文介绍了设备、系统架构和数据流程。讨论了系统部署的结果。
{"title":"ECS: Elderly Care System for Fall and Bedsore Prevention using Non-Constraint Sensor","authors":"G. Pongthanisorn, W. Viriyavit, T. Prakayapan, S. Deepaisam, V. Somlertlamvanich","doi":"10.1109/IES50839.2020.9231781","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231781","url":null,"abstract":"The Internet of Things (IoT) has become more practical nowadays. Various IoT applications are now being developed and deployed in order to attenuate our daily life problems. The global society is currently suffering problems associate to different aspects and ones that require our concern are regarding the aging society. Many and more countries are entering their aging society era while their healthcare sections have yet effective solutions to overcome the corresponding problems. Therefore, we propose the Elder Care System (ECS) for monitoring behaviours of elderly patients on the bed equipped with our designed system. The system includes notification system, in-bed position prediction system and real-time monitoring system. This paper demonstrates equipment, system architecture and dataflow. The result of our system deployment is discussed.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Mobile Application of User Traveling-Behavior Tracking using Heuristic Method 基于启发式方法的用户出行行为跟踪移动应用
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231813
Rasyiq Farandi, Amang Sudarsono, M. Z. S. Hadi
This research focuses on tracking user-behavior based on applications usage of the user’s smartphone and creates a conclusion of user behavior when he/she has a trip of traveling. To track the application usage from the user’s smartphone, a library from Android SDK is utilized in creating an instruction that can track the application usage from the user’s smartphone. While he/she is on a trip, his/her positions can be tracked by using Google Maps API as well integrated on the application. To realize these functionalities, a heuristic method is adopted. In this application, user behavior data that have been made are stored in the database. The data sent are secured using the RSA algorithm and equipped with message digest verification. The results show that our proposed application is worked properly within the testing scope for behavioral generation during traveling.
本研究的重点是基于用户智能手机的应用程序使用情况来跟踪用户行为,并得出用户在旅行时的行为结论。为了跟踪用户智能手机上的应用程序使用情况,我们利用Android SDK中的一个库来创建一个指令,该指令可以跟踪用户智能手机上的应用程序使用情况。当他/她在旅行时,他/她的位置可以通过使用谷歌地图API以及集成在应用程序上进行跟踪。为了实现这些功能,采用了一种启发式方法。在此应用程序中,已生成的用户行为数据存储在数据库中。发送的数据使用RSA算法进行保护,并配备消息摘要验证。结果表明,我们提出的应用程序在旅行行为生成的测试范围内运行正常。
{"title":"A Mobile Application of User Traveling-Behavior Tracking using Heuristic Method","authors":"Rasyiq Farandi, Amang Sudarsono, M. Z. S. Hadi","doi":"10.1109/IES50839.2020.9231813","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231813","url":null,"abstract":"This research focuses on tracking user-behavior based on applications usage of the user’s smartphone and creates a conclusion of user behavior when he/she has a trip of traveling. To track the application usage from the user’s smartphone, a library from Android SDK is utilized in creating an instruction that can track the application usage from the user’s smartphone. While he/she is on a trip, his/her positions can be tracked by using Google Maps API as well integrated on the application. To realize these functionalities, a heuristic method is adopted. In this application, user behavior data that have been made are stored in the database. The data sent are secured using the RSA algorithm and equipped with message digest verification. The results show that our proposed application is worked properly within the testing scope for behavioral generation during traveling.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Pattern Verification Based On Seller's Batik Solo Product Name Using SURF As A Texture Based Image Retrieval 基于SURF纹理图像检索的卖家蜡染单品名称图像模式验证
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231950
Berlian Rahmy Lidiawaty, Mohammad Isa Irawan, R. V. Hari Ginardi
Sellers in online marketplace who use batik Solo’s pattern name as their product title, but mistaken it with product image that doesn’t contain the pattern, could causes the buyer to wear batik Solo in wrong event. Every pattern in batik Solo has crucial meaning and specialize to be worn in different event such as wedding ceremony or funeral. Therefore this research has the purpose to build a system that can verify batik Solo’s product image depending on the batik pattern name that the seller wants to use as their product title in online marketplace. First, the research input batik Solo pattern name in the four biggest online marketplaces in Indonesia, which are Tokopedia, Bukalapak, Shopee and Lazada. Second, it scrapped some of the images result from every marketplace. Then the research makes a system that can identify the image’s texture from marketplace and identify the image’s texture from the data set that was prepared before. This process could be completed using the SURF method. Next, an image from an online marketplace that contains a specific pattern will input to the system to find if it retrieves image from data set’s image with a similar intended pattern or not. The system verification will label an image as true if it can retrieve some images from data set, and label an image as false if it can’t retrieve image from data set. The output label from the system will be compared with the label from human judgement to measure the accuracy of the system. The results are, the highest accuracy is 74.76% and the highest recall is 94.55%.
网上市场卖家使用蜡染独奏的图案名称作为产品标题,但将其与不包含图案的产品图片混淆,可能会导致买家在错误的情况下穿蜡染独奏。蜡染独奏的每一种图案都有重要的意义,专门用于婚礼或葬礼等不同的场合。因此,本研究的目的是建立一个系统,可以验证蜡染Solo的产品形象,根据卖家想要使用的蜡染图案名称作为他们的产品标题在网上市场。首先,研究输入印尼四大在线市场的蜡染Solo图案名称,分别是Tokopedia、Bukalapak、Shopee和Lazada。其次,它取消了来自每个市场的一些图像结果。在此基础上,研究了一个既能从市场上识别图像纹理,又能从事先准备好的数据集中识别图像纹理的系统。这个过程可以用SURF方法完成。接下来,将来自在线市场的包含特定模式的图像输入到系统中,以查找它是否从数据集的图像中检索到具有类似预期模式的图像。如果系统验证能从数据集中检索到一些图像,则将图像标记为真,如果不能从数据集中检索到图像,则将图像标记为假。将系统输出的标签与人类判断的标签进行比较,以衡量系统的准确性。结果表明:最高准确率为74.76%,最高召回率为94.55%。
{"title":"Image Pattern Verification Based On Seller's Batik Solo Product Name Using SURF As A Texture Based Image Retrieval","authors":"Berlian Rahmy Lidiawaty, Mohammad Isa Irawan, R. V. Hari Ginardi","doi":"10.1109/IES50839.2020.9231950","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231950","url":null,"abstract":"Sellers in online marketplace who use batik Solo’s pattern name as their product title, but mistaken it with product image that doesn’t contain the pattern, could causes the buyer to wear batik Solo in wrong event. Every pattern in batik Solo has crucial meaning and specialize to be worn in different event such as wedding ceremony or funeral. Therefore this research has the purpose to build a system that can verify batik Solo’s product image depending on the batik pattern name that the seller wants to use as their product title in online marketplace. First, the research input batik Solo pattern name in the four biggest online marketplaces in Indonesia, which are Tokopedia, Bukalapak, Shopee and Lazada. Second, it scrapped some of the images result from every marketplace. Then the research makes a system that can identify the image’s texture from marketplace and identify the image’s texture from the data set that was prepared before. This process could be completed using the SURF method. Next, an image from an online marketplace that contains a specific pattern will input to the system to find if it retrieves image from data set’s image with a similar intended pattern or not. The system verification will label an image as true if it can retrieve some images from data set, and label an image as false if it can’t retrieve image from data set. The output label from the system will be compared with the label from human judgement to measure the accuracy of the system. The results are, the highest accuracy is 74.76% and the highest recall is 94.55%.","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Age Estimation Based on Indonesian Face Recognition using Convolutional Neural Networks 基于卷积神经网络的印尼语人脸识别年龄估计
Pub Date : 2020-09-01 DOI: 10.1109/IES50839.2020.9231952
Mufidatun Nisa Nur Lailiyah, A. Basofi, A. Fariza
In Indonesia, age identity plays an important role in deciding many things, for example, to determine the level of education, medical treatment, and health, to determine the age allowed to get married, to get a job, etc. An effective way to overcome age counterfeiting is to recognize facial images that have unique biometric features. Age development is generally indicated by skin texture and facial structure, this makes it quite difficult to estimate age. Therefore, we need automatic age identification that can be convinced, can be accounted for in the public interest, and has a high closeness. This paper proposed the age estimation of Indonesian face using Deep Convolutional Neural Networks (CNN) DenseNet-161 model architecture approach. The dataset is collected with a range of 7-22 years old of 2300 face image of Indonesian. We compare the prediction result with the custom architecture of CNN with 3 convolution layer and 3 fully connected. The prediction results of the DenseNet-161 model achieved very good prediction results (MAE = 3.02, Accuracy = 67.93%, and R-Squared = 0.99) than the custom model (MAE = 3.17, Accuracy = 64.47%, and R-Squared = 0.97).
在印度尼西亚,年龄身份在决定许多事情方面起着重要作用,例如,决定教育、医疗和健康水平,决定允许结婚、找工作的年龄等。克服年龄造假的有效方法是识别具有独特生物特征的面部图像。年龄的发展通常由皮肤纹理和面部结构来表示,这使得估计年龄相当困难。因此,我们需要能够被说服、能够在公共利益中被解释、并且具有高度密切性的自动年龄识别。本文提出了一种基于深度卷积神经网络(CNN) DenseNet-161模型架构的印尼人脸年龄估计方法。该数据集收集了2300张年龄范围为7-22岁的印度尼西亚人的面部图像。我们将预测结果与具有3个卷积层和3个全连接的CNN自定义架构进行了比较。DenseNet-161模型的预测结果(MAE = 3.02,准确率= 67.93%,R-Squared = 0.99)优于自定义模型(MAE = 3.17,准确率= 64.47%,R-Squared = 0.97)。
{"title":"Age Estimation Based on Indonesian Face Recognition using Convolutional Neural Networks","authors":"Mufidatun Nisa Nur Lailiyah, A. Basofi, A. Fariza","doi":"10.1109/IES50839.2020.9231952","DOIUrl":"https://doi.org/10.1109/IES50839.2020.9231952","url":null,"abstract":"In Indonesia, age identity plays an important role in deciding many things, for example, to determine the level of education, medical treatment, and health, to determine the age allowed to get married, to get a job, etc. An effective way to overcome age counterfeiting is to recognize facial images that have unique biometric features. Age development is generally indicated by skin texture and facial structure, this makes it quite difficult to estimate age. Therefore, we need automatic age identification that can be convinced, can be accounted for in the public interest, and has a high closeness. This paper proposed the age estimation of Indonesian face using Deep Convolutional Neural Networks (CNN) DenseNet-161 model architecture approach. The dataset is collected with a range of 7-22 years old of 2300 face image of Indonesian. We compare the prediction result with the custom architecture of CNN with 3 convolution layer and 3 fully connected. The prediction results of the DenseNet-161 model achieved very good prediction results (MAE = 3.02, Accuracy = 67.93%, and R-Squared = 0.99) than the custom model (MAE = 3.17, Accuracy = 64.47%, and R-Squared = 0.97).","PeriodicalId":344685,"journal":{"name":"2020 International Electronics Symposium (IES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127784012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 International Electronics Symposium (IES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1