2015 International Conference on Electrical Engineering and Informatics (ICEEI)最新文献

筛选
英文 中文
Improvement of radar performance using LFM pulse compression technique 利用LFM脉冲压缩技术改进雷达性能
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352515
Ilfiyantri Intyas, Rahmawati Hasanah, M. R. Hidayat, Barokatun Hasanah, Andriyan B. Suskmono, A. Munir
{"title":"Improvement of radar performance using LFM pulse compression technique","authors":"Ilfiyantri Intyas, Rahmawati Hasanah, M. R. Hidayat, Barokatun Hasanah, Andriyan B. Suskmono, A. Munir","doi":"10.1109/ICEEI.2015.7352515","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352515","url":null,"abstract":"One fundamental aspect in designing a good radar system is the performance of range resolution. The good range resolution performance is required in radar system to detect small targets at a long distance. It is already known that the longer pulse will increase energy and improve target detection. Conversely, shorter pulse will increase the range resolution of radar. Recently, one pulse compression technique frequently used is linear frequency modulated (LFM) pulse wave. This paper presents the LFM pulse compression technique for improving radar performance and its simulation in Matlab and GNU radio using audio and radio waves. The performance of radar resolution using LFM pulse compression technique is observed from the parameter of pulse compression ratio (PCR). A higher PCR value indicates a better radar resolution. From the result, it shows that the values of PCR in Matlab® simulation using audio and radio waves are 6000 and 300000, respectively. Moreover, in GNU radio implementation, the values PCR using audio and radio waves are 0.275 and 50, respectively.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116330654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Android anomaly detection system using machine learning classification Android异常检测系统采用机器学习分类
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352512
Harry Kurniawan, Y. Rosmansyah, B. Dabarsyah
{"title":"Android anomaly detection system using machine learning classification","authors":"Harry Kurniawan, Y. Rosmansyah, B. Dabarsyah","doi":"10.1109/ICEEI.2015.7352512","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352512","url":null,"abstract":"Android is one of the most popular open-source smartphone operating system and its access control permission mechanisms cannot detect any malware behavior. In this paper, new software behavior-based anomaly detection system is proposed to detect anomaly caused by malware. It works by analyzing anomalies on power consumption, battery temperature and network traffic data using machine learning classification algorithm. The result shows that this method can detect anomaly with 85.6% accuracy.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A novel 4-point discrete fourier transforms circuit based on product of Rademacher functions 一种基于Rademacher函数积的四点离散傅里叶变换电路
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352483
Zulfikar, H. Walidainy
{"title":"A novel 4-point discrete fourier transforms circuit based on product of Rademacher functions","authors":"Zulfikar, H. Walidainy","doi":"10.1109/ICEEI.2015.7352483","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352483","url":null,"abstract":"This paper presents a new circuit design for implementing 4-point DFT algorithm based on product of Rademacher functions. The circuit has been derived from the similarity of how Fourier transforms and Walsh transforms are implemented. Walsh matrices contain numbers either +1 or -1 except for first row. Similarly, the 4-point DFT matrix contain numbers either positive or negative except for first row. This similarity has been taken into the case of how to implement the DFT circuit based on how Walsh transforms is generated. Since Walsh transforms is derived based on product of Rademacher functions, the proposed 4-point DFT circuit is designed according to product Rademacher functions. The circuit consist of negative circuit, multiplexers, accumulator (real and imaginary), buffers, and control circuit. The control circuit is designed to produce Rademacher functions for controlling and managing data flow. The 4-point DFT circuit has been successfully designed and implemented to FPGA platform. Among the selected chips, Artix 7 is the fastest one.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"41 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Requirements refinements and analysis with case-based reasoning techniques to reuse the requirements 使用基于案例的推理技术对需求进行细化和分析,以重用需求
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352535
Fransiskus Adikara, B. Hendradjaya, B. Sitohang
{"title":"Requirements refinements and analysis with case-based reasoning techniques to reuse the requirements","authors":"Fransiskus Adikara, B. Hendradjaya, B. Sitohang","doi":"10.1109/ICEEI.2015.7352535","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352535","url":null,"abstract":"This paper proposes an approach in Goal-Oriented Requirements refinement and analysis that adapt Case-Based Reasoning techniques. This approach is expected to help emphasizing the reuse of the high quality requirements that have been applied on previous system development process. The Attributed Goal-Oriented Requirements Analysis (AGORA) is simplified to analyze requirements proposed by Goal Tree Model Case-Based. An information system project for a transportation company has been used as a case study to demonstrate this approach. The case study helped demonstrated that the generated requirements using our approach are able to accomplish the company needs, rather than user requirements that are caused by the user's interest in requirements engineering process.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Geohash index based spatial data model for corporate 基于Geohash索引的企业空间数据模型
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352548
I. Suwardi, Dody Dharma, Dicky Prima Satya, D. Lestari
{"title":"Geohash index based spatial data model for corporate","authors":"I. Suwardi, Dody Dharma, Dicky Prima Satya, D. Lestari","doi":"10.1109/ICEEI.2015.7352548","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352548","url":null,"abstract":"Spatial data wrapped and processed by an application known as Geographic Information Systems (Geographical Information System / GIS). In desktop based GIS, the spatial information services only occurs when a variety of basic data has been loaded into the applications database. The development of information technology has provide ready to access, worldwide scale, web based mapping system, like Google Maps. The addition of the information content to the map can also be done easily by any user into the system. Until now, both the basic data provided by Google Maps or data that is added by users are loosely connected, meaning that there are minimum linkage between data. Thus, the data for greater benefit of a corporation or government where the data is closely related to each other still yet to be served. As spatial data being managed are voluminous, the scalability of querying performance will be a challenge. To anticipate this, we describe an improvement that built on top of our proposed spatial data model. We used a special data which derived by interleaving bits obtained from latitude-longitude pairs of a spatial data, the string called geohash. A geohash can be used as an index of every object in Spatial data table. The longer the Geohash string, the more precise the bounding box around the location it references. This approach will improve the performance of querying process of a single or even collection of spatial data in the data table of corporate GIS. The main study of this research is to provide information services along with the availability of a variety of basic spatial data owned by Google Maps. This paper highlights our recent effort in theoretical and applied research in spatial data management.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Malware detection on Android smartphones using API class and machine learning 使用API类和机器学习对Android智能手机进行恶意软件检测
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352513
Westyarian, Y. Rosmansyah, B. Dabarsyah
{"title":"Malware detection on Android smartphones using API class and machine learning","authors":"Westyarian, Y. Rosmansyah, B. Dabarsyah","doi":"10.1109/ICEEI.2015.7352513","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352513","url":null,"abstract":"This paper proposes a (new) method to detect malware in Android smartphones using API (application programming interface) classes. We use machine learning to classify whether an application is benign or malware. Furthermore, we compare classification precision rate from machine learning. This research uses 51 APIs package classes from 16 APIs classes and employs cross validation and percentage split test to classify benign and malware using Random Forest, J48, and Support Vector Machine algorithms. We use 412 total application samples (205 benign, 207 malware). We obtain that the classification precision average is 91.9%.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
The development of a cross-platform multi-player virtual application of Kolintang musical instruments using various controllers 利用多种控制器开发了一个跨平台的科林堂乐器多人虚拟应用
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352570
Liza Wikarsa, D. Paseru, Vianry Teguh Pangemanan
{"title":"The development of a cross-platform multi-player virtual application of Kolintang musical instruments using various controllers","authors":"Liza Wikarsa, D. Paseru, Vianry Teguh Pangemanan","doi":"10.1109/ICEEI.2015.7352570","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352570","url":null,"abstract":"Kolintang (Indonesian's xylophones) is popular nationwide as the traditional music instruments from Minahasa, a regency in North Sulawesi. It is usually played in ancestor worshipping rituals as it was believed that Kolintang had a close relationship with the traditional belief of North Sulawesi's natives and as their culture. Currently, there are several Kolintang applications developed that run either on Windows and Android and use different types of controllers like a web camera, touch screen, and keyboard. Despite their differences, these applications are played offline by a single player only without using an Internet connection. In addition, there is no depth discussion on how the performance of these applications was tested. Thus, this research will develop a more advance Kolintang application that can be played by multiple players simultaneously on multiple platforms, Android and Windows Based, using various controllers such as webcam, keyboard, mouse, or touch screen. The findings revealed that the interaction is best visualized within the range of two to three meters long. The sounding range of this application is safe for human hearing. The Root mean square error (RMSE) and Mean Absolute Error (MAE) tests can only be done to measure the real time auditory feedback from the application since there is no avail ideal data model for sounding range and application load time. The loading time for this application is faster than any Kolintang applications that have been previously developed. This application needs further improvements on the real time auditory feedbacks by diagnosing the variation in the errors in a set of forecasts.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient audio watermark by autocorrelation methods 基于自相关方法的高效音频水印
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352571
Habibur Muhaimin, D. Danudirdjo, A. B. Suksmono, Donghwan Shin
{"title":"An efficient audio watermark by autocorrelation methods","authors":"Habibur Muhaimin, D. Danudirdjo, A. B. Suksmono, Donghwan Shin","doi":"10.1109/ICEEI.2015.7352571","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352571","url":null,"abstract":"Some audio watermark applications, specifically the second screen, are subject to harsh environment, such as high attenuation and interference during the transmission of the stego signal from speaker of the primary screen to microphone of the second screen. Autocorrelation domain embedded audio watermarking systems are a promising algorithm since the watermark signal is highly correlated to the host signal causing an inherently temporal masking effect. At the same time the algorithm promises blind watermark data extraction since the watermark data are hidden in the relationship between the stego signal and its delayed version. Only if the stego key remains secret, the algorithm satisfies the three criteria of an audio watermark algorithm: robustness, imperceptibility, and capacity. In this paper, we discuss several derivations of the algorithm and present the performances of the algorithm in terms of bit detection rate for some parameter arrangements. Discussion about the robustness of the algorithm performances under attacks is also presented.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DG placement and size with continuation power flow method 用连续潮流法计算DG的位置和大小
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352566
A. Arief, M. B. Nappu
{"title":"DG placement and size with continuation power flow method","authors":"A. Arief, M. B. Nappu","doi":"10.1109/ICEEI.2015.7352566","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352566","url":null,"abstract":"Optimum location and size of distributed generations (DGs) is important to maximize the system's stability. This paper presents a new simple but robust method based on the continuation power flow (CPF) method to determine the optimal location of DG units. The tangent vector in the CPF method provides the ratio of differential change in voltage to differential change in load. Size of DGs at each location is computed through an iteration process until the stable condition of the system is achieved. The proposed CPF method is tested on the IEEE 24-bus Reliability Test System (RTS) the results show the robustness of the method. Further relevant findings are also discussed in this paper.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Analysis and classification of serious games for cognitive stimulation 严肃游戏对认知刺激的分析与分类
2015 International Conference on Electrical Engineering and Informatics (ICEEI) Pub Date : 2015-08-01 DOI: 10.1109/ICEEI.2015.7352572
N. A. A. Zaki, Tengku Wook, K. Ahmad
{"title":"Analysis and classification of serious games for cognitive stimulation","authors":"N. A. A. Zaki, Tengku Wook, K. Ahmad","doi":"10.1109/ICEEI.2015.7352572","DOIUrl":"https://doi.org/10.1109/ICEEI.2015.7352572","url":null,"abstract":"Serious games are an emerging technology that is growing in importance, providing benefits beyond pure entertainment in order to improve the users' realistic experience. Nowadays, there is increasing concern for people with cognitive troubles. Their cognitive capabilities could be improved so they can lead a better life. Serious games have great potential in stimulating cognitive abilities for different target audiences via multiple devices. Classifications of serious games should help increase our understanding of the user, technology, and functions as well as point out existing gaps that could be filled. However, there is not much research concerning classifications of serious games for cognitive stimulation. In view of this, we have identified certain criteria from the common classification of serious games and provided an overview on a selection of serious games for cognitive stimulation based on literature research, which is done by extracting and summarising common categories used to classify serious games. Further, the information gained from these classifications would be useful in identifying the potential of serious games and enhance their impact on the field.","PeriodicalId":426454,"journal":{"name":"2015 International Conference on Electrical Engineering and Informatics (ICEEI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信