Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579154
Nanta Fakih Prebianto, A. D. Futra
Paper-based sensor is a new alternative technology to build low cost and simple fabricated sensor applications. This paper described fabrication process technologies of paper-based sensors and their applications for force, tactile, oxygen, and humidity sensor. Paper-based sensors are much easier in fabrication and can reduce production cost, such as the clean room requirement. The piezoresistive effect is applied in force and tactile sensor by using low-cost paper substrate. Meanwhile, the paper-based substrate is used in the oxygen and humidity sensor as a new method to enhance adhesive between substrate and sensing material.
{"title":"Paper as a Substrate for Sensor Applications: A Review","authors":"Nanta Fakih Prebianto, A. D. Futra","doi":"10.1109/INCAE.2018.8579154","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579154","url":null,"abstract":"Paper-based sensor is a new alternative technology to build low cost and simple fabricated sensor applications. This paper described fabrication process technologies of paper-based sensors and their applications for force, tactile, oxygen, and humidity sensor. Paper-based sensors are much easier in fabrication and can reduce production cost, such as the clean room requirement. The piezoresistive effect is applied in force and tactile sensor by using low-cost paper substrate. Meanwhile, the paper-based substrate is used in the oxygen and humidity sensor as a new method to enhance adhesive between substrate and sensing material.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117103448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579416
Abdillah Fashiha Ilman, Dzulkiflih
Arc faults usually occur due to problems with cable insulators and loose lines. The occurrence of high temperatures and melting of the metal conductor wires creates an arc fault and sparks on the channel. In each year the fire disaster continues to increase. by using conventional protection techniques it is very difficult to detect the occurrence of the arc fault phenomenon because the characteristics of the arc fault are very different from the short circuit which produces a very large fault current. In this study experiments were conducted to detect the occurrence of a series arc fault using discreat wavelet transform (DWT). By comparing the difference in the high-frequency signal normal conditions by the high-frequency signal interference conditions. Other features also compare thresholds, peak detection. Discrete Wavelet Transform algorithm is performed on a microcontroller.
{"title":"Low Voltage Series Arc Fault Detecting With Discrete Wavelet Transform","authors":"Abdillah Fashiha Ilman, Dzulkiflih","doi":"10.1109/INCAE.2018.8579416","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579416","url":null,"abstract":"Arc faults usually occur due to problems with cable insulators and loose lines. The occurrence of high temperatures and melting of the metal conductor wires creates an arc fault and sparks on the channel. In each year the fire disaster continues to increase. by using conventional protection techniques it is very difficult to detect the occurrence of the arc fault phenomenon because the characteristics of the arc fault are very different from the short circuit which produces a very large fault current. In this study experiments were conducted to detect the occurrence of a series arc fault using discreat wavelet transform (DWT). By comparing the difference in the high-frequency signal normal conditions by the high-frequency signal interference conditions. Other features also compare thresholds, peak detection. Discrete Wavelet Transform algorithm is performed on a microcontroller.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579392
Lutfi Sani, D. Basuki, Mochamad Mobed Bahctiar
Indonesia's industrial development in the transportation and logistics sector will experience a 15.4% increase until 2020 in accordance with the calculations of one of the global market research institutions, Frost and Sullivan. In dealing with this change, a good management is needed from planning to the distribution process to estimate the time when shipping goods. This final project will design and create a system that can optimize the route by congestion, damaged roads, and travel distance using the Djikstra method which considers the weight of each node as a representation of the condition. In addition to optimizing, the system will monitor by looking at the list of active and operating trucks along with notifications containing a list of shipments for each distributor and estimated delivery time. In this application a map will be shown and provided information in the form of pop-ups and colors on each road that describes the current condition of the road. The report on road conditions is directly input by the driver to provide notifications on maps so that the application can provide alternative ways to avoid congestion and damaged roads. The results of this study indicate that, in field trials, this application has succeeded in determining the fastest route based on the shortest distance and the weight on the damaged road using the Djikstra algorithm. The travel monitoring system has been able to receive and display travel conditions that are visualized in the form of symbols and lines on a map managed by the admin in real time.
根据全球市场研究机构之一弗若斯特沙利文(Frost and Sullivan)的计算,到2020年,印尼在运输和物流领域的工业发展将增长15.4%。在应对这种变化时,需要从计划到配送过程的良好管理,以估计货物运输时的时间。这个最终的项目将设计并创建一个系统,该系统可以通过使用Djikstra方法来优化拥堵,损坏的道路和行驶距离,该方法将每个节点的权重视为条件的表示。除了优化之外,该系统还将通过查看活跃和运行的卡车列表以及包含每个经销商的发货列表和预计交货时间的通知来进行监控。在这个应用程序中,地图将以弹出窗口和颜色的形式显示,并在每条道路上提供描述道路当前状况的信息。驾驶员可以直接输入路况报告,在地图上提供通知,这样应用程序就可以提供避免拥堵和损坏道路的替代方法。研究结果表明,在现场试验中,该应用程序使用Djikstra算法,根据最短距离和受损道路的重量,成功地确定了最快的路线。行车监控系统已经能够接收和显示行车状况,并将其以符号和线条的形式可视化显示在由管理员实时管理的地图上。
{"title":"Supply Delivery Monitoring System Using Mobile Device Based on Internet of Things Case Study (Pt. Semen Gresik Persero Tbk.)","authors":"Lutfi Sani, D. Basuki, Mochamad Mobed Bahctiar","doi":"10.1109/INCAE.2018.8579392","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579392","url":null,"abstract":"Indonesia's industrial development in the transportation and logistics sector will experience a 15.4% increase until 2020 in accordance with the calculations of one of the global market research institutions, Frost and Sullivan. In dealing with this change, a good management is needed from planning to the distribution process to estimate the time when shipping goods. This final project will design and create a system that can optimize the route by congestion, damaged roads, and travel distance using the Djikstra method which considers the weight of each node as a representation of the condition. In addition to optimizing, the system will monitor by looking at the list of active and operating trucks along with notifications containing a list of shipments for each distributor and estimated delivery time. In this application a map will be shown and provided information in the form of pop-ups and colors on each road that describes the current condition of the road. The report on road conditions is directly input by the driver to provide notifications on maps so that the application can provide alternative ways to avoid congestion and damaged roads. The results of this study indicate that, in field trials, this application has succeeded in determining the fastest route based on the shortest distance and the weight on the damaged road using the Djikstra algorithm. The travel monitoring system has been able to receive and display travel conditions that are visualized in the form of symbols and lines on a map managed by the admin in real time.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study aims to provide a smartphone antitheft application with improved distance accuracy, Okurity. The application is equipped with an accelerometer and GPS sensor system that transmits the data location to the connected user in real time. If the accelerometer sensor detects a smartphone movement, then the system will send a notification to another smartphone that has been connected continuously. The accuracy of the application was analyzed using the Haversine formula. Results of this study show that the application accuracy is higher than the data location accuracy while using other application.
{"title":"Distance Accuracy Improvement for Smartphone Anti-Theft Application","authors":"Muchammad Fajri Amirul Nasrullah, Rina Yulius, Erwin","doi":"10.1109/INCAE.2018.8579363","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579363","url":null,"abstract":"This study aims to provide a smartphone antitheft application with improved distance accuracy, Okurity. The application is equipped with an accelerometer and GPS sensor system that transmits the data location to the connected user in real time. If the accelerometer sensor detects a smartphone movement, then the system will send a notification to another smartphone that has been connected continuously. The accuracy of the application was analyzed using the Haversine formula. Results of this study show that the application accuracy is higher than the data location accuracy while using other application.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123253577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579365
M. Lubis, S. Pujiyati, W. Anurogo, M. Kirana, H. Kausarian, S. Antoni
There is little information about the detection of signals made on dolphins by detecting whistle sounds that serve as an echolocation on dolphins. Bottlenose dolphins (Tursiops aduncus) will be able to receive sound waves with a frequency range of 15 kHz to 150 kHz. The purpose of this research was to analyze the signal detection of whistle sound aimed at communication manipulation. This research is done with the location at Ocean Dream Ocean, Ancol. Indonesia on May 10, 2016. The method of the filter in this study using Band Pass Filter (BPF) with cut off 0–12 kHz. The results of signal detection on dolphin whistle Interval Interval at the time before meals and after meals have the different maximum time span of each other with time 630 ms and 650 ms. At the whistle sound interval after meals more shows a significantly greater difference with whistle 2 at 196.66 ms duration and before meals with whistle 4 at 12 ms duration. Source level (SL) produced at the time before the meal has the highest value on whistle sound 3 (range 15900 Hz-16100 Hz) at 33.6 dB intensity, while at the after the meal on whistle sound 4 (range 17800 Hz - 185 00 Hz on intensity 33.62 dB.
{"title":"Echolocation Signal Detection From Captive Dolphin Using Whistles Sound","authors":"M. Lubis, S. Pujiyati, W. Anurogo, M. Kirana, H. Kausarian, S. Antoni","doi":"10.1109/INCAE.2018.8579365","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579365","url":null,"abstract":"There is little information about the detection of signals made on dolphins by detecting whistle sounds that serve as an echolocation on dolphins. Bottlenose dolphins (Tursiops aduncus) will be able to receive sound waves with a frequency range of 15 kHz to 150 kHz. The purpose of this research was to analyze the signal detection of whistle sound aimed at communication manipulation. This research is done with the location at Ocean Dream Ocean, Ancol. Indonesia on May 10, 2016. The method of the filter in this study using Band Pass Filter (BPF) with cut off 0–12 kHz. The results of signal detection on dolphin whistle Interval Interval at the time before meals and after meals have the different maximum time span of each other with time 630 ms and 650 ms. At the whistle sound interval after meals more shows a significantly greater difference with whistle 2 at 196.66 ms duration and before meals with whistle 4 at 12 ms duration. Source level (SL) produced at the time before the meal has the highest value on whistle sound 3 (range 15900 Hz-16100 Hz) at 33.6 dB intensity, while at the after the meal on whistle sound 4 (range 17800 Hz - 185 00 Hz on intensity 33.62 dB.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579156
Tarwaji Warsokusumo, T. Prahasto, W. Caesarendra, A. Widodo
In this paper, we will discuss about power generation efficiency improvement program (EIP) for saving fuel cost of electrical energy production. EIP will be focused on the embedding and enhancing operation culture by setting the operation parameters quality control chart as guidance for the power plant frontline operation. The data sources are limited to the controllable operation parameters acquired by Distributed Control System (DCS). New methodology that is algorithm as one of artificial intelligence tools will be proposed to be applied on the EIP. The new methodology consists of 5 steps: 1) collect operation parameter data acquisition, 2) select main operating indicator, 3) develop relevance vector machine (RVM) regression algorithm used for regression process, 4) define operation parameter quality control chart, 5) frontline operation optimization process. The operation parameter quality control chart is derived from statistical data acquired with the RVM regression algorithm. The mean regression curve achieved is proposed as a reference for maximum tolerable limit of operation parameter range and from the practical reference the efficient operation limit curve was set at 5% below it. The results show that RVM technique capable to produce an operation parameter regression curves from the sparse prior operation parameter data. This quality control chart can be applied as a helpful guidance for frontline operation in purpose for leading the change the operator behavior to become a new efficient mindset culture. Originality of the proposed methodology in this paper is the operation parameter quality control chart which derived by application of RVM regression algorithm.
{"title":"Optimization of Power Plant Operation Parameters for Efficiency Improvement through Data-Driven Relevance Vector Machine Regression Algorithm","authors":"Tarwaji Warsokusumo, T. Prahasto, W. Caesarendra, A. Widodo","doi":"10.1109/INCAE.2018.8579156","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579156","url":null,"abstract":"In this paper, we will discuss about power generation efficiency improvement program (EIP) for saving fuel cost of electrical energy production. EIP will be focused on the embedding and enhancing operation culture by setting the operation parameters quality control chart as guidance for the power plant frontline operation. The data sources are limited to the controllable operation parameters acquired by Distributed Control System (DCS). New methodology that is algorithm as one of artificial intelligence tools will be proposed to be applied on the EIP. The new methodology consists of 5 steps: 1) collect operation parameter data acquisition, 2) select main operating indicator, 3) develop relevance vector machine (RVM) regression algorithm used for regression process, 4) define operation parameter quality control chart, 5) frontline operation optimization process. The operation parameter quality control chart is derived from statistical data acquired with the RVM regression algorithm. The mean regression curve achieved is proposed as a reference for maximum tolerable limit of operation parameter range and from the practical reference the efficient operation limit curve was set at 5% below it. The results show that RVM technique capable to produce an operation parameter regression curves from the sparse prior operation parameter data. This quality control chart can be applied as a helpful guidance for frontline operation in purpose for leading the change the operator behavior to become a new efficient mindset culture. Originality of the proposed methodology in this paper is the operation parameter quality control chart which derived by application of RVM regression algorithm.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579405
Dedy Slamet Riyadi, Siti Aisyah
Flame detection systems are useful for the development of fire early detection systems. In general, conventional fire detection system which is usually used heat detector cannot detect the presence of fire since the detector requires much time to detect temperature changes. The use of a camera as an image scanner sensor has the potential to be used as an identifier of a flame shape or color. This study aims to build an image processing flame detection system using image enhancement, segmentation and filtering methods which is applied the Vission Assistant available in LabView.The system implemented in a frame rate of 30 fps with a resolution of 1024 x 768, in which the system accuracy reach up to 98%.
{"title":"Vision Based Flame Detection System For Surveillance Camera","authors":"Dedy Slamet Riyadi, Siti Aisyah","doi":"10.1109/INCAE.2018.8579405","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579405","url":null,"abstract":"Flame detection systems are useful for the development of fire early detection systems. In general, conventional fire detection system which is usually used heat detector cannot detect the presence of fire since the detector requires much time to detect temperature changes. The use of a camera as an image scanner sensor has the potential to be used as an identifier of a flame shape or color. This study aims to build an image processing flame detection system using image enhancement, segmentation and filtering methods which is applied the Vission Assistant available in LabView.The system implemented in a frame rate of 30 fps with a resolution of 1024 x 768, in which the system accuracy reach up to 98%.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117041478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579368
Sri Hardianti, B. Sugandi, A. D. Futra
The spreading of cafes, restaurant, and food courts in a small market area can create a high-level competitive situation among food serving industries. As customer satisfaction is the main key to reach the glory, making up or keeping up a service or product quality is a critical decision. In this research, we presented a steady and easy way out to solve this problem based on face recognition and smile detection method. We implemented an Adaboost (adaptive boosting) algorithm by Viola-Jones which is the robust algorithm for recognizing the face and detecting a smile. It works completely by cascade classifier step to ensure the object detected is a face. Our system performance attained 96,43% of accuracy in real time condition. It is able to detect a face in a range of 25–100 cm, and it can detect a smile from 25–45 cm in a certain position and conditions.
{"title":"Face Recognition and Smile Detection as an Appraisal of Customer Satisfaction Instrument","authors":"Sri Hardianti, B. Sugandi, A. D. Futra","doi":"10.1109/INCAE.2018.8579368","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579368","url":null,"abstract":"The spreading of cafes, restaurant, and food courts in a small market area can create a high-level competitive situation among food serving industries. As customer satisfaction is the main key to reach the glory, making up or keeping up a service or product quality is a critical decision. In this research, we presented a steady and easy way out to solve this problem based on face recognition and smile detection method. We implemented an Adaboost (adaptive boosting) algorithm by Viola-Jones which is the robust algorithm for recognizing the face and detecting a smile. It works completely by cascade classifier step to ensure the object detected is a face. Our system performance attained 96,43% of accuracy in real time condition. It is able to detect a face in a range of 25–100 cm, and it can detect a smile from 25–45 cm in a certain position and conditions.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579359
Farid Fajriana Pulungan, D. W. Sudiharto, T. Brotoharsono
Smartphone has become the tool which is used daily in modern human life. Some activities in human life, according to the usage of the smartphone can be related to the information which has a high privilege and needs a privacy. It causes the owners of the smartphone needs a system which can protect their privacy. Unfortunately, the secure the system, the unease of the usage. Hence, the system which has an invulnerable environment but also gives the ease of use is very needful. The aspect which is related to the ease of use is an authentication mechanism. Sometimes, this aspect correspondence to the effectiveness and the efficiency. This study is going to analyze the application related to this aspect which is a lock screen application. This lock screen application uses the context data based on the environment condition around the user. The context data used are GPS location and Mac Address of Wi-Fi. The system is going to detect the context and is going to determine if the smartphone needs to run the authentication mechanism or to bypass it based on the analysis of the context data. Hopefully, the smartphone application which is developed still can provide mobility and usability features, and also can protect the user privacy even though it is located in the environment which its context data is unknown.
{"title":"Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition","authors":"Farid Fajriana Pulungan, D. W. Sudiharto, T. Brotoharsono","doi":"10.1109/INCAE.2018.8579359","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579359","url":null,"abstract":"Smartphone has become the tool which is used daily in modern human life. Some activities in human life, according to the usage of the smartphone can be related to the information which has a high privilege and needs a privacy. It causes the owners of the smartphone needs a system which can protect their privacy. Unfortunately, the secure the system, the unease of the usage. Hence, the system which has an invulnerable environment but also gives the ease of use is very needful. The aspect which is related to the ease of use is an authentication mechanism. Sometimes, this aspect correspondence to the effectiveness and the efficiency. This study is going to analyze the application related to this aspect which is a lock screen application. This lock screen application uses the context data based on the environment condition around the user. The context data used are GPS location and Mac Address of Wi-Fi. The system is going to detect the context and is going to determine if the smartphone needs to run the authentication mechanism or to bypass it based on the analysis of the context data. Hopefully, the smartphone application which is developed still can provide mobility and usability features, and also can protect the user privacy even though it is located in the environment which its context data is unknown.","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115100157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/INCAE.2018.8579151
Awria Awria, Muhammad Hasan Albana, Rahman Hakim
The automotive technology race to improve the efficiency of engine performance is increasing, one of which is the use of heat energy in car radiators. This is in addition to reducing the workload of the engine. It can also produce electrical energy. This experiment uses four pieces of TEC1-12706 thermoelectric generators (TEG) which are arranged in series with heat sink construction in the direction of the fluid flow mounted directly above the TEG fixture. TEG Fixture will be installed on Lombardini diesel engine upper hose radiator LDW1404. This experiment produces a maximum voltage of 2.05 volts, with the current strength of 68.4 mA (0.064 A) and the power generated is 140.22 mA (0.14 A) with a difference in heat sink temperature from the heat side of 17, 8°C
提高发动机性能效率的汽车技术竞赛日益激烈,其中之一就是在汽车散热器中使用热能。这是除了减少引擎的工作量。它也能产生电能。本实验采用四台TEC1-12706热电发生器(TEG)串联布置,散热器结构与流体流动方向一致,安装在TEG夹具正上方。TEG夹具将安装在Lombardini柴油机上部软管散热器LDW1404上。本实验产生的最大电压为2.05伏,电流强度为68.4 mA (0.064 a),产生的功率为140.22 mA (0.14 a),散热侧温度差为17.8℃
{"title":"Experimental Study: Design of Thermoelectric Generator (TEG) Fixture for Harvesting an Automobile Electricity","authors":"Awria Awria, Muhammad Hasan Albana, Rahman Hakim","doi":"10.1109/INCAE.2018.8579151","DOIUrl":"https://doi.org/10.1109/INCAE.2018.8579151","url":null,"abstract":"The automotive technology race to improve the efficiency of engine performance is increasing, one of which is the use of heat energy in car radiators. This is in addition to reducing the workload of the engine. It can also produce electrical energy. This experiment uses four pieces of TEC1-12706 thermoelectric generators (TEG) which are arranged in series with heat sink construction in the direction of the fluid flow mounted directly above the TEG fixture. TEG Fixture will be installed on Lombardini diesel engine upper hose radiator LDW1404. This experiment produces a maximum voltage of 2.05 volts, with the current strength of 68.4 mA (0.064 A) and the power generated is 140.22 mA (0.14 A) with a difference in heat sink temperature from the heat side of 17, 8°C","PeriodicalId":387859,"journal":{"name":"2018 International Conference on Applied Engineering (ICAE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}