{"title":"Modelling and optimization of simultaneous AC-DC transmission to enhance power transfer capacity of the existing transmission lines","authors":"Uvais Mustafa, M. S. Arif, H. Rahman, M. Sidik","doi":"10.1109/ICECOS.2017.8167159","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167159","url":null,"abstract":"With ever-growing population, the demand of electric power is also increasing day by day. To meet this increasing demand, the power transferred should also increase. However, the existing EHV transmission lines cannot be loaded up to their thermal limits because of the considerations of their transient stability. To address this issue simultaneous power transfer scheme came into existence. With this scheme it is possible to load the transmission lines close to their thermal limits, thus increasing the power transfer capacity of the line. This is done by the transferring AC power with DC current superimposed on it. A double circuit line is converted into composite AC-DC line which will be used for simultaneous AC-DC transmission. In this work, simple mathematical model of composite line is developed and analysed to track down the conditions for maximum power transfer. Developed mathematical approach is also compared with the existing graphical method for calculating maximum power transfer. The results obtained from mathematical model are found to be in close proximity to those obtained by graphical analysis.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"94 1","pages":"328-332"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85100642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. S. Sitanggang, A. Ginanjar, M. Syukur, R. Trisminingsih, H. Khotimah
{"title":"Integration of spatial online analytical processing for agricultural commodities with OpenLayers","authors":"I. S. Sitanggang, A. Ginanjar, M. Syukur, R. Trisminingsih, H. Khotimah","doi":"10.1109/ICECOS.2017.8167127","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167127","url":null,"abstract":"Data on agricultural commodities in Indonesia are provided Ministry of Agriculture, Republic of Indonesia which can be accessed on Agricultural Statistics Database at http://aplikasi.pertanian.go.id/bdsp/index.asp. The data are presented to the public in tabular formats. In order to provide the analytical tool for the agricultural commodities data, this study aims to develop a Spatial Online Analytical Processing (SOLAP) that is integrated to spatial data warehouse. The SOLAP for Agricultural Commodities adopts the three-tier architecture. The first layer is the visualization layer which is responsible for displaying data summary in tabular format, graphics, and maps. This layer consists of OpenLayers, GeoJSON, HTML and Java Script. The second layer is the logic layer which is responsible for receiving input parameters from the visualization layer, retrieving data according to parameters to the data layer, processing data, then returning the data to the visualization layer. The logic layer uses PHP as the programming language and CakePhp framework. The third layer is the data layer which is the agricultural commodities data storage. This layer consists of OLAP engine Mondrian and PostgreSQL. The SOLAP for Agricultural Commodities has successfully implemented and can provide the summary of agricultural commodities data in tabular format and maps.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"48 1","pages":"167-170"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81707600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Prawira, E. Nasrullah, S. R. Sulistiyanti, F. A. Setyawan
{"title":"The detection of 3D object using a method of a Harris Corner Detector and Lucas-Kanade Tracker based on stereo image","authors":"W. Prawira, E. Nasrullah, S. R. Sulistiyanti, F. A. Setyawan","doi":"10.1109/ICECOS.2017.8167126","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167126","url":null,"abstract":"This research proposes the use of Harris Corner Detector and Lucas-Kanade Tracker methods for the detection of 3D objects based on stereo image. The test image obtained from the results of capturing of the camera to the object of the form of tubes, balls, cubes, and 2D images. This research is the early step in the development of the ability of a computer vision to be able to mimic the performance of eye organs in humans in detecting an object. The detection step of the proposed method begins by determining the feature point on the image of the taking results of two cameras using the Harris Corner Detector. After the feature point of the two images obtained, then performed tracking feature point using the Lucas-Kanade Tracker method. In this research, the distance between the cameras used 10, 20, and 50 cm. The Effectiveness of the detection result of the proposed method is measured using the recall and precision parameter values obtained in the merged of the image. The proposed method gives a Recall value above 90% and a precision value above 50% for a distance of the cameras 10cm and 20cm for ball and tube objects. In the box object, the Recall value is 60% for a distance between the cameras 50cm and below 25% for a distance of the cameras 10cm and 20cm. The precision value for detection of the box object is very low, i.e. less than 25%.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"15 1","pages":"163-166"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80266485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Car model recognition from frontal image using BRISK","authors":"Malisa Huzaifa, I. Suwardi","doi":"10.1109/ICECOS.2017.8167114","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167114","url":null,"abstract":"Car Recognition is a part of Intelligent Transportation System. This research proposes the manufacture of ITS-based system to identify car model from Its frontal image using Binary Robust Invariant Scalable method. The BRISK method is used to detect image keypoint, and it uses Hamming Distance for keypoint matching. As for matching error, this research depends on RANSAC. BRISK method excellence lies in the speed of scale space searching of images. Car model recognition using BRISK has an accuracy rate of 96.25%.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"220 1","pages":"104-108"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77064681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarifah Putri Raflesia, K. Surendro, Rossi Passarella
{"title":"The user engagement impact along information technology of infrastructure library (ITIL) adoption","authors":"Sarifah Putri Raflesia, K. Surendro, Rossi Passarella","doi":"10.1109/ICECOS.2017.8167130","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167130","url":null,"abstract":"There are some issues with the adoption of information technology of infrastructure library (ITIL). The common issue comes from customers that always need excellent services. On the other hand, there are employees acting as an internal element of enterprise who need to be motivated while delivering the services. It has been known that the pressure at work and employees' personal problem can cause negative impacts such as decreasing the productivity and lack of teamwork. Moreover, IT managers have a limitation in understanding the psychological issues. Hence, it drives the enterprise to adopt an approach, which can help IT managers to motivate and reward the employees. They also need to ensure the employees that enterprise can be trusted, which means they should not be any doubt in helping the enterprise to reach the goals. Gamification is one of the persuasive approaches that have been used to boost motivation. In previous research, the design of user-centric ITIL function, which embedded gamification approach has been designed. But, the design still required evaluation in order to reveal the positive correlation between the user engagement and system success. This research focused on presenting the impact of user engagement towards successful ITIL adoption.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"120 1","pages":"184-187"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77155418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid cuckoo search and K-means for clustering problem","authors":"A. S. Girsang, A. Yunanto, Ayu Hidayah Aslamiah","doi":"10.1109/ICECOS.2017.8167117","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167117","url":null,"abstract":"Cuckoo search algorithm (CSA) is one of behavior algorithm which is effective to solve optimization problem including the clustering problem. Based on investigation, k-means is also effective to solve the clustering problem specially in fast convergence. This paper combines two algorithms, cuckoo search algorithm and k-means algorithm in clustering problem called FCSA. Cuckoo search is used to build the robust initialization, while K-means is used to accelerate by building the solutions. The result confirms that FCSA's computational time in ten datasets is faster than the compared algorithm.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"316 1","pages":"120-124"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77230294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Odor classification using Support Vector Machine","authors":"N. Husni, A. Handayani, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167170","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167170","url":null,"abstract":"This paper discusses about the process of classifying odor using Support Vector Machine. The training data was taken using a robot that ran in indoor room. The odor was sensed by 3 gas sensors, namely: TGS 2600, TGS 2602, and TGS 2620. The experimental environment was controlled and conditioned. The temperature was kept between 27.5 0C to 30.5 0C and humidity was in the range of 65%–75 %. After simulation testing in Matlab, the classification was then done in real experiment using one versus others technique. The result shows that the classification can be achieved using simulation and real experiment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"89 1","pages":"71-76"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86448733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel three-tier SQLi detection and mitigation scheme for cloud environments","authors":"Wahid Rajeh, Alshreef Abed","doi":"10.1109/ICECOS.2017.8167160","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167160","url":null,"abstract":"Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which is certainly one of the top ranking vulnerabilities in cloud systems, is addressed in this paper. Also, a novel three-tier system for detection and mitigation of SQLi attacks is proposed. The methodology is involved over dynamic, static and runtime prevention and detection mechanisms. Moreover, it removes malicious queries and ensures the system is prepared for an environment that is secure despite being focused on the database server only. For the three-tier architecture, the first approach involves detection and prevention that follows the client logic access and data server (three-tier) organization to access, process and exchange queries. Furthermore, it makes sure no vulnerable code is executed that might affect the hosted operating system either partially or entirely. Experimental evaluation schemes demonstrate the efficiency and superiority of the scheme compared with existing approaches.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84300000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing gamification framework to support social media application based on game elements and cutting-edge technology","authors":"Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji","doi":"10.1109/ICECOS.2017.8167118","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167118","url":null,"abstract":"Gamification is widely applied in various fields, such as business, marketing, education and social media. Gamification is predicted to be used by many companies. Therefore, gamification is still being developed. Nowadays, social media application also growing rapidly and make a new social media application must have new methods to penetrate the global market. This research is assembled from various literature about game elements used in gamification products and it is discovered that there are twenty-five game elements that can be used in a gamification product. The research also describe some cutting-edge technologies are used to improve the benefits of gamification products and affect the habit of the users. This research aims to describe game elements and technologies that can be applied in gamification products. Based on the research, a simple and generic gamification framework is designed to support gamification in social media applications by considering three different perspectives, the developer, the user and the beneficiaries.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"1 1","pages":"125-130"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Handayani, N. Husni, S. Nurmaini, I. Yani, Deby Adhisty Putri
{"title":"Mobile-robot positioning for Wi-Fi signal strength measurement","authors":"A. Handayani, N. Husni, S. Nurmaini, I. Yani, Deby Adhisty Putri","doi":"10.1109/ICECOS.2017.8167173","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167173","url":null,"abstract":"The aim of this work is to design a mobile robot using WPT (Wi-Fi Position Techniques) method. The design in this research is intended to determine the mobile robot position by using the Wi-Fi module to determine the coordinates of position as determination to reach the target position and to find the strength of the detected Wi-Fi signal. Mobile robot is using to get the results of the strength of the signal, besides mobile robot can also be applied for various purposes, such as potential for localization and navigation purposes in areas hard to reach by humans. The proposed method does not require the environment layout and additional equipment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"107 1","pages":"87-91"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81451279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}