Mirza Turesinin, Abdullah Md Humayun Kabir, Tanzina Mollah, Sadvan Sarwar, M. S. Hosain
{"title":"Aquatic Iguana: A Floating Waste Collecting Robot with IoT Based Water Monitoring System","authors":"Mirza Turesinin, Abdullah Md Humayun Kabir, Tanzina Mollah, Sadvan Sarwar, M. S. Hosain","doi":"10.23919/EECSI50503.2020.9251890","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251890","url":null,"abstract":"Water pollution is a major problem worldwide. In order to tackle the pollution and keeping the water resources clean, this paper presents an affordable and advanced floating garbage removing robot called “Aquatic Iguana”. The robot moves around the surface of the water and collects floating waste material such as plastic, packets, leaves, etc. Along with the waste-collecting system, the robot also includes water monitoring with pH, turbidity, temperature sensors, and a live streaming feature, increasing the capacity to a greater extent. We have developed this robot to ensure the cleaning of water resources and to create a strong data set of water quality for future predictions. The use of this technology will ensure the safety of all aquatic animals and plants.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"99 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73213852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Al-Barazanchi, Zahraa A. Jaaz, H. Abbas, Haider Rasheed Abdulshaheed
{"title":"Practical application of IOT and its implications on the existing software","authors":"I. Al-Barazanchi, Zahraa A. Jaaz, H. Abbas, Haider Rasheed Abdulshaheed","doi":"10.23919/EECSI50503.2020.9251302","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251302","url":null,"abstract":"The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"17 1","pages":"10-14"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76824372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victor Lamboy Sinaga, Rakhmat Yuniarto, T. Hermawan, R. Harwahyu, R. F. Sari
{"title":"Performance Comparison of Schedulers in MmWave Communication using NS-3","authors":"Victor Lamboy Sinaga, Rakhmat Yuniarto, T. Hermawan, R. Harwahyu, R. F. Sari","doi":"10.23919/EECSI50503.2020.9251910","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251910","url":null,"abstract":"Millimeter-wave (mmWave) has proven to provide the bandwidth requirement for the new radio (NR) on 5G. MmWave has been developed as a new technology to support enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable low latency communication (URLLC). Since using a high frequency, mmWave also has some disadvantages that could not be avoided, such as small coverage, high signal attenuation, limited against some obstacles, and sensitive to the influence of signal quality. This paper discusses the effect of signal quality on 5G performance using mmWave while sending or receiving packet data by using three types of the scheduler, such as Round Robin, Proportional Fairness, and Max Rate scheduler. Signal quality will impact the value of modulation and coding scheme (MCS) that will be used. Our experiments using NS-3 based on the scenario showed that in the same location and number of UEs, performance throughput using Round Robin and Max Rate with excellent signal strength could reach the maximum throughput. The use of Proportional Fairness could lead only to reaching 50% of the maximum throughput. On the other hand, the use of the Proportional Fairness scheduler causes the weak signal to be unstable. Using Round Robin scheduler, the throughput is more stable. Different from the result using the Max Rate scheduler, the UE with the best signal quality compared to other UEs, was the only UE that get the resources allocation.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"8 1","pages":"31-37"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78564466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Nurnaningsih, A. Permana, Salsabila Ramadhina, A. Rodoni
{"title":"Designing Shiyam Application: An Android-based Fasting Reminder","authors":"D. Nurnaningsih, A. Permana, Salsabila Ramadhina, A. Rodoni","doi":"10.23919/EECSI50503.2020.9251891","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251891","url":null,"abstract":"Indonesia is a country with Muslim majority. Muslims implement fasting as one of the essential Islamic pillars. Information regarding fasting is substantial for Muslims, especially warnings of imsak, sahur and iftar times. The integration of information related to fasting schedules and provisions in mobile devices with Android is a promising solution for Muslims. Designing the Shiyam application as the fasting reminder is great to perform. This application had been developed using the Waterfall model, emphasizing on the development of systematic and sequential information systems. The implementation of the Shiyam application that focuses on the aspect of fasting can provide detailed fasting-related information and provides warnings at the time of imsak, iftar, and sahur, which can help Muslims in carrying out their worship.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"19 1","pages":"60-64"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83573094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method Using IOT Low Earth Orbit Satellite to Monitor Forest Temperature in Indonesia","authors":"Ariesta Satryoko, A. Runturambi","doi":"10.23919/EECSI50503.2020.9251873","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251873","url":null,"abstract":"The ultimate goal of this paper is to ensure the proper functioning of the Monitoring Forest Temperature program in Indonesia using the IoT Narrow-Band Low earth orbit Satellite. As a new technology for monitoring the temperature continue to expand, its implementation in developing countries particularly in Indonesia requires strategic guidance of how the whole process will be executed. Nevertheless, due to this, cross-sectoral partnership in technology, policy, budget, industry is essential to be addressed. The World Bank has recorded the loss from forest fire where 28 million people directly affected including 19 people who died and over 500 thousand people suffered from respiratory problems. Smokes from forest and land fires have also struck Malaysia, Singapore, and Brunei Darussalam respectively. To respond to this, the IoT (Internet of Things) now comes with an extensive feature, using the capability of satellite reach. The Narrow Band Low Earth Orbit Satellite has released a feature for IoT connect to Low Orbit Satellite and transmit the data from the sensor directly. Therefore, we argue that this technology is crucial and needs to be functioned immediately to monitor forest temperature in Indonesia.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"6 1","pages":"240-243"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91015065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Privacy for the Internet of Things","authors":"B. Sikdar","doi":"10.23919/eecsi50503.2020.9251914","DOIUrl":"https://doi.org/10.23919/eecsi50503.2020.9251914","url":null,"abstract":"The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause a paradigm shift in the way we work, interact, and think. The IoT is envisioned as the enabling technology for smart cities, power grids, health care, and control systems for critical installments and public infrastructure. This diversity, increased control and interaction of devices, and the fact that IoT systems use public networks to transfer large amounts of data make them a prime target for cyber attacks. In addition, IoT devices are usually small, low cost and have limited resources. Therefore, any protocol designed for IoT systems should not only be secure but also efficient in terms of usage of chip area, energy, storage, and processing. This presentation will start by highlighting the unique security requirements of IoT devices and the inadequacy of existing security protocols and techniques of the Internet in the context to IoT systems. Next, we will focus on security solutions for the IoT, with special focus on protection against physical and side channel attacks. In particular, we will focus on mutual authentication protocols for IoT devices based on security primitives that exploit hardware level characteristics of IoT devices.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90592410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Improvement Impact Performance of Face Detection Using YOLO Algorithm","authors":"Rakha Asyrofi, Yoni Azhar Winata","doi":"10.23919/EECSI50503.2020.9251905","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251905","url":null,"abstract":"Image data augmentation is a way that makes it possible to increase the diversity of available data without actually collecting new data. In this study, researchers have evaluated the application of image manipulation with the Thatcher effect, double illusion, and inversion on the performance of face detection for data augmentation needs where the data obtained has a weakness that is the limited amount of data to create a training model. The purpose of this research is to increase the diversity of the data so that it can make predictions correctly if given other similar datasets. To perform face detection on images, it is done using YOLOv3 then comparing the accuracy results from the dataset after and before adding data augmentation.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"67 1","pages":"177-180"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80919077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning Model on Virtual University of Senegal's Educational Data Based On Lambda Architecture","authors":"S. M. Gueye, A. Diop, Amadou Dahirou Gueye","doi":"10.23919/EECSI50503.2020.9251903","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251903","url":null,"abstract":"Nowadays, a new form of learning has emerged in higher education. This is e-Learning. Lessons are taught on a Learning Content Management Systems (LCMS). These platforms generate a large variety of data at very high speed. This massive data comes from the interactions between the system and the users and between the users themselves (Learners, Tutors, Teachers, administrative Agents). Since 2013, UVS (Virtual University of Senegal), a digital university that offers distance learning through Moodle and Blackboard Collaborate platforms, has emerged. In terms of statistics, it has 29340 students, more than 400 active Tutors and 1000 courses. As a result, a large volume of data is generated on its learning platforms. In this article, we have set up an architecture allowing us to execute all types of queries on all data from platforms (historical data and real-time data) in order to set up intelligent systems capable of improving learning in this university. We then set up a machine learning model as a use case which is based on multiple regression in order to predict the most influential learning objects on the learners' final mark according to his learning activities.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"88 1","pages":"270-275"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80291753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Reduction Approach Based on Fog Computing in IoT Environment","authors":"Rawaa Majid Obaise, M. A. Salman, H. A. Lafta","doi":"10.23919/EECSI50503.2020.9251894","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251894","url":null,"abstract":"This paper investigates a data processing model for a real experimental environment in which data is collected from several IoT devices on an edge server where a clustering-based data reduction model is implemented. Then, only representative data is transmitted to a cloud-hosted service to avoid high bandwidth consumption and the storage space at the cloud. In our model, the subtractive clustering algorithm is employed for the first time for streamed IoT data with high efficiency. Developed services show the real impact of data reduction technique at the fog node on enhancing overall system performance. High accuracy and reduction rate have been obtained through visualizing data before and after reduction.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"19 1","pages":"65-70"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85121921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}