IJITEE (International Journal of Information Technology and Electrical Engineering)
Not a member yet
    95 research outputs found

    A Review on Face Anti-Spoofing

    Get PDF
    The biometric system is a security technology that uses information based on a living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in the real world, such as access control and surveillance. But face recognition has a security issue of spoofing. A face anti-spoofing, a task to prevent fake authorization by breaching the face recognition systems using a photo, video, mask, or a different substitute for an authorized person's face, is used to overcome this challenge. There is also increasing research of new datasets by providing new types of attack or diversity to reach a better generalization. This paper review of the recent development includes a general understanding of face spoofing, anti-spoofing methods, and the latest development to solve the problem against various spoof types

    Serendipity Identification Using Distance-Based Approach

    Get PDF
    The recommendation system is a method for helping consumers to find products that fit their preferences. However, recommendations that are merely based on user preference are no longer satisfactory. Consumers expect recommendations that are novel, unexpected, and relevant. It requires the development of a serendipity recommendation system that matches the serendipity data character. However, there are still debates among researchers about the available common definition of serendipity. Therefore, our study proposes a work to identify serendipity data's character by directly using serendipity data ground truth from the famous Movielens dataset. The serendipity data identification is based on a distance-based approach using collaborative filtering and k-means clustering algorithms. Collaborative filtering is used to calculate the similarity value between data, while k-means is used to cluster the collaborative filtering data. The resulting clusters are used to determine the position of the serendipity cluster. The result of this study shows that the average distance between the recommended movie cluster and the serendipity movie cluster is 0.85 units, which is neither the closest cluster nor the farthest cluster from the recommended movie cluster

    Determining the Citizen Loyalty Factor of COVID-19 Website Using the Trust Model

    Get PDF
    One of the information technology (IT) utilization by the government is the establishment of an official website for public access, designed to disseminate information about the COVID-19. Gaining public trust in the information dissemination is getting harder due to the amount of information, while the government is striving to provide reliable information. The service quality provided on the official website will affect the public’s trust and desire to use these services. Citizen loyalty is known when people intensively use the government electronic services because they believe in the government and its e-services based on perceived satisfaction and service quality. This research studied the effect of service quality, trust, and user satisfaction on user loyalty when using e-services by the Special Region of Yogyakarta (DIY) government. The study used a trust model developed by Alkraiji and Ameen and applied it to the official COVID-19 website. Data were collected from 100 respondents in the DIY who were in the productive age range. The experiment was carried out using explanatory and inferential techniques with multiple linear regression methods. The results of the study indicate that all model hypotheses are accepted. The relationship between antecedents and citizen loyalty was more influenced by trust in government and e-government. This finding explains why Yogyakarta citizen trust the government and its electronic services and will be loyal to use these services during the COVID-19 pandemic, as well as other facilities in the future.

    Load Flow Allocation to Improve the Fairness of MW-Mile Method

    Get PDF
    In a deregulated power system, an appropriate wheeling cost is required to provide valuable economic information to market participants, such as generation and transmission companies. The load flow method is used in power wheeling to determine the condition of the existing system after the wheeling participant is added to the system.  In the load flow method, it can be seen how much power is generated from a generator. However, the power flow method cannot determine wheeling generator allocation to the power flow in each transmission network. For this reason, power tracing will be used to determine the wheeling generator allocation. Power tracing is also a solution that could improve the fairness of determining wheeling costs. This paper discusses the power tracing method to determine load flow allocation for wheeling generators using the genetic algorithm (GA) method. GA is one of the optimization techniques, where in power tracing with GA, the load flow allocations (LFA) problem will be assumed as an optimization problem. Calculation with tracing and without tracing will be compared to demonstrate the benefits of the proposed technique. Experimental results showed that the MW-mile method with LFA yielded more expensive wheeling costs than the conventional method. The cost is more expensive due to the absence of cost reduction as in the conventional MW-mile method, and wheeling users pay wheeling costs based on the transmission usage. Although wheeling costs are high, the LFA method provides a fair price because wheeling users pay a fee based on the actual usage. In the future, another power tracing may be used to help determine wheeling costs

    Analysis of Information Technology Security Management UKSW SIASAT Using ISO/IEC 27001:2013

    No full text
    IT security management is essential for organizations to notice the occurring risks and opportunities because they will profoundly affect the ongoing business processes within the organization. The Satya Wacana Academic Information System, more often called SIASAT, is an IT component playing an essential role in running core business processes at Satya Wacana Christian University under the control of the Information Systems and Technology Bureau. At this time, the implementation of SIASAT has been going well, but there are still some obstacles. Lack of human resources is one of the findings and one it becomes of the most significant risks as it affects the use of infrastructure and information security. This research was conducted using the international standard ISO/IEC 27001:2013, prioritizing information security by taking a planning clause focusing on risk assessment. From the results of this study, there were nine recommendations given. Some of which were the most important, i.e., creating separated standard operating procedure documents for SIASAT, which previously were still affiliated with the Academic Administration Bureau; distributing job descriptions; and providing clear and documented access rights for everyone. It is expected that this research can reduce the occurring risks and can be considered for establishing improvements to enhance academic services in the future

    Improving Data Quality and Data Governance Using Master Data Management: A Review

    Get PDF
    Master data management (MDM) is a method of maintaining, integrating, and harmonizing master data to ensure consistent system information. The primary function of MDM is to control master data to keep it consistent, accurate, current, relevant, and contextual to meet different business needs across applications and divisions. MDM also affects data governance, which is related to establishing organizational actors’ roles, functions, and responsibilities in maintaining data quality. Poor management of master data can lead to inaccurate and incomplete data, leading to lousy stakeholder decision-making. This article is a literature review that aims to determine how MDM improves the data quality and data governance and assess the success of MDM implementation. The review results show that MDM can overcome data quality problems through the MDM process caused by data originating from various scattered sources. MDM encourages organizations to improve data management by adjusting the roles and responsibilities of business actors and information technology (IT) staff documented through data governance. Assessment of the success of MDM implementation can be carried out by organizations to improve data quality and data governance by following the existing framework

    Ultra-Wideband Microstrip Bandpass Filter and Its Equivalent Circuit

    Get PDF
    Microstrip filters can be designed with various methods to obtain good performances, such as defected ground structure, open-ended slot, planar edge coupled, and split ring resonator with groundplane windowing. In this paper, the design of an ultra-wideband microstrip bandpass filter used the defected ground structure (DGS) method by adding a circular slot to the groundplane. The addition of the circular slot was carried out to improve the value of S parameter (return loss and insertion loss) from the initial filter design without a circular slot. In the simulation process, optimization was carried out by changing the value of filter component parameters such as patch length and thickness and circular slot width. The simulation results showed that the microstrip bandpass filter could pass frequencies in the range of 1.4 GHz to 5.7 GHz with the bandwidth response of 4.3 GHz. In addition, filter analysis could also be done with an equivalent circuit represented by lumped element components in the form of capacitors and inductors connected in series or parallel. The simulation results of the equivalent circuit had a wider bandwidth, which was able to pass frequencies in the range of 1.2 GHz to 6.1 GHz with a bandwidth response of 4.9 GHz

    Optimal Capacity and Location Wind Turbine to Minimize Power Losses Using NSGA-II

    Get PDF
    Voltage deviations and power losses in the distribution network can be handled in various ways, such as adding diesel power plants and wind turbines. Adaut Village, Tanimbar Islands Regency, Maluku Province has installed a diesel power plant with a capacity of 1,200 kW, while the average hourly electricity load is 374.9 kW. Adaut Village has high wind potential that can be used for distributed generations namely wind turbine (WT). WT can be used to improve power quality in terms of power losses and voltage deviations. In adding WT, the capacity and location must be determined to get good power quality in terms of power loss and voltage deviation. The research applied an optimization technique for determining the capacity and location of WT using non-dominated sorting genetic algorithm II (NSGAII) with an objective function of power losses and voltage deviation. In addition, the economic aspects of the power plant were calculated using the levelized cost of energy (LCOE). The research used scenarios based on the number of WT installed. The best results were obtained in scenario IV or 4 WT with 1.38 kW on Bus 2, 422.43 kW on Bus 15, 834.33 kW on Bus 30, and 380.81 kW on Bus 31 which could reduce power losses by 80% with an LCOE value of Rp7,113.15/kWh. The addition of the WT could also increase the voltage profile to close to 1 pu, which means it can minimize the voltage deviation in the distribution network

    Dimmable High Power LED Driver Using Fuzzy Logic Controller

    Get PDF
    The use of lighting loads is one of the crucial matters which increases every year. The increasing use then leads to the development of brighter and longer-lasting sources. In addition, the conventional use of lighting loads today, which only emit light at its maximum intensity, does not allow the consumers to adjust the brightness level as needed. Consequently, this condition may cause energy wastage. The LED lighting system is gaining popularity as it is widely used in a wide range of applications. The advantages of LEDs, such as its compact size and varied lamp colors, replace conventional lighting sources. The linear setting of the driver topology using the flyback converter was aimed to control the LEDs with a constant current in order to adjust the variation of the LED light intensity. The closed-loop driver circuit with flyback converter topology was designed as an LED driver with a given load specification from the LED string. A dimmable feature was included for adjusting the intensity of the light produced by the LEDs. Eventually, the fuzzy logic controller (FLC) method was applied to the integrated change setting to obtain a dynamic response

    Performance of MPSO-MPPT on PV-Based DC Microgrid in Partial Shading Conditions

    Get PDF
    Microgrid is a controllable decentralized group of energy resources and loads with the ability to operate both in grid-connected or island modes. Photovoltaic (PV) is one of the sources that are commonly used in microgrid. PV has a good ability to convert solar irradiation into electrical energy, especially under ideal condition, namely uniform irradiation or non-shading condition. However, PV often has some problems when facing partial shading condition. In this condition, PV does not produce optimal power because it stucks at the local maximum power point (MPP), thus it unables to track the global MPP. For this reason, it is necessary to implement a smart maximum power point tracker (MPPT) that can solve this problem. Furthermore, MPPT will be implemented in pulse width modulation (PWM) to control the buck converter. This study is focused on designing a laboratory scaled microgrid system with PV sources and controlled by modified particle swarm optimization (MPSO)-based MPPT. The 360 Wp PV array used consisted of two strings of three series modules Solarex MSX-60. The performance of the proposed method was compared with perturb and observe (P&O)-based MPPT, which was the commonly used method on MPPT. Furthermore, it was found that P&O and MPSO performed relatively similar accuracy (with difference of 0.04%) in non-shading condition. However, in partial shading condition, MPSO could perform better by producing greater output power so that it delivers better accuracy (98.74% to 99.11%) compared to P&O (57.95% to 71.87%). However, MPSO required a slightly longer time to converge because it had more complicated method and more computational load

    91

    full texts

    95

    metadata records
    Updated in last 30 days.
    IJITEE (International Journal of Information Technology and Electrical Engineering)
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇