2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)最新文献

筛选
英文 中文
Implementation of Dynamic Web Server Based on Operating System-Level Virtualization using Docker Stack 基于操作系统级虚拟化的动态Web服务器的Docker Stack实现
H. Nurwarsito, Verio Brika Sejahtera
{"title":"Implementation of Dynamic Web Server Based on Operating System-Level Virtualization using Docker Stack","authors":"H. Nurwarsito, Verio Brika Sejahtera","doi":"10.1109/ICITEE49829.2020.9271710","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271710","url":null,"abstract":"A webserver is a provider that receives and provides data-based services that are sent through a web browser, then given a response in the form of web pages and HTML documents. The main problem that often occurs on a web server is the level of availability, demand affects the performance of the webserver which gets a lot of loads so that the webserver experiences overload, it will cause the web to go down. The Docker stack allows multiple services to connect to each other and run on multiple connected machines. The solution to this is by using operating system-level virtualization that utilizes the cluster system provided by the docker swarm, the docker stack is used to run multi-container images and web server services that will be distributed to other virtual servers. The results of this research show that the operating system-level virtualization supports the failover and load balancing mechanisms in the docker swarm area and the docker stack plays a role in distributing web server services from node manager to node worker as a backup webserver service, testing the best average response time parameters on failover obtained on a node with the time obtained 18.90 milliseconds while in availability through the parameter request test, at 200 requests the system successfully received 80% requests and indicated that the system could not meet the nines criteria at levels of availability.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tourism Demand Time Series Forecasting: A Systematic Literature Review 旅游需求时间序列预测:系统文献综述
Suci Karunia Prilistya, Adhistya Erna Permanasari, S. Fauziati
{"title":"Tourism Demand Time Series Forecasting: A Systematic Literature Review","authors":"Suci Karunia Prilistya, Adhistya Erna Permanasari, S. Fauziati","doi":"10.1109/ICITEE49829.2020.9271732","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271732","url":null,"abstract":"The tourism industry is one of the economic sectors that is overgrowing throughout the world. Accurate tourism demand forecasting is needed for proper strategic planning, decision making, and advanced research. Although there are several review papers on tourism demand forecasting in the literature, they are limited to only a few aspects. The purpose of this paper is to provide a comprehensive, structured analysis, not only method but also data source, destination, date range, information type, data frequency, and measurement accuracy. This paper also identified some remaining problems to be solved as the future direction for tourism demand forecasting research. There are 21 recent studies in tourism demand forecasting from 2017 to 2019 in the form of a systematic literature review. This will contribute to research in stimulating tourism demand prediction researchers and practitioners to undertake more work and developments in the field of time series forecasting.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coupled Feedback Differential Amplifier as a High-Power Terahertz Amplifier 作为大功率太赫兹放大器的耦合反馈差分放大器
Dzuhri Radityo Utomo
{"title":"Coupled Feedback Differential Amplifier as a High-Power Terahertz Amplifier","authors":"Dzuhri Radityo Utomo","doi":"10.1109/ICITEE49829.2020.9271664","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271664","url":null,"abstract":"This work proposes an amplifier architecture called coupled feedback differential amplifier (CFDA) that can reduce the effective gate-drain parasitic capacitance (Cgd) of a transistor. The effective parasitic capacitance reduction offered by the proposed CFDA allows the adoption of large size transistor to improve the saturated output power (Psat) performance of a THz amplifier. In addition, an adoption of Gmax concept into the proposed CFDA boosts its power gain performance. Therefore, the proposed CFDA has good performance in terms of both Psat and power gain as confirmed by the simulation results. The simulated Psat of the proposed CFDA shows around 6 dB improvement compared to that of the conventional single-ended high-gain THz amplifier, while still having similar level of power gain performance.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Increased Penetration DFIG on Power Oscillation Damping 增大贯深DFIG对功率振荡阻尼的影响
A. Widiastuti, Sasongko Pramono Hadi, S. Sarjiya
{"title":"Impact of Increased Penetration DFIG on Power Oscillation Damping","authors":"A. Widiastuti, Sasongko Pramono Hadi, S. Sarjiya","doi":"10.1109/ICITEE49829.2020.9271677","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271677","url":null,"abstract":"Wind power is believed to be one of the promised renewable energy sources. At present, various countries already have a high penetration of wind power in the power system. Wind power's impact on the power system's stability is widely researched to ensure system stability remains met. In general, many studies have conducted stability analysis by looking at the system's eigenvalue but have not yet emphasized the system's damping ratio value. The damping ratio shows how an oscillation can be damped, which is necessary for the electric operator. The simulation in this research is conducted with a scenario where the wind generator replaces one of the test system's synchronous generators. This study accommodates the wind generator location's condition far away from the load center transmitted through the long transmission. For each condition, the stability and damping ratio value of the system will be analyzed. The simulation results confirm that the higher the wind generator penetration level, the damping ratio will decrease. A noticeable decline occurs in systems with weak transmission conditions, and this is dangerous for the system.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICITEE 2020 Breaker Page ICITEE 2020断路器页面
{"title":"ICITEE 2020 Breaker Page","authors":"","doi":"10.1109/icitee49829.2020.9271766","DOIUrl":"https://doi.org/10.1109/icitee49829.2020.9271766","url":null,"abstract":"","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reactive Power Management in Radial Distribution Grid Connected Photovoltaic System 径向配电网并网光伏系统无功功率管理
Abdan Hanifan Dharmasakya, Fikri Waskito, L. M. Putranto
{"title":"Reactive Power Management in Radial Distribution Grid Connected Photovoltaic System","authors":"Abdan Hanifan Dharmasakya, Fikri Waskito, L. M. Putranto","doi":"10.1109/ICITEE49829.2020.9271680","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271680","url":null,"abstract":"The penetration of photovoltaic (PV) system as distributed generation in radial distribution network is increasing in each year. High PV penetration in radial distribution network can lead to overvoltage. Overvoltage can be overcome by having reactive power control in PV. However, the presence of reactive power flow leads to increasing of grid losses. In this study, the proper method to overcome overvoltage and produce minimum losses is conducted. In this study, three reactive power control method would be implemented, namely constant power factor, adjustable power factor and voltage reactive power. By using quasi dynamic load flow simulation in DIgSILENT Power Factory, it is obtained that voltage reactive power method can reduce overvoltage better and produce fewer increasing rate of system losses for approximately 2.228% and 5.613% respectively than other method.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence) 运用ISO/IEC 27005: 2018加强信息安全管理(以国防部数据信息中心为例)
Muhammad Fahrurozi, Soli Agrina Tarigan, Marah Alam Tanjung, K. Mutijarsa
{"title":"The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence)","authors":"Muhammad Fahrurozi, Soli Agrina Tarigan, Marah Alam Tanjung, K. Mutijarsa","doi":"10.1109/ICITEE49829.2020.9271748","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271748","url":null,"abstract":"The country's vital objects that provide data and information are vulnerable to threats. Information in the form of valuable assets needs to be protected from threats and vulnerabilities. Data and information must be guaranteed confidentiality, integrity, authenticity, and availability. Data and Information Center of Ministry of Defence, better known as Pusdatin Kemhan. Business processes owned by this organization are very complex. Pusdatin Kemhan requires strengthening in managing information security because the assets carried are important and high-value assets that are needed by leaders who assist in making decisions to support national defense and security. The implementation of information security and the existence of risk management are still not well managed. This study will provide an information security management design method based on risk management based on ISO / IEC 27005: 2018. The results of this study are the information security management policy at the Center for Data Processing and Information Technology.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Domain-Specific Contextualized Embedding: A Systematic Literature Review 特定领域情境化嵌入:系统文献综述
Ide Yunianto, A. E. Permanasari, Widyawan Widyawan
{"title":"Domain-Specific Contextualized Embedding: A Systematic Literature Review","authors":"Ide Yunianto, A. E. Permanasari, Widyawan Widyawan","doi":"10.1109/ICITEE49829.2020.9271752","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271752","url":null,"abstract":"Word embedding has successfully resolved various Natural Language Processing (NLP) problems. Unfortunately, the method has a weakness in detecting polysemy and homonym. Those issues led to the emergence of a new approach, which is named contextualized embedding. Many researchers examined such embedding to resolve problems in various particular areas. However, the studies are published disparate and complex. To provide a more comprehensive overview of contextualized embedding research in specific domains, a Systematic Literature Review (SLR) was conducted. The SLR results show that research on domain-specific contextualized embedding pays more attention to solving NLP problems in the Healthcare domain, by the percentage of more than 65%, followed by the Academic & Research field and other areas. The popularity of the Healthcare domain is associated with the availability of abundant datasets, mostly in English. BERT is the most contextualized embedding models used for domain-specific tasks, followed by ELMo, and finally GPT-1, as well as XLNET. Almost all reviewed papers reported performance improvements by using domain-specific contextualized embedding in their proposed model. Contextualized embedding can resolve polysemy problems and reduces overfitting. Besides, many downstream tasks have proved the ease implementation of the embedding. The shortcomings of this embedding are the high requirements of computation resources, the long execution time, and the computation complexity. Domain-specific contextualized embedding has resolved many problems, mostly classification tasks (e.g., Question and Answering) and tagging tasks (e.g., Named Entity Recognition). The two evaluation methods for measuring the performance of domain-specific contextualized embedding are Intrinsic evaluation and Extrinsic evaluation.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pushing the LTE Capability Towards 5G: The Analysis of Licensed Assisted Access (LAA) Implementation for High-Density Area in Indonesia 推动LTE能力向5G发展:印尼高密度地区授权辅助接入(LAA)实施分析
Ni Made Dwidhyana Ksamawati, D. Gunawan, M. I. Nashiruddin
{"title":"Pushing the LTE Capability Towards 5G: The Analysis of Licensed Assisted Access (LAA) Implementation for High-Density Area in Indonesia","authors":"Ni Made Dwidhyana Ksamawati, D. Gunawan, M. I. Nashiruddin","doi":"10.1109/ICITEE49829.2020.9271746","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271746","url":null,"abstract":"The number of mobile network subscribers has increased over the past few years rapidly. 4G LTE, as a part of wireless technology, made a significant contribution through the coverage expansion around countries but still faces critical issues, namely spectrum scarcity. However, the growth of data users and data consumption seems to be increased. The Mobile Network Operator (MNO) tried to provide the infrastructures and services that capable of responding to the necessity of capacity, reliability, and availability. 3GPP answered the opportunity by introducing the LTE-Advanced Pro (4.9 G) technology with 3GPP Rel-13 that called Licensed Assisted Access (LAA). LAA uses carrier aggregation technology, both licensed and 5 GHz unlicensed band. Through utilizing the unlicensed band, MNO tried to face the necessity of improvement with the cost-efficiency. This paper tries to introduce the LAA implementation in a dense urban area of Indonesia. Based on the calculation result of capacity and coverage planning in Jakarta, LAA will increase the capacity from 41.95% to 61.67% in the time period 2020 – 2030 based on existing LTE capacity. Besides capacity planning, the coverage planning resulted in the amount of required LAA site to covered 40 Points of Interest (POI) area by 72 outdoor LAA and 119 indoor LAA. According to business feasibility analysis for economic aspects, LAA business implementation in the dense urban area is categorized as feasible with positive NPV value at IDR 390,653,517,937; IRR > rate at 40.61%, and three years and three months payback period (PP) on the baseline scenario.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130217553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial Expression Recognition on Video Data with Various Face Poses Using Deep Learning 基于深度学习的不同面部姿态视频数据面部表情识别
Ayas Faikar Nafis, Dini Adni Navastara, A. Yuniarti
{"title":"Facial Expression Recognition on Video Data with Various Face Poses Using Deep Learning","authors":"Ayas Faikar Nafis, Dini Adni Navastara, A. Yuniarti","doi":"10.1109/ICITEE49829.2020.9271740","DOIUrl":"https://doi.org/10.1109/ICITEE49829.2020.9271740","url":null,"abstract":"Facial expressions in humans produce non-verbal communication to convey emotional states in humans; hence, they play an essential role in social interactions between humans. Along with the times, research on facial expression analysis has expanded to automatic facial expression recognition by computers. The facial expression recognition plays a vital role in human-computer interactions, monitoring human behavior, educational techniques, psychological, to sociable robots. In this study, the development of human facial expression recognition was carried out using a deep learning method called You Only Look Once (YOLO) based on Convolutional Neural Network (CNN). There are seven classes of facial expressions that can be recognized, namely angry, disgust, fear, happy, sadness, surprise, and neutral. The datasets used are video-based facial expression datasets such as CK+, IMED, and video data from 8 students of the Informatics Department, Institut Teknologi Sepuluh Nopember (ITS), with various face poses. Based on the experimental results, the best accuracy of the still image dataset is 94% on the CK+ dataset with channel three and learning rate 0.01. Moreover, the accuracy of video data with various face poses achieves 73%.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信