首页 > 最新文献

2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)最新文献

英文 中文
Augmented Reality for Office and Basic Programming Laboratory Peripheral 增强现实办公室和基础编程实验室外围设备
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878527
M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka
Submission of information can use 3-dimensional (3D) images that will make information clearer and more interesting. Faculty of Computer Science and Information Technology (FKTI) one of the faculties located at Mulawarman University. Base rooms and laboratories are often used and if someone wants to do peripherals then he will look for additional peripherals. However, they do not have a device that can be used to know the pattern of each room function and the learning environment must have additional devices to facilitate the use of Augmented Reality 3D media. Therefore, it is necessary to have augmented reality media to provide an understanding of visual information for the faculty room and the basic laboratory of the FKTI program. Each scheme of determining markers is adjusted to the point where the camera will scan. Tests are carried out to show the results are done on plain paper that already has their own floor plan and in each room partition can display basic information about the room. Light testing is also done with the result that if the light is $gt300$ lux then it can be ascertained that AR visibility will appear quickly.
提交的信息可以使用三维(3D)图像,这将使信息更清晰,更有趣。计算机科学与信息技术学院(FKTI)位于Mulawarman大学的院系之一。基地室和实验室经常被使用,如果有人想做外围设备,那么他会寻找额外的外围设备。然而,他们没有一个可以用来了解每个房间功能模式的设备,学习环境必须有额外的设备来促进增强现实3D媒体的使用。因此,有必要为教员室和基础实验室提供对视觉信息的理解的增强现实媒体。每个确定标记的方案被调整到相机将扫描的点。测试显示结果是在已经有自己的平面图的普通纸上完成的,并且在每个房间的分区可以显示房间的基本信息。光照测试也完成了,结果是如果光照为300勒克斯,那么可以确定AR能见度将很快出现。
{"title":"Augmented Reality for Office and Basic Programming Laboratory Peripheral","authors":"M. Firdaus, E. Budiman, J. A. Widians, Noval Maringan Sinaga, Sofiansyah Fadli, F. Alameka","doi":"10.1109/EIConCIT.2018.8878527","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878527","url":null,"abstract":"Submission of information can use 3-dimensional (3D) images that will make information clearer and more interesting. Faculty of Computer Science and Information Technology (FKTI) one of the faculties located at Mulawarman University. Base rooms and laboratories are often used and if someone wants to do peripherals then he will look for additional peripherals. However, they do not have a device that can be used to know the pattern of each room function and the learning environment must have additional devices to facilitate the use of Augmented Reality 3D media. Therefore, it is necessary to have augmented reality media to provide an understanding of visual information for the faculty room and the basic laboratory of the FKTI program. Each scheme of determining markers is adjusted to the point where the camera will scan. Tests are carried out to show the results are done on plain paper that already has their own floor plan and in each room partition can display basic information about the room. Light testing is also done with the result that if the light is $gt300$ lux then it can be ascertained that AR visibility will appear quickly.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127042411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of e-Business Furniture SMEs From Commodity and Waste Utilization Perspective 商品与废弃物利用视角下的中小家具企业电子商务设计
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878520
I. Patulak, M. Firdaus, N. Dengen
Current economic era is not only based on capital and human resources, but on information held by the company and no exception to small medium enterprise (SMEs). Correct information at the right time can determine positive business development, while lack of information can lead to failure. Commodity-Processed Furniture SMEs and Waste Utilization in Samarinda are research targets because they feel SMEs furniture is increasingly farther away with consumers in the current information age. Data collection is carried out by direct survey to the place of business and the community by recording, documenting photos, archives, and recording interviews. This research aims to show that existing modern media is suitable for use in e-business in Furniture SMEs in terms of increasing the coverage and sales of various products and services. The authors try to present business model solutions from SMEs furniture services in particular. Wood raw material for wood production waste is closer to being obtained from sawn timber companies along the lower reaches of the Mahakam River. The resulting waste is in the form of powder and specks. Commodities of finished and traded goods are pretty much like cosmetics, windows, doors, cabinets, tables, chairs, even gravestones. Social media such as Facebook, Instagram, WhatsApp, and Lne are the cornerstones of the e-business media in this design because it is the social media that is closest to the community.
当今的经济时代不仅是以资金和人力资源为基础,而且是以企业所掌握的信息为基础,中小企业也不例外。在正确的时间获得正确的信息可以决定积极的业务发展,而缺乏信息则可能导致失败。Samarinda的商品加工家具中小企业和废物利用是研究对象,因为他们觉得在当前的信息时代,中小企业家具与消费者的距离越来越远。数据收集是通过对营业地点和社区的直接调查,通过记录、记录照片、档案和记录访谈来进行的。本研究旨在说明现有的现代媒体在家具中小企业的电子商务中适用于增加各种产品和服务的覆盖范围和销售。作者试图从中小企业家具服务中提出商业模式解决方案。木材生产废料的木材原料更接近于从马哈卡姆河下游的锯木公司获得。由此产生的废物以粉末和斑点的形式存在。成品和贸易品的商品很像化妆品、门窗、橱柜、桌子、椅子,甚至墓碑。社交媒体,如Facebook、Instagram、WhatsApp和line是本设计中电子商务媒体的基石,因为它是最接近社区的社交媒体。
{"title":"Design of e-Business Furniture SMEs From Commodity and Waste Utilization Perspective","authors":"I. Patulak, M. Firdaus, N. Dengen","doi":"10.1109/EIConCIT.2018.8878520","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878520","url":null,"abstract":"Current economic era is not only based on capital and human resources, but on information held by the company and no exception to small medium enterprise (SMEs). Correct information at the right time can determine positive business development, while lack of information can lead to failure. Commodity-Processed Furniture SMEs and Waste Utilization in Samarinda are research targets because they feel SMEs furniture is increasingly farther away with consumers in the current information age. Data collection is carried out by direct survey to the place of business and the community by recording, documenting photos, archives, and recording interviews. This research aims to show that existing modern media is suitable for use in e-business in Furniture SMEs in terms of increasing the coverage and sales of various products and services. The authors try to present business model solutions from SMEs furniture services in particular. Wood raw material for wood production waste is closer to being obtained from sawn timber companies along the lower reaches of the Mahakam River. The resulting waste is in the form of powder and specks. Commodities of finished and traded goods are pretty much like cosmetics, windows, doors, cabinets, tables, chairs, even gravestones. Social media such as Facebook, Instagram, WhatsApp, and Lne are the cornerstones of the e-business media in this design because it is the social media that is closest to the community.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Transmission using Metadata Logger Manipulation Approach 使用元数据记录器操作方法的安全数据传输
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878601
Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo
The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.
遥测是一种自动通信过程,其中测量和其他数据在远程点收集或无法访问(称为远程站)并传输到接收设备(称为主机站)。该系统是一个数据采集系统,在一个足够大的区域,通常配备数据记录仪的形式的电子设备,记录数据随时间的变化。甚至大多数配备数字处理器或计算机的数据记录器。各种环境条件都会影响遥测系统,特别是在将数据从远程站点传输到主机的过程中。在这种情况下,传输过程中的数据安全变得非常重要。在本研究中,重点讨论了如何构建数据包,使数据包在传输过程中不易被识别。元数据操作方法的概念是通过将三维立方体数据转换为元数据日志,根据数据包的地址索引改变数据包的排列。存储在数据记录仪中的数据根据其地址索引转换成若干立方形状的三维数据结构。以某种方式,将所有立方体数据转换为元数据日志并存储在元数据日志记录器中。然后将元数据日志传输到主机站,再转换回数据日志并存储到主机的数据记录器中。研究结果表明,生成的元数据日志与数据日志的内容差异很大。同样,它们的数据字节的大小。这个概念的关键是如何根据数据可用性选择数据的3-D形式表示,以及如何在形成元数据日志的过程中改变其方向。
{"title":"Secured Data Transmission using Metadata Logger Manipulation Approach","authors":"Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo","doi":"10.1109/EIConCIT.2018.8878601","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878601","url":null,"abstract":"The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Image Edge Detection Operators for Lontara Sanskrit Scripts Lontara梵文图像边缘检测算子的性能比较
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878673
Yolanda Gabyriela Ferandji, Diaraya, A. Lawi
Processing of image digital is a technology that can be used to enhance images and information about objects in images. Edge detection in digital image enhancement is a process that produces parts of image objects for segmentation and creativity of objects in the image. This research aims to get the best operators to detect the character of the word Lontara in Sanskrit manuscripts. This research also uses morphological operations in binary images to identify the many forms of the character of the word Lontara. Edge detection operators used are Sobel, Canny, Prewitt, and Roberts. There are 2 types of images used in this study are good quality images and poor-quality images. The parameter used to measure operator performance is Mean Square Error (MSE). The results we obtained from Roberts operator are the best operators to detect the location of the script with an MSE value of 0.8370 in images of good quality, MSE value of 0.8688 in images of poor quality.
数字图像处理是一种可以用来增强图像和图像中物体信息的技术。数字图像增强中的边缘检测是产生图像对象的部分,用于分割和创造图像中对象的过程。本研究旨在找到最好的操作者来检测梵文手稿中Lontara一词的特征。本研究还利用二值图像的形态运算来识别“Lontara”字的多种形式。使用的边缘检测算子有Sobel、Canny、Prewitt和Roberts。本研究中使用的图像有两种类型:高质量图像和低质量图像。用来衡量操作员性能的参数是均方误差(MSE)。Roberts算子的结果是检测脚本位置的最佳算子,在质量较好的图像中MSE值为0.8370,在质量较差的图像中MSE值为0.8688。
{"title":"Performance Comparison of Image Edge Detection Operators for Lontara Sanskrit Scripts","authors":"Yolanda Gabyriela Ferandji, Diaraya, A. Lawi","doi":"10.1109/EIConCIT.2018.8878673","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878673","url":null,"abstract":"Processing of image digital is a technology that can be used to enhance images and information about objects in images. Edge detection in digital image enhancement is a process that produces parts of image objects for segmentation and creativity of objects in the image. This research aims to get the best operators to detect the character of the word Lontara in Sanskrit manuscripts. This research also uses morphological operations in binary images to identify the many forms of the character of the word Lontara. Edge detection operators used are Sobel, Canny, Prewitt, and Roberts. There are 2 types of images used in this study are good quality images and poor-quality images. The parameter used to measure operator performance is Mean Square Error (MSE). The results we obtained from Roberts operator are the best operators to detect the location of the script with an MSE value of 0.8370 in images of good quality, MSE value of 0.8688 in images of poor quality.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Case Based Reasoning with Nearest Neighbor and Decision Tree for Early Warning System of Student Achievement 基于案例的最近邻推理与决策树相结合的学生成绩预警系统
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878512
Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin
Student achievement is one of the main focuses to increase university credibility. An early warning system is needed to prevent more risks. The early warning systems (EWS) of student achievement has been possible with a combination of case based reasoning (CBR), k-nearest neighbor (K-NN), and decision tree. CBR is used to obtain a solution that stores knowledge so that it can predict student achievement. This research is combining the Case Based Reasoning, K-Nearest Neighbor (K-NN), and Decision Tree (DT) methods for the prediction of student achievement that applied in the early warning system. The attributes of an early warning system of student achievement are genders, distances of residence, ages, high schools, majors, and grade point average (GPA) for six semesters. The results show that accuracy rate is 60.5% of 55 data in the early warning system of student achievement and a model CBR for Early Warning System of Student Achievement.
学生成绩是提高大学信誉的主要焦点之一。需要一个早期预警系统来防止更多的风险。基于案例推理(CBR)、k-最近邻(K-NN)和决策树相结合的方法可以实现学生成绩预警系统(EWS)。CBR用于获得存储知识的解决方案,以便预测学生的成绩。本研究将基于案例的推理、k -最近邻(K-NN)和决策树(DT)方法结合起来,用于预测早期预警系统中的学生成绩。学生成绩预警系统的属性是性别、居住距离、年龄、高中、专业、6个学期的平均绩点(GPA)。结果表明,学生成绩预警系统中55个数据的准确率为60.5%,为学生成绩预警系统提供了模型CBR。
{"title":"Combination of Case Based Reasoning with Nearest Neighbor and Decision Tree for Early Warning System of Student Achievement","authors":"Mardiyyah Hasnawi, N. Kurniati, St. Hajrah Mansyur, Irawati, Tasrif Hasanuddin","doi":"10.1109/EIConCIT.2018.8878512","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878512","url":null,"abstract":"Student achievement is one of the main focuses to increase university credibility. An early warning system is needed to prevent more risks. The early warning systems (EWS) of student achievement has been possible with a combination of case based reasoning (CBR), k-nearest neighbor (K-NN), and decision tree. CBR is used to obtain a solution that stores knowledge so that it can predict student achievement. This research is combining the Case Based Reasoning, K-Nearest Neighbor (K-NN), and Decision Tree (DT) methods for the prediction of student achievement that applied in the early warning system. The attributes of an early warning system of student achievement are genders, distances of residence, ages, high schools, majors, and grade point average (GPA) for six semesters. The results show that accuracy rate is 60.5% of 55 data in the early warning system of student achievement and a model CBR for Early Warning System of Student Achievement.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality of Service Voice over Internet Protocol in Mobile Instant Messaging 移动即时通讯中基于互联网协议的语音服务质量
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878574
M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi
Voice over Internet Protocol (VoIP) technology is easy to find even almost all instant messaging mobile applications already have features such as voice calls. The VoIP feature can only be used after the user is connected to the internet network, for the average smartphone user to use the internet network provided by the internet service provider (ISP). The VoIP is very dependent on the network used. Quality of Service (QoS) parameters such as delay, jitter, throughput and packet loss be used to measure the quality of the network. This study aims to analyze the performance of VoIP technology in one of the instant messaging mobile applications like WhatsApp uses Telkomsel ISP network and be adapted to International Telecommunication Union (ITU-T G.114) standards. Results of the research, the highest of delay generated by voice calls during indoor conditions is 56,6 ms, jitter is the most resulted voice call when the indoor condition is 0,5 ms, packet loss is the most generated voice call when the indoor condition is 7%. The resulting throughput in the voice call testing process is between 25.2 Mbps until 28.1 Mbps.
互联网协议语音(VoIP)技术很容易找到,甚至几乎所有的即时通讯移动应用程序都已经具有语音呼叫等功能。VoIP功能只能在用户接入互联网后使用,一般智能手机用户只能使用互联网服务提供商(ISP)提供的互联网。VoIP非常依赖于所使用的网络。时延、抖动、吞吐量、丢包等QoS (Quality of Service)参数用来衡量网络的质量。本研究旨在分析VoIP技术在即时通讯移动应用程序之一(如WhatsApp)中的性能,该应用程序使用Telkomsel ISP网络并适应国际电信联盟(ITU-T G.114)标准。研究结果表明,室内条件下语音通话产生的最大延迟为56,6 ms,室内条件为0,5 ms时产生的抖动最多,室内条件为7%时产生的丢包最多。在语音呼叫测试过程中产生的吞吐量在25.2 Mbps到28.1 Mbps之间。
{"title":"Quality of Service Voice over Internet Protocol in Mobile Instant Messaging","authors":"M. Taruk, E. Budiman, Muhammad Riantama Rustam, Haviluddin, Huzain Azis, H. J. Setyadi","doi":"10.1109/EIConCIT.2018.8878574","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878574","url":null,"abstract":"Voice over Internet Protocol (VoIP) technology is easy to find even almost all instant messaging mobile applications already have features such as voice calls. The VoIP feature can only be used after the user is connected to the internet network, for the average smartphone user to use the internet network provided by the internet service provider (ISP). The VoIP is very dependent on the network used. Quality of Service (QoS) parameters such as delay, jitter, throughput and packet loss be used to measure the quality of the network. This study aims to analyze the performance of VoIP technology in one of the instant messaging mobile applications like WhatsApp uses Telkomsel ISP network and be adapted to International Telecommunication Union (ITU-T G.114) standards. Results of the research, the highest of delay generated by voice calls during indoor conditions is 56,6 ms, jitter is the most resulted voice call when the indoor condition is 0,5 ms, packet loss is the most generated voice call when the indoor condition is 7%. The resulting throughput in the voice call testing process is between 25.2 Mbps until 28.1 Mbps.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Economic Dispatch using Novel Bat Algorithm Constrained by Voltage Stability 电压稳定约束下新型Bat算法的经济调度
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878604
Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin
Economic Dispatch (ED) of thermal power plant has a role in maintaining economic power system. The main purpose of ED is to set the control variables of power system so that the generators can generate maximum power according to load demand based on each generator characteristic with lower production cost. In this paper, the economic dispatch will be done in thermal power system using Novel Bat Algorithm (NBA) constrained by voltage stability. NBA is a recent optimization method that is developed build upon bat behavior. The result showed that the NBA can optimize the thermal power system by showing lower price of production cost. The NBA can reduce 9.23% of the production cost. Not only is the production cost smaller but also the power loss obtained by NBA. Voltage stability is also maintained in this research by showing better improvement of critical point with average 0.920 per unit. The proposed method is applied in real system of SULSELBAR 150 kV power system.
火电厂经济调度对维持电力系统的经济运行具有重要作用。其主要目的是设置电力系统的控制变量,使发电机组能够根据每台发电机组的特性,以较低的生产成本,根据负荷需求产生最大功率。本文将在电压稳定约束下,采用新颖的蝙蝠算法对火电系统进行经济调度。NBA是最近的一种优化方法,是建立在蝙蝠的行为。结果表明,NBA可以通过降低生产成本来优化火电系统。NBA可以降低9.23%的生产成本。不仅生产成本更小,而且NBA获得的功率损失也更小。本研究还保持了电压的稳定性,其临界点的提高较好,平均每台提高0.920。该方法已在SULSELBAR 150 kV电力系统的实际系统中得到应用。
{"title":"Economic Dispatch using Novel Bat Algorithm Constrained by Voltage Stability","authors":"Sulistianingsih Nur Fitri, Y. Akil, I. Gunadin","doi":"10.1109/EIConCIT.2018.8878604","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878604","url":null,"abstract":"Economic Dispatch (ED) of thermal power plant has a role in maintaining economic power system. The main purpose of ED is to set the control variables of power system so that the generators can generate maximum power according to load demand based on each generator characteristic with lower production cost. In this paper, the economic dispatch will be done in thermal power system using Novel Bat Algorithm (NBA) constrained by voltage stability. NBA is a recent optimization method that is developed build upon bat behavior. The result showed that the NBA can optimize the thermal power system by showing lower price of production cost. The NBA can reduce 9.23% of the production cost. Not only is the production cost smaller but also the power loss obtained by NBA. Voltage stability is also maintained in this research by showing better improvement of critical point with average 0.920 per unit. The proposed method is applied in real system of SULSELBAR 150 kV power system.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
[EIConCIT 2018 Back Cover] [EIConCIT 2018封底]
Pub Date : 2018-11-01 DOI: 10.1109/eiconcit.2018.8878541
{"title":"[EIConCIT 2018 Back Cover]","authors":"","doi":"10.1109/eiconcit.2018.8878541","DOIUrl":"https://doi.org/10.1109/eiconcit.2018.8878541","url":null,"abstract":"","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Student Academic Evaluation using Naïve Bayes Classifier Algorithm 使用Naïve贝叶斯分类器算法的学生学业评价
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878626
Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah
One of the department tasks is to predict study duration-time of each student in order to anticipate dropout (DO), which causes the department performance to be poorly. Consequently, study duration-time of each student is indispensable. Furthermore, the evaluation showing whether the student will pass or fail would benefit the student/instructor and act as a guide for future recommendations/evaluations on performance. An in-depth study on the student academic evaluation techniques by using Naïve Bayes Classifier (NBC) has been implemented. The dataset with specific parameters among others age, place of birth, gender, high school status (public or private), department in high school, organization activeness, age at the start of high school level, and progress GPA (pGPA) and Total GPA (tGPA) of undergraduate program from semester 1–4 with three times graduation criteria (i.e., fast, on, and delay times) have been described and analyzed. The experimental results indicated that accuracy algorithm (AC) of 76.79% with true positive rate (TP) of 44.62% by using quality training data of 80% and 90% have a good performance accuracy value.
本系的任务之一是预测每个学生的学习时间,以预测退学(DO),这导致了本系的表现不佳。因此,每个学生的学习时间是必不可少的。此外,显示学生将通过或不通过的评估将使学生/教师受益,并作为将来推荐/评估表现的指南。利用Naïve贝叶斯分类器(NBC)对学生学业评价技术进行了深入的研究。对具有特定参数的数据集进行了描述和分析,其中包括年龄,出生地,性别,高中状态(公立或私立),高中部门,组织活跃度,高中开始时的年龄,以及本科课程从1-4学期具有三次毕业标准(即快,上和延迟时间)的进度GPA (pGPA)和总GPA (tGPA)。实验结果表明,在80%和90%的质量训练数据下,准确率(AC)为76.79%,真阳性率(TP)为44.62%,具有良好的性能准确率值。
{"title":"Student Academic Evaluation using Naïve Bayes Classifier Algorithm","authors":"Haviluddin, N. Dengen, E. Budiman, M. Wati, U. Hairah","doi":"10.1109/EIConCIT.2018.8878626","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878626","url":null,"abstract":"One of the department tasks is to predict study duration-time of each student in order to anticipate dropout (DO), which causes the department performance to be poorly. Consequently, study duration-time of each student is indispensable. Furthermore, the evaluation showing whether the student will pass or fail would benefit the student/instructor and act as a guide for future recommendations/evaluations on performance. An in-depth study on the student academic evaluation techniques by using Naïve Bayes Classifier (NBC) has been implemented. The dataset with specific parameters among others age, place of birth, gender, high school status (public or private), department in high school, organization activeness, age at the start of high school level, and progress GPA (pGPA) and Total GPA (tGPA) of undergraduate program from semester 1–4 with three times graduation criteria (i.e., fast, on, and delay times) have been described and analyzed. The experimental results indicated that accuracy algorithm (AC) of 76.79% with true positive rate (TP) of 44.62% by using quality training data of 80% and 90% have a good performance accuracy value.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Comparison of Artificial Neural Network and Gaussian Naïve Bayes in Recognition of Hand-Writing Number 人工神经网络与高斯Naïve贝叶斯在手写体数字识别中的比较
Pub Date : 2018-11-01 DOI: 10.1109/EIConCIT.2018.8878651
Herman, Lukman Syafie, Dolly Indra, As’ad Djamalilleil, Nirsal, Heliawaty Hamrul, Siska Anraeni, Lutfi Budi Ilmawan
Current technological developments spur the application of pattern recognition in various fields, such as the introduction of signature patterns, fingerprints, faces, and handwriting. Human handwriting has differences between one another and often is difficult to read or difficult to recognize and this can hamper daily activities, such as transaction activities that require handwriting. Even though one of the human biometric features is handwriting. The purpose of this paper is to compare the algorithm of Artificial Neural Network (ANN) and Gaussian Naïve Bayes (GNB) in handwriting number recognition. Both of these algorithms are quite reliable in performing the classification process. ANN can do pattern recognition and provide good results. If the size of the training data is small, the accuracy of GNB provides good results. To recognize the handwriting pattern, the characteristics of the handwriting object are extracted using an invariant moment. The test results show that GNB produces a higher level of accuracy of 28.33% compared to the ANN of 11.67%. The resulting accuracy level is still very low. This is because the result extraction data has a small distance for each class or any number character.
当前的技术发展刺激了模式识别在各个领域的应用,例如签名模式、指纹、人脸和手写的引入。人类的笔迹彼此之间存在差异,通常难以阅读或难以识别,这可能会妨碍日常活动,例如需要手写的交易活动。尽管人类的生物特征之一是笔迹。本文的目的是比较人工神经网络(ANN)算法和高斯Naïve贝叶斯(GNB)算法在手写数字识别中的应用。这两种算法在执行分类过程中都是相当可靠的。人工神经网络可以进行模式识别,并提供了良好的结果。如果训练数据的规模较小,GNB的精度可以提供很好的结果。为了识别笔迹模式,使用不变矩提取笔迹对象的特征。测试结果表明,GNB的准确率为28.33%,高于人工神经网络的11.67%。得到的精度水平仍然很低。这是因为结果提取数据对于每个类或任何数字字符具有较小的距离。
{"title":"Comparison of Artificial Neural Network and Gaussian Naïve Bayes in Recognition of Hand-Writing Number","authors":"Herman, Lukman Syafie, Dolly Indra, As’ad Djamalilleil, Nirsal, Heliawaty Hamrul, Siska Anraeni, Lutfi Budi Ilmawan","doi":"10.1109/EIConCIT.2018.8878651","DOIUrl":"https://doi.org/10.1109/EIConCIT.2018.8878651","url":null,"abstract":"Current technological developments spur the application of pattern recognition in various fields, such as the introduction of signature patterns, fingerprints, faces, and handwriting. Human handwriting has differences between one another and often is difficult to read or difficult to recognize and this can hamper daily activities, such as transaction activities that require handwriting. Even though one of the human biometric features is handwriting. The purpose of this paper is to compare the algorithm of Artificial Neural Network (ANN) and Gaussian Naïve Bayes (GNB) in handwriting number recognition. Both of these algorithms are quite reliable in performing the classification process. ANN can do pattern recognition and provide good results. If the size of the training data is small, the accuracy of GNB provides good results. To recognize the handwriting pattern, the characteristics of the handwriting object are extracted using an invariant moment. The test results show that GNB produces a higher level of accuracy of 28.33% compared to the ANN of 11.67%. The resulting accuracy level is still very low. This is because the result extraction data has a small distance for each class or any number character.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1