{"title":"Application of Bees Algorithm to Reduce Household's Energy Costs via Load Deferment","authors":"J. Leitão, P. Gil, B. Ribeiro, A. Cardoso","doi":"10.1109/ICITEED.2018.8534847","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534847","url":null,"abstract":"This work studies the management of electrical and water appliances in a household with the ultimate goal of reducing its energy-related costs. We consider a scenario where the operation of energy and water appliances are scheduled during one day, in which water demands and energy restrictions needs must be satisfied.Operation periods for these appliances was determined by solving an optimisation problem whose objective function reflects the overall energy costs. The Bees optimisation algorithm was employed to solve this problem and schedule appliances usages. Documented results select periods when energy is cheaper to operate appliances: early in the morning (6 am and 8 am) and later at night (0 am). A profit was also achieved by selling excess photovoltaic energy to the grid.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Prayogo, Reihan Putra, Akmal Hugo Prasetyo, M. Suryanegara
{"title":"Evaluation of LDPC Code and Polar Code Coding Scheme in 5G Technology – Massive Machine Type Communication","authors":"G. Prayogo, Reihan Putra, Akmal Hugo Prasetyo, M. Suryanegara","doi":"10.1109/ICITEED.2018.8534937","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534937","url":null,"abstract":"This research aims to compare and evaluate the performances of Polar code and LDPC code as the candidate of channel coding for 5G – mMTC scenario. Technical evaluation is done by assessing BLER, BER and coding gain for low block length with code rate = ½ using QPSK modulation over AWGN channel. Decoding schemes include Message Passing Algorithm (MPA) and Sum Product Algorithm (SPA) min-sum for LDPC code as well as Successive Cancelation (SC) and Successive Cancelation List (SCL) with L = 8 and L = 32 for Polar code. The result indicates that Polar code SCL decoder has the best performance with coding gain value 8.3 dB - 10 dB. In addition, the Polar code SCL decoder also has a smaller Eb/N0 value with a difference of 1 dB - 3 dB compared to other coding schemes to obtain BLER 10−4.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132744088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors Influencing e-payment Loyalty in Thailand","authors":"Kobthong Ladkoom, Bundit Thanasopon","doi":"10.1109/ICITEED.2018.8534881","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534881","url":null,"abstract":"Essentially, e-commerce involves trading of goods and services by electronic means. Due to the popularity of e-commerce many electronic payment or e-payment services have been emerged to enable consumers to easier and faster make payment for products and services. In Thailand, the government is trying to push the National e-payment program to provide Thai people with a standardized electronic payment system. In this research in-progress article, the researchers reviewed the literature on e-commerce and e-payment loyalty aiming to identify important factors influencing e-payment adoption in Thailand. We are able to come up with a research model comprising of key factors such as privacy risk, acceptability, consumers’ liability, perceived usefulness and confirmation. The model will be used to frame our data collection and analysis in our future research.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining the Critical Success Factors of Startup in Thailand Using Structural Equation Model","authors":"Srinual Nalintippayawong, Nattakit Waiyawatpattarakul, Supannada Chotipant","doi":"10.1109/ICITEED.2018.8534854","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534854","url":null,"abstract":"Startup is a fast-growing business model by funding from investors, however, it also has a high failure rate and risk. This research aims to examine critical success factors of and their relations in Thai startups. Structural equation model is applied for studying causal relationships between factors by using factor analysis and multivariable regression analysis. Based on sixteen observed variables, the results show that there are four critical success factors of Thai startups, namely support partner, business model, market opportunity, and customer perspective. Especially, the factors of the business model and support partner have direct effects on potential and success in startups. This research is a knowledge framework which assists, not only young startups to succeed their business, but also investors to evaluate investments in startups. Moreover, the paper also provides a literature review which is useful for researchers in the area of a startup.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"16 s23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VoBiRo - Vocational Bipedal Robot Platform, Kinematic and Locomotion Control","authors":"Fahmizal, A. Mayub","doi":"10.1109/ICITEED.2018.8534767","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534767","url":null,"abstract":"This paper presents kinematic and locomotion control of vocational bipedal robot (VoBiRo)with a kid-size platform. Typically, a linear inverted pendulum model (LIPM) can be used to generate the center of mass (CoM) trajectory of a bipedal robot. By combining the swing foot trajectory, the omnidirectional walking command is capable of generating joint angle control commands in terms of kinematic. Thus, this paper proposes kinematic and LIPM as a locomotion control VoBiRo. A complete simulation was then implemented in MATLAB and graphical user interface (GUI) by Processing IDE relying on kinematic and LIPM model.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114368208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Smart Card Interface Device on Zynq-7000 System-on-Chip","authors":"Adi Candra Swastika, T. Adiono","doi":"10.1109/ICITEED.2018.8534777","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534777","url":null,"abstract":"The latest technological developments that are so massive make the issue of authentication and security data more interesting. One way to overcome these things is by using a smart card. Furthermore, one of the essential elements of the smart card is smart card Interface Device (IFD). Technological developments that are developing rapidly make the smart card IFD function not only as a reader. Moreover, smart card IFD is required to be integrated with various features (e.g., connected to the internet, interface using LCD, can operate without PC, and so on). One of the solutions is to design the smart card IFD in the form of IP Core so it can be implemented into an SoC that has various advantages. This paper will discuss about hardware and software design from smart card IFD and then implement it on Zynq-7000 All-Programmable System-on-Chip (SoC). By implementing the design on SoC, it is possible to make smart card IFD faster and flexible for further research. The result of this research shows that smart card IFD based on SoC is successfully implemented on Zynq-7000 and has a good speed performance compared to other systems.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Forward-Backward Sweep Technique for the Load Flow Analysis of a Distribution Network with Accurate Modeling of Zero Sequence Voltages","authors":"R. Verma, V. Sarkar","doi":"10.1109/ICITEED.2018.8534800","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534800","url":null,"abstract":"The objective of this paper is to improve the accuracy of the results obtained from the load llow analysis of a distribution network via forward-backward sweeps. Specific attention is paid to the two-port modeling of a transformer with precise consideration for the zero sequence components of its port voltages. The zero sequence voltages at transformer ports are often ignored in the conventional load llow analyses. A new two-port network model is derived, which is generalized enough for the accurate representation of a transformer in the cascaded connection. Based upon the novel two-port representation made, a new set of iteration rules is established to carry out the forward-backward sweeps for solving the load llow results. All possible transformer configurations are taken into account. It is shown that the load llow analysis technique proposed is suitable for both active and passive distribution networks. The accuracy analysis of the load llow results is also carried out. For a given load llow result, by assessing the nodal current imbalances are evaluated based upon the admittance matrix representation of the network. Case study is performed to demonstrate the utility of the proposed load llow analysis technique.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Model for the Threshold Voltage of a Double Gate Tunneling MOSFET Including the Source/Drain Depletion Regions","authors":"Mahshad Ghaffari, S. A. Hashemi","doi":"10.1109/ICITEED.2018.8534792","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534792","url":null,"abstract":"In this paper an analytical model for the threshold voltage of a double gate tunneling MOSFET has been presented. The threshold voltage is defined as the gate voltage at which the tunneling barrier width from the valence band of the source region to the conduction band of the channel region starts to saturate. The tunneling barrier width depends on the depletion width at the source/channel junction which in turn depends on the channel surface potential. The surface potential is affected by the source/drain depletion regions. Therefore, these depletion regions are included in the modeling. Finally, an analytical expression for the threshold voltage has been introduced which shows good match with the simulation results.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Identification Characteristics Using Named Entity Recognition and Phrase Detection","authors":"H. Al-Ash, W. Wibowo","doi":"10.1109/ICITEED.2018.8534898","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534898","url":null,"abstract":"Information explosion that can be generated by anyone may lead to the spread of fake news not only at the news channel, but also at social media, and so forth. Detection of fake news has become an urgent need on the society because of fake news spread of unrest in the society. Several related studies have been conducted in the news classification with the aim of providing a decision whether a news is included in fake news or original news. In the related research, a vector representation of documents is used. This vector representation is then given to the algorithm for further processing. This study aims to model vectors that can accommodate the characteristics of fake news before further processed by language algorithms using the Indonesian language. In this research, fake news and original news are represented according to the vector space model. Vector model combination of frequency term, inverse document frequency and frequency reversed with 10-fold cross validation using support vector machine algorithm classifier. Variations of phrase detection as well as name recognition entities (entity recognition names) are also used in vector representation. A vector representation that uses the term frequency shows promising performance. It can recognize news characteristics correctly 96.74% of 2516 documents across phrase detection and named entity recognition process.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Server Farm Design Using Personal Computer (PC) Desktop","authors":"Iqsyahiro Kresna A, Y. Rosmansyah","doi":"10.1109/ICITEED.2018.8534920","DOIUrl":"https://doi.org/10.1109/ICITEED.2018.8534920","url":null,"abstract":"Web server is a service system that has been used for various purposes. Not just popular websites like Google, Facebook, Twitter, and Amazon only. Even Computer Assisted Test (CAT), Computer Based Test (CBT) and Learning Management Systems (LMS) are now web-based. But not all are able to provide server computers to run web server services for one reason or another. The web server service provider utilizes the Desktop Personal Computer (PC) to replace the server computer's task. Desktop PC is not designed to run server functions. A lot of requests will cause the server on Desktop PC to overload and cause server down. It takes two or more servers for the server to be shared. Scalable web server is a set of multiple servers that are connected and used to handle requests from Hypertext Transfer Protocol (HTTP) protocol users on a large scale. Implementing the Web Server Farm or Clustering Web Server and Load Balancer, as well as High Availability architecture, are expected to overload the server overload problem. From Load Balancer test result concluded that Least Connection algorithm better than Round Robin algorithm. The average time of Downtime in High Availability or failover testing is 6.587 seconds.","PeriodicalId":142523,"journal":{"name":"2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"38 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}