M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur
{"title":"SCADA Solution by Installing DTM6000 and Trunking Tier Three","authors":"M. Siregar, D. Wahyudi, Ikar Mustikaswara, Tajuddin Nur","doi":"10.23919/EECSI50503.2020.9251301","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251301","url":null,"abstract":"The aim of this study is to provide the new solution for the SCADA system by using the DTM6000 with Tier three and the multipoint node topology for the application offshore mining industry. The application of the proposed design can provide the data as wind speed, machine temperature, sonar, vessel position. Applying the SCADA Software, NMS (network management system), and DWS (Dispatch Work Station), data can be monitored through the control Center. The SCADA system with radiofrequency can cover a wide coverage area (ie up to 60 km). The trunking base station, carry out the data, and able to transmit voice communication with good quality. The technical design and the installation as well as the trial for validation of the proposed system in the remote area offshore of the mining industry is provided. It is might be stated that the system enables the development and addition of more other SCADA equipment in the future.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"89-94"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Integrated Bioimpedance Analysis and Body Mass Index for Users with Special Needs","authors":"Ganjar Winasis, M. Riyadi, T. Prakoso","doi":"10.23919/EECSI50503.2020.9251895","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251895","url":null,"abstract":"This research was conducted with the aim to build integration between Bioimpedance Analysis (BIA) and Body Mass Index (BMI) for users with special needs. The proposed system can measure height, weight, BMI and body composition simultaneously to be used by the elderly population and handicapped users. The proposed system is developed as a chair equipped with several system blocks, namely BIA block, BMI block, power supply block, and microcontroller block. Before starting the measurement, users only need to enter their age and gender data. The whole system is controlled by using Arduino Mega 2560 on the microcontroller block equipped with keypad for data input and an LCD to display measurement results. System testing is performed by comparing the measurement results with Omron HBF-375. The test involved 8 volunteers (4 males and 4 females). The test results show that the integrated BIA-BMI works well with an average error of 1.5%.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"4 1","pages":"181-186"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81784769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta
{"title":"Email classification via intention-based segmentation","authors":"S. K. Sonbhadra, Sonali Agarwal, M. Syafrullah, K. Adiyarta","doi":"10.23919/EECSI50503.2020.9251306","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251306","url":null,"abstract":"Email is the most popular way of personal and official communication among people and organizations. Due to untrusted virtual environment, email systems may face frequent attacks like malware, spamming, social engineering, etc. Spamming is the most common malicious activity, where unsolicited emails are sent in bulk, and these spam emails can be the source of malware, waste resources, hence degrade the productivity. In spam filter development, the most important challenge is to find the correlation between the nature of spam and the interest of the users because the interests of users are dynamic. This paper proposes a novel dynamic spam filter model that considers the changes in the interests of users with time while handling the spam activities. It uses intention-based segmentation to compare different segments of text documents instead of comparing them as a whole. The proposed spam filter is a multi-tier approach where initially, the email content is divided into segments with the help of part of speech (POS) tagging based on voices and tenses. Further, the segments are clustered using hierarchical clustering and compared using the vector space model. In the third stage, concept drift is detected in the clusters to identify the change in the interest of the user. Later, the classification of ham emails into various categories is done in the last stage. For experiments Enron dataset is used and the obtained results are promising.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"1 1","pages":"38-44"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83779051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto
{"title":"IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning","authors":"Susanto, D. Stiawan, M. Arifin, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251304","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251304","url":null,"abstract":"Botnet is one of the threats to internet network security-Botmaster in carrying out attacks on the network by relying on communication on network traffic. Internet of Things (IoT) network infrastructure consists of devices that are inexpensive, low-power, always-on, always connected to the network, and are inconspicuous and have ubiquity and inconspicuousness characteristics so that these characteristics make IoT devices an attractive target for botnet malware attacks. In identifying whether packet traffic is a malware attack or not, one can use machine learning classification methods. By using Weka and Scikit-learn analysis tools machine learning, this paper implements four machine learning algorithms, i.e.: AdaBoost, Decision Tree, Random Forest, and Naïve Bayes. Then experiments are conducted to measure the performance of the four algorithms in terms of accuracy, execution time, and false positive rate (FPR). Experiment results show that the Weka tool provides more accurate and efficient classification methods. However, in false positive rate, the use of Scikit-learn provides better results.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"68 27","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91400030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Feature Application for User Experience to Censor Inappropriate Scene in Indonesia","authors":"Ariesta Satryoko, Arthur Josias Simon Runturambi","doi":"10.23919/EECSI50503.2020.9251909","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251909","url":null,"abstract":"The objective of this article is to build a better and more realistic user interface for Vlarm, an application we developed to censor inappropriate scenes during the COVID-19 pandemic. This premise was built by the fact that most children demand home entertainment, such as watching movies during the quarantine. Thus, this research introduces a new feature in our censorship software that enables parents to exchange their censorship findings so that other parents can use such findings without doing so to the same movie. On the other hand, the Indonesian Government imposes a large-scale social restriction (PSBB) due to the situation of COVID-19 in the country. This interaction is to provide information on the user's experience to eventually build more user-friendly interfaces and features that enable users to conveniently utilize Vlarm application.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81108375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo
{"title":"Human Related Challenges in Agile Software Development of Government Outsourcing Project","authors":"Amaliah Khoirun Nisyak, Khairiyah Rizkiyah, T. Raharjo","doi":"10.23919/EECSI50503.2020.9251899","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251899","url":null,"abstract":"In 2019, a government organization in Indonesia has developed several systems that will run in parallel using Agile by utilizing vendor services. Based on internal project reports, there are indications of human-related issues or challenges during the development process of these systems. The case study is one of the critical systems of failed projects in this government organization. In this study, a Systematic Literature Review (SLR) was used to identify human-related challenges or issues that could lead to failure in an ASD project. These issues or challenges were qualitatively validated based on expert judgment from external and internal organizations by interview and questionnaire. The final results of this study were 20 human-related challenges grouped into 5 categories, which were identified as human-related challenges that led to the failure of the ASD project in this case study. Proposed solutions based on best practices are also provided for each challenge or issue by conducting business research methods with open and axial coding. Besides, the comparison of views between vendors and organizations on human-related challenges as well as the implications of this study are also presented at the end, so that readers can get insight into these challenges.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"64 1","pages":"222-229"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90476742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto
{"title":"Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)","authors":"Sharipuddin, Benni Purnama, Kurniabudi, E. Winanto, D. Stiawan, Darmawiiovo Hanapi, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251292","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251292","url":null,"abstract":"Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"196 1","pages":"114-118"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Sizing of Micro Hydropower to Improve Hybrid Renewable Power System","authors":"Syafii, H. D. Laksono, Novizon, R. Fahreza","doi":"10.23919/EECSI50503.2020.9251911","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251911","url":null,"abstract":"This paper presents an analysis of optimal micro hydropower (MH) capacity of hybrid systems to improve renewable energy based power systems. The electricity system was designed by considering river water flow data and solar radiation data at the research location of Universitas Andalas (Unand). Optimal results obtained for the configuration of the Grid, MH, and photovoltaic (PV) with a head height of 30 m and a flow rate of 800 L/s with the lowest Cost of Energy (CoE) value of $ 0.065. As an optimal sizing system has been able to increase the composition of renewable energy generation in the Unand electrical network. The renewable energy fraction has increased from 26.4% to 36.5%. Therefore, determining the optimal capacity will increase the use of renewable energy generation. Conversely, an increase in electricity supply from renewable energy plants will reduce electricity consumption from the State Electricity Company (Perusahaan Listrik Negara, PLN) grid. The latest excess power generation at a low load can be sold to the PLN grid.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"164 1","pages":"95-99"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86923496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
{"title":"Dynamic Hand Gesture Recognition Using Temporal-Stream Convolutional Neural Networks","authors":"Fladio Armandika, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.23919/EECSI50503.2020.9251902","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251902","url":null,"abstract":"Movement recognition is a hot issue in machine learning. The gesture recognition is related to video processing, which gives problems in various aspects. Some of them are separating the image against the background firmly. This problem has consequences when there are incredibly different settings from the training data. The next challenge is the number of images processed at a time that forms motion. Previous studies have conducted experiments on the Deep Convolutional Neural Network architecture to detect actions on sequential model balancing each other on frames and motion between frames. The challenge of identifying objects in a temporal video image is the number of parameters needed to do a simple video classification so that the estimated motion of the object in each picture frame is needed. This paper proposed the classification of hand movement patterns with the Single Stream Temporal Convolutional Neural Networks approach. This model was robust against extreme non-training data, giving an accuracy of up to 81,7%. The model used a 50 layers ResNet architecture with recorded video training.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"110 1","pages":"132-136"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87655441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa
{"title":"Design of Regenerative Damper for Energy Harvester in Playground Seesaw","authors":"Reyhan Ramadhan, E. Ekawati, Muhammad Dhiya Ul Haq, Tri Prakosa","doi":"10.23919/EECSI50503.2020.9251299","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251299","url":null,"abstract":"Increasing demand for electricity, coupled with a greater understanding of the environmental impact of conventional power generation, has led to growing research interest on alternative energy sources. Energy harvesters based on playground equipment, such as the seesaw, has been proposed as an alternative method to generate electrical power. In this study, a new harvesting mechanism based on the electromagnetic regenerative damper is proposed as an alternative method to harness energy from a playground seesaw. The proposed design is intended for higher power output and efficiency, smaller dimensions, and ease of installation on a seesaw. Lab tests have been carried out to characterize the proposed design experimentally. The energy harvesting (stroke velocity-to-voltage) coefficient for the proposed seesaw-based energy harvester is obtained as 73.18 V/(ms−1). The regenerative damper is capable of producing up to 110 mW of power at 9.34% efficiency.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"41 1","pages":"83-88"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90983996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}