{"title":"Feature extraction and classification of the Indonesian syllables using Discrete Wavelet Transform and statistical features","authors":"Domy Kristomo, Risanuri Hidayat, I. Soesanti","doi":"10.1109/ICSTC.2016.7877353","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877353","url":null,"abstract":"The major problem of most speech recognition systems is their unsatisfactory effectiveness (impact to recognition rate), efficiency (feature vector dimension), shift variance, and robustness in noisy condition. Feature extraction plays a very important role in the speech recognition process, because a better feature is good for improving the recognition rate. This paper presents a speech feature extraction by combining Discrete Wavelet Transform (DWT) and statistical method for recognizing the syllables sound in the Indonesian language. Three different mother wavelet transforms combined with statistical method (DWT-Statistical) are used as a feature extraction method. Multi-layer perceptron is used as a classifier after feature extraction process. This research aims to find the best properties in effectiveness and efficiency on performing feature extraction of each syllable sound to be applied in the speech recognition method on the intelligent systems. Experiments, in this study, show that the proposed method which uses 29 features set is applicable for feature extraction and classification of the Indonesian syllable. The results show that the average of recognition rate for the DWT-Statistical at the 7th level decomposition by using mother wavelet of Haar, Daubechies 2, and Coiflet 2 are 57.77%, 71.11%, and 67.77%, respectively.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPU and memory performance analysis on dynamic and dedicated resource allocation using XenServer in Data Center environment","authors":"H. Ismail, M. Riasetiawan","doi":"10.1109/ICSTC.2016.7877341","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877341","url":null,"abstract":"Idle servers only utilize 10% to 20% of their potential. As such, configuring computer resource management has been considered to optimize servers' capabilities. In this research, a series of experiments were conducted using virtual machines (VMs) with different CPU and memory allocation techniques implemented in XenServer. The created virtual machines ran benchmarks and stress test applications with a preconfigured test and duration to understand the virtual machines' performance when given a continuous load. These applications consist of CPU, memory, disk intensive app as well as benchmark apps. The performance parameters in this research were the benchmark apps results. These experiments indicate that the best CPU allocation for file transfer and MySQL query tests are Priority Weight and Cap CPU allocation, with performance differences of around 75% compared to Default CPU allocation. Meanwhile, the CPU allocation method for Stress-ng CPU stress test, Stress-ng VM stress test, and UnixBench tests is the Default CPU allocation with a performance difference of around 45%. Furthermore, Default CPU allocation is the best method of CPU allocation for web servers with performance differences of between 5% to 29% over Priority Weight and Cap CPU allocation. The best memory allocation method is Static Memory allocation, with a performance difference between 7% to 53% over Dynamic Memory allocation in all tests.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SHA-2 and SHA-3 based sequence randomization algorithm","authors":"Kuntoro Adi Nugroho, A. Hangga, I. Sudana","doi":"10.1109/ICSTC.2016.7877365","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877365","url":null,"abstract":"Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms. The first utilized a few of the most significant digits of the hash value and the second treated all digits of the hash value as equally important. Entropy analysis and running time analysis were performed to assess the proposed method in terms of randomness and computational efficiency. SHA-2 implemented with the first strategy is superior with entropy of 3.88792 bits and real execution time of 1.76585 seconds. The evaluation result demonstrates no significant difference between the randomness of the sequences generated by SHA-2 and SHA-3. In terms of computational efficiency, SHA-2 demonstrated faster execution time than SHA-3.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128740576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nazrul Effendy, Nur Chalim Wachidah, Balza Achmad, Prasojo Jiwandono, M. Subekti
{"title":"Power estimation of G.A. Siwabessy Multi-Purpose Reactor at start-up condition using artificial neural network with input variation","authors":"Nazrul Effendy, Nur Chalim Wachidah, Balza Achmad, Prasojo Jiwandono, M. Subekti","doi":"10.1109/ICSTC.2016.7877362","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877362","url":null,"abstract":"Thermal power of nuclear reactor needs to be carefully maintained to produce desired electrical power. While in-core measurement system has a higher safety risk, ex-core measurement has been employed to increase safety. Artificial neural network with multi-layer perceptron architecture and Bayesian regularization algorithm has been trained and tested for estimating the thermal power at G.A. Siwabessy multi-purpose reactor. Furthermore, to find out the parameters that provide the strongest influences to thermal power, variations of input were tested to the estimation system. This study found that the output from primary coolant temperature sensor was the main factor that produces the strongest effect toward thermal power of the reactor, whereas the output from pressure sensor providing the smallest effect toward the power calculation.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juni Nurma Sari, A. N. Hanung, Edi N Lukito, P. Santosa, R. Ferdiana
{"title":"A study on algorithms of pupil diameter measurement","authors":"Juni Nurma Sari, A. N. Hanung, Edi N Lukito, P. Santosa, R. Ferdiana","doi":"10.1109/ICSTC.2016.7877372","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877372","url":null,"abstract":"Pupillary changes can be used to detect human condition. Several studies on pupillary changes were carried out in order to study human emotions such as annoyance, stress, and reactions when viewing pleasant or unpleasant images, or seeing exciting products. A person's emotions can also be detected from pupil diameter when solving math problems using samples or independently. In medical field, pupil diameter can also be used to support doctor's decision for early detection of diabetes. The steps to measure pupil diameter include eye detection, pupil detection, and pupil diameter measurement. This paper discusses several eye detection methods, pupil detection methods and pupil diameter measurements using image processing algorithms. This paper also conducted an experiment by measuring pupil diameter using a simple method. The paper contribute a reference of algorithms that can be used by researchers for measuring pupil diameter to detect users' emotions and measure workload.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. W. Ordiyasa, L. Nugroho, P. Santosa, Wahyudi Kumorotomo
{"title":"Enhancing Quality of Service for eGovernment interoperability based on adaptive ontology","authors":"I. W. Ordiyasa, L. Nugroho, P. Santosa, Wahyudi Kumorotomo","doi":"10.1109/ICSTC.2016.7877356","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877356","url":null,"abstract":"Today, the implementation of eGovernment services in many countries become larger. Interoperability is how to interlink different systems and different schema of working in among different administrations when eGovernment services run a number of applications. Furthermore, the interoperability can be implemented in all over the world. The interoperability, a concept that supports eGovernment interlinking, is used to achieve a good service of eGovernment accessed by public. When the application of eGovernment is growing, the quality of services becomes an important aspect. However, various data and systems will cause problems among them, such as different field names in the database, different tables and so on. Therefore, in this paper, we propose a model for achieving good Quality of Service (QoS) for eGovernment services. We propose an adaptive ontology method to get high QoS in eGovernment services with heterogenity data and information.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128144057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographical Information System for mapping accident-prone roads and development of new road using Multi-Attribute Utility method","authors":"Anik Vega Vitianingsih, Dwi Cahyono","doi":"10.1109/ICSTC.2016.7877349","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877349","url":null,"abstract":"The means of transportation development which are not offset by adequate roads construction will lead the traffic density exceeds the volume capacity of the roads. This will cause the access road difficult to pass thus often raises the risk of traffic congestion and lead to traffic accidents. This paper will discuss the use of Geographical Information System (GIS) technology in analyzing spatial data and attribute data (geoprocessing layer) in the form of mapping accident-prone roads and mapping dense traffic lanes as an alternative to the development of new road using Multiple-Attribute Utility Theory (MAUT) method. Geoprocessing layer test conducted on the roads in Gresik District, Indonesia shows the accident-prone roads mapping points, with the average yield of low-risk accident-prone roads are 58%, 24% are low-risk accident-prone roads and 18% roads condition are high-risk accident-prone roads. Geoprocessing for alternative development of new road as the consequences of the density of traffic lanes, in which the uncrowded road categories are 36%, dense road 32% and very dense roads 32%. This system can be used by the government of Gresik District as the decision makers to plan for the alternative development of new road area, therefore traffic density can be minimized.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epilepsy detection on EEG data using backpropagation, firefly algorithm and simulated annealing","authors":"A. Damayanti, A. B. Pratiwi, Miswanto","doi":"10.1109/ICSTC.2016.7877368","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877368","url":null,"abstract":"Epilepsy is a central system disorder of human brain in which nerve cell activity becomes disrupted, causing seizures or periods of unsual behaviour, sensations and sometimes loss of consciousness. The electroencephalogram (EEG) is a measure of brain waves can be used in evaluation of brain disorders, one of which epilepsy. In this paper, epilepsy detection system on EEG data is built using combination of backpropagation and simulated annealing. Firefly algorithm and simulated annealing are used to determine optimal learning rate and number of unit hidden on backpropagation process. Then learning rate and number of unit hidden are used for trainning and validation backpropagation testing process on EEG data epilepsi detection. The percentages of success rate detection epilepsy EEG data obtained for 93.3% using the learning rate 0.93 and the number of hidden layer units as much as 7 to mean square error of 0.00535.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127562948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. G. Bagasjvara, I. Candradewi, S. Hartati, A. Harjoko
{"title":"Automated detection and classification techniques of Acute leukemia using image processing: A review","authors":"R. G. Bagasjvara, I. Candradewi, S. Hartati, A. Harjoko","doi":"10.1109/ICSTC.2016.7877344","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877344","url":null,"abstract":"Hematological disorders of leukocytes (white blood corpuscles) are very frequent in medical practices. Each year, the number of new cases of leukemia increased with a high mortality rate what can cause a delay in diagnosis and treatment of leukemia. The hematologist faces difficulty in classifying white blood cells included cancerous leukemia cells. Currently, the diagnosis of hematological disorder was made by microscopic analysis of peripheral blood smear by hematological experts. However, this kind of diagnosis is complex, costly process, time-consuming and inherently subjective, hence to avoid such problems a classification technique based on computer vision is required. This document provides a survey of many kinds of literature which talk about leukemia detection using image processing. In this year, many improvements were made in this field. With this document, we provide a new perspective from many kinds of literature so future research can be developed effectively for their research.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical simulation of the effect of axial distance between two rotors in counter-rotating wind turbines","authors":"Y. H. Irawan, M. A. Bramantya","doi":"10.1109/ICSTC.2016.7877338","DOIUrl":"https://doi.org/10.1109/ICSTC.2016.7877338","url":null,"abstract":"The counter-rotating wind turbines (CRWT) is a wind turbine model developed from a single rotating wind turbine (SRWT) model with a horizontal axis. CRWTs have two rotors rotating in opposite directions on the same axis. The purpose of this research is to find the optimal power that can be produced by CRWTs, as related to the change of the axial distance between the front and rear rotors. The flow around CRWTs is simulated using computational fluid dynamic (CFD) with ANSYS Fluent. The simulation consists of two steps: obtaining the optimum rotation and rotor torque, respectively. These two values are used to calculate the mechanical power of the rotors. In this simulation, the wind velocity is 3 m/s and the variations of axial distance are 0.2d; 0.3d; 0.44d; 0.61d; 0.7d; 0.8d; 1d; 1.5d; 2d (with d standing for front rotor diameter). The result of the simulation shows that axial distance between 0.2d– 0.7d has the most optimal mechanical power.","PeriodicalId":228650,"journal":{"name":"2016 2nd International Conference on Science and Technology-Computer (ICST)","volume":"578 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}