首页 > 最新文献

2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)最新文献

英文 中文
SCADA Solution by Installing DTM6000 and Trunking Tier Three 通过安装DTM6000和中继三层实现SCADA解决方案
M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur
The aim of this study is to provide the new solution for the SCADA system by using the DTM6000 with Tier three and the multipoint node topology for the application offshore mining industry. The application of the proposed design can provide the data as wind speed, machine temperature, sonar, vessel position. Applying the SCADA Software, NMS (network management system), and DWS (Dispatch Work Station), data can be monitored through the control Center. The SCADA system with radiofrequency can cover a wide coverage area (ie up to 60 km). The trunking base station, carry out the data, and able to transmit voice communication with good quality. The technical design and the installation as well as the trial for validation of the proposed system in the remote area offshore of the mining industry is provided. It is might be stated that the system enables the development and addition of more other SCADA equipment in the future.
本研究的目的是通过使用DTM6000的第三层和多点节点拓扑,为海上采矿业的应用提供SCADA系统的新解决方案。应用本设计可以提供风速、机器温度、声纳、船舶位置等数据。通过SCADA软件、网管系统(NMS)和调度工作站(DWS),可以通过控制中心对数据进行监控。采用射频的SCADA系统可以覆盖较宽的覆盖区域(即高达60公里)。集群基站,进行数据传输,并能传输高质量的语音通信。提供了技术设计和安装以及在采矿工业的偏远近海地区对拟议系统进行验证的试验。可以这样说,该系统使未来更多其他SCADA设备的开发和增加成为可能。
{"title":"SCADA Solution by Installing DTM6000 and Trunking Tier Three","authors":"M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur","doi":"10.23919/EECSI50503.2020.9251301","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251301","url":null,"abstract":"The aim of this study is to provide the new solution for the SCADA system by using the DTM6000 with Tier three and the multipoint node topology for the application offshore mining industry. The application of the proposed design can provide the data as wind speed, machine temperature, sonar, vessel position. Applying the SCADA Software, NMS (network management system), and DWS (Dispatch Work Station), data can be monitored through the control Center. The SCADA system with radiofrequency can cover a wide coverage area (ie up to 60 km). The trunking base station, carry out the data, and able to transmit voice communication with good quality. The technical design and the installation as well as the trial for validation of the proposed system in the remote area offshore of the mining industry is provided. It is might be stated that the system enables the development and addition of more other SCADA equipment in the future.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"89-94"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Integrated Bioimpedance Analysis and Body Mass Index for Users with Special Needs 为有特殊需要的用户设计集成生物阻抗分析和体重指数
Ganjar Winasis, M. Riyadi, T. Prakoso
This research was conducted with the aim to build integration between Bioimpedance Analysis (BIA) and Body Mass Index (BMI) for users with special needs. The proposed system can measure height, weight, BMI and body composition simultaneously to be used by the elderly population and handicapped users. The proposed system is developed as a chair equipped with several system blocks, namely BIA block, BMI block, power supply block, and microcontroller block. Before starting the measurement, users only need to enter their age and gender data. The whole system is controlled by using Arduino Mega 2560 on the microcontroller block equipped with keypad for data input and an LCD to display measurement results. System testing is performed by comparing the measurement results with Omron HBF-375. The test involved 8 volunteers (4 males and 4 females). The test results show that the integrated BIA-BMI works well with an average error of 1.5%.
本研究旨在为有特殊需求的用户建立生物阻抗分析(BIA)和身体质量指数(BMI)之间的集成。该系统可以同时测量身高、体重、身体质量指数和身体成分,供老年人和残疾人使用。所提出的系统被开发成一个椅子,配备了几个系统模块,即BIA模块、BMI模块、电源模块和微控制器模块。在开始测量之前,用户只需输入他们的年龄和性别数据。整个系统采用Arduino Mega 2560单片机控制,配有数据输入键盘和显示测量结果的LCD。系统测试通过与欧姆龙HBF-375的测量结果进行比较。该测试涉及8名志愿者(4男4女)。测试结果表明,该方法具有较好的综合效果,平均误差为1.5%。
{"title":"Design of Integrated Bioimpedance Analysis and Body Mass Index for Users with Special Needs","authors":"Ganjar Winasis, M. Riyadi, T. Prakoso","doi":"10.23919/EECSI50503.2020.9251895","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251895","url":null,"abstract":"This research was conducted with the aim to build integration between Bioimpedance Analysis (BIA) and Body Mass Index (BMI) for users with special needs. The proposed system can measure height, weight, BMI and body composition simultaneously to be used by the elderly population and handicapped users. The proposed system is developed as a chair equipped with several system blocks, namely BIA block, BMI block, power supply block, and microcontroller block. Before starting the measurement, users only need to enter their age and gender data. The whole system is controlled by using Arduino Mega 2560 on the microcontroller block equipped with keypad for data input and an LCD to display measurement results. System testing is performed by comparing the measurement results with Omron HBF-375. The test involved 8 volunteers (4 males and 4 females). The test results show that the integrated BIA-BMI works well with an average error of 1.5%.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"4 1","pages":"181-186"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81784769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Email classification via intention-based segmentation 基于意图的电子邮件分类
S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta
Email is the most popular way of personal and official communication among people and organizations. Due to untrusted virtual environment, email systems may face frequent attacks like malware, spamming, social engineering, etc. Spamming is the most common malicious activity, where unsolicited emails are sent in bulk, and these spam emails can be the source of malware, waste resources, hence degrade the productivity. In spam filter development, the most important challenge is to find the correlation between the nature of spam and the interest of the users because the interests of users are dynamic. This paper proposes a novel dynamic spam filter model that considers the changes in the interests of users with time while handling the spam activities. It uses intention-based segmentation to compare different segments of text documents instead of comparing them as a whole. The proposed spam filter is a multi-tier approach where initially, the email content is divided into segments with the help of part of speech (POS) tagging based on voices and tenses. Further, the segments are clustered using hierarchical clustering and compared using the vector space model. In the third stage, concept drift is detected in the clusters to identify the change in the interest of the user. Later, the classification of ham emails into various categories is done in the last stage. For experiments Enron dataset is used and the obtained results are promising.
电子邮件是个人和组织之间最流行的个人和官方沟通方式。由于不可信的虚拟环境,电子邮件系统可能经常面临恶意软件、垃圾邮件、社会工程等攻击。垃圾邮件是最常见的恶意活动,其中大量发送未经请求的电子邮件,而这些垃圾邮件可能是恶意软件的来源,浪费资源,从而降低生产力。在垃圾邮件过滤器的开发中,最重要的挑战是找到垃圾邮件的性质与用户的兴趣之间的相关性,因为用户的兴趣是动态的。本文提出了一种新的动态垃圾邮件过滤模型,该模型在处理垃圾邮件活动时考虑了用户兴趣随时间的变化。它使用基于意图的分割来比较文本文档的不同部分,而不是将它们作为一个整体进行比较。所提出的垃圾邮件过滤器是一种多层方法,最初,电子邮件内容在基于语态和时态的词性(POS)标记的帮助下被分成段。此外,使用分层聚类对片段进行聚类,并使用向量空间模型进行比较。在第三阶段,在聚类中检测概念漂移,以识别用户兴趣的变化。然后,在最后一个阶段将垃圾邮件分类为各种类别。实验采用安然数据集,得到了令人满意的结果。
{"title":"Email classification via intention-based segmentation","authors":"S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta","doi":"10.23919/EECSI50503.2020.9251306","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251306","url":null,"abstract":"Email is the most popular way of personal and official communication among people and organizations. Due to untrusted virtual environment, email systems may face frequent attacks like malware, spamming, social engineering, etc. Spamming is the most common malicious activity, where unsolicited emails are sent in bulk, and these spam emails can be the source of malware, waste resources, hence degrade the productivity. In spam filter development, the most important challenge is to find the correlation between the nature of spam and the interest of the users because the interests of users are dynamic. This paper proposes a novel dynamic spam filter model that considers the changes in the interests of users with time while handling the spam activities. It uses intention-based segmentation to compare different segments of text documents instead of comparing them as a whole. The proposed spam filter is a multi-tier approach where initially, the email content is divided into segments with the help of part of speech (POS) tagging based on voices and tenses. Further, the segments are clustered using hierarchical clustering and compared using the vector space model. In the third stage, concept drift is detected in the clusters to identify the change in the interest of the user. Later, the classification of ham emails into various categories is done in the last stage. For experiments Enron dataset is used and the obtained results are promising.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"1 1","pages":"38-44"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83779051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning 使用Weka工具和Scikit-learn机器学习的物联网僵尸网络恶意软件分类
Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto
Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.
僵尸网络是互联网网络安全的威胁之一,botmaster利用网络流量进行通信,对网络进行攻击。物联网(IoT)网络基础设施由廉价,低功耗,始终在线,始终连接到网络的设备组成,并且不显眼,具有无处不在和不显眼的特征,因此这些特征使物联网设备成为僵尸网络恶意软件攻击的有吸引力的目标。在识别数据包流量是否是恶意软件攻击时,可以使用机器学习分类方法。本文利用Weka和Scikit-learn机器学习分析工具,实现了AdaBoost、Decision Tree、Random Forest和Naïve Bayes四种机器学习算法。然后通过实验对四种算法在准确率、执行时间和误报率(FPR)方面的性能进行了测试。实验结果表明,Weka工具提供了更加准确、高效的分类方法。然而,在假阳性率方面,使用Scikit-learn可以提供更好的结果。
{"title":"IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning","authors":"Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251304","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251304","url":null,"abstract":"Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"68 27","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91400030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing Feature Application for User Experience to Censor Inappropriate Scene in Indonesia 为用户体验设计功能应用程序以审查印度尼西亚的不适当场景
Ariesta Satryoko, Arthur Josias Simon Runturambi
The objective of this article is to build a better and more realistic user interface for Vlarm, an application we developed to censor inappropriate scenes during the COVID-19 pandemic. This premise was built by the fact that most children demand home entertainment, such as watching movies during the quarantine. Thus, this research introduces a new feature in our censorship software that enables parents to exchange their censorship findings so that other parents can use such findings without doing so to the same movie. On the other hand, the Indonesian Government imposes a large-scale social restriction (PSBB) due to the situation of COVID-19 in the country. This interaction is to provide information on the user's experience to eventually build more user-friendly interfaces and features that enable users to conveniently utilize Vlarm application.
本文的目的是为Vlarm构建一个更好、更逼真的用户界面,Vlarm是我们开发的一个应用程序,用于在COVID-19大流行期间审查不适当的场景。这是因为大部分孩子在隔离期间需要看电影等家庭娱乐。因此,这项研究在我们的审查软件中引入了一个新功能,使父母能够交换他们的审查结果,以便其他父母可以使用这些发现,而不必对同一部电影这样做。另一方面,印尼政府因国内新冠疫情实施了大规模社会限制。这种交互是为了提供有关用户体验的信息,以最终构建更加用户友好的界面和功能,使用户能够方便地使用varm应用程序。
{"title":"Designing Feature Application for User Experience to Censor Inappropriate Scene in Indonesia","authors":"Ariesta Satryoko, Arthur Josias Simon Runturambi","doi":"10.23919/EECSI50503.2020.9251909","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251909","url":null,"abstract":"The objective of this article is to build a better and more realistic user interface for Vlarm, an application we developed to censor inappropriate scenes during the COVID-19 pandemic. This premise was built by the fact that most children demand home entertainment, such as watching movies during the quarantine. Thus, this research introduces a new feature in our censorship software that enables parents to exchange their censorship findings so that other parents can use such findings without doing so to the same movie. On the other hand, the Indonesian Government imposes a large-scale social restriction (PSBB) due to the situation of COVID-19 in the country. This interaction is to provide information on the user's experience to eventually build more user-friendly interfaces and features that enable users to conveniently utilize Vlarm application.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81108375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Related Challenges in Agile Software Development of Government Outsourcing Project 政府外包项目敏捷软件开发中与人相关的挑战
Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo
In 2019, a government organization in Indonesia has developed several systems that will run in parallel using Agile by utilizing vendor services. Based on internal project reports, there are indications of human-related issues or challenges during the development process of these systems. The case study is one of the critical systems of failed projects in this government organization. In this study, a Systematic Literature Review (SLR) was used to identify human-related challenges or issues that could lead to failure in an ASD project. These issues or challenges were qualitatively validated based on expert judgment from external and internal organizations by interview and questionnaire. The final results of this study were 20 human-related challenges grouped into 5 categories, which were identified as human-related challenges that led to the failure of the ASD project in this case study. Proposed solutions based on best practices are also provided for each challenge or issue by conducting business research methods with open and axial coding. Besides, the comparison of views between vendors and organizations on human-related challenges as well as the implications of this study are also presented at the end, so that readers can get insight into these challenges.
2019年,印度尼西亚的一个政府组织开发了几个系统,这些系统将利用供应商服务使用敏捷并行运行。根据内部项目报告,在这些系统的开发过程中存在与人有关的问题或挑战的迹象。案例研究是该政府机构失败项目的关键系统之一。在这项研究中,系统文献综述(SLR)被用于识别可能导致ASD项目失败的与人类相关的挑战或问题。通过访谈和问卷调查,根据外部和内部组织的专家判断,对这些问题或挑战进行定性验证。本研究的最终结果是20个与人类相关的挑战,分为5类,这些挑战被确定为导致本案例研究中ASD项目失败的与人类相关的挑战。通过使用开放编码和轴向编码进行业务研究方法,还为每个挑战或问题提供了基于最佳实践的建议解决方案。此外,本文最后还比较了供应商和组织对与人相关的挑战的看法以及本研究的意义,以便读者深入了解这些挑战。
{"title":"Human Related Challenges in Agile Software Development of Government Outsourcing Project","authors":"Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo","doi":"10.23919/EECSI50503.2020.9251899","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251899","url":null,"abstract":"In 2019, a government organization in Indonesia has developed several systems that will run in parallel using Agile by utilizing vendor services. Based on internal project reports, there are indications of human-related issues or challenges during the development process of these systems. The case study is one of the critical systems of failed projects in this government organization. In this study, a Systematic Literature Review (SLR) was used to identify human-related challenges or issues that could lead to failure in an ASD project. These issues or challenges were qualitatively validated based on expert judgment from external and internal organizations by interview and questionnaire. The final results of this study were 20 human-related challenges grouped into 5 categories, which were identified as human-related challenges that led to the failure of the ASD project in this case study. Proposed solutions based on best practices are also provided for each challenge or issue by conducting business research methods with open and axial coding. Besides, the comparison of views between vendors and organizations on human-related challenges as well as the implications of this study are also presented at the end, so that readers can get insight into these challenges.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"64 1","pages":"222-229"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90476742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA) 基于主成分分析的物联网入侵检测系统特征提取
Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.
特征提取解决了寻找最有效和最全面的特征集的问题。采用主成分分析(PCA)特征提取算法优化特征提取的有效性,构建有效的入侵检测方法。本文将主成分分析(PCA)用于入侵检测系统的特征提取,以提高检测的准确性和精密度。研究了特征提取对攻击检测的影响。在物联网(IoT)网络拓扑试验台创建的网络流量数据集上进行了实验,结果表明,检测的准确率达到100%。
{"title":"Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)","authors":"Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251292","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251292","url":null,"abstract":"Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"196 1","pages":"114-118"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimal Sizing of Micro Hydropower to Improve Hybrid Renewable Power System 微水电优化规模优化可再生能源混合发电系统
Syafii, H. D. Laksono, Novizon, R. Fahreza
This paper presents an analysis of optimal micro hydropower (MH) capacity of hybrid systems to improve renewable energy based power systems. The electricity system was designed by considering river water flow data and solar radiation data at the research location of Universitas Andalas (Unand). Optimal results obtained for the configuration of the Grid, MH, and photovoltaic (PV) with a head height of 30 m and a flow rate of 800 L/s with the lowest Cost of Energy (CoE) value of $ 0.065. As an optimal sizing system has been able to increase the composition of renewable energy generation in the Unand electrical network. The renewable energy fraction has increased from 26.4% to 36.5%. Therefore, determining the optimal capacity will increase the use of renewable energy generation. Conversely, an increase in electricity supply from renewable energy plants will reduce electricity consumption from the State Electricity Company (Perusahaan Listrik Negara, PLN) grid. The latest excess power generation at a low load can be sold to the PLN grid.
本文分析了混合发电系统的最优微水电容量,以改进可再生能源发电系统。电力系统的设计考虑了Andalas大学(Unand)研究地点的河水流量数据和太阳辐射数据。以水头高度为30 m、流量为800 L/s、最低能源成本(CoE)值为0.065美元的电网、MH和光伏(PV)配置为最优结果。作为一个最佳的规模系统已经能够增加可再生能源发电在Unand电网的组成。可再生能源比例从26.4%增加到36.5%。因此,确定最佳容量将增加可再生能源发电的使用。相反,可再生能源发电厂电力供应的增加将减少国家电力公司(Perusahaan Listrik Negara, PLN)电网的用电量。最新的低负荷过剩发电量可以出售给PLN电网。
{"title":"Optimal Sizing of Micro Hydropower to Improve Hybrid Renewable Power System","authors":"Syafii, H. D. Laksono, Novizon, R. Fahreza","doi":"10.23919/EECSI50503.2020.9251911","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251911","url":null,"abstract":"This paper presents an analysis of optimal micro hydropower (MH) capacity of hybrid systems to improve renewable energy based power systems. The electricity system was designed by considering river water flow data and solar radiation data at the research location of Universitas Andalas (Unand). Optimal results obtained for the configuration of the Grid, MH, and photovoltaic (PV) with a head height of 30 m and a flow rate of 800 L/s with the lowest Cost of Energy (CoE) value of $ 0.065. As an optimal sizing system has been able to increase the composition of renewable energy generation in the Unand electrical network. The renewable energy fraction has increased from 26.4% to 36.5%. Therefore, determining the optimal capacity will increase the use of renewable energy generation. Conversely, an increase in electricity supply from renewable energy plants will reduce electricity consumption from the State Electricity Company (Perusahaan Listrik Negara, PLN) grid. The latest excess power generation at a low load can be sold to the PLN grid.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"164 1","pages":"95-99"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86923496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Hand Gesture Recognition Using Temporal-Stream Convolutional Neural Networks 基于时间流卷积神经网络的动态手势识别
Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
Movement recognition is a hot issue in machine learning. The gesture recognition is related to video processing, which gives problems in various aspects. Some of them are separating the image against the background firmly. This problem has consequences when there are incredibly different settings from the training data. The next challenge is the number of images processed at a time that forms motion. Previous studies have conducted experiments on the Deep Convolutional Neural Network architecture to detect actions on sequential model balancing each other on frames and motion between frames. The challenge of identifying objects in a temporal video image is the number of parameters needed to do a simple video classification so that the estimated motion of the object in each picture frame is needed. This paper proposed the classification of hand movement patterns with the Single Stream Temporal Convolutional Neural Networks approach. This model was robust against extreme non-training data, giving an accuracy of up to 81,7%. The model used a 50 layers ResNet architecture with recorded video training.
运动识别是机器学习领域的一个热点问题。手势识别涉及到视频处理,在很多方面都存在问题。他们中的一些人正在牢固地将图像与背景分开。当与训练数据有难以置信的不同设置时,这个问题就会产生后果。下一个挑战是一次处理形成运动的图像的数量。以往的研究已经在深度卷积神经网络架构上进行了实验,以检测序列模型上帧上相互平衡的动作和帧之间的运动。在时间视频图像中识别目标的挑战是进行简单的视频分类所需的参数数量,以便需要在每个图像帧中估计目标的运动。提出了一种基于单流时间卷积神经网络的手部运动模式分类方法。该模型对极端非训练数据具有鲁棒性,准确率高达81.7%。该模型使用了50层的ResNet架构和录制的视频训练。
{"title":"Dynamic Hand Gesture Recognition Using Temporal-Stream Convolutional Neural Networks","authors":"Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.23919/EECSI50503.2020.9251902","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251902","url":null,"abstract":"Movement recognition is a hot issue in machine learning. The gesture recognition is related to video processing, which gives problems in various aspects. Some of them are separating the image against the background firmly. This problem has consequences when there are incredibly different settings from the training data. The next challenge is the number of images processed at a time that forms motion. Previous studies have conducted experiments on the Deep Convolutional Neural Network architecture to detect actions on sequential model balancing each other on frames and motion between frames. The challenge of identifying objects in a temporal video image is the number of parameters needed to do a simple video classification so that the estimated motion of the object in each picture frame is needed. This paper proposed the classification of hand movement patterns with the Single Stream Temporal Convolutional Neural Networks approach. This model was robust against extreme non-training data, giving an accuracy of up to 81,7%. The model used a 50 layers ResNet architecture with recorded video training.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"110 1","pages":"132-136"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87655441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Regenerative Damper for Energy Harvester in Playground Seesaw 游乐场跷跷板能量采集器蓄热式阻尼器设计
Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa
Increasing demand for electricity, coupled with a greater understanding of the environmental impact of conventional power generation, has led to growing research interest on alternative energy sources. Energy harvesters based on playground equipment, such as the seesaw, has been proposed as an alternative method to generate electrical power. In this study, a new harvesting mechanism based on the electromagnetic regenerative damper is proposed as an alternative method to harness energy from a playground seesaw. The proposed design is intended for higher power output and efficiency, smaller dimensions, and ease of installation on a seesaw. Lab tests have been carried out to characterize the proposed design experimentally. The energy harvesting (stroke velocity-to-voltage) coefficient for the proposed seesaw-based energy harvester is obtained as 73.18 V/(ms−1). The regenerative damper is capable of producing up to 110 mW of power at 9.34% efficiency.
电力需求的增加,加上对传统发电对环境的影响有了更深入的了解,导致对替代能源的研究兴趣日益增加。基于游乐场设备(如跷跷板)的能量收集器已被提议作为一种发电的替代方法。在这项研究中,提出了一种基于电磁再生阻尼器的新型收集机构,作为利用游乐场跷跷板能量的替代方法。所提出的设计旨在实现更高的功率输出和效率,更小的尺寸,并且易于在跷跷板上安装。已经进行了实验室试验来表征所提出的设计。所提出的基于跷跷板的能量收集器的能量收集(冲程速度-电压)系数为73.18 V/(ms−1)。再生阻尼器能够以9.34%的效率产生高达110兆瓦的功率。
{"title":"Design of Regenerative Damper for Energy Harvester in Playground Seesaw","authors":"Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa","doi":"10.23919/EECSI50503.2020.9251299","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251299","url":null,"abstract":"Increasing demand for electricity, coupled with a greater understanding of the environmental impact of conventional power generation, has led to growing research interest on alternative energy sources. Energy harvesters based on playground equipment, such as the seesaw, has been proposed as an alternative method to generate electrical power. In this study, a new harvesting mechanism based on the electromagnetic regenerative damper is proposed as an alternative method to harness energy from a playground seesaw. The proposed design is intended for higher power output and efficiency, smaller dimensions, and ease of installation on a seesaw. Lab tests have been carried out to characterize the proposed design experimentally. The energy harvesting (stroke velocity-to-voltage) coefficient for the proposed seesaw-based energy harvester is obtained as 73.18 V/(ms−1). The regenerative damper is capable of producing up to 110 mW of power at 9.34% efficiency.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"41 1","pages":"83-88"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90983996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1