Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251301
M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur
The aim of this study is to provide the new solution for the SCADA system by using the DTM6000 with Tier three and the multipoint node topology for the application offshore mining industry. The application of the proposed design can provide the data as wind speed, machine temperature, sonar, vessel position. Applying the SCADA Software, NMS (network management system), and DWS (Dispatch Work Station), data can be monitored through the control Center. The SCADA system with radiofrequency can cover a wide coverage area (ie up to 60 km). The trunking base station, carry out the data, and able to transmit voice communication with good quality. The technical design and the installation as well as the trial for validation of the proposed system in the remote area offshore of the mining industry is provided. It is might be stated that the system enables the development and addition of more other SCADA equipment in the future.
{"title":"SCADA Solution by Installing DTM6000 and Trunking Tier Three","authors":"M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur","doi":"10.23919/EECSI50503.2020.9251301","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251301","url":null,"abstract":"The aim of this study is to provide the new solution for the SCADA system by using the DTM6000 with Tier three and the multipoint node topology for the application offshore mining industry. The application of the proposed design can provide the data as wind speed, machine temperature, sonar, vessel position. Applying the SCADA Software, NMS (network management system), and DWS (Dispatch Work Station), data can be monitored through the control Center. The SCADA system with radiofrequency can cover a wide coverage area (ie up to 60 km). The trunking base station, carry out the data, and able to transmit voice communication with good quality. The technical design and the installation as well as the trial for validation of the proposed system in the remote area offshore of the mining industry is provided. It is might be stated that the system enables the development and addition of more other SCADA equipment in the future.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"89-94"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251895
Ganjar Winasis, M. Riyadi, T. Prakoso
This research was conducted with the aim to build integration between Bioimpedance Analysis (BIA) and Body Mass Index (BMI) for users with special needs. The proposed system can measure height, weight, BMI and body composition simultaneously to be used by the elderly population and handicapped users. The proposed system is developed as a chair equipped with several system blocks, namely BIA block, BMI block, power supply block, and microcontroller block. Before starting the measurement, users only need to enter their age and gender data. The whole system is controlled by using Arduino Mega 2560 on the microcontroller block equipped with keypad for data input and an LCD to display measurement results. System testing is performed by comparing the measurement results with Omron HBF-375. The test involved 8 volunteers (4 males and 4 females). The test results show that the integrated BIA-BMI works well with an average error of 1.5%.
本研究旨在为有特殊需求的用户建立生物阻抗分析(BIA)和身体质量指数(BMI)之间的集成。该系统可以同时测量身高、体重、身体质量指数和身体成分,供老年人和残疾人使用。所提出的系统被开发成一个椅子,配备了几个系统模块,即BIA模块、BMI模块、电源模块和微控制器模块。在开始测量之前,用户只需输入他们的年龄和性别数据。整个系统采用Arduino Mega 2560单片机控制,配有数据输入键盘和显示测量结果的LCD。系统测试通过与欧姆龙HBF-375的测量结果进行比较。该测试涉及8名志愿者(4男4女)。测试结果表明,该方法具有较好的综合效果,平均误差为1.5%。
{"title":"Design of Integrated Bioimpedance Analysis and Body Mass Index for Users with Special Needs","authors":"Ganjar Winasis, M. Riyadi, T. Prakoso","doi":"10.23919/EECSI50503.2020.9251895","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251895","url":null,"abstract":"This research was conducted with the aim to build integration between Bioimpedance Analysis (BIA) and Body Mass Index (BMI) for users with special needs. The proposed system can measure height, weight, BMI and body composition simultaneously to be used by the elderly population and handicapped users. The proposed system is developed as a chair equipped with several system blocks, namely BIA block, BMI block, power supply block, and microcontroller block. Before starting the measurement, users only need to enter their age and gender data. The whole system is controlled by using Arduino Mega 2560 on the microcontroller block equipped with keypad for data input and an LCD to display measurement results. System testing is performed by comparing the measurement results with Omron HBF-375. The test involved 8 volunteers (4 males and 4 females). The test results show that the integrated BIA-BMI works well with an average error of 1.5%.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"4 1","pages":"181-186"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81784769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251306
S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta
Email is the most popular way of personal and official communication among people and organizations. Due to untrusted virtual environment, email systems may face frequent attacks like malware, spamming, social engineering, etc. Spamming is the most common malicious activity, where unsolicited emails are sent in bulk, and these spam emails can be the source of malware, waste resources, hence degrade the productivity. In spam filter development, the most important challenge is to find the correlation between the nature of spam and the interest of the users because the interests of users are dynamic. This paper proposes a novel dynamic spam filter model that considers the changes in the interests of users with time while handling the spam activities. It uses intention-based segmentation to compare different segments of text documents instead of comparing them as a whole. The proposed spam filter is a multi-tier approach where initially, the email content is divided into segments with the help of part of speech (POS) tagging based on voices and tenses. Further, the segments are clustered using hierarchical clustering and compared using the vector space model. In the third stage, concept drift is detected in the clusters to identify the change in the interest of the user. Later, the classification of ham emails into various categories is done in the last stage. For experiments Enron dataset is used and the obtained results are promising.
{"title":"Email classification via intention-based segmentation","authors":"S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta","doi":"10.23919/EECSI50503.2020.9251306","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251306","url":null,"abstract":"Email is the most popular way of personal and official communication among people and organizations. Due to untrusted virtual environment, email systems may face frequent attacks like malware, spamming, social engineering, etc. Spamming is the most common malicious activity, where unsolicited emails are sent in bulk, and these spam emails can be the source of malware, waste resources, hence degrade the productivity. In spam filter development, the most important challenge is to find the correlation between the nature of spam and the interest of the users because the interests of users are dynamic. This paper proposes a novel dynamic spam filter model that considers the changes in the interests of users with time while handling the spam activities. It uses intention-based segmentation to compare different segments of text documents instead of comparing them as a whole. The proposed spam filter is a multi-tier approach where initially, the email content is divided into segments with the help of part of speech (POS) tagging based on voices and tenses. Further, the segments are clustered using hierarchical clustering and compared using the vector space model. In the third stage, concept drift is detected in the clusters to identify the change in the interest of the user. Later, the classification of ham emails into various categories is done in the last stage. For experiments Enron dataset is used and the obtained results are promising.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"1 1","pages":"38-44"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83779051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251304
Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto
Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.
{"title":"IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning","authors":"Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251304","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251304","url":null,"abstract":"Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"68 27","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91400030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251909
Ariesta Satryoko, Arthur Josias Simon Runturambi
The objective of this article is to build a better and more realistic user interface for Vlarm, an application we developed to censor inappropriate scenes during the COVID-19 pandemic. This premise was built by the fact that most children demand home entertainment, such as watching movies during the quarantine. Thus, this research introduces a new feature in our censorship software that enables parents to exchange their censorship findings so that other parents can use such findings without doing so to the same movie. On the other hand, the Indonesian Government imposes a large-scale social restriction (PSBB) due to the situation of COVID-19 in the country. This interaction is to provide information on the user's experience to eventually build more user-friendly interfaces and features that enable users to conveniently utilize Vlarm application.
{"title":"Designing Feature Application for User Experience to Censor Inappropriate Scene in Indonesia","authors":"Ariesta Satryoko, Arthur Josias Simon Runturambi","doi":"10.23919/EECSI50503.2020.9251909","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251909","url":null,"abstract":"The objective of this article is to build a better and more realistic user interface for Vlarm, an application we developed to censor inappropriate scenes during the COVID-19 pandemic. This premise was built by the fact that most children demand home entertainment, such as watching movies during the quarantine. Thus, this research introduces a new feature in our censorship software that enables parents to exchange their censorship findings so that other parents can use such findings without doing so to the same movie. On the other hand, the Indonesian Government imposes a large-scale social restriction (PSBB) due to the situation of COVID-19 in the country. This interaction is to provide information on the user's experience to eventually build more user-friendly interfaces and features that enable users to conveniently utilize Vlarm application.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81108375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251899
Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo
In 2019, a government organization in Indonesia has developed several systems that will run in parallel using Agile by utilizing vendor services. Based on internal project reports, there are indications of human-related issues or challenges during the development process of these systems. The case study is one of the critical systems of failed projects in this government organization. In this study, a Systematic Literature Review (SLR) was used to identify human-related challenges or issues that could lead to failure in an ASD project. These issues or challenges were qualitatively validated based on expert judgment from external and internal organizations by interview and questionnaire. The final results of this study were 20 human-related challenges grouped into 5 categories, which were identified as human-related challenges that led to the failure of the ASD project in this case study. Proposed solutions based on best practices are also provided for each challenge or issue by conducting business research methods with open and axial coding. Besides, the comparison of views between vendors and organizations on human-related challenges as well as the implications of this study are also presented at the end, so that readers can get insight into these challenges.
{"title":"Human Related Challenges in Agile Software Development of Government Outsourcing Project","authors":"Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo","doi":"10.23919/EECSI50503.2020.9251899","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251899","url":null,"abstract":"In 2019, a government organization in Indonesia has developed several systems that will run in parallel using Agile by utilizing vendor services. Based on internal project reports, there are indications of human-related issues or challenges during the development process of these systems. The case study is one of the critical systems of failed projects in this government organization. In this study, a Systematic Literature Review (SLR) was used to identify human-related challenges or issues that could lead to failure in an ASD project. These issues or challenges were qualitatively validated based on expert judgment from external and internal organizations by interview and questionnaire. The final results of this study were 20 human-related challenges grouped into 5 categories, which were identified as human-related challenges that led to the failure of the ASD project in this case study. Proposed solutions based on best practices are also provided for each challenge or issue by conducting business research methods with open and axial coding. Besides, the comparison of views between vendors and organizations on human-related challenges as well as the implications of this study are also presented at the end, so that readers can get insight into these challenges.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"64 1","pages":"222-229"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90476742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251292
Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.
{"title":"Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)","authors":"Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251292","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251292","url":null,"abstract":"Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"196 1","pages":"114-118"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251911
Syafii, H. D. Laksono, Novizon, R. Fahreza
This paper presents an analysis of optimal micro hydropower (MH) capacity of hybrid systems to improve renewable energy based power systems. The electricity system was designed by considering river water flow data and solar radiation data at the research location of Universitas Andalas (Unand). Optimal results obtained for the configuration of the Grid, MH, and photovoltaic (PV) with a head height of 30 m and a flow rate of 800 L/s with the lowest Cost of Energy (CoE) value of $ 0.065. As an optimal sizing system has been able to increase the composition of renewable energy generation in the Unand electrical network. The renewable energy fraction has increased from 26.4% to 36.5%. Therefore, determining the optimal capacity will increase the use of renewable energy generation. Conversely, an increase in electricity supply from renewable energy plants will reduce electricity consumption from the State Electricity Company (Perusahaan Listrik Negara, PLN) grid. The latest excess power generation at a low load can be sold to the PLN grid.
本文分析了混合发电系统的最优微水电容量,以改进可再生能源发电系统。电力系统的设计考虑了Andalas大学(Unand)研究地点的河水流量数据和太阳辐射数据。以水头高度为30 m、流量为800 L/s、最低能源成本(CoE)值为0.065美元的电网、MH和光伏(PV)配置为最优结果。作为一个最佳的规模系统已经能够增加可再生能源发电在Unand电网的组成。可再生能源比例从26.4%增加到36.5%。因此,确定最佳容量将增加可再生能源发电的使用。相反,可再生能源发电厂电力供应的增加将减少国家电力公司(Perusahaan Listrik Negara, PLN)电网的用电量。最新的低负荷过剩发电量可以出售给PLN电网。
{"title":"Optimal Sizing of Micro Hydropower to Improve Hybrid Renewable Power System","authors":"Syafii, H. D. Laksono, Novizon, R. Fahreza","doi":"10.23919/EECSI50503.2020.9251911","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251911","url":null,"abstract":"This paper presents an analysis of optimal micro hydropower (MH) capacity of hybrid systems to improve renewable energy based power systems. The electricity system was designed by considering river water flow data and solar radiation data at the research location of Universitas Andalas (Unand). Optimal results obtained for the configuration of the Grid, MH, and photovoltaic (PV) with a head height of 30 m and a flow rate of 800 L/s with the lowest Cost of Energy (CoE) value of $ 0.065. As an optimal sizing system has been able to increase the composition of renewable energy generation in the Unand electrical network. The renewable energy fraction has increased from 26.4% to 36.5%. Therefore, determining the optimal capacity will increase the use of renewable energy generation. Conversely, an increase in electricity supply from renewable energy plants will reduce electricity consumption from the State Electricity Company (Perusahaan Listrik Negara, PLN) grid. The latest excess power generation at a low load can be sold to the PLN grid.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"164 1","pages":"95-99"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86923496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251902
Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
Movement recognition is a hot issue in machine learning. The gesture recognition is related to video processing, which gives problems in various aspects. Some of them are separating the image against the background firmly. This problem has consequences when there are incredibly different settings from the training data. The next challenge is the number of images processed at a time that forms motion. Previous studies have conducted experiments on the Deep Convolutional Neural Network architecture to detect actions on sequential model balancing each other on frames and motion between frames. The challenge of identifying objects in a temporal video image is the number of parameters needed to do a simple video classification so that the estimated motion of the object in each picture frame is needed. This paper proposed the classification of hand movement patterns with the Single Stream Temporal Convolutional Neural Networks approach. This model was robust against extreme non-training data, giving an accuracy of up to 81,7%. The model used a 50 layers ResNet architecture with recorded video training.
{"title":"Dynamic Hand Gesture Recognition Using Temporal-Stream Convolutional Neural Networks","authors":"Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.23919/EECSI50503.2020.9251902","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251902","url":null,"abstract":"Movement recognition is a hot issue in machine learning. The gesture recognition is related to video processing, which gives problems in various aspects. Some of them are separating the image against the background firmly. This problem has consequences when there are incredibly different settings from the training data. The next challenge is the number of images processed at a time that forms motion. Previous studies have conducted experiments on the Deep Convolutional Neural Network architecture to detect actions on sequential model balancing each other on frames and motion between frames. The challenge of identifying objects in a temporal video image is the number of parameters needed to do a simple video classification so that the estimated motion of the object in each picture frame is needed. This paper proposed the classification of hand movement patterns with the Single Stream Temporal Convolutional Neural Networks approach. This model was robust against extreme non-training data, giving an accuracy of up to 81,7%. The model used a 50 layers ResNet architecture with recorded video training.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"110 1","pages":"132-136"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87655441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.23919/EECSI50503.2020.9251299
Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa
Increasing demand for electricity, coupled with a greater understanding of the environmental impact of conventional power generation, has led to growing research interest on alternative energy sources. Energy harvesters based on playground equipment, such as the seesaw, has been proposed as an alternative method to generate electrical power. In this study, a new harvesting mechanism based on the electromagnetic regenerative damper is proposed as an alternative method to harness energy from a playground seesaw. The proposed design is intended for higher power output and efficiency, smaller dimensions, and ease of installation on a seesaw. Lab tests have been carried out to characterize the proposed design experimentally. The energy harvesting (stroke velocity-to-voltage) coefficient for the proposed seesaw-based energy harvester is obtained as 73.18 V/(ms−1). The regenerative damper is capable of producing up to 110 mW of power at 9.34% efficiency.
{"title":"Design of Regenerative Damper for Energy Harvester in Playground Seesaw","authors":"Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa","doi":"10.23919/EECSI50503.2020.9251299","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251299","url":null,"abstract":"Increasing demand for electricity, coupled with a greater understanding of the environmental impact of conventional power generation, has led to growing research interest on alternative energy sources. Energy harvesters based on playground equipment, such as the seesaw, has been proposed as an alternative method to generate electrical power. In this study, a new harvesting mechanism based on the electromagnetic regenerative damper is proposed as an alternative method to harness energy from a playground seesaw. The proposed design is intended for higher power output and efficiency, smaller dimensions, and ease of installation on a seesaw. Lab tests have been carried out to characterize the proposed design experimentally. The energy harvesting (stroke velocity-to-voltage) coefficient for the proposed seesaw-based energy harvester is obtained as 73.18 V/(ms−1). The regenerative damper is capable of producing up to 110 mW of power at 9.34% efficiency.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"41 1","pages":"83-88"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90983996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}