Balinese papyrus is one of the media to write the ideas from minstrels in ancient times. Currently,
many ancient literatures which are written in the papyrus, that also very difficult to identify because the
writings were beginning to rot or fade influenced by age. In this study takes the Balinese papyrus
characters as its object. The improvement of the image quality in image processing of the characters here
refers to the change for the quality of the image before its next development. There is the process of
identifying the color space to spot the shape of the papyrus characters. The difference of the colors is so
small so that it needs CIELab to process the identification out of its background and noise.
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
The preventive control is one of the well advance controls for recent security for protection of data
and services from the uncertainty. Because, increasing the importance of business, communication
technologies and growing the external risk is a very common phenomenon now-a-days. The system
security risks put forward to the management focus on IT infrastructure (OS). The top management has to
decide whether to accept expected losses or to invest into technical security mechanisms in order to
minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development
of an optimization model that aims to determine the optimal cost to be invested into security mechanisms
deciding on the measure component of UFS attribute. Our model should be design in such way, the Read,
Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the
system attacks and down time by implementing RWX ACM mechanism based on semi-group structure,
mean while improving the throughput of the Business, Resources & Technology.
False Node Recovery Algorithm for a Wireless Sensor NetworkRadita Apriana
This paper proposes a fault node recovery algorithm to enhance the lifetime of a wireless sensor
network when some of the sensor nodes shut down. The algorithm is based on the grade diffusion algorithm
combined with the genetic algorithm. The algorithm can result in fewer replacements of sensor nodes and
more reused routing paths. In our simulation, the proposed algorithm increases the number of active nodes
up to 8.7 times, reduces 98.8%, and reduces the rate of energy consumption by approximately 31.1%.
ESL Reading Research Based on Eye Tracking TechniquesRadita Apriana
This document discusses eye tracking research on ESL reading. It begins with an introduction to eye tracking techniques and how they can provide insights into the cognitive processes involved in reading. It then describes key eye movement patterns observed in reading, including fixations, saccades, regressive eye movements, and return sweeps. Finally, it discusses the perceptual span in reading and the different types of information that can be obtained within the perceptual span, such as word identification and visual features.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
- A new ozone concentration regulator was designed based on the theory of continuity equation for gas flow in parallel pipes.
- The regulator allows an ozone generator to produce variable ozone concentrations at different flow rates, expanding its capabilities.
- Experimental results showed that at an initial oxygen flow rate of 33.33 cm3/s, the regulator could vary ozone concentration between 429.30 ppm to 3826.60 ppm, and at 25 cm3/s between 387.30 ppm to 4435.20 ppm.
- When setting the concentration to around 1000 ppm, the concentration decreased with increasing flow rate as expected based on gas flow theory.
- The regulator was effective in
Filtering Based Illumination Normalization Techniques for Face RecognitionRadita Apriana
The main challenge experienced by the present face recognition techniques and smooth filters
are the difficulty in managing illumination. The differences in face images that are created by illumination
are normally bigger compared to the differences in inter-person that is utilized to differentiate identities.
However, face recognition over illumination has more uses in a lot of applications that deal with subjects
that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric
feature can be executed and utilized. A lot of work has been put into the research and development of
illumination and face recognition in the present era and a lot of critical methods have been introduced.
Nevertheless, there are some concerns with face recognition and illumination that require further
considerations which include the deficiencies in comprehending the sub-spaces in illumination pictures,
problems with intractability in face modelling and complicated mechanisms of face surface reflections.
Analysis and Estimation of Harmonics Using Wavelet TechniqueRadita Apriana
The paper develops an approach based on wavelet technique for the evaluation and estimation of
harmonic contents of power system waveform. The proposed algorithm decomposes the signal waveforms
into the uniform frequency sub-bands corresponding to the odd harmonic components of the signal. The
proposed implementation of algorithm determines the frequency bands of harmonics which retain both the
time and frequency relationship of the original waveforms and uses a method to suppress those
harmonics.Thewaveletalgorithm is selected to obtain compatible output bands with the harmonic groups
defined in the standards for power-supply systems. A comparative analysis will be done with the input and
the results obtained from the wavelet transform (WT) for different measuring conditions and Simulation
results are given.
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
The preventive control is one of the well advance controls for recent security for protection of data
and services from the uncertainty. Because, increasing the importance of business, communication
technologies and growing the external risk is a very common phenomenon now-a-days. The system
security risks put forward to the management focus on IT infrastructure (OS). The top management has to
decide whether to accept expected losses or to invest into technical security mechanisms in order to
minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development
of an optimization model that aims to determine the optimal cost to be invested into security mechanisms
deciding on the measure component of UFS attribute. Our model should be design in such way, the Read,
Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the
system attacks and down time by implementing RWX ACM mechanism based on semi-group structure,
mean while improving the throughput of the Business, Resources & Technology.
False Node Recovery Algorithm for a Wireless Sensor NetworkRadita Apriana
This paper proposes a fault node recovery algorithm to enhance the lifetime of a wireless sensor
network when some of the sensor nodes shut down. The algorithm is based on the grade diffusion algorithm
combined with the genetic algorithm. The algorithm can result in fewer replacements of sensor nodes and
more reused routing paths. In our simulation, the proposed algorithm increases the number of active nodes
up to 8.7 times, reduces 98.8%, and reduces the rate of energy consumption by approximately 31.1%.
ESL Reading Research Based on Eye Tracking TechniquesRadita Apriana
This document discusses eye tracking research on ESL reading. It begins with an introduction to eye tracking techniques and how they can provide insights into the cognitive processes involved in reading. It then describes key eye movement patterns observed in reading, including fixations, saccades, regressive eye movements, and return sweeps. Finally, it discusses the perceptual span in reading and the different types of information that can be obtained within the perceptual span, such as word identification and visual features.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
- A new ozone concentration regulator was designed based on the theory of continuity equation for gas flow in parallel pipes.
- The regulator allows an ozone generator to produce variable ozone concentrations at different flow rates, expanding its capabilities.
- Experimental results showed that at an initial oxygen flow rate of 33.33 cm3/s, the regulator could vary ozone concentration between 429.30 ppm to 3826.60 ppm, and at 25 cm3/s between 387.30 ppm to 4435.20 ppm.
- When setting the concentration to around 1000 ppm, the concentration decreased with increasing flow rate as expected based on gas flow theory.
- The regulator was effective in
Filtering Based Illumination Normalization Techniques for Face RecognitionRadita Apriana
The main challenge experienced by the present face recognition techniques and smooth filters
are the difficulty in managing illumination. The differences in face images that are created by illumination
are normally bigger compared to the differences in inter-person that is utilized to differentiate identities.
However, face recognition over illumination has more uses in a lot of applications that deal with subjects
that are not cooperative where the highest potential of the face recognition as a non-intrusive biometric
feature can be executed and utilized. A lot of work has been put into the research and development of
illumination and face recognition in the present era and a lot of critical methods have been introduced.
Nevertheless, there are some concerns with face recognition and illumination that require further
considerations which include the deficiencies in comprehending the sub-spaces in illumination pictures,
problems with intractability in face modelling and complicated mechanisms of face surface reflections.
Analysis and Estimation of Harmonics Using Wavelet TechniqueRadita Apriana
The paper develops an approach based on wavelet technique for the evaluation and estimation of
harmonic contents of power system waveform. The proposed algorithm decomposes the signal waveforms
into the uniform frequency sub-bands corresponding to the odd harmonic components of the signal. The
proposed implementation of algorithm determines the frequency bands of harmonics which retain both the
time and frequency relationship of the original waveforms and uses a method to suppress those
harmonics.Thewaveletalgorithm is selected to obtain compatible output bands with the harmonic groups
defined in the standards for power-supply systems. A comparative analysis will be done with the input and
the results obtained from the wavelet transform (WT) for different measuring conditions and Simulation
results are given.
A Novel Method for Sensing Obscene Videos using Scene Change DetectionRadita Apriana
Video scene change detection has great importance of managing and analyzing large amount of
videos. Traditionally this technique used for indexing, segmenting and categorizing different types of
videos. Very few works addressed to classify obscene using scene change detection method. In this
research we proposed a simple approach for sensing objectionable videos by observing scene changes
into different video genres. Video scenes are grouped into set of key frames. After analyzing duration of
each scene and counting the number of key frames of designated scene, it has been shown that obscene
videos have infrequent scene changing nature. While in sports, dramas, music and action films have large
number of scene changes. We used six types of video genres and the decision has been made by setting
a threshold based on extracted key frames. Experimental result showed that the accuracy is 83.33% and
false positive rate is 16.67%.
Robust SINS/GNSS Integration Method for High Dynamic ApplicationsRadita Apriana
As high dynamic movement is always accompanied by colored noise which lacks of mathematical
model, traditional Kalman filtering based on an assumption of white Gaussian noise always faces serious
divergence. To enhance the performance in high dynamic environment with uncertain colored noise, a kind
of robust filtering based on H-infinity technology is developed. State model of the algorithm is derived from
SINS error propagation. Both position and velocity errors are used as the measurements. A simulation
system which includes a tri-axial turntable and a GNSS signal simulator is used to verify the integration
design under high dynamic environment. Simulation results proved that both the accuracy and robustness
of the integration design have been improved significantly.
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
Aim at the limitation of traditional PID controller has certain limitation, the traditionalPID control is
often difficult to obtain satisfactory control performance, and the RBF neural networkis difficult to meet the
requirement ofreal-time control system.To overcome it, an adaptive PID control strategy based on (RBF)
neural network isproposed in this paper. The resultsshow that the proposed controller is practical and
effective, because of the adaptability, strong robustness and satisfactory controlperformance.It is also
revealed from simulation results that the proposed control algorithm is valid for DC motor and also
provides the theoretical and experimental basis.
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...Radita Apriana
People used to solve high-order H model matching based on H control theory, it is too
difficult. In this paper, we use model reduction theory to solve high-order H model matching problem, A
new method to solve H model matching problem based on the theory of the model reduction is
proposed. The simulation results show that the method has better applicability and can get the expected
performance.
A Review to AC Modeling and Transfer Function of DCDC ConvertersRadita Apriana
In this paper, AC modeling and small signal transfer function for DC-DC converters are
represented. The fundamentals governing the formulas are also reviewed. In DC-DC converters, the
output voltage must be kept constant, regardless of changes in the input voltage or in the effective load
resistance. Transfer function is the necessary knowledge to design a proper feedback control such as PID
control to regulate the output voltage as linear PID and PI controllers are usually designed for DC-DC
converters using standard frequency response techniques based on the small signal model of the
converter.
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase FaultRadita Apriana
Three-phase Induction Motor (IM) drives are widely used in industrial equipments. One of the
essential problems of 3-phase IM drives is their high speed and torque pulsation in the fault conditions.
This paper shows Direct Torque Control (DTC) strategy for vector control of a 3-phase IM under opencircuit
fault. The objective is to implement a solution for vector control of 3-phase IM drives which can be
also used under open-phase fault. MATLAB simulations were carried out and performance analysis is
presented.
Impact Analysis of Midpoint Connected STATCOM on Distance Relay PerformanceRadita Apriana
This paper presents the impact of the Static Synchronous Compensator (STATCOM) on the
performance of distance protection of EHV transmission lines. A 400kV transmission system having
midpoint connected STATCOM with its control circuit is modeled using MATLAB/SIMULINK software. The
impact of STATCOM on distance relay for different fault conditions and different fault locations is analyzed.
Simulation results indicate that the presence of the STATCOM in the transmission system significantly
changes the line impedance seen by the distance relay to be lower or higher than the actual line
impedance. Due to this the performance of the distance relay changes, either overreaches or under
reaches.
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...Radita Apriana
Today, with the increase of distributed generation sources in power systems, it’s important to
optimal location of these sources. Determine the number, location, size and type of distributed generation
(DG) on Power Systems, causes the reducing losses and improving reliability of the system. In this paper
is used Co-evolutionary particle swarm optimization algorithm (CPSO) to determine the optimal values of
the listed parameters. Obtained results through simulations are done in MATLAB software is presented in
the form of figure and table in this paper. These tables and figures, show how to changes the system
losses and improving reliability by changing parameters such as location, size, number and type of DG.
Finally, the results of this method are compared with the results of the Genetic algorithm (GA) method, to
determine the performance of each of these methods.
Similarity and Variance of Color Difference Based DemosaicingRadita Apriana
The aim of the project is to find the missing color samples at each pixel location by the
combination of similarity algorithm and the variance of colour difference algorithm. Many demosaicing
algorithms find edges in horizontal and vertical directions, which are not suitable for other directions.
Hence using the similarity algorithm the edges are found in different directions. But in this similarity
algorithm sometimes the horizontal and vertical directions are mislead. Hence this problem can be rectified
using the variance of colour difference algorithm. It is proved experimentally that this new demosaicing
algorithm based on similarity and variance of colouyr difference has better colour peak signal to noise ratio
(CPSNR). It has better o0bjective and subjective performance. It is an analysis study of both similarity and
colour variance algorithms.
Energy Efficient RF Remote Control for Dimming the Household ApplaincesRadita Apriana
During recent years there is a strong trend towards radio frequency (RF) remote controls as it is
delivering even more comfort to the users and increased usability with high robustness of the RF links.
Lower power consumption with new features and security make RF remote control systems more
competitive with widely used IR remote control systems. In this paper we propose, a RF module based
real time system, which is an integrated system designed to control the dimming or speed of the
appliances. Zigbee module is used as RF module to establish wireless link between Remote and appliance
section having 9600kbs baud rate and range of 100m. Dimming control circuits is part of appliances
section which is used to control the appliances corresponding to signals generated by the remote section.
This system provides energy efficient solution for household uses.
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...Radita Apriana
The document proposes a hybrid intrusion detection framework that uses two classifiers: Tree Augmented Naive Bayes (TAN) as the base classifier and Reduced Error Pruning (REP) as the meta classifier. The TAN classifier performs initial classification on the KDD Cup 99 dataset and the results are then used as input for the REP meta classifier, which reclassifies the instances to improve overall classification performance. The framework is evaluated using a testing dataset, with the results analyzed to assess the performance of the hybrid approach.
For some kinds of products, such as car, aircraft, government acquisition, the consumers have
strict requirements to the reliability of these products. Then the manufacturer is inclined to provide the twodimensional
preventive maintenance policy to take the usage degree of the product into account. As a
result, two-dimensional preventive maintenance policy in the warranty period has recently obtained
increasing attention from manufacturers and consumers. In this paper, we focused on the optimization of
based warranty cost and proposed a new expected cost model of the two-dimensional imperfect
preventive maintenance policy from the perspective of the manufacture. The optimal two-dimensional
preventive maintenance was obtained by minimizing based warranty cost. And asymmetric copula function
was applied to modeling the failure function of the product. At last, numerical examples are given to
illustrate the proposed models, of which the results prove the model effective and validate.
ARM 9 Based Intelligent System for Biometric Figure AuthenticationRadita Apriana
Now a day’s some universities in India are enforcing afiliated colleges to implement biometric
fingerprint attendance system to monitor student attendance. This sytem requiresbiometric fingerprint
scanner need to be installed in affiliated college where student studying and it is monitored by the
university online. As finger print scanner is placed at affiliated college which is far away from the university,
there is possibility of adding fake finger print into the scanner which can be used for proxy attendance of
student who is not attending the college. In this paper, the proposed system is designed in such a way
that, the acquired fingerprint of the student is initially stored in the database with complete student profile
and photograph. And, when the student places his fingerprint it compares with stored database. If
fingerprint matches it displays the student photo. The proposed intelligent system includes R305 fingerprint
sensor and ARM 9 processor. We used RS232 for interfacing with system and visual studio 2008 software
for designing the interface. This attendance system is verified practically with students and we obtained the
desired results accurately.
A Compact Multiple Band-Notched Planer Antenna with Enhanced Bandwidth Using ...Radita Apriana
UWB antenna with dual notched characteristics fed by microstrip transmission line is presented in
this paper. The tapered connection between the rectangular patch and the feed line is used to produce a
good impedance matching from 2.3 to 11.5 GHz. A dual band frequency notches are achieved using UDGS
loaded with lumped capacitors. The first notch frequency band is achieved using DGS to reduce the
interference with WIMAX from 3.3 to 3.7 Ghz. The second notch frequency band is also achieved using Uparasitic
strip placed in the ground plan to eliminate the interference with WLAN from 5.2 to 5.9 GHz.
Lumped capacitors are combined with the slot due to miniaturize the slot size. The size of the resonator is
reduced by more than 40% when lumped capacitors are used. The proposed antenna hasVSWR < 2
except the notched bands. The simulated results confirm that the antenna is suitable for UWB applications.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
A Novel Method for Sensing Obscene Videos using Scene Change DetectionRadita Apriana
Video scene change detection has great importance of managing and analyzing large amount of
videos. Traditionally this technique used for indexing, segmenting and categorizing different types of
videos. Very few works addressed to classify obscene using scene change detection method. In this
research we proposed a simple approach for sensing objectionable videos by observing scene changes
into different video genres. Video scenes are grouped into set of key frames. After analyzing duration of
each scene and counting the number of key frames of designated scene, it has been shown that obscene
videos have infrequent scene changing nature. While in sports, dramas, music and action films have large
number of scene changes. We used six types of video genres and the decision has been made by setting
a threshold based on extracted key frames. Experimental result showed that the accuracy is 83.33% and
false positive rate is 16.67%.
Robust SINS/GNSS Integration Method for High Dynamic ApplicationsRadita Apriana
As high dynamic movement is always accompanied by colored noise which lacks of mathematical
model, traditional Kalman filtering based on an assumption of white Gaussian noise always faces serious
divergence. To enhance the performance in high dynamic environment with uncertain colored noise, a kind
of robust filtering based on H-infinity technology is developed. State model of the algorithm is derived from
SINS error propagation. Both position and velocity errors are used as the measurements. A simulation
system which includes a tri-axial turntable and a GNSS signal simulator is used to verify the integration
design under high dynamic environment. Simulation results proved that both the accuracy and robustness
of the integration design have been improved significantly.
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
Aim at the limitation of traditional PID controller has certain limitation, the traditionalPID control is
often difficult to obtain satisfactory control performance, and the RBF neural networkis difficult to meet the
requirement ofreal-time control system.To overcome it, an adaptive PID control strategy based on (RBF)
neural network isproposed in this paper. The resultsshow that the proposed controller is practical and
effective, because of the adaptability, strong robustness and satisfactory controlperformance.It is also
revealed from simulation results that the proposed control algorithm is valid for DC motor and also
provides the theoretical and experimental basis.
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...Radita Apriana
People used to solve high-order H model matching based on H control theory, it is too
difficult. In this paper, we use model reduction theory to solve high-order H model matching problem, A
new method to solve H model matching problem based on the theory of the model reduction is
proposed. The simulation results show that the method has better applicability and can get the expected
performance.
A Review to AC Modeling and Transfer Function of DCDC ConvertersRadita Apriana
In this paper, AC modeling and small signal transfer function for DC-DC converters are
represented. The fundamentals governing the formulas are also reviewed. In DC-DC converters, the
output voltage must be kept constant, regardless of changes in the input voltage or in the effective load
resistance. Transfer function is the necessary knowledge to design a proper feedback control such as PID
control to regulate the output voltage as linear PID and PI controllers are usually designed for DC-DC
converters using standard frequency response techniques based on the small signal model of the
converter.
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase FaultRadita Apriana
Three-phase Induction Motor (IM) drives are widely used in industrial equipments. One of the
essential problems of 3-phase IM drives is their high speed and torque pulsation in the fault conditions.
This paper shows Direct Torque Control (DTC) strategy for vector control of a 3-phase IM under opencircuit
fault. The objective is to implement a solution for vector control of 3-phase IM drives which can be
also used under open-phase fault. MATLAB simulations were carried out and performance analysis is
presented.
Impact Analysis of Midpoint Connected STATCOM on Distance Relay PerformanceRadita Apriana
This paper presents the impact of the Static Synchronous Compensator (STATCOM) on the
performance of distance protection of EHV transmission lines. A 400kV transmission system having
midpoint connected STATCOM with its control circuit is modeled using MATLAB/SIMULINK software. The
impact of STATCOM on distance relay for different fault conditions and different fault locations is analyzed.
Simulation results indicate that the presence of the STATCOM in the transmission system significantly
changes the line impedance seen by the distance relay to be lower or higher than the actual line
impedance. Due to this the performance of the distance relay changes, either overreaches or under
reaches.
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...Radita Apriana
Today, with the increase of distributed generation sources in power systems, it’s important to
optimal location of these sources. Determine the number, location, size and type of distributed generation
(DG) on Power Systems, causes the reducing losses and improving reliability of the system. In this paper
is used Co-evolutionary particle swarm optimization algorithm (CPSO) to determine the optimal values of
the listed parameters. Obtained results through simulations are done in MATLAB software is presented in
the form of figure and table in this paper. These tables and figures, show how to changes the system
losses and improving reliability by changing parameters such as location, size, number and type of DG.
Finally, the results of this method are compared with the results of the Genetic algorithm (GA) method, to
determine the performance of each of these methods.
Similarity and Variance of Color Difference Based DemosaicingRadita Apriana
The aim of the project is to find the missing color samples at each pixel location by the
combination of similarity algorithm and the variance of colour difference algorithm. Many demosaicing
algorithms find edges in horizontal and vertical directions, which are not suitable for other directions.
Hence using the similarity algorithm the edges are found in different directions. But in this similarity
algorithm sometimes the horizontal and vertical directions are mislead. Hence this problem can be rectified
using the variance of colour difference algorithm. It is proved experimentally that this new demosaicing
algorithm based on similarity and variance of colouyr difference has better colour peak signal to noise ratio
(CPSNR). It has better o0bjective and subjective performance. It is an analysis study of both similarity and
colour variance algorithms.
Energy Efficient RF Remote Control for Dimming the Household ApplaincesRadita Apriana
During recent years there is a strong trend towards radio frequency (RF) remote controls as it is
delivering even more comfort to the users and increased usability with high robustness of the RF links.
Lower power consumption with new features and security make RF remote control systems more
competitive with widely used IR remote control systems. In this paper we propose, a RF module based
real time system, which is an integrated system designed to control the dimming or speed of the
appliances. Zigbee module is used as RF module to establish wireless link between Remote and appliance
section having 9600kbs baud rate and range of 100m. Dimming control circuits is part of appliances
section which is used to control the appliances corresponding to signals generated by the remote section.
This system provides energy efficient solution for household uses.
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...Radita Apriana
The document proposes a hybrid intrusion detection framework that uses two classifiers: Tree Augmented Naive Bayes (TAN) as the base classifier and Reduced Error Pruning (REP) as the meta classifier. The TAN classifier performs initial classification on the KDD Cup 99 dataset and the results are then used as input for the REP meta classifier, which reclassifies the instances to improve overall classification performance. The framework is evaluated using a testing dataset, with the results analyzed to assess the performance of the hybrid approach.
For some kinds of products, such as car, aircraft, government acquisition, the consumers have
strict requirements to the reliability of these products. Then the manufacturer is inclined to provide the twodimensional
preventive maintenance policy to take the usage degree of the product into account. As a
result, two-dimensional preventive maintenance policy in the warranty period has recently obtained
increasing attention from manufacturers and consumers. In this paper, we focused on the optimization of
based warranty cost and proposed a new expected cost model of the two-dimensional imperfect
preventive maintenance policy from the perspective of the manufacture. The optimal two-dimensional
preventive maintenance was obtained by minimizing based warranty cost. And asymmetric copula function
was applied to modeling the failure function of the product. At last, numerical examples are given to
illustrate the proposed models, of which the results prove the model effective and validate.
ARM 9 Based Intelligent System for Biometric Figure AuthenticationRadita Apriana
Now a day’s some universities in India are enforcing afiliated colleges to implement biometric
fingerprint attendance system to monitor student attendance. This sytem requiresbiometric fingerprint
scanner need to be installed in affiliated college where student studying and it is monitored by the
university online. As finger print scanner is placed at affiliated college which is far away from the university,
there is possibility of adding fake finger print into the scanner which can be used for proxy attendance of
student who is not attending the college. In this paper, the proposed system is designed in such a way
that, the acquired fingerprint of the student is initially stored in the database with complete student profile
and photograph. And, when the student places his fingerprint it compares with stored database. If
fingerprint matches it displays the student photo. The proposed intelligent system includes R305 fingerprint
sensor and ARM 9 processor. We used RS232 for interfacing with system and visual studio 2008 software
for designing the interface. This attendance system is verified practically with students and we obtained the
desired results accurately.
A Compact Multiple Band-Notched Planer Antenna with Enhanced Bandwidth Using ...Radita Apriana
UWB antenna with dual notched characteristics fed by microstrip transmission line is presented in
this paper. The tapered connection between the rectangular patch and the feed line is used to produce a
good impedance matching from 2.3 to 11.5 GHz. A dual band frequency notches are achieved using UDGS
loaded with lumped capacitors. The first notch frequency band is achieved using DGS to reduce the
interference with WIMAX from 3.3 to 3.7 Ghz. The second notch frequency band is also achieved using Uparasitic
strip placed in the ground plan to eliminate the interference with WLAN from 5.2 to 5.9 GHz.
Lumped capacitors are combined with the slot due to miniaturize the slot size. The size of the resonator is
reduced by more than 40% when lumped capacitors are used. The proposed antenna hasVSWR < 2
except the notched bands. The simulated results confirm that the antenna is suitable for UWB applications.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
2. ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 321 – 328
322
produced [7]. In Java besides lontar, used for the same purpose included nipa leaf, dluwang
(the skin of kind of wood), and perkamen (skin of goat). In Sulawesi people used bamboo and
rotan. In Batak the wood skin used to write is called tribak.
Figure 1. The Lontar of Dewa Segening Negara
One of our ancestor’s cultural legacies which have important value is ancient
manuscripts. All over Indonesia it is known that there are lots of ancient manuscripts written in
various scripts and languages. Most of the manuscripts still stored or owned by ordinary people.
The others are existed in central and regional agencies, and traditional institutions.
2.2. Balinese Script
According to the Pasamuhan Agung the spelling system of Balinese characters in Latin
letters should be in accordance with the Indonesian spelling system [7]. To the regulation the
following equivalents between the languages are established.
1. Balinese vowels: a, e, i, u, e. o (6 has been changed to pepet and taling).
Table 1. Balinese Voice Scripts
The changing transcription of the Balinese vowels into the Latin system as detailed
below.
a. Wisarga ha (with its attachment) is to be written as the same as ä kara.
b. Suara dirga (ulu sari, suku ilut etc.) is to be written as the same as aksara hrasua.
c. The pepet and taling are equalized
d. Dipthongs: ai / ia = e (taling) and au / ua = o (should be a)
3. TELKOMNIKA ISSN: 2302-4046
Identifying of the Cielab Space Color for the Balinese Papyrus Characters (Made Sudarma)
323
According to the Balinese scholars, the words spelled in wisarga ha characters, are in
general of Bali origins or at least considered so. Whereas the ones in a kara are not, known as
from the language of either Jawa Kuna or Sanskerta. The following table shows the change.
Table 2. The Substitution of Voice Scripts
2. Consonant: h, n, c, r, k, g, t, m, ng, b, s, w, l, p, d, j, y, ny, (18 buah).
Table 3 Wianjana script
4. ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 321 – 328
324
Note:
a. The number of Balinese characters in Latin is the same as the numbers of ha, na,
ca, ra, ka, Bali (18 characters)
b. The writing
Tabel 4. The Wianjana script
(da madu, murdania) has no particular form, which is different from the Old Javanese in
Latin. The names such as dantia dan murdania are often regarded misguiding. It is expected that
the names should represent the articulation area of the characters.
3. Pengangge
Pangangge is the character that cannot be used itself. They should be put together to
the vowels or consonants for their functions to change the sounds of them. The kinds are called,
among them, pangangge suara, pangangge tengenan and pangangge aksara.
2.3. CIELab
CIELab is one of the color structures defined as CIE (Commicion International de
1’Eclairage/The International Commission on Illumination in 1976 (CIE 1976 L*a*b*). According
to CIELab, the amount of CIE_L* to describe the brightness of the color is 0 for black and L* =
100 for white. CIE_a* dimension describes the colors of green – red, in which negative a*
indicates green whereas CIE_a* positive indicates red. CIE_b* dimension for blue – yellow is
the negative b* indicates blue and CIE_b* positive indicates yellow. The transformation of RGB
(Red, Green, Blue) – CIELab can be done as described in the following formulations [6, 2]:
(1)
In which:
′
(2)
5. TELKOMNIKA ISSN: 2302-4046
Identifying of the Cielab Space Color for the Balinese Papyrus Characters (Made Sudarma)
325
G= 2.2. and C= R, G, B
/ (3)
/ (4)
/ (5)
(6)
(7)
(8)
Then L*a*b* to be:
∗
116 16 (9)
∗
500 (10)
∗
200 (11)
3. Research Method
3.1. Data Acquisition
Data acquisition is the process of acquiring data from analog to digital, namely from the
physical papyrus to become papyrus image by using scanner. Thus, first, the Balinese Lontar
Bali is scanned to obtain the image. When it is done, the image is stored as a computer before
being further analysed in the processing stage.
3.2. Preprocessing
3.2.1. Cropping and papyrus merging
The right, left, and middle image of the lontar obtained from the scanning is cropped for
the further stage.
The Balinese papyrus usually has two parts. The writing on the first line is continued in
the second one as can be seen in the following Figure 2.
Figure 2. Papyrus image
The yellow lines are the border of the image that are to be cropped. To crop, the left line
is first, middle, and then the right. Being cropped to be two parts, the image will be merged to be
one as shown in Figure 3.
Figure 3. The image after cropping
6. ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 321 – 328
326
3.2.2. The Color Space of CIELab
On the image obtained after the cropping, the color space identification is done through
CIELab. CEILab is a color model in which the L* component is a perception of the light intensity
a* and b* is the component showing the number of the colors displayed [1]. The CIELab is
used because it is not all of the colors on papyrus are different from the background.
Sometimes the colors are different very litlle because during the writing the papyrus writers do
not use the natural types (burned candlenut) for the final processing. The. CIELab is the very
effective method to do the separation.
The color of the image obtained is of RGB, from which it is necessary to alter it into the
CIELab color space using the formula (1) to (11). RGB is a three dimensional color structure
used for the true color type on digital image, in which R is for Red, G for Green and B for Blue.
Whereas CIELab (L*a*b) is the image color structure that represents L for lighting and a for red
or green and b for yellow or blue. The transformation produces different color structure of the
image from the original one.
4. Results and Analysis
The experiment in this study is about how to identify or spot the color space of the
papyrus using CIELab. Figure 4 is the image of the printscreen system that used to the
identification.
Figure 4. The early display
On this early display there are several menus. The one used in this experiment is the
PreProcessing CIELab. For inputting the image the picture (image) search can be used.
Figure 5 Open image fiture
After clicking on the image search, the computer will show such as Figure 5. Here, the
selection of the papyrus is done.
7. TELKOMNIKA ISSN: 2302-4046
Identifying of the Cielab Space Color for the Balinese Papyrus Characters (Made Sudarma)
327
Figure 6. The loaded and image cropping
In the Figure 6, the papyrus images that has been entered will be directly carried out to
the process of cutting image that starting from the left side, middle, into the upper side, so that
the image processed will be immediately appear under the original papyrus image.
Figure 7. Process of CIELab
The process of identifying the color space Proses using the CIELab can be done by
clicking the PreProcessing CIELab. The system processes the looping as many as the number
of the bit found on the image. The outcome can be seen on the table displayed by the system.
From there there will be the process of obtaining the means of the L*, a*, dan b* values.
5. Conclusion
Based on the outcome obtained from the experiment it can be concluded that the color
space of CIELab can be used to identify and separate the color of the Balinese characters from
the ones of the background. This is clearly informed through the values of L* = 45, a* = 128,
and b* = 127, in which L* of the CIELab represents the brightness of the color as a little
differentiator. The next study can be done to analyzed from the pre processing till the extracting
to finally traslating the Balinese characters on the payrus to latin script.
Acknowledgements
The appreciation is awarded to the members of this research team, along with all the
colleagues who have given a lot of help both in discussion of ideas until the trial implementation
stage of the device. Not forgotten also the appreciation is delivered to the Department of
8. ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 321 – 328
328
Electrical and Computer System Engineering University of Udayana which has supported in
lending the equipments from instrumentation laboratory in this research.
References
[1] Bansal. Seema, Aggarwal Deepak. Color Image Segmentation Using CIELab Color Space Using Ant
Colony Optimization. IJCSET. 2012; 1(7): 415-420.
[2] Gernot Hoffmann. CIE Color Space. 2010.
[3] HR Mamatha, K Srikantamurthy. Morphological Operations and Projection Profiles based
Segmentation of Handwritten Kannada Document. International Journal of Applied Information
Systems (IJAIS). 2013; 4(5)
[4] Made Sudarma, Sutramini NP. The Thinning Zhang-Suen Application Method in the Image of Balinese
Scripts on the Papyrus. International Journal of Computer Applications. 2014; 91(1): 0975-8887.
[5] Prapitasari. Luh Putu Ayu. Noise Removal for Ancient Palm Leaf Manuscript of Bali. Konferensi
Nasional Sistem Informasi (KNSI) No ISBN 9786029876802. 2012
[6] Putra. IKG Darma, Pengolahan Citra Digital, Andi No ISBN 9789792914436, 2010
[7] http://www.babadbali.com/aksarabali/books/ppebb.htm, cited: August 10, 2014