Sunteți pe pagina 1din 174

Electrical Power, Electronics, Communications,

Controls & Informatics International Seminar


(EECCIS) 2012

Hall of Engineering Faculty, Brawijaya University


Malang, May 30-31, 2012

Proceedings
International Session

Organized by:
Department of Electrical Engineering
Brawijaya University
Indonesia
PUBLISHED BY:
Department of Electrical Engineering
Faculty of Engineering
Brawijaya University
eeccis@ub.ac.id

LAYOUT EDITOR
COORDINATOR
Wijono

MEMBERS
Angger Abdul Razak
Eka Maulana
Renie Febriyanti
Marina Dicarara
Firman Triyanto
Fahad Arwani
Erny Anugrahany

All papers in this book have been selected by the reviewers and technical committee.
All authors have signed the copyright declaration of their papers.

All rights reserved. No part of this book may be reproduced, downloaded,


disseminated, published, or transferred in any form or by any means, except with the
prior written permission of, and with express attribution to the authors.

The publisher makes no representation, express or implied, with regard to the


accuracy of the information contained in this book and cannot accept any legal
responsibility or liability for any errors that may be made.

Copyright by Department of Electrical Engineering, Brawijaya University


2012

ii
ORGANIZING INSTITUTION

DEPARTMENT OF ELECTRICAL ENGINEERING


BRAWIJAYA UNIVERSITY
MALANG, INDONESIA

STEERING COMMITTEE
Prof. Ir. Harnen Sulistio, M.Sc., Ph.D.
Dr. Ir. Sholeh Hadi Pramono, M.S..

REVIEWER
Asc.Prof. Dr. Mamdouh (Aswan University, Egypt)
Asc. Prof. Dr. Mahrus (Aswan University, Egypt)
Dr. Corina Martineac (Rumania)
Ishtiaq R. Khan, Ph.D (Singapore)
Hazlie Muslikh, Ph.D (UM, Malaysia)
Dr. Hamzah Arouf (Malaysia)
Prof. Dr. Kaharudin Dimyati (Malaysia)
Md. Atiqur Rahman Ahad, B.Sc.,M.S.,M.S.,PhD (Bangladesh)
Prof. Adi Susanto, MSc. Ph.D (UGM, Indonesia)
Prof. Thomas Sri Widodo, DEA (UGM, Indonesia)
Prof. Dr. Ir. Arif Djunaidy, MSc (ITS, Indonesia)
Dr. Aris Triwiyatno (UNDIP, Indonesia)
Dr. Ir. Son Kuswadi (ITS, Indonesia)
Purnomo Sidi Priambodo, Ph. D (UI, Indonesia)
Dr. Ir. Muhammad Nurdin (ITB, Indonesia)
Dr.-Ing. Ir. M. Sukrisno (STEI-ITB, Indonesia)
Dr. Ferry Hadary, ST, M. Eng (UNTAN, Indonesia)
Dr. Mashury Wahab (PPET-LIPI, Indonesia)
Dr. Rini Nurhasanah, M. Sc (UB, Indonesia)
Ir. Wijono, MT. Ph.D (UB, Indonesia)
Hadi Suyono, Ph.D (UB, Indonesia)
Dr. Sholeh Hadi Pramono (UB, Indonesia)

iii
TECHNICAL PROGRAM COMMITTEE
Muhammad Ary Murti (IEEE Indonesia Section)
Kuncoro Watuwibowo (IEEE Indonesia Section)
Arief Hamdani (IEEE Indonesia Section)
Ford Lumban Gaol (IEEE Indonesia Section)
Panca Mudjiraharjo (KIT - Japan)
Onny Setyawati (Universitat Kassel - Jerman)
M. Rusli (University of Wollongong - Australia)
Sholeh Hadi Pramono (UB - Indonesia)
Agung Darmawansyah (UB - Indonesia)
M. Aziz Muslim (UB - Indonesia)
Hadi Suyono (UB - Indonesia)
Rini Nurhasanah (UB - Indonesia)
Wijono (UB - Indonesia)

iv
SEMINAR PROGRAM

WENESDAY, MAY 30, 2012

HALL OF ENGINEERING FACULTY, BRAWIJAYA UNIVERSITY

07.00 - 08.25 REGISTRATION

08.25 - 08.30 OPENING CEREMONY

08.30 - 08.45 SPEECH BY CHAIRMAN OF THE ORGANIZING COMMITTEE

08.45 - 09.10 WELCOME SPEECH BY THE DEAN OF ENGINEERING FACULTY

09.10 - 09.30 BREAK

09.30 - 10.45 1ST KEYNOTE SPEECH BY DR. IR. UNGGUL PRIYANTO, M.SC (DEPUTY
CHAIRMAN FOR TECHNOLOGY OF INFORMATION AND COMMUNICATION,
ENERGY, AND MATERIALS OF THE AGENCY FOR THE ASSESMENT AND
APPLICATION OF TECHNOLOGY)

10. 45 - 12.00 2ND KEYNOTE SPEECH BY DR. EKO FAJAR PRASETYO (FOUNDER OF
VERSATILE SILICON TECHNOLOGY, FIRST IC DESIGN COMPANY IN
INDONESIA)

INTRODUCING SEMICONDUCTOR TECHNOLOGY AND CMOS LSI DESIGN


& FABRICATION

12.00 - 13.00 BREAK: PRAYING AND LUNCH

DEPARTMENT OF ELECTRICAL ENGINEERING BUILDING

13.00 - 15.00 COMMISSION SEMINAR: ORAL PRESENTATION SESSION I

15.00 - 15.25 BREAK: PRAYING AND COFFEE BREAK

15.25 - 17.25 COMMISSION SEMINAR: ORAL PRESENTATION SESSION II

17.25 CLOSING

v
FOREWORD BY THE DEAN OF
FACULTY OF ENGINEERING,
BRAWIJAYA UNIVERSITY
Assalamualaikum warahmatullahi wabarakatuh

irst of all, I would like to express my acknowledgement to the whole parties,

F lecturers, students, and all other people impossible to cite individually, for having
involved in the good achievement of the organization of the EECCIS 2012 Seminar.

I also would like to express my gratitude to Dr. Ir. Unggul Priyanto, M.Sc and Dr. Eko
Fajar Prasetyo for having accepted to become the keynote speakers of this EECCIS 2012
Seminar.

The EECCIS 2012 Seminar follows the success of the previously held seminars of
EECCIS 2000, 2004, 2006, 2008 and 2010. It becomes a part of scientific activity
programmes in the Faculty of Engineering to contribute to the creation of Brawijaya
University as a research university, and furthermore as an entrepreneurial university.

As a part of the Brawijaya University, civitas academica of the Faculty of Engineering


play a very strategic and active role in producing a tight link to industry and society in
general. It is hoped that through the EECCIS 2012 Seminar the tight link could be
maintained and improved either nationally or internationally, so that the scientific culture
among the research and education institutions as well as its link-and-match to industry
could bring out the welfare of the Indonesian society, and humanity in general.

Wassalamualaikum warahmatullahi wabarakatuh

Dean of Faculty of Engineering


Brawijaya University,

Prof. Ir. Harnen Sulistio, M.Sc., Ph.D

vi
PREFACE BY THE CHAIRMAN OF
THE ORGANIZING COMMITEE
Assalamualaikum warahmatullahi wabarakatuh

he EECCIS 2012, which stands for The Electrical Power, Electronics,

T Communications, Controls and Informatics Seminar 2012, is held following the


success of the previous EECCIS seminars organized biennially by the Department of
Electrical Engineering, Brawijaya University. The EECCIS 2012 Seminar takes place on
May 30-31, 2012 at the Faculty of Engineering Hall, Brawijaya University.

The EECCIS seminar is purposed to establish an interdisciplinary discussion forum in the


fields commonly covered in Electrical Engineering, i.e. Electrical Power Engineering,
Electronic Engineering, Telecommunication Engineering, Control System Engineering and
Information Technology. Despite the energy and economic crises which are still being
endured by our country, it is hoped that the hardwork of researchers from many
universities, research institutions, and also industry, could contribute to the acceleration of
our national recovery process from the crises. The academic and industry dynamics in
these efforts can be seen from their enthusiasm for participating and attending this
EECCIS 2012 Seminar.

The hardwork of our technical program committee for the success of this seminar has
been indicated by the large number of the scientific paper received. There have been
received about 189 papers coming from Indonesia, Malaysia, Japan, and Australia. After a
very rigorous process of reviewing by reviewers coming from Switzerland, Egypt,
Malaysia, Singapore, Bangladesh, and Indonesia, only about 83% of the received papers
have been accepted to be presented in a series of oral-presentation sessions during the
seminar, and also to be documented and published in the Proceedings of EECCIS 2012.

Sincere thanks go to all members of the Steering Committee and reviewers, who have
worked hard to guarantee the good quality of papers presented in this seminar.

On the part of the chairman of the Organizing Committee, I also would like to convey my
very high appreciation on the enthusiasm and hardwork shown by the whole technical
program committee, and also to many other people who are involved directly or indirectly
in contributing to the good achievement of this seminar.

Finally, I would like to thank and welcome all researchers, lecturers, students, industry,
and all other participants to the EECCIS 2012 Seminar. We admit that there are still
numerous lacks in the organization of this seminar, however any suggestions are always
welcome for our improvement in the future.

Wassalamualaikum warahmatullahi wabarakatuh


,

Organizing Committe of the EECCIS 2012 Seminar


Chairman,
M. Aziz Muslim, ST., MT., Ph.D

vii
TABLE OF CONTENT
Cover i
Organizing Institution iii
Seminar Program v
Preface by the Dean of the Faculty of Engineering vi
Preface by the Chairman of the Organizing Committee vii
Table of Content viii

A. ELECTRICAL POWER
[149-EEA_28] Fractional Open Voltage Maximum Power Point Tracking Using ATMega8535
For Photovoltaic System
Gunawan Wibisono, Sholeh Hadi Pramono, M. Aziz Muslim
Student of Master Degree Program Lecturer of Brawijaya University A1

[185-EEA_31] Reducing Cogging Force in A Cage-secondary Linear Induction Motor (LIM)


by One-Side Shifting
Mochammad Rusli

Electrical Department Faculty of Engineering, Unversity of Brawijaya A2

B. ELECTRONICS
[111-EEB_24] Automated Measurement of Haemozoin (Malarial Pigment) Area in Liver Histology Using
Image J 1.6
Dwi Ramadhani, Tur Rahardjo, and Siti Nurhayati
Center for Technology of Radiation Safety and Metrology, National Nuclear Energy Agency of Indonesia B1

[147-EEB_32] High-Input-Range Low-Offset-Voltage Flipped Voltage Followers Using FG-MOSFETs


Zainul Abidin, Koichi Tanno, Agung Darmawansyah
Electrical Engineeering of Brawijaya University, Electrical and Electronic Engineering of University of Miyazaki B2

[151-EEB_33] Design of 3-phase Fully-controlled Rectifier using ATMega8535


Mochammad Rifan, ST., MT., Ir. Hari Santoso, MS., Nandan Pratama Putra, ST.
Electrical Engineering of Brawijaya University B3

[168-EEB_35] Design of Boost Inverter for Setting Motor Induction 3 Phase


Ir. Dedid Cahya Happyanto, Agus Indra Gunawan, Bregas Wiratsongko P.
Politeknik Elektronika Negeri Surabaya
B4

C. COMMUNICATION
[034-EEC_05] Android Smartphone Based for the Local Directory Application of Public Utility
Arini, MT., Viva Arifin, MMSi., Chery Dia Putra, S.Kom.
Informatics Engineering Program State University (UIN) Syarief Hidayatullah, Jakarta C1

vii
[062-EEC_11] Tropical rain effects on Free-Space Optical and 30 GHz wireless systems
M. Derainjafisoa and G. Hendrantoro
Department of Electrical Engineering, Institut Teknologi Sepuluh Nopember C2

[150-EEC_27] First Aid Application Based Android Smartphone


Qurrotul Aini, Husni Teja Sukmana, and Imamul Huda
Faculty of Science and Technology Syarief Hidayatullah State Islamic University, Jakarta C3

[172-EEC_35] Singled-fed Circularly Polarized Triangular Microstrip Antenna with Truncated Tip Using
Annular Sector Slot for Mobile Satellite Communications
Muhammad Fauzan Edy Purnomo, Sapriesty Nainy Sari
Department of Electrical Engineering, University of Brawijaya C4

[173-EEC_36] Improvement in Performance of WLAN 802.11e Using Genetic Fuzzy


Admission Control
Setiyo Budiyanto
Electrical Engineering Department, Faculty of Engineering, Mercu Buana University
C5
[176-EEC_38] Characterization of Tilted Fiber Bragg Grating as a Sensor of Liquid Refractive Index
Eka Maulana, Sholeh Hadi Pramono, A. Yokotani
Department of Electrical Engineering, University of Brawijaya and University of Miyazaki
C6
[177-EEC_39] Video Streaming Analysis on Worldwide Network Interoperability for Microwave
Access (WiMAX) 802.16d
Dwi Fadila Kurniawan, Muhammad Fauzan E.P. dan Widya Rahma M.
Department of Electrical Engineering Faculty of Engineering UB C7

[187-EEC_42] Statistical Propagation of Terrestrial Free-Space Optical Communication


Using Gamma-Gamma
Ucuk Drusalam, Purnomo Sidi Priambodo, Harry Sudibyo, Eko Tjipto Rahardjo
Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia C8

D. CONTROLS
[051-EED_12] Maximum Power Point Tracking using Fuzzy Logic Control for Buck Converter in
Photovoltaic System
Mahendra Widyartono, Sholeh Hadi Pramono, M. Aziz Muslim
Student of Master Degree Program and Lecturers, Department of Electrical Engineering, Brawijaya University D1

[093-EED_21] A Computer Fluid Dynamics Study of 6.5 Micron AA 1235 Annealing Treatment in
Sided Blow Inlet-Outlet Furnace
Ruri A. Wahyuono, Wiratno A. Asmoro, Edy Sugiantoro, Muhamad Faisal
Department of Engineering Physics, Institut Teknologi Sepuluh Nopember, Surabaya
D2

viii
[132-EED_29] The Height Control Systems of Hydraulic Jack Using Takagi Sugeno Fuzzy
Logic Controller
Fitriana Suhartati, Ahmad Fahmi
Department of Electrical Engineering University of Brawijaya, Electrical Engineering of State University of Malang D3

[146-EED_32] An Application of Adaptive Neuro Fuzzy Inference System (ANFIS) with Substractive
Clustering for Lung Cancer Early Detection System
Mohamad Yusuf Santoso, Syamsul Arifin
Faculty of Industrial Technology, Institut Teknology Sepuluh Nopember, Surabaya
D4
[163-EED_36] PID Design for 3-Phase Induction Motor Speed Control Based on Neural Network
Levenberg Marquardt
Dedid Cahya H., Agus Indra G., Ali Husein A., Ahmad Arif A.
Politeknik Elektronika Negeri Surabaya
D5
[182-EED_39] Zelio PLC-Based Automation of Coffe Roasting Processs
M. Aziz Muslim, Goegoes Dwi N., Ali Mahkrus
Department of Electrical Engineering, Faculty of Engineering, Brawijaya University D6

[188-EED_40] Prediction of CO and HC on Multiple Injection Diesel Engine Using Multiple Linear
Regression
Bambang Wahono, Harutoshi Ogai
Graduate School of Information, Production and Systems, Waseda University D7

E. INFORMATICS
[048-EEE_07] Acceptance of Mobile Peyment Application in Indonesia
Hendra Pradipta
Informatics Management, State Polytechnics of Malang E1

[057-EEE_10] Attitude Consensus of Multiple Spacecraft with Three-Axis Reaction Wheels


Harry Septanto, Bambang Riyanto Trilaksono, Arief Syaichu-Rohman and Ridanto Eko Poetro
Center of Satellite Technology, Indonesian Institute of Aeronautics and Space
School of Electrical Engineering and Informatics, Insitut Teknologi Bandung
Faculty of Mechanical and Aerospace Engineering, Insitut Teknologi Bandung E2
[058-EEE_11] Implementing Naive Bayes Classifier and Chi Square o the Abstract to Classify
Research Publication Topics
Imam Fahrur Rozi, Rudi Ariyanto
Magister Program of Department of Electrical Engineering, University of Brawijaya, Politeknik Negeri Malang E3

[072-EEE_16] Analysis and Implementation of Combined Triple Vigenere Cipher and ElGamal Cryptography
using Digital Image as a Cryptographic Key
Komang Rinartha, Agung Darmawansyah, Rudy Yuwono
STMIK Stikom Bali, Department of Electrical Engineering, Faculty of Engineering, Brawijaya University
E4

ix
[083-EEE_19] Heart Rate Variability Analysis on Sudden Cardiac Death Risk RR Interval by
Using Poincare Plot Method
Ponco Siwindarto, I.N.G. Wardana, M. Aris Widodo, M. Rasjad Indra
Faculty of Engineering and Medical Faculty of Brawijaya University E5

[094-EEE_21] Lung Cancer Prediction in Imaging Test Based on Gray Level Co-occurrence Matrix
Sunngging Haryo W., Agus M. Hatta., Syamsul Arifin
Department of Engineering Physics, Faculty of Industrial Technology, Institut Teknologi Sepuluh Nopember E6

[102-EEE_23] Optimal EDR Methods for Sleep Apnea Classification


Mungki Astiningrum, Sani M. Isa, Aniati Murni Arimuthy
Faculty of Computer Science, University of Indonesia E7

[112-EEE_26] Automated Detection of Congested Central Vein Liver Histology of Mice


Infected with Plasmodium berghei using CellProfiller 2.0
Tur Rahardjo, Dwi Ramadhani, Siti Nurhayati
Center for Technology of Radiation Safey and Metrology, National Nuclear Energy Agency of Indonesia E8

[156-EEE_33] Telemonitoring Application in Health Safety and Environment at PT. Pertamina


Refinery Unit IV Cilacap using Android Smartphone
Budi Santosa, Bambang Yuwono, Mariza Feary
Informatics Engineering Department, Universitas Pembangunan Nasional Babarsari Tambakbayan E9

[169-EEE_36] RIFASKES Geographic Information System Based on Web


Istikmal, Yuliant S., Ratna M., Tody AW., Ridha MN., Kemas ML., Tengku AR.
Electro and Communication Faculty, Telkom Institute Technology E10

[184-EEE_38] Fast and Accurate Interest Points Detection Algorithm on Brycentric Coordinates
using Fitted Quadratic Surface Combinaed with Hilbert Scanning Distance
Tibyani Tibyani, Sei-ichiro Kamata
Graduation School of Iformation , Production, and System, Waseda University
E11
[186-EEE_39] Generating Security Keys From Combination of multiple Biometric Sources
Primantara Hari Trisnawan
Camputer Sciences, University of Malaysia
E12

x
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Fractional Open Voltage Maximum Power Point


Tracking Using ATMega8535 for Photovoltaic
System
Gunawan Wibisono, Sholeh Hadi Pramono, M. Aziz Muslim
Student of Master Degree Program, Electrical Engineering, Engineering Faculty,
Brawijaya University,Malang, Indonesia
ndhoel@gmail.com, sholeh_hp@ub.ac.id, muh_aziz@ub.ac.id

AbstractPhotovoltaic (PV) systems are power source controlled by the duration of the switch on and off (ton and
systems that have non-linear current voltage toff). This method is known as pulse-width modulation
characteristics (I-V) under different environments condition. (PWM) switching [3].
The system consists of PV generator (cells, modules, PV
array), energy storage (batteries), buck converter, and
resistive load. The proposed maximum power point control
is based on fractional open voltage The controller must
maintain PV voltage at VMPP by changing the converter duty
cycle so that maximum power can be generated in varying
operating condition. Using proposed maximum power point
tracking (MPPT) method, average power is 11,8% higher
than direct load, and 21.9% higher than constant output
voltage scheme. The system have better accuracy and
stability even in dynamic operating conditions.
Index TermsPhotovoltaic system, Maximum Power
Point Tracking, Fractional Open Voltage.

I. INTRODUCTION
Photovoltaic systems (PV) is a system to convert the
sun's energy directly into electrical energy. PV system is
one of the renewable energy alternatives. The power of
sunlight received by the earth outside the atmosphere is
about 1300 watt/m2 [1].
Simple PV system consists of a PV cell unit, a solar
charger, and a battery. The battery is an electro-chemical
devices. Various types of batteries have different
characteristics, and different ways of charging. The battery
charger must adjust according to these characteristics so Figure 1. Ideal characteristic of PV cell showing MPP
that the battery can last long. On the other hand, the PV Maximum Power Point Tracking (MPPT) is a sub-
cell output also has certain characteristics that may not be system designed to extract maximum power from power
suitable to charge the battery. source [2]. The maximum power point is shown in Figure
A solar charger should be able to bridge between the (1) above. In the case of solar power source, the
PV cell output voltage and current is varied according to maximum point varies due to the influence of changes in
the level of solar lighting with a battery that must be electrical characteristics as function of temperature, solar
charged with a certain voltage for optimum power transfer iradiation, heating and others. With the change of
and not damage the battery. temperature and solar iradiation, the voltage and current
Conversion efficiency of solar energy into electric output of the PV modules are also changing and reducing
energy via PV cells are low, only around 15-20%. One of efficiency of PV systems. MPPT maximizes power output
the effort to improve energy conversion efficiency of of the panels in different conditions to detect the best
photovoltaic cells is using the Maximum Power Point working point of the power characteristics and then
Tracking (MPPT) method [2]. controls the current or voltage on the panel.
DC-DC converter is used to convert the DC input General requirement for MPPT is simple and low cost,
voltage that varies into controlled DC output voltage at the fast tracking the changing conditions, and fluctuations of
desired voltage level. The basic form of DC-DC converter small output. Due to the nature of PV system is non-
is buck converter, are also called step-down converter. As linear, i.e. current and voltage that varies depending on
the name implies, step-down converters produce a dc environmental conditions, it isvery important to operate
output voltage of the average lower than the input dc
voltage. In DC-DC converter, average output voltage is
A1- 1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

the PV system at the condition of maximum power point. Figure 2. Proposed system
This will improve the efficiency of PV systems. The Buck converter used here is a simple common
There are various methods and ways to implement the Buck converter as is Figure (3)
MPPT control, e.g., by perturb and observe, incremental
conductance, fractional open voltage, parasitic capacitance
[2].

II. FRACTIONAL OPEN VOLTAGE MPPT


The approximately linear relationship between VMPP
and VOC of the PV array, under varying irradiance and
temperature levels, is the basis for the fractional VOC
method: Figure 3. Buck converter
VMPP k1 VOC, (1) The switch used is an IRFP 450 power MOSFET that
has VDSon about 2 V. The MOSFET gate is drived via an
where k1 is a constant dependent on the characteristics
AN2222 switching transistor. Switching frequency is 4
of the PV array. However, it has to be computed kHz to minimize audible noise and yet keeping the
beforehand by empirically determining VMPP and VOC switching losses low.
for the specific PV array at different irradiance and
temperature levels. The factor k1 is usually between 0.71 The ATMega8535 is chosen because it is wide
and 0.78. availability, Easy to be programmed, and built in ADC.
PWM signal at 25% from the microcontroller can be seen
Using Equation (1) and measuring VOC from a no- in Figure (4).
loaded PV array, VMPP can be calculated with the known
k1. The output terminals of the PV array should be The VOC is sampled by turning off the switch for 10 ms
disconnected from the power converter. This results in a so that the PV to return to its open voltage condition. The
VOC is sampled every about 5 second. Therefore energy
temporary loss of power, which is the main drawback of
loss due to Voc sampling is negligible.
this technique. To overcome this drawback, pilot cells can
be used to measure VOC. These pilot cells should have the The PV module used is Wuhan Rixin MBF75 PV
same irradiation and temperature as well as the same module. Table 1 summarized specifications of the PV
characteristics with the main PV array for better module.
approximation of the open-circuit voltage. PN junction
diodes generate a voltage that is approximately 75% of TABLE I. PV MODULE SPECIFICATION
VOC. Thus, there is no need to measure VOC. A closed- Brand Wuhan Rixin
loop voltage control can be implemented after the MPPT Model MBF75
DC/DC converter for voltage regulation of the inverter Material Polycrystalline Silicon
input.
Power output (max) 75 W
The PV array technically never operates at the MPP Voltage output (max) 17,5 V
since Equation 1.32 is an approximation. This Current output (max) 4,29 A
approximation can be adequate, depending on the
Open circuit voltage 21,5 V
application of the PV system. The technique is easy to
implement and cheap because it does not require a Short circuit current 4,72 A
complicated control system; however, it is not a real Open circuit voltage -0,35% / C
MPPT technique. Also, k1 is not valid under partial temperature coefficient
shading conditions and it should be updated by sweeping Short circuit current +0,036% / C
the PV array voltage. Thus, to use this method under temperature coefficient
shaded conditions, the implementation becomes Working temperature - 40 ~ 90C
complicated and incurs more power loss [2].
The control algorithm is a simple IF-THEN control. If
the input voltage is higher than VMPP then the duty cycle is
III. PROPOSED SYSTEM increased to increase apparent load. If the input voltage is
The proposed system can be desribed as Figure (2) lower than VMPP then the duty cycle is decreased to
below. decrease apparent load.

IV. EXPERIMENT SETUP


PWM control pulse and output voltage ripple is
measured using digital oscilloscope.

A1- 2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The system is tested at 700 W/m2 insolation with


k1=0.7. The resistive load is varies from 40 to 10 with
5 interval. Then from 10 to 0 with 1 interval.
Theoretical optimum load as indicated by specification
is 4,1 . Therefore we defined 40 to 9 as low load,
and 8 to 0 as high load.
The system is tested and compared with direct load (no
controller), and a constant output voltage controller.

Figure 6. output voltage ripple at 88% duty cycle.


Figure 4. Experiment setup

V. RESULT AND ANALYSIS


PWM output at 25% from the microcontroller is shown
in Figure (4) below. Output voltage is 5 volt with duty
cycle 25%.
The PWM signal is quite satisfying 5 V pulse at 4 kHz
(note that the oscilloscope gave false frequency analysis).

Figure 7. PV Voltage over resistance

PV Power
45

40

35

30
PV Power

25

20

Figure 5. PWM output at 25% 15

10
Output voltage ripple is shown in Figure (6) below.
5
The ripple is satisfactory low at 125 mV.
0
OC 40 35 30 25 20 15 10 9 8 7 6 5 4 3 2 1 0
The input voltage graph can be seen in Figure (7) Resistance (Ohm)
below. As seen from the figure, the PV voltage can be
Constant output MPPT direct load
maintain around VMPP at high load. Average voltage using
MPPT at high load is 14.99 V, while direct load gave Figure 8. PV Power over resistance
10.22 V, and constant output voltage gave 12.43 V. To
maintain VMPP at low load, we must use buck-boost
converter to increase apparent load. With only a buck
converter, the algorithm only work at high load. VI. CONCLUSION
From the results and analysis, it can be concluded that
As seen from Figure (8) below, the algorithm also
PV system using fractional open voltage can maintain
maintain power at high load. Average power using MPPT
voltage at VMPP and PV power at high load. Using MPPT,
at high load is 28,47 W, evidently higher than direct load
panel voltage is maintained closer to VMPP at 14.99 V. The
at 25.45 W, and constant output voltage gave 23,35 W.
average power also 11,8% higher than direct load, and
21.9% higher than constant output voltage scheme.

A1- 3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

REFERENCES
Sholeh Hadi Pramono received Bachelor
Degree from Electritrical Engineering
[1] Markvart, T dan Castaner, L. Solar Cells: Materials, Manufacture Department, Brawijaya University in 1986. He
and Operation. Elsevier Amsterdam (2005) received his Master Degree and Doctoral Degree
both from University of Indonesia, in 1995 and
[2] Khaligh, A dan Onar, O.C. Energy Harvesting: Solar, Wind and
2010, respectively. Since 1987 he is with
Ocean Energy Conversion System. CRC Press Florida (2010)
Electrical Engineering Department, Brawijaya
[3] Mohan N, Undeland T, M, and Robbins, W, P. 1995. Power University. His current research interest including
Electronics. Converters, Applications, and Design. (2nd Edition). fiber optics, telecommunication and renewable
John Wiley & Sons, Inc. energy.

Gunawan Wibisono Bachelor Degree from M. Aziz Muslim received Bachelor Degree and
Universitas Brawijaya, Malang, Indonesia, in Master Degree from Electritrical Engineering
2004, in electrical engineering. Currently, he is Department of Institut Teknologi Sepuluh
working toward Master Degree in power system Nopember, Surabaya, Indonesia, in 1998 and
engineering at Brawijaya University, Malang, 2001, respectively. In 2008 he received Ph.D
Indonesia. His current research interest is solar degree from Kyushu Institute of Technology,
power system and renewable energy. Japan. Since 2000 he is with Electrical
Engineering Department, Brawijaya

A1- 4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Reducing Cogging Force in A Cage-secondary


Linear Induction Motor (LIM) by One-Side
Shifting
Mochammad Rusli 1) 2)
1)
School of Mechanical, Materials and Mechatronic Engineering,
Faculty of Engineering, University of Wollongong, NSW, Australia
2)
Electrical Department Faculty of Engineering, University of Brawijaya, Indonesia
mochammad.rusli@gmail.com

Abstract High precision linear machining tools is one of completely eliminate many of the performance limiting
interesting research field in related to high qualitative factors associated with rotary-linear translation
products which is also becoming one of competitive methods[2]. The most common linear motor used in
factor. The movement precision can be affected by
existence of ripple force, unpredicted external load and
precision machine tools is the permanent magnet linear
frictional force. The existence of cogging force is the one motor, particularly in high speed applications[3].
limited factor of the linear precision. The reduction of However, permanent magnet linear motors have a
cogging force of its linear movement precision of major disadvantage in precision metal cutting as the
machining tools using rotary motor drive can be obtained metallic dust and swarf associated with these processes
by the skewed rotor or implement the feedback control can be attracted by the permanent magnets, which are
system. Many researchers have conducted the reduction
of cogging torque of its machining tools drive supported
typically along the entire length of the axis. Therefore,
by using a feedback control algorithm variation concepts. alternative linear motor technologies, such as the Linear
Because of the great opportunity of construction variation Induction Motor (LIM), offer great potential as a
in linear motors, this paper proposes to investigate an solution for precision linear metal cutting axes.
innovation of the cage secondary Double sided linear One design aspect of linear motors that is important
induction motor construction aimed to obtain the zero from a precision machining perspective is the
cogging Force. The cogging force can be predicted by
investigated of the variation of stored energy magnetic in
minimization of cogging. Cogging is represented in
the air gap. Therefore, at first in this paper the linear machines as a variation in the magnetic forces
implementation of estimation flux path in multi-tooth along the machine axis, and can have a severe impact
model in which is built as similar construction to the cage on the overall precision of the axis. For rotary motors,
single sided linear induction motor, and will be verified by many researchers have reduced the cogging effect by
building experimental multi-tooth test-bed. Based on that using the feedback controller design or skewed rotor of
multi-tooth experiment and the justification of estimation
flux path method, the double-sided linear induction motor
motors. In linear induction motor, cogging effect can be
with offset position between both sided will be developed reduced by modification of its construction, because
with the assumption that the cogging force will be able to linear motors have the great opportunities to modify the
cancel each other. In this paper will be described the construction forms. This paper will present the
arrangement of LIM model using FEM software and investigation of the modification of A Cage-secondary
simulated. This motors consist of two layers, moving and Double Sided Linear induction motor with cogging
stationary part. The stationary part are arranged as the
cage-ladder structure.
effect nearly zero value.

Keywords Cogging Forces, Electromagnetic Field,


Double sided-Linear Induction Motors

I. INTRODUCTION
The demands for high precision machining are
rapidly increasing, especially in industrial processes
such as semiconductor manufacturing or metal cutting
machine tools[1]. For machine tools in particular, the
current international competitive levels of precision are
below 1mm Linear Motors can offer significant
advantages over rotary motors for driving linear Figure 1: cage-secondary single-sided LIM (Photo
Courtesy of Krauss Maffei Automationstechnik GmbH,
machine tool axes, in that they either reduce or
A2-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Minimization of the cogging effect in LIMs requires density and cogging force prediction will be calculated
knowledge of the variation of stored magnetic energy in by using the Estimation Flux Path (EFP) method. Based
the air-gap. The calculation of magnetic circuits, where on that prediction equation, the one-side shifting length
the air-gap permeance the magnetic flux and the flux will be determined numerically.
density distribution are determined, is one of the most
difficult problems in electrical machines[3]. Due to III. COGGING FORCES
slotted cores, many researchers approximate the air-gap According to Arger [4] the term cogging can be
permeance in relation to magnetic energy stored in the defined as the variation in the motor torque as it turns
air-gap. This paper proposes also to describe slowly. Based on this definition, cogging in an LIM
developing of the estimation of flux path in linear can also be described as the variation of
Induction motor construction in understanding the electromagnetic forces. The existence of cogging forces
variation of cogging force in the air gap. The cogging can be detected by energy variation or the magnetic
force analysis based on the prediction of variation of energy gradient[4]. The direction of cogging forces is
stored magnetic energy in the air gap of motor. The perpendicular to the air gap or called as tangential
calculation of the cogging forces will be conducted by forces.
using FEM approximation and EFP method. The both Each devices that consist of the some magnetic
method will be compared and provide the relationship circuits especially that is implemented in electrical
between difference relative position of the side in the machines, including linear induction motors, the
DSLIM and the opportunity for reducing cogging force. interaction between magnetic material, produced by
nature permanent magnet or by electrical current
II. PROPOSED MODEL source electromagnet, with the iron core will effect
Figure 2 shows the common a cage-secondary generating of the attractive forces. When the rotor of
DSLIM which it will be described in this paper. It motors exhibit a movement from one position to the
consist of two main parts, moving part and stationary other position, it can be change the direction of the
part. The three phases AC electrical signal are attractive force in both surfaces of materials.
impressed into coils placed in the slots of stationary The position of iron core to the magnetic materials
part. The winding system based on the common determines the direction of the attractive force. The
structure in rotary AC machines. The stationary part is cogging force can be manifested as the projection of
divided into two layer, the left side layer and right the attractive force in the x-axis of movement. The
layer. Each layer have been designed with same number cogging force in linear induction motors can be also
of slots, 9 slots in three poles pitch of winding. referred to cogging force in permanent magnet motors.
In permanent magnet motor, cogging torque arises
from the interaction of the rotor magnets with the steel
teeth on the stator[5]. Yoshimura et al.[6] predict the
existence of cogging force associated with the
interaction between magnet end and the steel teeth of
the primary winding.
The cogging force is a function of position and
independent of the load angle. Due to the slotted nature
of the primary core, the cogging force is periodic and
repeat itself over every slot pitch[7]. Cogging torque is
produced by the interaction between permanent magnet
(PMs) and slotted iron structure and manifests itself by
the tendency of a rotor align in a number of stable
positions even when motor not energized[8]. However
in Linear Induction Motors (LIMs), energy magnetic
variation in the air gap can be used for prediction of the
cogg8ng foces [9].
Because of the electromagnetic interaction between
the exterior teeth of the armature core and the
permanent magnets, the cogging force is inevitable in
Figure 2: proposed model of LIM both a short primary type and short secondary type
PMLM [10]. As in rotary PM machines, linear PM
This paper proposes to describe the cogging motors can exhibit significant cogging forces due to
reduction can be obtained by one-side shifting of this interaction of the permanent magnet in the stator and
motor. The proposed model will be built in the FEM- with the iron in the stator[11].
software for investigation the distribution of flux Based on the above explanation, it can be concluded
density quantity if the one of side are shifted. The flux that cogging forces are: (a) that effected by the
interaction between edge of certainty magnet and the
A2-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

slotting iron core; (b) a function of the position and slot pitch are tooth width ( t th ) , slot width ( S slt ) ,
independent to load angle; (c) is periodic and repeat
'
itself over every slot pitch. totally number of slot ( Z1 ) and number full filled slot
Analogy to the cogging force in permanent magnet ( Z 1 ) . The winding system in this design are given as
motors, it can be defined that the cogging forces in a
linear induction motor might be caused by the double winding with 3 slots are half filled. Slot pitch
interaction between edge of electromagnet on primary can be calculated using the equation (see fig. 3)
section with the slotted iron core in secondary layer. It
2. p.
should be independent to the load angle and periodic
= th + S slt = (3)
according to slot pitch. Z1'
IV. GEOMETRIC PARAMETERS STANDARD DESIGN The pole number is given that of as 2, so slot pitch
This LIM-model design will be initialized by can be obtained by:
calculating of geometric parameters of DSLIM. design
2 * 0.06 0.1
parameters of upper side of Double-sided Linear
= = = 13.33mm 15mm
Induction motor using standard procedures. Because the 9 9
DSLIM consist of principally two sides that have (4)
symmetry dimensions each other. Therefore design
concept would be developed only in one side. The For improving the distribution of magnetic flux
upper sided design procedure are referred by standard density and reduce the resistance and reactance, this
design of main dimension calculations and electrical linear induction motor use chorded winding system.
dimension. The number of slot and winding system will Based on the construction of chorded winding system,
be given as the first step of design. there is parameter called coil pitch parameter. It can be
The first important parameter in designing linear determined based on the slot pitch. Because was given
induction motor is pole pitch. The pole pitch is defined the number of slot in which consist only half filled coil,
as the distance between slots where some three phase so the coil pitch should be:
windings for one pole are connected. Due to significant
influence of pole pitch to the synchronous velocity of
c = 2 *13.33 = 26.66mm 30mm
such as linear induction motor, thus pole pitch could be
calculated by using equation that describe relationship (5)
between synchronous velocity and pole pitch.
Totally, the length of primary layer can be obtained
v s = (2. f ) (1) with addition of multiplication of number pole with
Where: pole pitch and coil pitch and end distance. The end
width of primary in this design will be defined as that
vs : synchronous velocity of 10 mm. Thus the length of primary layer is:
f : three phases signal input frequency
: Pole pitch L = 2 p * +c + c1 = 2*60+ 30+15=165mm (6)
If the synchronous velocity is given 6 m/s, so pole
pitch for that Linear Induction motor should be: The rated thrust of small and large linear induction
6 motor depend on the area of primary layer. According
= = 0.06m = 60mm (2) the previous designer, that for small linear induction
100
motor for rated thrust which have thrust bigger than 100
N, the ratio between rated thrust and the area of primary
layer approximately is:

Fx
hsl = 5000 ( N / m 2 )
A
(7)
Then we can calculate area of primary layer:
th Slt Fx 100
A= = = 0.017m 2 = 17000mm2 (8)
Figure 3: sketch of two slots in the moving part 6000 6000
The next main dimension of moving part of linear
induction motor is slot pitch. This parameter reveals the The area of primary layer is multiplication between
distance between slots in moving part of LIM. The slot depth and width of primary layer. Because primary
pitch could be related to the dimension of slot- and width has already calculated, so The primary depth may
tooth- width of motor. Parameters which refereed to be obtained easily.

A2-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

A 17000
Li = = = 103.03 100mm d1 = Li + 0.1* = 0.075+ 0.1*0.06=
L 165 (18)
(9) 0.030m = 30mm
The three phases AC current signal flowing in
primary coil generated the travelling magnetic flux in The slot high may be determined by using ratio
air-gap. This magnetic flux influence or induced typical flux density normal and tangential and pole
voltage signal into the secondary layer of LIM. pitch. Detail equation are:
Typically, the induced voltage in secondary layer is Bn 1.6
hsl = 0.3 * * = 0.3 * 0.050 *
approximated about a half of the rms value of input Bt 0.7 (19)
voltage signal.
0.0342 35mm
Ei 0.5 * Vi = 110Volt (rms values) (10) The thickness of aluminum can be defined as
d 2 = 5mm .
And input current in coil of primary layer: TABLE 1:
DESIGN RESULTS
Fx * vi 100 * 3.5 No. Parameter Symbol Value Unit
Ii = 8 Ampere (11)
m phV1 cos 3 * 220 * 0.115
1 Pole pitch 60 Mm
The number of turn per phase is calculated by using 2 Current Per Ii 8 A
variation of electromagnetic power (EP). The AC phases
current signal flowing in primary coil generate the
3 Primary depth Li 100 Mm
travelling magnetic flux. The output coefficient for
5 Aluminum 5 Mm
primary can also determined with modification of d2
carter coefficient. thickness
6 Back iron d1 30 Mm
thick-ness
Pelm = m ph * E1 * I i 7.59VA (12)
7 Slot width S slt 10 Mm
P 7.591520
p = elm 15000VA/ m2 (13) 8 Teeth width W th 10 Mm
Vsc * A 5*4.6 9 End section end 10 Mm
Based on the output coefficient line current density 10 Turn number 951
N1
and the output coefficient, with assuming that 11 Number of slot 9
B z = 0.4T , approximately line current density can be of full Z1
12 Height of slot hy 35 Mm
calculated by using f this methods)

mph 2 * Ii N1 32000 V. OFF-SET POSITION OF MOVING PART LIM-MODEL


Jy = = 88900A/ m (14)
Bz 0.4 The double sided linear induction motor consist of
Therefore number of turn per phase is: two parts, secondary and primary layer. The secondary
part are placed in between the double primary layers in
which the electrical current flowing into the coils
88900* 0.05* 2
N1 = = 449 450Turn (15) placed to their slots. The secondary layer compose of
3 2 * 2.3 some cages or ladders circuits that made of aluminum.
Figure 1 shows the simulated DSLIM model in the flux
The width of air-gap is assumed = 0.5mm And the software version 10.2.1 produced by Cedrat [12].
width of teeth will be taken as 5.5mm In each primary part compose of 9 slots in which AC
three phase signal current are flowed into them. The
th = 5.5 (16) arrangement of the three phase winding in similarity to
the rotary induction motors. The moving part is the
S lt = = 5.5mm (17) secondary layer and fixed part is the primary layer. The
The cage width (secondary tooth) of secondary are
For single sided linear induction motor, the thickness specified as 6 mm (less than the tooth width of primary
of back Iron can be calculated using the following 10mm), for fulfilling the starting requirement. The
equation. However for double-sided linear induction secondary and primary slot are defined with the same
motor, the thickness of secondary layer can be obtained values, each is 10 mm.
by the subtraction the back iron thickness with air-gap The measurement of cogging action in this model are
and primary high. conducted by using the multi-static option. The cage-
A2-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

secondary are made in open circuit condition, so that


there is no electrical current flowing in them. After the
coils are supplied by electrical current, the primary
layer are moved in 1 mm step in positive direction (up
direction). Because of there is no current flowing in the
ladder, in the secondary occur the electromagnetic
forces (attractive and repel forces). The
electromagnetic force that have the tangential direction
in this model the magnetic forces varies up and down
called cogging action.

Figure 6: Norma Flux density in the left and right air-gap

TABLE 2:
COMPARISON BETWEEN REC. MODEL AND OFFSET 12 MM

t-width thrust Thrust


(mm) No offset 12_ofset
4 72.84 65.10
5 77.32 69.11
6 83.53 74.66
7 88.94 79.49
8 93.43 83.51
9 96.5 86.25
Figure 4: the cogging forces by the offset position variation
10 101.63 90.84
11 104.67 93.55
The investigation for variation of offset position 12 107.25 101.92
between left and right side of model have been 13 113.64 101.57
conducted. By using the finite element method, the 14 119.58 106.88
simulation results show that the offset-position of both
15 124.87 111.61
sides could provide the minimum cogging forces.
Figure 4 shows that the minimization of cogging can be
obtained in the 8 mm offset model. The designed LIM-model have simulated by using
Figure 5 shows the tangential flux densities in the left Cedrat Flux Software. By the slot pitch variation from 4
and the right side of the air gap of LIM model. The until 15 mm, The investigation of the useful thrust
tangential flux density in both sides could be cancelled between no offset model and 12mm offset-model
each other. The normal flux densities also looks shown that provide the slight difference between them.
symmetry, so the reduction of electromagnetic forces in Table 2 show the comparison results of shifted one side
the tooth will be minimized. of LIM-model in 12 mm length
Figure 7 shows the distribution magnetic field in all
of regions of the 8 mm ffset model. The circle of
magnetic field between both sides are similar, therefore
the useful thrust in the both air gap have a similar
direction. the 8mm-offset model. In this paper will be
shown the cogging forces investigation results of that
model, if the right side of model would be shifted up in
step 1 mm. Table 3 shows simulation results of useful
thrust of offset model.
The offset position length variation in the simulations
results influences the useful thrust significantly
compared with the no offset-model.

Figure 5: Tangential Flux density in the left and right air-gap

A2-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

TABLE 3: TABLE 4:
COMPARISON THRUST FOR OFFSET VARIATION PERCENT OF COGGING OVER THRUST FOR 12MM AND 9 MM OFFSET
MODEL
speed ofset 5 ofset 6 ofset 7 ofset 8
m/s Thrust(N) Thrust(N) Thrust(N) Thrust(N) offset cogging cogging thrust thrust percent percent
6 0 0 0 0 (mm) 12 mm 9 mm 12mm 9 mm 12 mm 9 mm
5.75 15.34 15.44 19.08 19.42
4 8.29 8.16 89.65 84.53 9.24707 9.65338
5.5 34.65 34.8 34.24 34.58
5 9.09 7.92 91.01 85.03 9.98791 9.31436
5.25 43.66 43.78 43.86 44.2
5 53.7 53.75 53.82 54.16 6 9.5 9.28 91.09 85.12 10.4292 10.9023
4.75 63.02 63.17 63.23 63.57 7 9.55 6.52 91.17 85.23 10.4749 7.64989
4.5 71.63 71.75 71.78 72.12
8 9.75 8.6 91.41 85.54 10.6662 10.0538
4.25 77.45 77.67 77.76 78.1
4 83.52 83.7 83.85 84.19
3.75 87.35 87.32 87.43 87.77 VI. CONCLUSION
3.5 89.55 89.77 89.82 90.16 The cage secondary LIM model with double layer
3.25 90.67 90.86 90.92 91.26 moving part might generate the high useful thrust and
3 91.01 91.09 91.17 91.51 also would used for reducing the cogging force. The
2.75 90.21 90.4 90.4 90.74 reducing cogging would be developed by compensation
way in which the one side will be up-shifted in order to
2.5 88.56 88.99 89.04 89.38
the flux magnetic in both sides would be cancelled each
2.25 86.43 86.54 86.65 86.99
other. By using finite element, the reducing cogging
2 84.66 84.71 84.88 85.22 forces on this model could be forced down until under
1.75 83.07 83.18 83.23 83.57 10% compared the useful thrust values Although the
1.5 78.23 78.39 78.87 79.21 offset-model can reduced cogging forces, however the
1.25 76.33 76.45 76.56 76.9 useful thrust value are in 12% lower than no-offset
1 72.01 72.06 72.23 72.57 LIM-model.
0.75 69.23 69.37 69.54 69.88
0.5 65.44 65.67 65.88 66.22
REFERENCES
[1] Kok Kiong Tan, Hui Fang Doi, Yang quan Chen and Tong
0.25 69.45 69.57 69.65 69.99
Heng Lee, High Precision Linear Motor Control Via Relay-Tuning
0 57.13 57.24 58.33 58.67 and Iterative Learning Based on Zero-Phase Filtering, IEEE
Transactions on Control Systems Technology, Vol. 9, No. 2,pp244-
253, March, 2001.
Table 3 sows that the offset variation from 5 until 8 [2] S. B. Yoon, J. Hur, and D.S. Hyun, A Method of Design of
mm could only provide the useful thrust much smaller Single-Sided Linear Induction Motor for Transit, IEEE
compared the no-offset model. The offset in 12 mm, the Transactions on Magnetics, Vol. 33, No. 5, September 1997
[3] Gieras, J. F., Linear Induction Drives, Clarendon Press, Oxford,
model could be made bigger thrust ( see table 2). 1994.
However the cogging force by the 12mm offset length [4] Philip L. Arger, Induction Machines, Gordon and Breach
is still higher than the other model. Therefore the Science Publishers, New York, 1961.
[5] Moscorop, J., Commins, P., Cook, C., Torque Perturbations
cogging force will be investigated only in the 9 mm and and Dynamic Stiffness of Linear Motors for Grinding Machines,
12 mm offset. Table 4 shows that cogging forces on University of Wollongong, Australia, 2003.
both offset model can be reduced into under 10% [6] Lee, B.J., Koo, D H, Cho Y H, Investigation of Secondary
Conductor type of linear Induction Motor Using the Finite Element
compared the useful thrust. Method, Proceeding of IEEE the 2008 International Conference on
Electrical Machines, 2008.
[7] G. Brandenburg, S. Brueckl, J. Dormann, J. Heinzl, C. Schmidt,
Isovalues Results
Quantity : Equi flux Weber

Time (s.) : 49.5E-3 Pos (mm): 73.313


Line /Value
1 / -670.48 61E-6
2 / -656.08 422E-6
Comparative Investigation of Rotary and Linear Motor Feed Drive
Systems for High Precision Machine Tools}, AMC2000 - IEEE,
3 / -641.68 143E-6
4 / -627.27 864E-6
5 / -612.87 58E-6
6 / -598.47 301E-6
7 / -584.07 022E-6
8 / -569.66 743E-6
9 / -555.26 465E-6
10 / -5 40.86186 E-6
11 / -5 26.45901 E-6

Nagoya, 2000.
12 / -5 12.05623 E-6
13 / -4 97.65344 E-6
14 / -4 83.25065 E-6
15 / -4 68.84787 E-6
16 / -4 54.44505 E-6
17 / -4 40.04226 E-6
18 / -4 25.63947 E-6
19 / -4 11.23666 E-6
20 / -3 96.83387 E-6
21 / -3 82.43108 E-6

[8] Sang-Moon Hwang, Geun-Bae Hwang, Weui-Bong Jeong and


22 / -3 68.02827 E-6
23 / -3 53.62548 E-6
24 / -3 39.22269 E-6
25 / -3 24.81988 E-6
26 / -3 10.41709 E-6
27 / -2 96.0143E-6
28 / -2 81.61149 E-6
29 / -2 67.2087E-6
30 / -2 52.80591 E-6

Yoong-Ho Jung, Cogging Torque and Noise reduction in Permanent


31 / -2 38.40311 E-6
32 / -2 24.00031 E-6
33 / -2 09.59752 E-6
34 / -1 95.19472 E-6
35 / -1 80.79192 E-6
36 / -1 66.38913 E-6
37 / -1 51.98633 E-6
38 / -1 37.58353 E-6
39 / -1 23.18074 E-6
40 / -1 08.77794 E-6
41 / -9 4.37514E-6
42 / -7 9.97235E-6
43 / -6 5.56955E-6
44 / -5 1.16675E-6
45 / -3 6.76396E-6
46 / -2 2.36116E-6
47 / -7 .95836E-6
48 / 6.4444 3E-6
49 / 20.847 23E-6
Magnet Motors by Teeth Pairing, IEEE, 2000.
[9] Rusli, M., Moscrop J.,Cook C. and Platt D., An Analytical
50 / 35.250 02E-6
51 / 49.652 82E-6
52 / 64.055 62E-6
53 / 78.458 42E-6
54 / 92.861 21E-6
55 / 107.26 401E-6
56 / 121.66 68E-6
57 / 136.06 96E-6
58 / 150.47 241E-6

Method for Predicting Cogging Forces in Linear Induction Motors,


59 / 164.87 519E-6
60 / 179.27 799E-6
61 / 193.68 078E-6
62 / 208.08 358E-6
63 / 222.48 639E-6
64 / 236.88 917E-6
65 / 251.29 199E-6
66 / 265.69 478E-6

Proceeding of 8th LDIA conference, Netherland, 3-6 july 2011.


67 / 280.09 756E-6
68 / 294.50 035E-6
69 / 308.90 317E-6
70 / 323.30 595E-6
71 / 337.70 874E-6
72 / 352.11 156E-6
73 / 366.51 434E-6
74 / 380.91 713E-6
75 / 395.31 995E-6
76 / 409.72 274E-6
77 / 424.12 552E-6

[10] Sung Whan Youn, Jong Jin Lee, Hee Sung Yoon, and Chang
78 / 438.52 834E-6
79 / 452.93 113E-6
80 / 467.33 391E-6
81 / 481.73 673E-6
82 / 496.13 952E-6
83 / 510.54 23E-6
84 / 524.94 509E-6
85 / 539.34 788E-6
86 / 553.75 072E-6
87 / 568.15 351E-6
88 / 582.55 63E-6
89 / 596.95 909E-6
90 / 611.36 187E-6
91 / 625.76 466E-6
92 / 640.16 751E-6
93 / 654.57 029E-6
94 / 668.97 308E-6
95 / 683.37 587E-6
96 / 697.77 865E-6
Seop Koh, A New Cogging-free Permanent-magnet Linear Motor,
IEEE Transactions on Magnetics, Vol. 44, No. 7, July, 2008.
97 / 712.18 144E-6
98 / 726.58 429E-6
99 / 740.98 707E-6
100 / 7 55.38986 E-6
101 / 7 69.79265 E-6

[11] Xu, W., Zhu, J., Tan, L., Guo, Y., Wang, S., Wang, Y.,
Optimal Design of a Linear Induction Motor Applied in
Transportation, IEEE, 2009.
Figure 7 : proposed 8mm-off-set model

A2-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

[12] __,Cedrat Inc., CAD Package for electromagnetic and Thermal ACKNOWLEDGMENT
Analysis using Finite Elements, CEDRAT Copyright, July 2007.
[13] Kumin, L, Stumberger, G., Dolinar, D., and The author would like to thank to the Directorate
Jezernik, K., Modeling and Control Design of a Linear Induction general of high education of the Cultural and
Motor, ISIE99, IEEE, Bled, Slovenia, 1999.
[14] Zhu, Z.Q., Xia, Z.P., Howe, D., Mellor, P.H.,
educational ministry of Republic of Indonesia in related
Reduction of Cogging force in slotless linear permanent magnet to financial supporting for completing this research
motors, IEE Proc.-electr. Power Appl., Vol 144, 4 July 1997. project and the School of Mechanical, Materials and
[15] E. R. Laithwaite, and S.A. Nasar, Linear-Motion Electrical
Mechatronic Engineering, Faculty of Engineering,
Machines, Proceedings of IEEE, Vol. 58, No. 4., April 1970.
[16] B. T. Ooi, A Generalized Machine Theory of Linear University of Wollongong which has provided the
Induction Motor, Presentation paper on PES Winter Meeting, New research facilities and finite element software and The
York, 1973. University of Brawijaya which has encouraged for
[17] Cruise, R.J., and Landy, C. F., Reduction of Cogging Forces
in Linear Syncronous Motors, IEEE, 1999. completing this research project.
[18] Liu, J., Lin, F., Yang, Z., Zheng, T. Q., Field Oriented
Control of Linear Induction Motor Considering Attraction Force & Mochammad Rusli was Completing the
End-Effects, IEEE, 2006. under graduate at the Institut technology
[19] Philip L. Arger, Induction Machines, Gordon and Breach Sepuluh Nopember Surabaya on 1986, and
Science Publishers, New York, 1961. Master program for Dipl.-Ing. At the
[20] S. Nonaka, and T. Higuchi, Elements of Linear Induction Techniche Universitaet Braunschweig
Motor Design, IEEE Transactions on Magnetic, Vol. MAG-23, No. 5, Germany on year 1996. Now he is as PhD
September 1987. postgraduate student at the University of
Wollongong Australia with research interest
reducing cogging effects by improving design
procedure and implement control strategies in linear induction motor.

A2-7
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

High-Input-Range Low-Offset-Voltage Flipped


Voltage Followers Using FG-MOSFETs
Zainul Abidin1), Koichi Tanno2), Agung Darmawansyah1)
1) Electrical Engineering of Brawijaya University
2) Electrical and Electronic Engineering of University of Miyazaki
zainulelektro@gmail.com, tanno@cc.miyazaki-u.ac.jp, agungdarmawansyah@yahoo.com

Abstract In this paper, high-input-range and


low-offset-voltage flipped voltage followers are presented.
The conventional voltage follower has two disadvantages;
narrow input range and offset voltage. In this paper, these
problems are solved. The former problem is modified by
adding two MOSFETs in the diode-connecting path. The
latter problem is modified by using floating-gate MOSFETs
(FG-MOSFETs). Using this device, the threshold voltage can
be eliminated. The circuits are simulated in a 0.25 m CMOS
process. Simulation results demonstrate that the
conventional circuit has narrow input range (0.46V) and
offset voltage (0.7V). The enhancement MOSFETs scheme
has 48.9% higher input range and offset voltage (0.7V). The
FG-MOSFET and doubler scheme has 42.5% wider input
range with the gain 1 and low offset voltage (<0.01V). It
can realize the actual condition of MOSFET implementation
because of the capacitors.

Index Terms Voltage Follower, Flipped Voltage


Follower, High Input Range, Offset Voltage, Analog Circuits

I. INTRODUCTION
Analog building blocks using CMOS technology are
the key components in mixed-mode digital and analog
Fig. 1 Conventional Voltage Follower.
LSIs1), 2). In these building blocks, the transmission of
signals is extremely important. In order to make this
transmission be possible, a conventional CMOS voltage
II. FLIPPED VOLTAGE FOLLOWER
follower which is called Flipped Voltage Follower was
proposed3). The circuit is very simple and consists of three Fig. 1 shows the conventional CMOS voltage
enhancement-mode MOS transistors and one current follower3). The circuit operation can be described as
mirror. Furthermore, it is very useful for heavy load drive follows.
without increasing power consumption. Actually, the M3 operates as a current source, which is controlled
voltage follower is used to build Operational by the bias voltage (VB). Because the drain-to-source
Transconductance Amplifier (OTA)4). However, it has the current of M1 (Ids1) is equal to Ids3 through the current
disadvantage of narrow input range and offset voltage. mirror consisting of M4 and M5, the gate-to-source voltage
These problems restrict application to various analog of M1 (Vgs1) is equal to Vgs3. Therefore, the output voltage
circuits. (Vo) is determined by the input voltage (Vin) and VB and it is
In this paper, some voltage followers are proposed. independent of the load. As a result, the circuit can drive
The proposed circuits are based on the voltage follower not only capacitive load but also a resistive load. Next, Vout
presented in Reference 3). Only two MOS transistors are will be derived using Ids-Vgs characteristics of an MOS
added to support input range enlargement. Ideal Vout and transistor.
Iout also will be given. Next, the offset voltage can be Assuming the back gate is connected to the source of
decreased by using depletion MOSFETs or FG-MOSFETs M1, both M1 and M3 operate in the saturation region, and
schemes. The performances of the proposed voltage that the transconductance parameters of M1 and M3 are
followers are characterized through HSPICE simulations. same, that is to say, the channel width W and the channel
In this paper, the simulation results are reported in detail. length L of M1 are equal to those of M3. Then, Ids1 and Ids3
are given by6)

B1-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

= ( ) (1) A. Enhancement MOSFETs scheme


= ( 0 ) (2) The enhancement scheme is shown in Fig. 2. The
= (3) circuit operates similar with the conventional circuit.
However, gate of M2 in the proposed circuit is not directly
where K is the transconductance parameter proportional to connected to the drain of M1. In the connection line, there
W/L, is carrier effective mobility, COX is capacitance of are two transistors (M6 and M7). M2 and M6 are combined
the oxide layer per unit area, VT is the threshold voltage of as current mirror circuit. It makes Ids6 can be controlled by
the NMOS transistor. Because Ids1 is equal to Ids3 by the W of M6 and M2 (under the condition of current mirror). If
current mirror, we obtain the following equation. those W and L of M7 are similar with those M6, Ids6 will be
= (4) equal to Ids7. It means that Vgs6 also similar with Vgs7. The
Using (1)-(4), Vout is given by gate of M7 is directly connected to Vp. It means that Vp
= (5) depends on Vgs7. In order to make M1 and M4 to be in
Vout is insensitive to device parameters in the fabrication saturation region, Vp must be adjusted. Therefore, Vp can
process because Vout has no dependence on VT and K. be optimized not only by M2 but also M6 and M7. In this
Next, the role of M2 is discussed. From Fig. 1, Ids2 is way, the addition of two MOSFETs greatly expands the
given by possibility voltage follower design with the high input
= + (6) range.
where IRL is the current through the load resistance RL. Next, offset voltage will be decreased. Offset voltage
The added path from the drain of M1 to gate of M2 makes makes the input range start from more than 0. Because of
M1-M2 behave like a diode-connected single device, and that condition, the proposed circuit will be modified by
using and floating-gate MOSFETs (FG-MOSFETs). This
hence Vp is varied by Ids2, which is determined by Vin and
kind of transistor will decreases the offset voltage by
RL. The current of Ids1 + IRL flows through M2 under the
replacing some transistors.
condition that Vo is larger than 0, i.e., M2 operates as the
current absorber. However, this circuit has a disadvantage B. FG-MOSFETs scheme
that the input range of Fig. 1 is narrow. Because Vp is Fig. 3(a) shows the basic structure of the
restricted by Vgs of M2. Moreover, this voltage follower has FG-MOSFET proposed by Shibata and Ohmi as a
the offset voltage of VB from Eq. (5). These problems functional MOS transistor featuring a gate-level weighted
restrict the circuit application. sum and threshold operation7). It consists of an n-channel
MOS transistor with a floating gate first poly layer) over
III. PROPOSED CIRCUITS the channel and, in some cases, extends to the field-oxide
In this section, the problems of input range and offset area. Multiple input gates are formed by the second poly
voltage are solved. There are some modifications based on layer over the floating gate. The capacitive coupling
the conventional circuit. The proposed circuits are between the multiple input gates and the floating gate is
enhancement scheme, FG-MOSFETs scheme, shown in Fig. 3(b). C0 shown in Figs. 3(a) and 3(b) is the
FG-MOSFETs and doubler scheme. capacitance between the floating gate and the substrate.
Fig. 3(c) is the symbolic representation of a FG-MOSFET.
Now, in the case of a k-input FG-MOSFET, capacitances
between the multiple input gates and the floating gate are
defined as C1, C2,,Ck, in order, from the drain side as
shown in Fig. 3(c). (Fig. 3(c) is an example of the case of k
= 2). Fig. 3(d) shows an example of the physical layout of
an FG-MOSFET.
When the floating gate to source voltage (Vfs) is
larger than the threshold voltage of the FG-MOSFET, as
seen from the floating gate (VT), the drain to source voltage
(Vds) is larger than Vfs VT and the initial charge of the
floating-gate equals 0, the FG-MOSFET operates in the
saturation region. Ids of the k-input FG-MOSFET under the
saturation region is

= ! (7)
Fig. 2 Proposed Circuit.

B1-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

%&'()* +, .%' +'/


where Ci is the capacitance between the floating gate and
#$ =
%&'()*
&'() .%'
(8)
i-th input gate, C0 is the oxide capacitance between the
floating gate and the substrate,
Fig. 5 (b) shows detail circuit of FG-MOSFET
FG M3. Vfg3 can
be defined as follow.

% +
#$ = % &'()-.%, (9)
&'()- -

Because Vfs1=Vfs3 by the current mirror and all


capacitances have same value, substitution Eq (7)-(9) will
obtain Vout as follow.

+'/
= (10)

VDD

Ids7
M5 M4

Ids1 M7
Vq Vp

M1
Vin
Vout
IRL
RL
Ids2
Ids6

Ids3
VB
M3 M2 M6

Fig. 4 FG-MOSFET
MOSFETs Scheme.

Fig. 3 FG-MOSFET (a) An illustration of the cross-sectional


cross structure of
an FG-MOSFET with two inputs, (b) capacitive model of the
FG-MOSFET, (c) symbolic representation of the FG-MOSFET
and (d) physical layout of the FG-MOSFET.
MOSFET.

Vs is the source voltage of the FG-MOSFET


MOSFET and VT is the
threshold voltage of the FG-MOSFET,
MOSFET, as seen from the (a)
floating-gate. In Eq. (7), K and Wi are defined and referred
to a transconductance parameter and capacitive weight,
respectively5). VB Cbias1
Fig. 4 shows the modification circuit. In the circuit,
Vfg3
fg M3
M1 and M3 are FG-MOSFETs
MOSFETs instead of enhancement C1
MOSFETs. M1 is connected to VB and Vin. M3 is connected
to VB and ground. Fig. 5 (a) shows detail circuit of
FG-MOSFET M1. If C0 is much smaller than the other
weight capacitances, Vfg1 can be defined as follow. (b)

Fig. 5 (a) Detail of Transistor M1, (b) Detail of Transistor M3

B1-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

C. FG-MOSFETs and Doubler scheme IV. SIMULATION RESULTS


Based on the theoretical analysis, the output voltage The circuits are simulated in a 0.25 m CMOS
of FG-MOSFETs scheme is not equal to input voltage process by using HSPICE. The simulations compare the
(gain < 1). It means that the circuit did not work properly conventional voltage follower and the proposed one based
as voltage follower. In this case, voltage doubler is on single supply voltage. M6 and M7 are the differences of
required to make the Vin become twice (see Fig. 6). both circuits. According to offset voltage, simulations also
show improvement of the proposed circuit. The simulation
results are demonstrated by the input range and offset
voltage.

Fig. 6 Voltage Doubler and The Voltage Follower Shown in Fig. 4 A. Evaluation of the proposed high-input-range voltage
follower
The simulations of conventional and proposed circuit
are based on the condition shown in Table 1. The
simulation results are shown in Fig. 9. This figure shows
Vin-Vout characteristic. It is also compared to the ideal
Vin-Vout characteristic that calculated by using (5). This
figure also shows that the input range of the proposed
voltage follower is 0.90V and the conventional one is
0.46V. It means that the input range of the proposed circuit
(Fig. 2) is 48.9% higher than that of the conventional one.

Table 1. Simulation Condition for Input Range


Fig. 1 Fig. 2
Rl 10k 10k
Fig. 7 Voltage Doubler
VDD 3.0 V 3.0 V
Vin 1.5 V 1.5V
Fig. 7 shows one of the realization circuit of the voltage VB 0.7 V 0.7V
doubler. Because Ids of M11 becomes equal to Ids of M10 by
W /L of M1 2m/5m 2m/5m
current mirror (M8 and M9), then Vgs of M10 becomes equal
to Vfs of M11. Therefore, the output voltage of the circuit W /L of M2 50m/5m 50m/5m
can be given by Vout=2Vin under the condition that C0 is W /L of M3 2m/5m 2m/5m
much smaller than the other weight capacitances. However W /L of M4 6m/5m 6m/5m
this voltage doubler has narrow input range. The design of W /L of M5 6m/5m 6m/5m
the voltage doubler suitable for the proposed voltage
W /L of M6 - 50m/5m
follower is the future work. FG-MOSFETs and doubler
scheme is shown in Fig. 8 W /L of M7 - 50m/5m

Fig. 8 FG-MOSFETs and Doubler Scheme

Fig. 9 Simulation Results Figs. 1 and 2 (Input Range)

B1-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

B. Evaluation of the voltage follower using the V. CONCLUSIONS


FG-MOSFETs In this paper, high-input-range and
In order to decrease the offset voltage, the low-offset-voltage flipped voltage followers are presented.
FG-MOSFETs scheme (Fig. 4) will be implemented. The These followers are evaluated through HSPICE. The
simulation is based on condition in Table 2. design and analysis results can be summarized as follow:
The simulation result of FG-MOSFETs scheme 1) The conventional circuit has narrow input range
without the voltage doubler is shown in Fig. 10. It shows (0.46V) and offset voltage (0.7V).
the output voltage is almost similar with the theoretical one 2) The enhancement MOSFETs scheme has 48.9%
and the gain is 0.5. From this figure, we can find that the higher input range and offset voltage (0.7V).
offset voltage can be eliminated. The simulated offset 3) The FG-MOSFET and doubler scheme has 42.5%
voltage is less than 0.001V. The input range of the voltage higher input range and low offset voltage (<0.01V). It
follower is 1.68V. It is 140.6% higher than the can realize the actual condition of MOSFET
conventional one. implementation because of the capacitors.
The simulation of FG-MOSFETs and doubler In the future, we try to design new circuit using back
scheme is based on condition in Table 3. Fig. 11 shows the gate control technique and actually implement the
input range of the voltage follower is 0.8V. It is 42.5% proposed voltage followers.
higher than the conventional one. Fig. 12 shows the output
voltage is almost similar with the input voltage and the Table 3. Simulation Condition for Offset Voltage
gain is 1. From this figure, we can find that the offset
voltage can be eliminated.
Fig.13
Rl 100 k
Table 2. Simulation Condition for Offset Voltage VDD 3.0 V
Fig.4 Vin 0.7 V
Rl 100k VB 2V
VDD 3.0 V W /L of M1 20m/5m
Vin 0.2V W /L of M2 80m/5m
VB 1.5V W /L of M3 20m/5m
W /L of M1 20m/5m W /L of M4 50m/5m
W /L of M2 80m/5m W /L of M5 50m/5m
W /L of M3 20m/5m W /L of M6 80m/5m
W /L of M4 50m/5m W /L of M7 80m/5m
W /L of M5 50m/5m W /L of M8 50m/5m
W /L of M6 80m/5m W /L of M9 50m/5m
W /L of M7 80m/5m W /L of M10 20m/5m
W /L of M11 20m/5m

Fig. 10 Simulation Result of Fig. 4


Fig. 11 Simulation Result of Fig. 8 (Input Range)

B1-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

authors would like to acknowledge anonymous reviewers


for valuable comments.

REFERENCES
[1] S. C. Fan, R. Gregorian, G.C. Temes, and M. Zomorrodi, Switched
capacitor filters using unit-gain buffers, in Proc. IEEE Int. Symp.
Circuit Syst., 1980, pp. 334-337.
[2] A. Hyogo and K. Sekine, SC immitance simulation circuits using
UGBs and their applications to filters, IEICE Trans., vol. J-72A, no.
3, pp. 535540, 1989.
[3] K. Tanno, H. Matsumoto, O. Ishizuka, and Z. Tang, Simple CMOS
Voltage Follower with Resistive-Load Drivability, IEEE
Transactions on Circuits and Systems II: Analog and Digital Signal
Processing, vol.46, No.2, February 1999.
[4] R. G. Carvajal et al., The Flipped Voltage Follower: A Useful Cell
for Low-Voltage Low-Power Circuit Design, IEEE Transactions on
Circuits and Systems I: Regular Papers, Vol. 52, No. 7, July 2005.
[5] K. Tanno, O. Ishizuka, and Z. Tang, A 1-V, 1-Vp-p Input Range,
Four Quadrant Analog Multiplier Using Neuron Transistors, IEICE
Trans. Electron., vol.E82-C, No.5, May 1999.
Fig. 12 Simulation Result of Fig. 8 (Offset Voltage) [6] R. Gregorian and G. C. Temes, Analog MOS Integrated Circuits for
Signal Processing. New York, NY: Wiley, 1986.
[7] T. Shibata and T. Ohmi, A functional MOS transistor featuring
ACKNOWLEDGMENT gate-level weighted sum and threshold operation, IEEE Trans.
This work is supported by VLSI Design and Education Electron Devices, vol.39, no.6, pp.14441455, June 1992.
Center (VDEC), the University of Tokyo in collaboration
with Synopsis, Inc. and Cadence Design Systems, Inc. The
[8]

B1-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Automated Measurement of Haemozoin


(Malarial Pigment) Area in Liver Histology
Using Image J 1.6
Dwi Ramadhani1 , Tur Rahardjo1, and Siti Nurhayati1
1
Center for Technology of Radiation Safety and Metrology,
National Nuclear Energy Agency of Indonesia
dhani02@batan.go.id

the elucidation of its life cycle [1,5]. Hemozoin is a


Abstract Common histopathological changes in the polymer of heme produced by the parasite during
liver due to Plasmodium infection is the presence of hemoglobin breakdown inside the host red blood cells
haemozoin (malarial pigment) in liver histology section. (RBC). Red blood cells lysis during infection results in
Identification of haemozoin generally done manually under release of merozoites with this pigment, which are
microscope. Measurement of haemozoin area rarely done phagocytized by circulating monocytes, neutrophils and
because it is quite difficult to separate the haemozoin area
resident macrophages [6,7]. The amount of haemozoin
from other element in liver histology. Identification and
measurement haemozoin area can be done by image in tissues increases throughout infection, so the greater
analysis using ImageJ. ImageJ is a public domain Java image amount of pigment, greater degree of chronicity of lesion
processing program that enables a plugin development. [1].
Plugins are small Java modules for extending the Liver histology is congested with a brown or black
functionality of ImageJ by using a simple standardized pigmentation as a result of accumulation of haemozoin
interface. Aim of this research is developed ImageJ plugin [3]. Haemozoin identification in liver histology
to measure the haemozoin area in liver histology. Totally commonly does manually under the microscope.
60 random liver histology images were analyzed using our Measurement of haemozoin in liver histology can be
plugin. Algorithm of plugin contain several sequential
done by measuring the brown area. Measurement of
stages, such as splitting channels, thresholding the image
for detection haemozoin area in blue channel and measure haemozoin can be done by image analysis using ImageJ.
haemozoin area. Average haemozoin area from 60 images ImageJ is a public domain Java image processing
defined with our plugin was 3884.5 m2. Our plugin program inspired by NIH Image for the Macintosh. It
succeeded in detecting and measuring the haemozoin area runs on any computer with a Java 1.1 or later virtual
in liver images at approximately 3.91 seconds. machine, either as an online applet or as a downloadable
application. ImageJ has a large number of native
Keywords.: Haemozoin, ImageJ, Liver Histology functions supplemented by an ever increasing number of
Malaria, Plasmodium berghei, Plugin plugins (optional extras needing installation). A plugin
is a file (named *.class) which needs to be in the
I. INTRODUCTION plugins sub-folder of the ImageJ folder, otherwise
Malaria is considered as one of the most important ImageJ will not load it [8].
infectious diseases in the worldwide. It affects 350 to Aim of this research is to build plugin for ImageJ that
500 million people and causes more than one million can be use for measure the haemozoin area in liver
deaths every year. Malaria is caused by protozoan histology of laboratory mice that already infected with
parasites belongs to the genus Plasmodium, which are Plasmodium berghei. The advantages of using
transmitted by blood-feeding Anopheline mosquitoes. laboratory mice as a model for malaria include a well
The disease is characterized by a range of clinical studied immune system of the host, the opportunity to
features from asymptomatic infection to a fatal disease assess pathologic changes at all stages of the disease, and
[1,2]. the availability of genetic variants [1].
Malarial involvement of liver is now a known entity
with specific histopathological changes. The commonly II. MATERIALS AND METHODS
histopathological changes in the liver due to 2.1. Mice
Plasmodium infection is the present of haemozoin [3]. Male Swiss mice age 8 to 12 weeks was purchased
Haemozoin or malaria pigment has a history in the from Pusat Penelitian dan Pengembangan Gizi dan
scientific literature older than the malaria parasite itself, Makanan, Kementerian Kesehatan Indonesia.
having first been described in the early 18th century by
the noted Italian physician Lancisi [4]. Eventually, this
2.2. Parasites and infections
pigment played a role in the discovery of the parasite and
Mice were inoculated intraperitoneally with 106

B2-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

erythrocytes infected by P. berghei. Mice were subjected because with this value all the haemozoin area can be
to euthanasia at one week after inoculation. Fragments of convert to black area in a binary image. Commonly 1
the liver were fixed by immersion in 10% buffered value will showed as a black color in a binary image.
formalin during 24 hours. These samples were then After thresholding process we selected the black area in
dehydrated, and processed for paraffin embedding. Five binary image as a region of interest (ROI) using
m sections were cut and stained with hematoxylin-eosin CreateSelection command so the black area can be
(H&E). measure using Measure command

2.3. Image acquisition 2.4.3. Measuring haemozoin area


To measure the haemozoin area, we used the Measure
A Nikon Biophot microscope attached with Nikon
command in ImageJ Analyze menu. Measure command
D3000 digital single lens reflects (DSLR) camera system
will calculates and displays area statistics, line lengths
was used to capture images of the smears. The slides
and angles, or point coordinates the ROI. ROI defined as
were examined under 40 objective lens. Images were a black area in binary image (Fig 2).
captured at a resolution of 19361296 and saved as
JPEG files. 2.4.4. Showing outlining haemozoin area in images
To show the outlining haemozoin area in original
2.4. Image analysis image, we used Add Image function in ImageJ Overlay
A plugin for measuring the haemozoin area in liver menu.
histology was developed. Totally 60 random liver
histology images were analyzed using our plugin in 2.4.5. Detecting total tissue area in green channel
ImageJ 1.60. The algorithm of plugin can be divided into This method is performed by detecting the total tissue
the following four sequential stages (Fig 1): (1) Splitting area by threshold the image and making the binary image
channels, (2) Detecting haemozoin area in blue channel, with ImageJ. Different with the haemozoin area, total
(3) Measuring haemozoin area, (4) Showing outlining tissue area is strongly easy to determine in green channel.
haemozoin area in images, (5) Detecting total tissue area We used 180 as a threshold value (ath), because with this
in green channel, and (6) Measuring tissue area. value total tissue area can be convert to black area in a
binary image. After that we selected the total black area
2.4.1. Splitting channels using CreateSelection command.
The purpose of this method is the separation of the
red, green and blue channels of the RGB image. 2.4.6. Measuring total tissue area
Haemozoin area is easy to identify in blue channel The purpose of this method is measuring the total
compared to red and green channels. In blue channel, the tissue area using Measure function in Analyze menu in
haemozoin area color is dark and the other component is ImageJ. Detail script and flowchart of the plugin is show
light. Splitting channel also used for converting the RGB in Fig 1 and 2.
image to monochrome image for thresholding process.
After splitting the channel we look at each channel
individually to determine which one of the channel
creates better contrast than another. The channel
containing the highest contrast is the best one to choose
for use for thresholding later on [9].

2.4.2. Detecting haemozoin area in blue channel


This method is performed by thresholding the image
and making the binary image with ImageJ. Thresholding
is quick method to identify areas of an image to include
and areas of an image to ignore.With sufficient contrast,
objects of interest may then be detected, resulting in
masking binary image components, where each pixel is
either on or off [9]. Fig 1. Script Haemozoin Analysis Plugin
Thresholding an image is a special type of quantization
that separates the pixel values in two classes, depending
upon a given threshold value ath. The threshold function III. RESULTS
threshold (a) maps all pixels to one of two fixed intensity
Average haemozoin area from 60 images defined with
values a0 or a1; i.e.,
our plugin are 3884,5 m2, graphics of haemozoin area
in 60 images are show in Fig 3. Our plugin success
detected and measured the haemozoin area in a liver
histology in approximately 3, 91 seconds.
with 0 < ath < amax . A common application is binarizing
an intensity image with the values a0= 0 and a1 = 1 [10].
In this case we used 160 as a threshold value (ath),

B2-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

IV. DISCUSSION
Images that comprise light objects on dark
background or dark object on a light background can be
In this plugin we choose to use splitting channels than
segmented by threshold operation. Based on that we
ColorDeconvolution plugin. We used splitting channels
segmented and detected the haemozoin area in blue
because ColorDeconvolution plugin failing to produce
channel by thresholding the image using ImageJ. ImageJ
an image that haemozoin area easy to identify. Color
automatically make binary image and then convert to
Deconvolution plugin commonly use for stain separation
mask after we apply thershold technique. The results is
in histological images. This plugin assumes images
image that divides into objects in black color and
generated by color subtraction (i.e. light-absorbing dyes
background in white color.
such as those used in bright field histology or ink on
To get measurement area result in m not in pixel first
printed paper). Our experiment showed that in the blue
the scale of the image must be set using Set Scale
channel after we apply splitting channels process, a
command in Analyze menu. A known distance should be
haemozoin is easy to identify because only the
measured by fitting a line to the known distance using the
haemozoin area are coloring in dark and the other
straight line selection tool in the ImageJ toolbar. Then
component showed in light color.
open the Set Scale command, which will automatically
register the distance from the straight line selection.
Enter the Known Distance and the Unit of Length and
after selecting Global and then OK, the scale will
Original Image automatically be calculated from the registered distance
[11]. A known distances we defined by capture a
micrometer slide in under 40 objective lens. With the
micrometer image then we define a scale using Set Scale
Substract Background,
Rolling Ball Radius : 50 pixels
command.
We also apply backround subtraction using rolling
ball algorithm before we splitting channels to do
background illumination correction in the images.
Split Channels Background correction can be applied while acquiring
into Blue, Green images (a priori) or after acquisition (a posteriori). The
and Red Channels difference between these is that a priori correction uses
additional images obtained at the time of image capture
while in a posteriori correction, the additional images are
Threshold Green not available and therefore an ideal illumination model
and Blue Channels has to assumed. Substract background using rolling ball
algorithm is one of the a posteriori correction methods.
Substract background function is removes smooth
Create Selection to continuous backgrounds from images. Based on the a
Measured the haemozoin rolling ball algorithm described in Stanley Sternberg's
and total tissue area
article, Biomedical Image Processing, IEEE
Computer, January 1983.
Overall our plugin success measured the haemozoin
Show outline of area in liver histology images, and the time need for
haemozoin area analyze one images is approximately 3.91 seconds.
Other research that conductes by Silva et al [1] also
measured haemozoin area in liver histology images using
ImageJ, unfortunatelly the details process is not
Fig 2. Flowchart of haemozoin area plugin
explained so we can not compared with our methods.

12000

10000
V. CONCLUSION
8000 We have developed ImageJ plugin that can be used
Haemozoin Area

measured the haemozoin area in liver histology images


6000
of mice infected with Plasmodium berghei. Time need
4000 for analyze one images is approximately 3. 91 seconds
2000
using our plugin. Overall, our plugin worked very well to
measured the haemozoin area in liver histology images.
0
1 4 7 10 13 16 19 22 25 28 31 34 37 40 43 46 49 52 55 58
Images Number REFERENCES
[1] Silva, A.P.C., Rodrigues, S.C.O., Merlo, F.A., Paixo, T.A., and
Santos, R.L. Acute and chronic histopathologic changes in wild
Fig 3. Chart of haemozoin area in 60 images

B2-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

[2] type or TLR-2-/-, TLR-4-/-, TLR-6-/-, TLR-9-/-, CD14-/-, and [8] SULLIVAN, A.D., and MESHNICK, S.R., Haemozoin:
MyD-88-/- mice experimentally infected with Plasmodium Identification and Quantification. Parasitology Today, 1996,
chabaudi. Braz J Vet Pathol, 2011, 4(1), 5-12. 12(4).
[3] WMR UNICEF, World Malaria Report. Technical Report, [9] Collins, T.J., ImageJ for microscopy. BioTechniques, 2007,
WMR and UNICEF, 2005 43:S25-S30.
[4] Baheti, R., Laddha, P., and Gehlot, R.S. Liver Involvement in [10] SYSKO, L.R., and DAVIS, M.A., From Image to Data Using
Falciparum Malaria A Histo-pathological Analysis. JIACM Common Image-Processing Techniques. Current Protocols in
CM, 2003; 4(1): 34-8 Cytometry, 2010, 12.21.1-12.21.17.
[5] ADACHI, K., TSUTSUI, H., KASHIWAMURA, S., SEKI, E., [11] BURGER, W., and BURGE, M.J., Digital Image Processing An
NAKANO, H., TAKEUCHI, O., TAKEDA, K., OKUMURA, Algorithmic Introduction using Java (1st Edition). 2008:
K., VAN KAER, L., OKAMURA, H., AKIRA, S., NAKANISHI, XX+565.
K. Plasmodium berghei infection in mice induces liver injury by [12] Papadopulos, F., Spinelli, M., Valente, S., Foroni, L., Orrico, C.,
an IL-12 and Toll-like receptor/myeloid differentiation factor and Alviano, F., Common Tasks in Microscopic and
88-dependent mechanism. J. Immunol. Res., 2001, Ultrastructural Image Analysis Using ImageJ. Ultrastructural
167,592834. Pathology, 2007, 31:401407.
[6] ANDRADE JR HF., CORBETT CEP., LAURENTI MD.,
DUARTE MIS. Comparative and sequential histophatology of
Plasmodium chabaudi infected BALB/C mice. Braz. J. Med.
Biol. Res, 1991, 24: 120918.
[7] EGAN, T.J. Haemozoin (malaria pigment): a unique crystalline
drug target. Targets, 2003, 2(3).

B2-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Design of 3-phase Fully-controlled Rectifier


using ATmega8535
Mochammad Rifan, ST.,MT., Ir. Hari Santoso, MS., Nanda Pratama Putra, ST.
Electrical Engineering of Brawijaya University
rifan@ub.ac.id

A fully-controlled three-phase full-wave rectifier is


Abstract - Fully-controlled three-phase full-wave shown in Fig. 2.
rectifier typically uses SCR as an active component. This
paper will discuss the design and testing of rectifier by
using SCR and microcontroller ATMEGA8535[1]. The test
results show that a series of triggers can work well, which
is indicated from the observed values whose magnitudes
are all in accordance with theory. Under load resistive
output, the rectifier shows a zero value for the point of
ignition greater than 120 , whereas when the load is
inductive, the mode of inverter can be applied following
the nature of the inductive load.
Figure 2.Fully-controlled three-phase full-wave rectifier[5]
I. INTRODUCTION
Rectification is the process of converting current There are two main parts in the software designing
from the alternating form (AC) into direct current process. The first part is used for zero-crossing detector,
before being supplied to load[2]. Fully-controlled which will detect the zero condition of each phase using
three-phase full-wave rectifier can produce a direct- the flowchart as shown in Figure 3.
current (DC) voltage which can be controlled. It is
done by adjusting the conduction intervals of each Start
SCR. Because the SCR can block voltage in both
directions, then it may be possible to reverse the
polarity of the output DC voltage and then give
power back to the AC supply from the DC side. In
some conditions, this converter operates in the INT Pin low? No
"inverter mode"[3]. SCR in the converter circuit is No
Yes
commutated with the help of the supply voltage
during rectification mode of operation, and it is
known as "line commutated converter". Using the INT Pin
low checking > 5
same circuit, when it is operating in the inverter
mode, on the load side the commutation requires
Yes
emf, so that it is called "load commutated
inverters"[4]. Pin_output=high

II. METHODOLOGY
Pin_output=low
The outline of a rectifier system can be
described in a block diagram as shown in Figure 1.

Finish

Figure 3. Flowchart of zero-crossing detector

The second part is the main software programs used


on the microcontroller. The main program flow diagram
is shown in Figure 4.

Figure 1 System Block Diagram


B3-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

the phase sequence RST and RTS respectively shown in


START
Fig. 6 and Fig. 7.

ADC input signal (firing angle)


Detection of the condition of zero phase
R, S, and T

Show the point of


ignition through
the LCD

Timer OFF

- Define phase sequence


- Calculate the period of each wave phase
- Convert the ignition angle to be a constant time
- Perform calculations to determine the timing Figure 6. The output signal S1 of microcontroller (input is
sequence of the active 6 Ports as an SCR trigger connected in the RST phase-sequence, with ignition angle 0)
signal

Timer ON

Activate the 6 Ports with the time sequence in


accordance with the conditions of phase sequence

Figure
4. Flowchart of main program

III. RESULTS AND DISCUSSION


3.1 Testing and Analysis of Zero-Cross Detector circuit
Figure 7. The output signal S1 of microcontroller (input is
The purpose of testing the zero-cross detector circuit connected in the RTS phase-sequence, with ignition angle 0)
is to determine whether the circuit is functioning well as
a series of 3-phase voltage sensor used to detect the zero Based on the test results, it can be seen that the signal
state of each phase that will be given to the S2 on both RST and RTS phase-sequences shows the
microcontroller . The results of the zero-cross detector most appropriate time, which is in accordance with
output circuit are shown in Figure 5. theory, i.e. starting from the angle of 90 to 210 for the
RST phasesequence condition and from 330 to 90 for
the RTS phase-sequence condition.

3.3 Testing and Analysis of the Overall System


The purpose of testing the whole system is to
determine whether the Six-Pulse Control Unit system
can work well to trigger the gate of the 6 SCRs at the
time the three-phase full-wave controlled rectifier is
used to supply the load of resistive and inductive
characteristics with ignition at angles of 0 to 150 . The
Figure 5. The output signal which shows the Interrupt Occurrence block diagram of the entire system testing can be seen in
on Edge Up with Reference to Phase R Fig. 8.

The testing result shows that an interrupt has occurred


on the rising edge of the output signal, indicating that
the Zero Cross Detector[6] circuit can detect the state of
zero as expected during the design.

3.2 Testing and Analysis of Main Program on


Microcontroller
Testing of the main program was conducted to
determine whether the output signal is generated at the
phase sequence RST or RTS, and at different angles
according to the desired ignition time, so that it will
properly trigger the SCR. The output of the
microcontroller to signal S2 with ignition angle 45 with
B3-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The test results after the addition of a low-pass filter


at the zero-cross detector is shown in Figs. 11, 12, 13
and 14.

Figure 11. Output voltage under resistive load at an ignition angle


Figure 8. Block diagram of the entire system testing of 30
The results of the tests with the ignition angle of 30
can be seen in Fig. 9.

Figure 12. Output voltage under resistive load at an ignition angle of


90
Figure 9. Resistive output voltage under load at 30 ignition angle

Based on the testing results, it can be seen from Fig.


9 that the output voltage of the rectifier is not in
accordance with the theory, because of the appearance
of noise at the output which was caused by SCR
switching. Consequently, the zero-cross detector cannot
detect the state of zero because of this noise. A
capacitor needs to be added in order to form a low pass
filter[7], as shown in Fig. 10.

Figure 13. Output voltage when loaded with inductive load with L/R
= 0.314 at an ignition angle of 30

Figure 14. Output voltage when loaded with inductive load with L/R
= 0.314 at an ignition angle of 90

The results of the measured quantities can be seen in


Table I and II.
Figure 10. Additional capacitors ( in the dashed box) to form a low-
pass filter of order one on the zero-cross detector

B3-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

TABLE I. DATA MEASUREMENT RESULTS WITH R=200 60 57 55 63 62,3 0,25 0,27 0,26 0,30 0,075 0,092 0,20 0,25
90 11 11 27,5 25,18 0,045 0,055 0,06 0,16 0,007 0,018 0,05 0,12
LOAD AT DIFFERENT FIRING ANGLES 120 0,1 0 1,6 0 0,001 0 0,003 0 0,005 0 0,005 0
parameters Firing Angle 135 0,1 0 2,0 0 0,001 0 0,003 0 0,005 0 0,005 0
Measured 0 30 45 60 90 120 135 150 150 0,1 0 1,7 0 0,001 0 0,003 0 0,005 0 0,005 0

UdAV (V) 110 95 78 56 16 0,05 0,06 0,06 P=Experiment; T=Theory


UdRMS (V) 110 95 80 62 25,5 0,4 0,55 0,50
IdAV(A) 0,55 0,45 0,34 0,27 0,067 0,001 0,001 0,001 Based on Table IV, it can be seen that under the
IdRMS (A) 0,55 0,45 0,36 0,29 0,115 0,004 0,003 0,003 inductive load condition the results of experiment were
ITAV (A) 0,16 0,14 0,11 0,08 0,015 0,005 0,005 0,005 almost the same as the results of theoretical
Is (A) 0,40 0,35 0,29 0,23 0,09 0,005 0,005 0,005 calculations, at which time L/R = 0.314, both showed
a decreasing Is when firing angle getting bigger. The
TABLE II. DATA MEASUREMENT RESULTS WITH R=200 values of UdRMS, UdAV, IdRMS, and IdAV will get smaller
AND L=200 mH LOAD AT DIFFERENT FIRING ANGLES
Firing Angle
when the firing angle getting bigger and its value will be
parameters
Measured 0 30 45 60 90 120 135 150
zero for the ignition angles of 120, 135, and 150. The
UdAV (V) 110 94 79 57 11 0,1 0,1 0,1
existence of non-zero value during the laboratory
UdRMS (V) 110 96 81 63 27,5 1,6 2 1,7 experiment using the firing angles of 120 , 135, and
IdAV(A) 0,50 0,44 0,36 0,255 0,045 0,001 0,001 0,001 150 was caused by the fact that the RMS-meter did not
IdRMS (A) 0,50 0,44 0,36 0,26 0,06 0,003 0,003 0,003 indicate the 0 value, even when it was not used to
ITAV (A) 0,15 0,13 0,105 0,075 0,007 0,005 0,005 0,005 measure anything. When loaded inductively, inverter
Is (A) 0,39 0,34 0,28 0,20 0,05 0,005 0,005 0,005 mode can be applied, and the value of L/R is very
The obtained measurment data were then compared large. From Figure 13 and 14 it can be seen that each
to the calculation of the theory, as shown in Table III value of the output voltage ignition angle tested was in
and IV. accordance with the theory discussed previously. The
confomity to the theory will ensure that the Six-pulse
TABLE III. COMPARISON OF MEASUREMENT RESULTS TO Control Unit can be used successfully to provide
CALCULATION RESULTS UNDER LOAD R=200 AT triggers to the SCR gate at a three-phase full-wave
VARIOUS IGNITION controlled rectifier when loaded inductively.
Angl Parameters measured
e UdAV (V) UdRMS (V) IdAV (A) IdRMS (V) ITAV (V) Is (A)
P T P T P T P T P T P T
0 110 109,9 110 110 0,55 0,55 0,55 0,55 0,16 0,183 0,40 0,45 IV. CONCLUSIONS
30 95 95,2 95 96,8 0,45 0,47 0,45 0,48 0,14 0,159 0,35 0,39
45 78 77,7 80 81,4 0,34 0,39 0,36 0,41 0,11 0,129 0,29 0,33 Based on the test results, can be summed up some
60 56 54,9 62 62,3 0,27 0,27 0,29 0,31 0,08 0,092 0,23 0,25 of the following:
90 16 14,7 25,5 23,9 0,067 0,07 0,115 0,12 0,015 0,025 0,09 0,09
120 0,05 0 0,4 0 0,001 0 0,004 0 0,005 0 0,005 0 In testing a gate trigger circuit blocks can generate
135 0,06 0 0,55 0 0,001 0 0,003 0 0,005 0 0,005 0
150 0,06 0 0,50 0 0,001 0 0,003 0 0,005 0 0,005 0 signals in accordance with that required to trigger the
P=Experiment; T=Theory. SCR at a full three-phase controlled rectifier full wave.
But on testing the whole system when used directly to
Based on Table III, it can be seen that under resistive trigger the SCR at rectifier under load resistive or
load each parameter measured has almost the same inductive, the circuit triggers may not work as well.
value as the calculation result. It also shows that an After the addition of a low pass filter components at the
increasing firing angle will be accompanied with zero cross detector, trigger circuit can work well so that
decreasing Is. The values of UdRMS, UdAV, IdRMS, and the output of the rectifier close to the value
IdAV will become smaller when the firing angle becomes corresponding to the theory.
higher, and its value will be zero for the firing angle of
120, 135, and 150. The existence of non-zero value REFERENCES
during the laboratory experiment using the firing angles [1] Atmel. 2006. 8-bit AVR with 8K Bytes In-System
of 120, 135, and 150, was caused by the fact that the Programmable Flash ATMega8535, ATMega8535. San Jose:
Atmel.
meter did not indicate the o value, even though it was
[2] Mohan, Ned. 1989. Power Electronics Converters,
not used to measure anything. Figs. 11 and 12 shows Applications, and Design Second Edition. John Willey & Sons,
that each value of the output voltage ignition angle Inc. New York.
tested was in accordance with the theory discussed [3] Sen, P. C.1989. Principles Of Electric Machines and Power
Electronics. John Willey & Sons, Inc. New York.
previously. The confomity to the theory will ensure that
[4] Skvarenina, Timothy L. 2002. The Power Electronics
the Six-pulse Control Unit can be used successfully to Handbook. Boca Raton, Florida : CRC Press LLC.
provide triggers to the SCR gate at a three-phase full- [5] Shepherd, William. 2004. Power Converter Circuits. New York
wave controlled rectifier during resistive loaded. : Marcel Dekker.
[6] Atmel. 2003. AVR 182 : Zero Cross Detector. San Jose:
Atmel.
TABLE IV. COMPARISON OF MEASUREMENT RESULTS TO
[7] Niewiadomski, Stefan. 1989. Filter Handbook A Practical
CALCULATION RESULTS AT R=200 LOAD IN SERIES WITH
Design Guide. Great Britain : Courier International Ltd,
l=200 mH AT VARIOUS IGNITION Tiptree, Essex.
Angl Parameters measured
e UdAV (V) UdRMS (V) IdAV (A) IdRMS (V) ITAV (V) Is (A)
P T P T P T P T P T P T
0 110 109,9 110 110 0,50 0,55 0,50 0,55 0,15 0,183 0,39 0,45
30 94 95,2 96 96,8 0,44 0,47 0,44 0,48 0,13 0,159 0,34 0,39
45 79 77,7 81 81,4 0,36 0,39 0,36 0,40 0,105 0,129 0,28 0,33

B3-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Design Of Boost Inverter for Setting Motor


Induction 3 Phase
1
Dedid Cahya Happyanto, 2Agus Indra Gunawan, 3Bregas Wiratsongko P
Politeknik Elektronika Negeri Surabaya
1
dedid@eepis-its.edu, 2agus_ig@eepis-its.edu,3bregasprasetyo@gmail.com

To support the operation of three phase induction motor


Abstract At the end of this project created an electric is required Aki (alteratif fuel source) and some power
car that aims to reduce levels of air pollution, minimize electronic circuits such as boost converter and inverter 3
noise and saves fuel. This electric car uses 3-phase phase. With electric cars expected to reduce air pollution
induction motor movement is powered by Aki, Aki levels, minimize noise, and saves fuel. So that the
connected to the output of the boost converter circuit. DC electric motors used to operate without impact - negative
output voltage is then converted into AC voltage using a
impact on the environment and society.
three-phase inverter. Inverter output voltage is used to
distribute three-phase induction motors. Three-phase
induction motor speed is regulated by the by applying the
method of V/f constant. Changes in induction motor speed II. LITERATURE STUDY
can be done in 2 ways, by setting the boost converter
output voltage and by adjusting the frequency of the A. Basic Theory
inverter 3 phase. Changes in each of the voltage and Boost Inverter is a tool to raise the low voltage DC to AC
frequency is set by the microcontroller. Based on the test high. Boost inverter consists of a combination of a boost
results obtained from the boost converter output voltage
converter and inverter which can be used for 1 phase or 3
can be set is of 48 Vdc and-220Vdc constant output current
of 2 amperes, the output frequency of the inverter can also phase. at the end of this project boost inverter is used to
be set as the voltage changes from 0 - 50Hz. Thus raise the voltage of 48 volts DC from the battery or the
producing an electric motor which mengguanakan battery to 220 Volt Inverter AC.Pada Boost has a system
induction motor drive with an adjustable speed. So the of cooperation with the boost converter that raises the
electric motor can operate without causing any impact - voltage by using the inductor, but the difference in the
negative impact on the environment and society. boost converter and boost inverter is the result output is
issued. In the boost converter outputs a DC voltage
Index Terms Boost Converter and Three Phase output sinal is great but on the contrary, to boost the
Inverter. output inverter of the voltage generated by the output
signal of the AC signal. At the end of this project the
I. INTRODUCTION boost inverter is made using a method of increasing the

I n the era of sophisticated globlalisasi, transportation


has become an indispensable need for humans to
perform daily activities - day. One of the commonly
voltage.

B. Method
used means of transportation is a motorcycle and a car.
With so much pollution and noise generated from flue The method that created the boost inverter is increased,
gas. On the other hand the use of the fuel used for or in other words the voltage step-up. Intention to raise
automobiles are relatively quickly exhausted in a the voltage here is to raise the voltage from 48 to 220
relatively short period of time anyway. One way that can Volt 3 system must pass through the boost converter is
be used to overcome these problems is to replace the mounted, wherein the first boost designed a system of 48
combustion engine with an electric engine or in other Volts to 90 Volts DC, where the boost to the second
words turn your car into an electric car. Electrical designed to enter the second boost the output of the boost
machines used are 3-phase induction motor because it the first so when the boost output voltage of the first
has several advantages such as: issue was accepted by the second boost as well as enter
a. The structure of 3-phase induction motors are the boost of 3 to produce output 220 volts. When it
reaches the output 220 Volt DC keluaran dari boost
b. lighter (20% - 40%) than the DC current to power the konverter ini masuk ke inverter untuk di rubah menjadi
motors the same. keluaran sinyal AC.
c. Unit price of 3 phase induction motor is relatively
cheaper.
d. 3-phase induction motor maintenance more efficient. III. SISTEM PLAN
In the design of these systems boost inverter
made consisting of:

B4-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

a. Boost konverter IV. SIMULATION RESULT


b. Inverter
c. Optocoupler
d. Minimum System
e. Accu/power supply
f. Motor Induksi

This equipment will arise from a system design where


the system can be seen in schematic or block diagram
below:
Boost Fig2. Boost converter and the inverter circuit is simulated
aki 1,2 dan motor
inverter
3 The following is a schematic in the simulation, where a
combination of boost konverter converterter.

Mikro 1 Mikro 2

Fig1. Block diagram of boost inverter system


This block diagram describes a system where the tools
are made from 48 volts 48 volts DC into 220 volts AC
voltage with an increase in boost converter. Fig3. Results Boost Output Signal Converter 3 when given a 3
phase inverter.
The working principle of this boost, when inserting the The following is the output of the simulation result of the
battery voltage is 48 volts then the voltage will go to the last series between the boost converter and inverter.
first boost, the first boost process that will increase the Which of the insert 170 volts DC will generate a voltage
voltage to 90 volts DC, when the boost voltage is the of about 300 volts AC.
voltage of the first issue will be used as the input voltage
boost 2 to issue 170 Volt DC, after the first boost and
boost both interact with each other then 3 will receive a
boost in output from the boost to the two to be used as
input and issued a 220 Volt DC. After the first boost to
Fig4. The Boost converter output series combination Boost converter
boost to the three mutual interaction and generate a 1,2 3 and inverter
voltage of 220 volts, the output of the Boost will be
converted into an AC signal by entering at the inverter The following is the output of the simulation results of
output. After all interact with each other then the output the boost converter circuit on the third step, which of the
will be in put in 3 phase induction motors. insert 170 volts DC will generate a voltage of about 300
volts DC.
Search value L, R dan C :

Effisiensi =

a. Duty Cycle
Vout = ( )

b. Value Resistor Fig5. Boost converter and the inverter circuit as a whole overall the
simulation results
iL =
The following is a series combination of a boost
converter 1,2 and 3, and join together in 3 phase inverter.
c. Value Capasitor
R=

d. Value Induktor
Lmin =
Fig6. overall circuit simulation results

B4-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The following are the result of simulations in which the [3] Aswadi. E Learning Document.BJJ FT UNP PADANG P4TK
MEDAN.2009
output end 300 volts AC.
[4] Agus Cahya Setya Budi. Sistem Kontrol Kecepatan Motor
Induksi 3-Phase Penggerak Mobil Hybrid. Tugas Akhir : T.
V. ANALYSIS Elektronika Politeknik Elektronika Negeri Surabaya Institut
Teknologi Sepuluh Nopember; 2011.
Of this system which when given a boost converter input [5] Ainur Rofiq, Irianto, Cahyo Fahma S. Rancang Bangun AC DC
is expected to be approximately 170 tha give result 330 Half Wafe Rectifier 3phasa dengan THD minimum dan Faktor
Volt DC output. From the above circuit can be explained Daya Mendekati Satu Menggunakan Kontrol Switching PI
when the boost converter circuit in the given input it has Fuzzy.Tugas Akhir : Teknik Elektro Industri Politeknik
Elektronika Negeri Surabaya Institut Teknologi Sepuluh
not resulted in increased tension, but after the entrance to Nopember; 2006
the second input is increased in response to a direct
increase the voltage boost converter which directly gives
the inductor. After that the output of the boost in tamping AUTHOR
by 3 phase inverter (AC). And the simulation results in
which the red color is green U blue V and W. system Dedid CH, born in Pasuruan, Indonesia,
where the signals U and V. W signal precedes This December 27, 1962. Educational backgrounds:
Engineer in Electrical Engineering Institute of
method uses a series of stars. Technology Sepuluh Nopember Surabaya,
Surabaya Indonesia (1986).
MT Electrical Engineering Institute of
VI. CONCLUSION Technology Sepuluh Nopember Surabaya,
Surabaya Indonesia (2002)
Be concluded that the results of the simulation signal Post-graduate student in Electrical Engineering,
boost converter combined boost converter 1 through 3 in Institute of Technology Sepuluh Nopember
produces a signal that SteadyState but the signal will be Surabaya-Indonesia (2007- ow)
steady state in the long term. This is due to ignoring the
Agus Indra Gunawan, born in Nganjuk, Indonesia,
value of efficiency so that no steady boost konverter state August 21, 1976.
then if given the inverter is in getting the results that there
is still a bit of signal noise on the signal.

REFERENCES
[1] Zhong Du, Burak Ozpineci, Leon M.Tolbert, John N.Chiasson.
DC-AC Cscacde H-Bridge Multilevel Boost InverterWith No
Inductors For Electric/Hybrid Electric Vehicle Application.
Bregas W P, born in Surabaya, Indonesia, June 18,
Boise State University.2009.
1990. Educational backgrounds:
[2] Ramon O.Caceres, Ivo Barbi, IEEE. A Boost DC AC Converter:
Engineer in Electrical Engineering Institute of
Analysis, Design, and Experimentation. IEEE Transactions On
Technology Sepuluh Nopember Surabaya,
Power Electronic.1999.
Surabaya Indonesia (2008-ow).

B4-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Android Smartphone Based for The Local


Directory Application of Public Utility
1
Arini, MT, 2Viva Arifin, MMSi, 3Chery Dia Putra, S.Kom
1,2,3Informatics Engineering Program
State Islamic University (UIN) Syarif Hidayatullah Jakarta
Ir. H. Juanda Street No. 95, Ciputat,South Tangerang Banten
Email: arinizoel@yahoo.com, viva_mks@yahoo.co.id, cherydiaputra@gmail.com.com

Android is a complete platform starting from the


AbstractMobile has become the one thing that operating system, applications, developing tools,
characterizes the lives of everyone present, so that applications, market applications, support of industry
evolution is happening very quickly, not just a device used vendors mobile, even the support of the community of
to communicate, but the phone also has been deeply Open Systems. By looking at this development, android
involved in the life style, to multimedia. Smartphone is a
has become extra ordinary powers. In 2009, estimates
term of mobile (cellular phone) with multimedia and
computing capabilities are more advanced than the mobile
reported by Canalys, the smartphone market to grow
phones in general. Android is a smart phone that has a android 1073.5% when there is no other platform that
complete platform starting from the operating system, reaches 100% growth [9].
applications, developing tools, applications, market
applications, support for mobile industry vendors, and
even support from the community of Open Systems. Of
course this is an advantage not shared by other platforms.
This study examines the development of local application
directory that specifically discusses the Bintaro Sector1 to
Sector9. Application development using JAVA
programming language with tools ECLIPSE GALILEO
and other programming languages to access the server
using the Personal Home Page by using the MySQL
database server. For the method of data collection is done
by three stages, namely the field of research that includes
observations and interviews, library research, and similar
literature studies. For system development, researchers
used the method of Rapid Application Development (RAD)
which has 4 stages of the terms of the planning phase,
design phase, construction phase and implementation
phase. This application can facilitate users in finding Fig 1.The spread of the Smartphone Market
existing public facilities in the region Bintaro Sector 1 to
Sector 9. For the process of further development, these
applications can be expected to provide call features to be
200000
able to contact the existing facilities.
100000
Index TermsLocal Directory, Public Utility, Android
Smartphone 0
Android iPhone

I. INTRODUCTION Fig 2. Comparison Android Users in


Indonesia
M OBILE has become the one thing that
characterizes the lives of everyone present, so that
evolution is happening very quickly, not just a device
source : Telkomsel, 2011

As for the number of android smartphone users in


used to communicate, but the phone also has been deeply Indonesia, such as news quoted from Tempo Interactive
involved in the life style, to multimedia [9]. (www.tempo.co) based on data obtained from one of the
Smartphone is a term of mobile (cellular phone) telecommunication operators in Indonesia, Telkomsel
with multimedia and computing capabilities are more which states that the number of Android users has
advanced than the mobile phones in general. This is due surpassed one of its competitors, the iPhone is based on
to the combination of operating systems, hardware, and category of number of users of data services offered by
applications that are much nicer on the smartphone. Telkomsel.

C1-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Developed jointly between Google, HTC, Intel, and communication to multiple media and wireless
Motorola, Qualcomm, T-Mobile, Nvidia joined in the access.
OHA (Open Handset Alliance) with the purpose of Basically, a smartphone is like a small computer
making an open standard for mobile devices (mobile network in the form of mobile phones. It supports one or
devices) [9]. more short-range wireless technologies like Bluetooth
Often times when in a new place and need and infrared, making it possible to transfer data via a
information about the place, for example where the wireless connection in addition to cellular data
nearest restaurant or place of worship, many people like connection. Smartphones can provide mobility as a
the people outside the region or local community who computer, access to data everywhere, and
struggle to have to ask where or to whom. Usually people comprehensive intelligence to nearly every aspect of
use maps to determine the direction, but the map can also business processes and everyday life. In addition, this
be used to determine the location of public facilities such smart phone can be used as a terminal for e-commerce,
as places of worship or a restaurant that difficult to find enterprise applications, and, location-based services
and precisely determined, because the public facilities (Location Based Service). In short, be the future of
are usually not included in the map. smartphones in mobile technology today, as it offers a
In the case of the difficulty of finding the location of variety of features in improving wireless capabilities,
public facilities that exist, it requires the device and computing power and storage on-board. Today, people
services that can assist in finding or determining one's are seeing as high-end smartphones, multifunctional,
position. Bintaro is a strategic area visited by many business-oriented phones with high resolution color
people, in addition to work, people visiting Bintaro also displays and processors support the equivalent of
for shopping, schools, etc. (Area Manager Directory computer technology.In general, smartphone regarded as
Bintaro, 2010:10). one of the promising candidates to achieve that goal.
From the results of the spread of the questionnaire,
A. Location Based Service (LBS
many people do not know the exact area Bintaro location
of public facilities in the Area Bintaro. 76% of the Area Location-Based Services is an information service
Bintaro not know the general location of the position of that can be accessed through mobile devices over
the existing facilities in the Area Bintaro, and 24% of the cellular networks and has the ability to utilize the
population Bintaro Regions Sector 1 to Sector 9 know location of the mobile device position. The same sense is
the location of existing public facilities in the Area given by Open Geospatial Consortium (OGC, 2005)
Bintaro. Therefore there is need for smartphone-based regarding the LBS is a service IP - wireless that uses
application intended to determine the location of the geographic information to provide services to users of
facilities visited by the public who wish around Bintaro mobile devices. Each service application that utilizes the
or society that is outside Bintaro. mobile terminal position (OGC, 2005). Kupper said :
These system can assist communities in determining Location Based Service (LBS) is a common name for a
public facility that can be viewed via mobile phones new service where the location information into its main
using the Android operating system by using internet parameters. Other terms are also given, that the LBS is
access. actually one of the added value of GSM cellular service.
LBS is not a system, but it is a service that uses
II. TEORITICAL BACKGROUND additional system support the GSM system. Basically,
some systems use the same basic principles, namely:
The Smartphone become the next generation of Triangulation. Thus, the principle is not much different
mobile computing (mobile) which will drive the from the GPS system, it's just a satellite function is
convergence between communications, computers, and replaced by BTS.
the use of electronic devices, three different From some of the definitions above can illustrate
characteristics of traditional industries with low that the LBS as a combination of three technologies
interoperability. (Figure 1).
PCMag Encyclopedia provides definitions
smartphone as a cellular phone with built-in applications
and internet access. Smartphones provide digital voice
services and text messaging, e-mail, Web browsing, and
video camera, MP3 player and video and even watch
TV. A smartphones can also run various applications,
change your phone to mobile computer (mobile
computer).
Additionally Pei Zheng and Lionel Ni defines a
smartphone as a new class in mobile phone technology
that is able to facilitate data access and processing Fig 3. LBS (Source : Shiode Et Al, 2004)
information with computing capability significantly.
Besides having the traditional functions contained on the B. How LBS Work
mobile phone such as call and sms, smartphones are
The figure 4. bellow is the illustration of how the
equipped with personal information management (PIM)
LBS.

C1-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Application Development (RAD) was chosen because


the applications will be built is a simple application.

1) Planning Phase
Combining the methods of field study reports the
results of user policies into a structured specification
using functional modeling to determine user needs. From
the analysis of such systems can be defined design
purposes, a viable proposal acceptable information.
Stage performed include :
1. Overview of Facility, which aims to find data about
the facilities that will be included in the application to
be made.
Fig 4. How LBS Works (Source: Riyanto, 2011) 2. Problem identification or problem analysis. Identify
the problem or problem analysis aims to identify
existing problems, related to the application made.
III. RESEARCH METHODOLOGY 3. Problem Solving. Is proposed settlement of the issues
in the search for the location of public facilities in the
A. Data Collection Methods form of restaurants (where food is unique), place of
In the early stages of designing this application, first worship, school, and banks.
conducted interviews with relevant parties in order to
obtain information about the problem and the application 2) Design Phase
needs to be designed. Party in question is Manager of the Having drawn up the existing system including the
Area Management Office Bintaro Ir. Riyaldi Lokaputra. resolution of constraints or problems that exist, the next
In addition to direct interviews, the next stage is stage is designing the proposed system in order to run
spread the questionnaire. To find out the problems and better and expected to overcome the problems that exist.
the desire that is expected by prospective users of the Applying the model of the desired user, the stages are
application, then made the spread of the questionnaire to carried out are:
the respondent that will be used as sample data. Samples 1. Designing processes that will occur in the system
are taken as many as 50, the researchers divided into two using UML diagrams is by making the number 13
parts, namely 15 respondents who already knew about it (thirteen) Activity Diagram, a Use Case and a Class
about the location of existing public facilities in the Area Diagram and 13 Sequence Diagrams Sequence
Bintaro, for this case is the community around Bintaro Diagram. In designing with UML, the author uses
Sektor1 to Sector 9. Furthermore, 35 respondents Visual Paradigm software.
addressed to the user community smarthphone android. 2. The design process required specification, by
Sampling was done by purposive sampling technique. translating the processes that occur in this system into
Purposive sampling is a technique of determining the the form of a simple algorithm that will be
sample with a certain consideration [11]. The reason the implemented in the form of the program.
use of this technique because we will develop 3. The design of the interface, by making the screen
applications Local Directory associated with the existing display design in the form of input-output which aims
Public Facilities in the Area Bintaro, then the selected to facilitate communication between user with the
respondents are people who are in the area Bintaro system. After the design of the display screen is
Sector 1 to Sector 9. formed then do the construction phase.
Then we also use Library studies. At the stage of
collecting data by means of research literature, the 3) Construction Phase
authors find references relevant to the object to be At this stage a presentation of the design into the
examined. Other reference searches carried out in program. In this stage the author uses the Java
libraries, bookstores, and online via the internet. programming language using the Eclipse platform and
the Android Emulator Galileo.
B. System Development Method 4) Implementation Phase
System development method that used is Rapid At this stage do application testing by performing
Application Development (RAD). This method has four two stages of testing, the testing will be done
stages of the development cycle, ie the terms of the independent by the writer and testing to be performed by
planning phase, design phase, construction phase and the the user of android smartphone users who will be using
last is implementation phase. The selection method is this system. This stage focuses on the functional
because the system is expected to have a design that can requirements of a testing software, which ensures that the
be accepted by consumers and can be developed easily input will be processed into output according to need.
because the design of the present system still needs Testing technique used is black box testing techniques
further development. Another reason this method is the software testing is a method that tests the functionality of
selection of system restrictions are needed in order that the application as opposed to the internal structure or
the system has not changed. In addition, Rapid

C1-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

job-specific knowledge of the application code / internal 3. Designing Database


structure and knowledge of programming in general is In this database, all types of data involved in the
not required. process of occurring, and collected in the form of
presentation as follows:
IV. DISCUSSION
a. Place Table
A. Planning Phase Table 2. Place Table
No Field Type Extra
Bintaro Jaya is a residential area which is
1 id_tempat INT(11) Auto_Increment
increasingly comprehensive, integrated, and 2 Nama VARCHAR (255)
independent role in stepping on the age of 30 years. 3 Alamat VARCHAR (255)
Bintaro Jaya, which was developed in 1979 and 4 Telp VARCHAR (255)
registered as a member of REI No. 1, managed by PT 5 Longitude VARCHAR (255)
Jaya Real Property, Tbk. Currently, it has built tens of 6 Latitude VARCHAR (255)
7 Sector INT (11)
thousands of housing units and occupied by more than
8 id_kategori VARCHAR (11)
22,000 kk. Vast stretches of sector 1 which still includes
the area south of Jakarta, to the Graha Raya, which is
b. Category Table
included in the administrative area of Tangerang regency Table 3. Category Table
administration. As a residential area that is well known, No Field Type Extra
Bintaro Jaya as the residence is equipped with various 1 Id_kategori INT (11) Auto_increment
facilities, such as commercial areas, offices, sports 2 Kategori VARCHAR (255)
facilities, education, health, shopping centers, places of
worship, transportation, and others. All this become c. Sector Table
Bintaro as the residence choice of professionals, so that Table 4. Sector Table
called the Professional'sCity. No Field Type Extra
1 Id_sektor INT(11) Auto_increment
2 Sector VARCHAR (255)
B. Design Phase
At this design stage, authors will design a system to a. Construction Phase
resolve the existing problems. The design of the system 4. Coding Implementation
that the author made the draft determination includes At this stage, carried out the implementation of
actor, usecase design, drafting usecase scenario or database designs, system designs, or design view. The
usecase narrative, activity diagrams, sequence diagrams, programming language used in the design of this system
class diagrams, and interface design. is to use PHP and Java. To use the MySQL Server
database as data storage media. To run the server
1. Design Applications application code is required, the design of these systems
a. Determination of Actor use Apache. To the editor and unit tests are used Eclipse
Table 1. Actor
Galileo. In the debugging phase of the eclipse plugin
No. Actor Information
authors using the Android Emulator using the SDK that
1 User Users are actors who use android based mobile has been given. For the code can be found at the end of
smartphones. Users can only view the data
contained on this application the writing of this appendix. One example menu in this
2 Admi Admin has full rights over this data and application is the Main Menu which contains four
n applications, including data editing, data updates, buttons, each button can provides the information
and see all the contents of the data on the needed.
application.

2. Designing Use Case

Fig 5. Screen Shot Main Menu

Fig 4. Use case


C1-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Fig 11. Screen Shot of Searching


Fig 6. Screen Shot Nearby Place View

Fig 7. Screen Shot Sector View Fig 12. Screen Shot of Searching Result

5. Software and Hardware


In order for these applications can be run properly and
correctly then it takes a device capable of supporting
these applications, both from the software and the
hardware. For that need to be considered a category of
devices that can run this application.
1. Mobile with OS Android
2. SmartphoneAndroidwith minimum API is 7

6. Implementation Phase
Before the program is applied, then the program
Fig 8. Screen Shot Place of Sector
should be free from error. And to be free of errors it is
necessary to test to find errors that may occur as in the
language errors, logic errors and error analysis program.
This stage is done so that applications can continue to
use and runs well. As for the writer to do is application
maintenance, maintenance is done on the possibility of
error (errors) that occur in applications that are running,
so the need for periodic check or control.
Implementation of the applications implemented with
testing applications that have been built, if built is in
conformity with the expectations of the user, at this stage
Fig 9. Screen Shot of Category View if the system has not developed as expected the writer to
revise its application. Examination performed on all
matters relating to the application. Testing applications
with black box methods. Tests carried out in two phases,
namely an independent testing and testing by the user.

1. Self Testing
Independent testing done by running the application
bintaro this application directory and see if it matches
with the problem domain and the expected conclusion.
Independent test results can be seen in Table 5.

Fig 10. Screen Shot of View Restaurant

C1-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table 5. Application Test Table 2. In this application has not been a call feature that can
be contacted directly to the destination place. The
No. Testing Result
author hopes that the development in this issue.
1. Interface Page Splash Screen Good
2. Main Menu Interface Good
3. Interface tab page in the Sector Good VI. REFRENCES
4. Button on the tab Sector sector Good [1] Anonim.2010. Direktori Pengelola Kawasan Bintaro
5. Category Tab son the application Good [2] Hariyanto, Bambang. 2004. Sistem Manajemen Basis Data :
6. Button of Category Good Pemodelan, Perancangan, dan Terapannya. Bandung:
7. Search button Good Informatika.
[3] Hariyanto, Bambang. 2004. RekayasaSistemBerorientasiObjek.
2. Field Testing Bandung: Informatika.
[4] Irfiyanda, Syukrina. 2009. Analisis dan Implementasi Informasi
Field testing conducted to determine the advantages Pembayaran Rekening Air Berbasis Mobile (Studi Kasus
and disadvantages in this application. The author tested Perusahaan Daerah Air Minum Kerta Raharja Kab. Tangerang).
the 50 people who becomes mapping in this study. Universitas Islam Negeri Syarif Hidayatullah Jakarta. Skripsi
tidak diterbitkan.
[5] Kendall, K.E., dan Kendall, J.E. 2008. System Analysis
Table 6. Field Testing
and Design 7th Edition.New Jersey: Prentice Hall.
[6] Ladjamudin, Al Bahra Bin. 2005. Analisi Dan Desain Sistem
No. Testing Result Informasi. Yogyakarta : GrahaIlmu
1. Over all of Application Good [7] Maseleno, Andino. 2003. Kamus Istilah Komputer dan
2. Feature for user Good Informatika. Dokumen tidak diterbitkan.
3. Completely feature Good [8] Misky, Dudi. 2005. Kamus Informasi & Teknologi. Jakarta :
4. Nearby feature Good EDSA Mahkota
5. Driving direction feature Good [9] Mulyadi, 2010.MembuatAplikasiUntuk Android
6. User Interface Good [10] Nugroho, Bunafit. 2005. Database Relation Dengan MySQL.
7. Ease of access to applications menu Good Yogyakarta :Andi
8. Compliance with Requirements Good [11] Sugiyono, Prof. DR. 2009.Statistika Untuk Penelitian. Bandung
: Alvabeta
[12] Suryadi, I Gede Iwan. Kepariwisataan. STMIK STIKOM bali.
After conducting an independent testing and field Dokumen tidak diterbitkan.
testing, the authors concluded this application runs fine. [13] Rahmawati, Yuli. 2008. Membangun Sistem Informasi Spasial
94% of people said that this application area Bintaro Fasilitas Umum Kesehatan (Studi Kasus : Puskesmas dan
good for use in a search of public facilities in the area Rumah Sakit Kota Administrasi Jakarta Selatan). Universitas
Islam Negeri Syarif Hidayatullah Jakarta. Skripsi tidak
Bintaro Sector 1 to Sector 9. diterbitkan.
[14] Wulandari, Sri. 2010. Aplikasi Proses Hierarki Analitik (PHA)
V. CONCLUSION AND SUGGESTION Dalam Memilih Handphone. Universitas Pendidikan Indonesia.
Skripsi Tidak Diterbitkan.
A. Conclusion [15] Zahrudin, Muhammad. 2010. Impelementasi Simulator
Optimasi Rute Terpendek Berbasis Mobile menggunakan
Form our research then it can be concluded as follows: metode Greedy dengan pendekatan Manhattan Distance (Studi
1. By analyzing and designing applications Bintaro Kasus : Jalur Transportasi Darat Wilayah Administrasi Jakarta
Directory is available applications that provide Barat). Universitas Islam Negeri Syarif Hidayatullah Jakarta.
Skripsi tidak diterbitkan.
information about the Bintaro, especially places to eat,
places of worship, banks, and schools. Arini, she acquire her Bachelor Degree (ST) from Brawijaya
2. This application can determine the distance from the University and Master Degree (MT) graduated from University of
user's position to the position where that will be Indonesia and cooperation with Uni Duisburg-Essen Germany. Now,
she work at the Faculty of Science & Technology, Informatics
addressed by utilizing the internet access. Engineering, UIN Syarif Hidayatullah Jakarta
3. Besides being able to determine the distance, this
application can also provide driving direction or a Viva Arifin, she acquire her Bachelor Degree (S.Kom) and Master
direction from the position of the user to position the Degree (MMSI) from Gunadarma University. Now, she work at the
Faculty of Science & Technology, Informatics Engineering, UIN
destination. Syarif Hidayatullah Jakarta
4. Determination of the distance taken from the user's
longitude and latitude and the destination. Cerry Dia Putra, he graduated from Informatics Engineering,
5. On the admin page, the admin can add new places that Faculty of Science & Technology, Informatics Engineering, UIN
Syarif Hidayatullah Jakarta
have not been registered in the database server.

B. Suggestion
This application is of course still not perfect. There
are still many things to do to develop this application to
make it better again, among others:
1. The author expects to progress further, this application
can input data into the database through a gadget that
is owned by the user. So the user can add a few places
that have not been registered by the author.

C1-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Tropical Rain Effects on Free-Space Optical and


30 Ghz Wireless Systems
1
M. Derainjafisoa, 2G. Hendrantoro
Department of Electrical Engineering, Institut Teknologi Sepuluh Nopember, Indonesia
Kampus ITS, Keputih-Sukolilo, Surabaya, 60111
1
mderainj@gmail.com, 2gamantyo@ee.its.ac.id

atmospheric scattering cause angular redistribution of


AbstractThe growth of technology in recent decades, the radiation. Among atmospheric effects on optical
demonstrates an ongoing commitment to find new wireless communications link, rain is the most important
elements for better improvement of quality of service in all factor in tropics. The effort here is to focus on some of
areas such as Free Space Optical (FSO) communication. In
the most important atmospheric attenuators and to
any wireless communication system, propagating channel
is highly dependent on different weather conditions simulate their attenuation behavior using precise
particularly that reduce performances. For a system mathematical relations, derived and improved over the
requiring high link availability, the variable attenuation of years. A conscious effort has been made to select the
the atmospheric link is the main challenge in practice. well known and most suitable relations in modeling and
Ongoing research considers the performance of free-space measurement the FSO and the Millimeter Wave
optical links over tropical rain which is a strong
channel. Previously, a significant effort in this regard
turbulence that affects the channels. Millimeter Wave
communication is known as a rain dependence has been shown. Effects of rain on FSO and GHz
communication. However, compare to FSO link, it frequency range links are studied and some
presents robustness to rain effect for propagation under a measurement results are presented. Specific attenuation
kilometer link distances. The rain attenuation difference for FSO can reach up to 40dB/km for rain rate of 155
between FSO and Millimeter wave was analyzed in order mm/hr. It further emphasizes the requirement of back up
to provide the optimal solution in terms of wireless
link with least rain attenuation to achieve certain degree
technology. The measurements and simulations described,
as a result, should achieve to a more suitable link distance of reliability of hybrid wireless network. [1]-[2].
and a link availability prediction on FSO systems in Finding out a suitable modulation and coding scheme
tropics. for the FSO systems requests rigorous understanding of
the behavior of the FSO. The choice of the modulation
Index TermsFree-Space Optical, Link availability, and coding format has to be based on measurements and
Millimeter wave, rain attenuation, Synthetic Storm simulation of the performance of FSO systems under
Technique.
unfavorable atmospheric conditions. These preliminary
investigations point out that the use of these schemes
I. INTRODUCTION
will lead to better systems to combat fog and other

T HE Free-Space Optical Communication technology


tries to carry out rising need for high bandwidth
transmission capability link along with safety and
attenuators which limit the performance of the
technology [3].
The problems of the propagation of signals through
simplicity in installation. Due to their high carrier free space are generally difficult to solve due to the
frequency in the range of 300 THz [1], it supplies
impairments of those signals. It is quite impossible to
highest data rates. FSO link is license free, secure and
find exact transmission techniques. These conduct to
easily deployable. These features encourage the use
FSO as a solution to last mile access. In any wireless some problems that need throughout investigation as the
communication system, transmission is influenced by degradation of the signal imposed by rain attenuation.
the propagating channel. The propagating channel for Also find the most suitable technology for wireless
FSO is atmosphere. FSO links are extremely weather propagation in tropical areas between FSO and
dependent that reduces the link availability and Millimeter wave operating in 30 GHz.
reliability. Yet, the starting point of our thinking understood the
The increased signal losses and fades are the fallout rain attenuation using SST as a measurement of the
of the impairments due to the optical signal propagation channel. The objective of the research is that
in free-space. The phenomena known as light absorption understanding the impairment on the free space
at specific optical wavelengths comes from interaction propagation under tropical rain in order to provide the
between photons and atoms or molecules that cause appropriate technology need to solve that problem. To
extinction of the incident photon, rise of the temperature do this task, the following step will be held, in first,
and radioactive emission. Scintillation caused by improve the quality of service in the field of free space
thermal turbulence within the propagation and propagation in tropics. In the other hand, provide the
technology needed to reduce those impairments in order

C2-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

to obtain the best performances of the propagation. The generally, for FSO, given by the Carbonneau relation
results of this research will benefit for the development [4]:
of research about the understanding both FSO and
millimeter wave operating in 30 GHz systems Att = 1.076 R0.67 (dB) Rain
(2.3)
performance under heavy tropical rain. The relationship between specific attenuation and
Much more investigation is desired as to the best of rain rate for millimeter wave communication is given by
our knowledge comprehensive channel models for [6]
optical wireless communications which still have many
unanswered questions. The organization of the paper is R = kR (2.4)
as follows: the first part presents the background of the Constant k and , according to ITU-R model, is
propagation in free space. The second part describes the given as:
methodology adopted to predict the rain attenuation (k H +k H +(k H -k H )cos 2 cos2)
using SST. Finally, a detailed analysis was done to k=
compare the performances for both Millimeter wave and
2
(2.5)
FSO systems considering operation and deployment.
(kH H +kV V +(kH H -kV V )cos2cos2)
= (2.6)
II. METODOLOGY 2k
A. Rain rate Where k H , kV , H and H for horizontal and vertical
Wind speed and orientation data range was provided polarization are given in [5].
by the meteorology station at Juanda - Surabaya, a
division of the Department Of Climatology and C. Attenuation for FSO
Geophysics Meteorology. The measurement of rain fall The attenuation of the rain rate events from January
was done in ITS campus of Surabaya. A disdrometer 2008 to January 2010 was computed. Maximum rain
optic combined with a rain gauge was used, and put on rate of 416.53 mm/hr and 351.66 mm/hr was recorded
roof of the mechanical engineering building. From this respectively on January and February events 2009.
calculation, it could found the rain fall value on the Fig.1 and Fig.2 below show the rain attenuation for
ASDO software since January 01, 2008 until January 31, both North and East direction link. The attenuation
2010. difference among the 0.5, 0.75, 1, 1.5 and 2 Km single
links increases linearly with the distance. The link
B. Synthetic Storm Technique (SST) orientation shows a considerable difference. For the 2
The synthetic storm Technique describes the value km link length, the attenuation reaches up to 90.2 and
of rain fall that moved on the line because of wind with 100.5 dB respectively for North and East direction link
particular speed. The data range concern about some at 0.001% outage probability. Rain attenuation
interval of time which are January, February, November estimation results show that the North direction link has
and December 2008, January and February 2009, and the largest attenuation. This is caused by the main wind
also January 2010 where the rain falls were heavy. directions in Indonesia which are from West and East.
A rain event for a time minute sample was made. CCDF Rain Attenuation Link North-South
1
The rain intensity records were done for each 10 seconds 10
0.5 km
and a sampling for each minute time was performed for 0.75 km
the calculation of the rain attenuation using the SST 10
0
1 km
1.5 km
method. The frequency operation is about the wireless
2 km
Pb.[Attenuation > Absciss]%

optical systems. 10
-1

The attenuation using SST is calculated considering


the main wind orientation. Wind speed is used to -2
10
calculate the length of each segment link.
L = Vr T ( Km ) , (2.1) 10
-3

-4
10

where Vr is the wind speed on a line and T is a

sampling time of 10s. 0 50 100 150


Rain Attenuation [dB]

Fig. 1 CCDF rain attenuation for 90o direction link at 0.5, 0.75, 1, 1.5
and 2 km for FSO
A (k ) = nN=0 aR (bk-n) L (dB) (2.2)
i N A SST multilink is used to measure the rain
where Ai is the rain attenuation for i=1, 2 ,, n. attenuation in Surabaya Indonesia. The rain attenuations
at 0.5 km link length, direction East (0o), for outage
L is the segment length, R is the rainfall intensity probability 0.1%, 0.01%, 0.001% are respectively
b
(mm/h), aR is the rain attenuation (dB/Km) and is 2.913, 15.26 and 24.79 dB (fig. 1). It is shown clearly in

C2-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

fig.3, for the 2 km link orientation West (180o), a high 10


1
CCDF Rain Attenuation Link North-South

and considerable attenuation .The maximum attenuation 0.5 km


0.75 km
estimated for this link are 11.2, 60.3 and 90.2 dB 0
10 1 km
respectively on 0.1%, 0.01%, 0.001% outage 1.5 km
probability.

Pb.[Attenuation > Absciss]%


2 km
-1
CCDF Rain Attenuation Link East 10
1
10
0.5 km
-2
0.75 km 10
0
10 1 km
1.5 km
-3
2 km
Pb.[Attenuation > Absciss]%

10
-1
10

-4
10
-2
10

-3 0 50 100 150
10
Rain Attenuation [dB]

-4 Fig. 4 CCDF rain attenuation for 90o link from 0.5-2 Km for 30 GHz
10
1
frequency
10
0.5 km
0 50 100 150 0.75 km
0
Rain Attenuation [dB] 10 1 km
1.5 km
Fig. 2 CCDF rain attenuation for 0o direction link from 0.5-2 km for Pb.[Attenuation > Absciss]% 2 km
FSO -1
1 10
10
link 0.5km
link 0.75km -2
0
10 link 1km 10
link 1.5km
Pb.[Attenuation > Absciss]%

link 2km
-1 -3
10 10

-2
10 -4
10

-3
10

0 50 100 150
-4
10 Rain Attenuation [dB]
Fig. 5 CCDF rain attenuation for 45o direction link from 0.5-2 Km for
30 GHz frequency
CCDF Rain Attenuation for 30GHz MM Wave
1
0 50 100 150 10
Rain Attenuation [dB]
link 0.5km
o o o o link 0.75km
Fig. 3 CCDF rain attenuation for 0.5 (0 ), 0.75 (45 ), 1 (90 ), 1.5 (135 ) 0
10 link 1km
and 2 km (180o) links for FSO
link 1.5km
link 2km
Pb.[Attenuation > Absciss]%

D. Attenuation for 30 GHz millimeter wave -1


10
The performance of the millimeter wave
communication system is corrupted by rain attenuation -2
10
which limits its exploitation for free space
communication link. Rain is one the major attenuating
-3
factor at frequencies above 10 GHz. The theoretical 10
back ground between specific attenuation and rain rate is
given in [6]. The rain attenuation on the millimetre wave 10
-4

operating in the frequency of 30 GHz was estimated


using the SST.
Estimation of the rain attenuation for both North and 0 50 100 150
Rain Attenuation [dB]
East direction link are shown in Fig.4 and Fig.5 below.
Fig. 6 CCDF rain attenuation from 0.5-2 Km links for 30 GHz
Rain attenuation among the 0.5, 0.75, 1, 1.5 and 2 Km frequency
point to point communication link do not diverge
considerably compared to the link direction but increase For the multilink communication shown in Fig. 6
linearly with distance. For the North orientation link, above, direction and length of links are 0.5 Km East (0o),
attenuations are 13.51, 20.26, 27.02, 40.53 and 54.04 dB 0.75 Km North-East (45o), 1 Km North (90o), 1.5 Km
at 0.01% outage probability; whereas at the same outage North-West (135o), and 2 km West (180o). Rain
probability, attenuations are 13.56, 20.23, 26.84, 40.47 attenuations augment linearly with the distance and also
and 54.42 dB for the North-East (45o) orientation link. with the link orientation and are 27.39, 40.69, 55.79,

C2-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

CCDF Rain Attenuation Link North-East


1
80.34 and 96.5 dB respectively at 0.001 outage 10
0.5 km FSO
probability. 0.5 km 30GHz
0
10 0.75 km FSO
III. SIMULATION AND RESULTS 0.75 km 30GHz
1 km FSO

Pb.[Attenuation > Absciss]%


-1
A. Difference attenuation 10 1 km 30GHz
1.5 km FSO
From probability outage 0.1% to 0.004%, rain affects 1.5 km 30GHz
the FSO link much more compared to the 30 GHz -2
10 2 km FSO
Frequency link for both point-to-point and multilink 2 km 30GHz

communication. However, under the sub mentioned -3


10
probability outage, the rain attenuation jeopardizes the
30 GHz Frequency badly independently of the link -4
10
length and orientation as shown in Fig.7, Fig.8 and
Fig.9. The difference attenuation (in dB) between FSO
link and 30 GHz Frequency according to the link
0 50 100 150
availability are shown in Table.1 and Table.2, Rain Attenuation [dB]
respectively for both point-to-point and multilink
communication. The negative values represent that the Fig.9 Comparison of the rain attenuation for 45o direction link
from 0.5-2 Km for FSO and 30 GHz frequency
rain attenuation on the 30 GHz Frequency link is greater
than its attenuation on the FSO link. TABLE.1 DIFFERENCE ATTENUATION (IN DB) BETWEEN FSO AND 30
GHZ FREQUENCY SINGLE LINK
FSO 0.5km
0 o
10 30Ghz 0.5km 0 Direction Link Distance (Km)
FSO 0.75km Link
30Ghz 0.75km Link
FSO 1km
Pb.[Attenuation > Absciss]%

-1
10 Availability 0.5 0.75 1 1.5 2
30Ghz 1km
FSO 1.5km 99% 1.63 2.39 3.11 4.5 6.08
-2 30Ghz 1,5km
10
FSO 2km
99.9% 1.58 2.34 2.86 4.68 5.47
30Ghz 2km
99.99% -2.95 -3.86 -5.38 -6.4 -6.3
-3 o
10 90 Direction Link Distance (Km)
Link
-4 Link
10
Availability 0.5 0.75 1 1.5 2
99% 1.66 2.5 3.33 4.99 6.65
0 20 40 60 80 100 120 99.9% 1.68 2.52 3.35 5.02 6.7
Rain Attenuation [dB]
99.99% -2.78 -4.17 -5.55 -8.33 -11.1
Fig. 7 Comparison of the rain attenuation for 0.5 (0o), 0.75 (45o), 1 o
(90o), 1.5 (135o) and 2 km (180o) links for FSO and 30 GHz frequency. 45 Direction Link Distance (Km)
1
CCDF Rain Attenuation Link North-South Link
10 Link
0.5 km FSO Availability 0.5 0.75 1 1.5 2
0.5 km 30GHz
0
0.75 km FSO
99% 1.63 2.44 3.19 4.68 6.02
10
0.75 km 30GHz 99.9%
1 km FSO
1.62 2.52 3.31 5.03 6.08
Pb.[Attenuation > Absciss]%

-1
10 1 km 30GHz 99.99% -2.44 -3.38 -4.9 -8.02 -7.84
1.5 km FSO
1.5 km 30GHz
-2
2 km FSO
TABLE.2 DIFFERENCE ATTENUATION (IN DB) BETWEEN FSO AND 30
10
GHZ FREQUENCY MULTILINK
2 km 30GHz

-3 Link Availability
10
Link Link
99% 99.9% 99.99%
Direction Length
-4 o
10 0 0.5 1.62 1.58 -2.61
o
45 0.75 2.42 2.52 -3.77
o
0 50 100 150 90 1 3.32 3.36 -5.49
Rain Attenuation [dB] o
135 1.5 4.67 5.03 -7.63
Fig.8 Comparison of the rain attenuation for 90o direction link from o
0.5-2 km for FSO and 30 GHz frequency 180 2 6.01 5.47 -6.3

C2-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

B. Analysis and discussion IV. CONCLUSION


In term of propagation distance, MMW is the best Tropical rain attenuation makes vulnerable
issue to supply FSO system for propagation under a performances of FSO and MMW links based on the
kilometer range in a foggy region. However, in tropics, simulation results. MMW links suffer less from rain
rain affects strongly both MMW and FSO systems. The attenuation for short distance propagation but has
simulations results shown that, for a link distances less bandwidth limited and not secure. FSO offers solutions
than 1 km, FSO link suffers more from rain attenuation for all of these problems but are typically deployed at
than the 30 GHz Millimeter Waves link for an outage lengths under a kilometer for reasonable availability.
probability from 0.1% to 0.004%,. A real advantage of The benefits of FSO motivate a deep investigation on
MM-Wave compared to FSO is that they can work on understanding its behavior under heavy rain condition
relatively short distances. Based on FSO technical specs and use it as last mile solution. The high and
and installation statistics, most of the FSO links are considerable attenuation measured underlines that
installed on distances no more than 1km, while reductions of these attenuations are needed which is the
MM-Wave links are designed to work on distances up to more accurate approach for estimating performances of
20km. This means that MM-Wave links have the very the wireless optical link under such condition.
significant gain margin which allows in penetrating 1km
distance even at very heavy rain [6] System designers REFERENCES
are free to choose the antenna size, which generally [1] F. Nadeem, E. Leitgeb, O. Koudelka, T. Javornic, G. Kandus,
dictates its gain. The size of the antenna determines the Comparing the rain effects on hybrid network using optical
wireless and GHz links, ICIET 2008, 17-18 October 2008,
amount of intercepted MMW energy and determines the Rawalpindi, Pakistan.
beam divergence, since the system is diffraction limited [2] F. Nadeem, E. Leitgeb, M. S. Khan, M. S. Awan et al.
[7]. Conversely, for long distance propagation, Comparing the Fog Effects on Hybrid Network using Optical
millimeter wave transmission is affected more by rain, Wireless and GHz Links, CSNDSP 2008, pp. 278-282, Graz,
Austria, 23-25 July 2008.
as the simulation results for the 1.5 and 2km link length Available:http://www.optikom.tugraz.at
because the carrier wavelength is closer to the size of a [3] Sheikh Muhammad S., Leitgeb E., Koudelka O. Multilevel
rain drop. Rain drops can vary in size from 0.1mm to Modulation and Channel Codes for Terrestrial FSO links,
Beitrag und Prsentation zum International (IEEE) Workshop on
10,0mm, and these will effectively disperse millimeter Satellite and Space Communications, September 2005 Siena,
waves, especially with carrier frequencies greater than Italy.
10 GHz. [4] T.H. Carbonneau, David R. Wisely, "Opportunities and
challenges for optical wireless; the competitive advantage of free
Another important system performance is the data space telecommunications links in today's crowded market
rates. FSO can provides the highest data rates of 2.5 place", SPIE Conference on optical wireless communications,
Gbps which can be increased to 10 Gbps using Boston, Massachusetts, vol. 3232,119 (1998);
[5] Specific attenuation model for rain for use in prediction methods,
Wavelength Division Multiplexing (WDM) due to their ITU-R, P.838-1
high carrier frequency in the range of 300 THz. FSO [6] Olsen, R.L., D. V. Rogers, D. B. Hodge, The a.Rb relation in
technologies offer optical capacity but are typically the calculation of rain attenuation, IEEE Trans. Antenna
Propag. AP-26(2), 318-329, (1978)
deployed at lengths under a kilometer for reasonable [7] Gurdeep Singh, Tanvir Singh, Vinaykant, Vasishath Kaushal,
availability as discussed in the previous section. FSO Free Space Optics: Atmospheric Effects & Back Up,
has a major time-to-market advantage over Millimeter International Journal of Research in Computer Science eISSN
Wave. An FSO link can be operational in a few days. 2249-8265 Volume 1 Issue 1 (2011) pp. 25-30 White Globe
Publications www.ijorcs.org
[8] Scott Bloom, The last-mile solution: Hybrid FSO Radio,
AirFiber, Inc. AirFiber, Inc.

C2-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

First Aid Application


Based Android Smartphone
1
Qurrotul Aini, 2Husni Teja Sukmana, and Imamul Huda
Faculty of Science and Technology
Syarif Hidayatullah State Islamic University Jakarta
1
qurrotul.aini@uinjkt.ac.id, 2husniteja@uinjkt.ac.id

Abstract Mobile computing technology advances rapidly


which has changed mobile phone into a smart phone device II. LITERATURE REVIEW
with variety of applications on it. So that devices such as
smart phones have become the primary requirement for Understanding of the applications came from English,
users. Accidents can happen to anyone, anywhere and namely "to applicate" which means to apply or applied. But
anytime. First aid measures are very important to reduce the in general understanding of the application program is a
impact of the accident. So researchers developed a First Aid package of ready-made and can be used. While the
application on smart phone device which in this context is on meaning of the application is a computer program created
the Android platform with version 2.2 Froyo. First Aid to help humans in performing certain tasks [1].
application that contains main features tutorials first aid Computer it self relation with applications consisting
measures in accident, as well as some additional features of of multiple functional units to achieve the purpose of data
drug information, info site nearest hospitals and dispensaries,
processing is:
the types of rescue techniques, and calls the emergency
number. By using methodology development Rapid 1. The part that reads the data (input data or input units)
Application Development system which consists of three 2. The part that manages the data (control processing unit)
phases, namely planning, design and implementation 3. Section who issued the results of data processing (Data
workshops, these applications are built using the Android Output)
SDK Framework, Java Programming Language, Google Besides understanding Application is a software unit
Maps as a spatial data service and system testing has been built to serve the need for some activities such as
done using the method of Black Box testing. The application commercial systems, games, community service,
has capacity 5 MB and according to questionnaire result, advertising, or any process that is almost done man.
90% of respondents understood the application.
2.1 First Aid in Accident
Index TermsAndroid, first aid, froyo, smartphone.
First Aid in Accident is a temporary relief and care for
victims of accidents before getting help that is more perfect
I. INTRODUCTION
than doctors or paramedics. This means that aid is not as

T he development of telecommunications technology


evolution in communication gave birth to a
telecommunications device itself. The emergence of
treatment or handling is perfect, but it was just a temporary
relief by first aid officer (medical officer or layman) who
first saw the victim. Ministration should be swiftly and
smart phone technology which is capacity almost similar to accurately by using the existing infrastructure at the scene.
a personal computer, android as one subset of the software First aid actions are done correctly will reduce the
for smart phones that include operating systems, disability or suffering and even save the victim from death,
middleware and core applications released by Google. but if action is not well done FIRST AID could even
Besides having a variety of features, android is also capable worsen and even cause death due to accidents [2].
to integrate with various Google services such as Google
Maps, in displaying visual map location information. 2.2 First Aid Purpose
Activity resulted in a diverse society the number of The purposes of First Aid are as follows: [3]
accidents that occurred in Indonesia either an accident at a. Save lives or prevent death
work, traffic and natural disasters has increased, causing 1. Taking into account the conditions and
the large number of casualties. The accident victim needs circumstances that threaten the victim
help quickly and precisely. The aid can be made and given 2. Implement Heart and Lung Resuscitation (CPR).
before arrival of medical team; come to hospital or 3. Find and fix the bleeding.
someone will provide further assistance, known as the First b. Prevent a more severe disability (prevent the condition
Aid. But the importance first aid was not accompanied by worsening)
sufficient knowledge in the community. Moreover, first aid 1. Hold a diagnosis
knowledge gained only from books, extracurricular school 2. Handle the victim with a logical priority.
and health education. Based on this background, the 3. Noting the conditions or circumstances (illness) is
research will be made on application of first aid android hidden.
smartphone. c. Supporting healing
1. Reduce pain and fear
2. Prevent infection

C3-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

3. Planning of medical rescue and right transportation 2.6 Architecture of Android


for victim. In architecture android, there is a Linux kernel and a
set of libraries for C / C ++ within a framework that provide
2.3 Principle First Aid and manage the flow of the application process [10-12].
Some principles to be implanted in First Aid officers The following diagram shows the main components of the
when facing incidents are as follows: [4] Android operating system.
a. Remain calm, do not panic. You expected to be a helper
rather than a murderer or a victim of the next (helped)
b. Use the eye with a sharp; brace your heart because you
have to have the heart to take action that makes the
victim screaming in pain for his safety, to do with agile
and precise movements without adding damage.
c. Consider the circumstances surrounding the accident,
the occurrence of accidents, weather etc.
d. Consider the person's condition is unconscious; there is
bleeding and wounds, broken bones, feeling much pain
etc.
e. Check the victim's breathing. If not breathing, check Fig. 1 Android Platform Architecture
and clean the airway and providerespiratory support (A,
B = Airway, Breathingmanagement). 2.7 JAVA
f. Check the victim's pulse or heart rate. If the heart stops, Java is a programming language that innovation can
perform external cardiac massage.If there is severe be an option for a program that will run on various
bleeding immediately stop (C= Circulatory operating systems. Java can be used for internet and
management) network-based applications. Java also allows the authors of
g. Does the patient Shock? If you are looking for shock the program for use in big scale application that can run
and treat the cause. without changes on the computer with the operating system
h. After A, B, and C is stable, check the cause of or that supports Java. This is the most widely applied in
concomitant injuries. If there do splintingbroken bones today's computers [13]. Java has some important
to bones broken, do not rush tomove or brought to a advantages, among others [14]:
clinic or hospital before to bandage broken bone. 1. Compatibility and stability
i. While providing assistance, you should also contact the Code a Java program can run on an operating system
medical officer or the nearest hospital that has a runtime environment. And it has a lot of
mistakes that have been addressed, and the existence of
2.4 Aid Priorities a virtual machine also supports the stability of java.
There are several key priorities that must be 2. Monitoring and management
performed by a helper in helping the victims, namely: [5-7] Java provides the functionality to monitor and manage
1. stop breathing applications that typically have enterprise-scale
2. cardiac arrest management using Java technology extension.
3. heavy bleeding 3. Enterprise desktop
4. shock Java provides integration with desktop facilities to
5. unconsciousness overcome the limitations of browser-based
6. mild bleeding applications.
7. fracture 4. XML
Java also provides support including the use of XML
2.5 Android digital signatures and streaming API for XML.
Android is a platform first truly open and
comprehensive approach to mobile devices, all software 2.8 Eclipse IDE
that is enabled to run a mobile device without thinking of Eclipse is an open source community that aims to
ownership constraints that inhibit innovation in mobile produce an open programming platform. Eclipse consists
technology [8]. In another definition, android is a subset of of a framework that can be developed further, auxiliary
software for mobile devices that includes an operating equipment to build and manage the software from the
system, middleware and core applications released by beginning to launch. Eclipse Platform is supported by a
Google. While Android SDK (Software Development Kit) large ecosystem of technologies vendors, innovative
provides tools and APIs needed to develop applications on start-ups, universities, research institutions and individuals.
Android platform are using Java programming language. Many people are familiar with Eclipse as an IDE
Developed jointly between Google Android, HTC, Intel, (integrated development environment) for the Java
Motorola, Quallcomm, T- Mobile, NVIDIA joined in the language, but the Eclipse is more than just a Java IDE.
OHA (Open Handset Alliance) with the purpose of making Eclipse community has more than 60 open source projects.
an open standard for mobile devices (Mobile Device) [9]. These projects are conceptually divided into 7 categories:
1. Enterprise Development
2. Embedded and Device Development

C3-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

3. Rich Client Platform analyzing some of first aid applications that have been
4. Rich Internet Applications made previously and to identify features based on
5. Application Frameworks application purposes.
6. Application Lifecycle Management (ALM) 2. Workshop Design
7. Service Oriented Architecture (SOA) Activity in the content by designing proposed
Generally, used Eclipse to build innovative, application to be run better and expected to overcome
industry-standard software, and tools along with its the problems which exist.
framework help job is easier. 3. Implementation
Activities at the contents with a presentation of the
design into the program using the Java JDK (Java
Development Kit) as a programming language
integrated into Eclipse, and Android SDK (Software
Development Kit) and continued with the installation to
Android handsets.
Some of the reasons researchers use RAD in application
development for first aid on android smart phone:
1. First aid application is a simple application that was
developed by researchers and require a short time. This
is because all components are provided in the Android
Fig. 2 Eclipse Galileo application framework. RAD is very precise so that the
method is applied because this method emphasizes an
III. RESEARCH METHOD extremely short development cycle.
Developing multimedia application divided into two 2. Existing needs can be well understood, the RAD
stages, data collection and application multimedia process enables to create a completefunctional system
methods. in a short period of time.
3. RAD can develop applications quickly and sustainable
3.1 Method of Data Collection implement the design and specification of user
1. Literature Studies requirements using tools such as Java.
Researchers conducted a study of literature by reading
and studying books and e-book related to first aid, IV. RESULTS
android-based programming as well as books and articles Refer to RAD stages, the application built based on
obtained from printed media and internet to support the following stages.
topics covered in preparation of this research. 4.1 Requirement
2. Field Study As described in the previous chapter, in this stage,
Observation data collection methods, researchers researcher identified objectives and system requirements
differentiate into three parts, namely: information arising from those goals.
a. Observation
b. Interview A. System Prototype Development Goals
c. Questionnaire Development of prototype system aims to help users
android in providing first aid in an accident that both
3.2 Method of Application Development happened to him or others.
A system development method that researchers use in
this study is method of Rapid Application Development
(RAD) which was introduced by James Martin in 1991. B. Finding Information Regarding First Aid
RAD is a development cycle that is designed to provide Information search purposes first aid aims to meet the
much faster development and higher quality results than data completeness measures first aid handling. Here the
those achieved with traditional life cycle (SHPS). The researchers conducted search first aid information through
selection method is because the system is expected to have books that discuss first aid, interviews to people who know
a design that can be accepted by consumers and can be
about first aid, and search for information on a certain
developed easily because the design of the current system
still requires further development. Another reason this website about first aid (www.gotoaid.com).
method is the selection of system restrictions are needed in
order that system has not changed. In addition, Rapid C. Learn About User Android
Application Development (RAD) was chosen because the Purpose of studying culture is Android smart phone
applications will be built an application that is built in a users to know the habits of Android smart phone users
fairly short period of time. when interacting with applications and to maximize the
Rapid Application Development (RAD), which design of user interface or application interface will be
researchers have used the following stages: [15] developed. Here researchers read a lot of good references
1. Requirements from printed books, e-book as well as supporting websites
Activities charged with finding a general overview of
first aid, learning the culture or cultures android users,

C3-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

like http://Admin.android.com and


http://www.androidpatterns.com.

D. Analyzing Some Applications FIRST AID


Researchers conducted an analysis on a number of
Android applications on FIRST AID with different media
platforms; the goal is to obtain a preliminary description of
the features, user interface and functionality making it
easier for researchers to do the innovations in the
application to be developed.
After doing the analysis, researchers can conclude
that in addition to feature a fairly complete presentation of
the material needed also an interesting application that Fig. 4 Use Case Diagram
users can more easily understand the material interest and
which is on the application. D. Activity Diagram
Activity diagrams describe the activities that occurred
4.2 Workshop Design in First Aid application begin until the activity stops.
In this stage, researcher design use case until interface
for the application.

A. System Design
Here, researchers conducted a system design that will
be applied in application. The developed application is
called "First Aid on Mobile" for first aid in an accident with
combined of several technologies such as Google's APIs, as
well as the GPS is implemented into the smart phone
android.
First aid measures data that existed at first aid on
Mobile derived from several sources such as providers of
books that discuss about first aid [2-7], also a site that
displays first aid tutorial [16]. From these sources the
researchers collect material that will be displayed in the
First Aid application on Mobile.
Fig. 5 Activity Diagram FIRST AID
B. User Interface Design
At this stage, the researchers designed user interface
E. Sequence Diagram Design
or interface view of application.
Sequence diagram is interaction diagram which
expressed with time, or the other word said with the
diagram from top to bottom. Sequence diagrams express
every user of few streams that pass through a use case.
TindakanFIR JenisTindakanFIR DetilTindakanFIR
: user ST AID ST AID ST AID
tindakan_FIRST
AID()

kategori_tindakan_FIRST
AID
jenis_tindakan_FIRST
AID()

show_list_jenis_tindakan_FIRS
T AID detil_tindakan_FIRST
AID()

show_detil_tindakan_FIRS
T AID

Fig. 3 User Interface Design Fig. 6 Sequence Diagram First Aid

C. Use Case Diagram 4.3 Implementation


Use Case describes the interaction of actors in the In implementing this process there are several steps,
FIRST AID applications to be developed. In this context, namely:
researchers chose Android Smartphone users as an actor. 1. Write program code (coding), this stage is done using
Use Case Scenarios serve to explain more details application program android developers, Android
about modules in First Aid application based Android Developer Tools (ADT), Android SDK (Software
Smartphone. Development Kit).

C3-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

2. Conducting the process of packaging by using facilities researchers. Based on the results of testing, all functions
provided by Android SDK. can be run well.
3. Test the program by using the android smart phone
B. Beta Testing
handsets, as well as perform debugging or repair the
program if necessary. Beta testing is testing conducted objectively where
testing is done directly to the field of public and not
A. Software Implementation restricted to certain circles. Testing is done by creating a
The software used in the building of this application is questionnaire to find out the opinions of respondents to
as follows: First Aid application on mobile, and then distributed to
1. Windows 7 32 bit Operating System some users to be filled which will serve as a sample and will
2. Android SDK (Software Development Kit) do the calculation to be taken its conclusion on the result of
3. IDE (Integrated Development Environment) using making the application of this system. Based on testing
Eclipse Galileo performed, 90% of respondents understood the steps to
4. Android Developer Tools (ADT) help injured people in accident.
5. Android : Froyo 2.2 with Google API SDK Level 8
6. Java V. CONCLUSION
7. XML Based on testing of application and questionnaire, it
can be concluded that First Aid application based android
B. Hardware Implementation smartphone developed under the rules of medical action of
The hardware used in building this application is as First Aid as its knowledge base which has capacity of 5 MB
follows: memory. The application is able to provide information
1. Intel Pentium Dual Core 2.6 GHz about actions and supporting information which cover
2. Memori 3GB location of hospitals and pharmacies, emergency numbers
3. VGA 1GB and rescue techniques required in performing first aid in
4. Harddisk 250GB accident. For the future research, the application could be
developed as a web-based application as continue to
5. Monitor
function as mobile application. The web application is used
6. Mouse and Keyboard as a medium for knowledge base development system that
7. Handset Smartphone Android (Samsung GT-S5660 serves as a media updated. Moreover, its better to develop
Galaxy Gio) for cross platform applications in other mobile platforms,
like Symbian or Blackberry.
C. User Interface Implementation
Implementation is the stage where system is ready to REFERENCES
operate in actual stage, so it will be known whether the
[1] A. Nugroho. Analisis dan Desain Sistem Informasi, Yogyakarta:
system has been created completely according to plan or Andi, 2004.
not. In software implementation will be explained how this [2] N. Saubers, Semua yang Harus Anda Ketahui Tentang FIRST AID.,
system works, by providing system display. Yogyakarta: PallMall, 2011.
[3] M. Kartono, Pertolongan Pertama., Jakarta: PT Gramedia Pustaka
Utama, 2005.
[4] S. Sudirman, Panduan FIRST AID, Jakarta: Restu Agung, 2008.
[5] A. Thygerson, First Aid : Pertolongan Pertama Edisi Kelima.
Jakarta: Erlangga, 2011.
[6] A. Yunisa, Pertolongan Pertama Pada Kecelakaan, Jakarta:
Victory Inti Cipta: Jakarta, 2010..
[7] Peraturan Menteri Tenaga Kerja dan Transmigrasi
(Permenakertrans) Nomor: PER.15/MEN/VIII/2008 tentang
Pertolongan Pertama pada Kecelakaan di Tempat Kerja.
[8] R. Meier. Professional Android 2 Application Development.,
London: Willey Publishing, Inc, 2008.
[9] A. Mulyadi, Membangun Aplikasi Android, Yogyakarta:
Multimedia Center Publishing, 2010.
[10] M. Murphy, Beginning Android 2, Barkeley: APRESS, 2009.
[11] M. Murphy, The Busy Coders Guide to Android Development,
United States of America: CommonsWare, 2008.
[12] J. Steele, The Android Developers Cookbook: Building
Fig. 7 Display of Main Menu Applications with the Android SDK, New York: Addison Wesley,
2010.
[13] I.Horton, Beginning JavaTM 2: JDKTM 5 Edition, Indianapolis:
4.4 System Testing Wiley Publishing, Inc, 2005.
The testing was used to examine new system by black [14] J. Friesen, Beginning JavaTM SE 6 Platform: From Novice to
box method focuses on the functional requirements of Professional, USA: Apress, 2007.
software. [15] Kendall & Kendall. 2008. System Analysis And Design. London:
Pearson International Edition 7th Edition.
A. Alpha Testing [16] First Aid. [Online]. Available: http://gotoaid.com

Based on the testing plan has been prepared, it can be


done alpha testing, which is a test conducted by the

C3-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Singly-Fed Circularly Polarized Triangular


Microstrip Antenna With Truncated Tip Using
Annular Sector Slot For Mobile Satellite
Communications
1
Muhammad Fauzan Edy Purnomo and 2Sapriesty Nainy Sari
Department of Electrical Engineering, University of Brawijaya
1
mfauzane@yahoo.com and 2nainy_sari@yahoo.co.id

AbstractIn this research, a new model of the triangular function of Is or two of triple truncated tip canalso affect
patch antenna with truncated tip using annular sector slot the bandwidth. It makes the bandwidth become wider than
embedded on the ground plane.The antenna instead of single without it (see Fig.2). In the other hand, the slot antenna
layer, singly-fed, small, wide bandwidth and analyzed by both embedded on patch antenna or and on ground plane
using method of moments. The result for simulation among
cause the bandwidth antenna decreased, but its
of the new model antenna c3s, c3 and c1, in the case of
frequency characteristic, S-parameter, and input impedance advantaged isprobably to make small antenna. The
are good results. The bandwidth c3 is widest than the others. function of slot is decreasing the frequency
The bandwidth c3sis almost the same with c1. It is caused by operationwherein the current path or guide wavelength g
using double truncated tip Is on the below side of the patch of the TM10 modewith slot is more length than the current
antenna thus the total of vector current distributions become path without slot. The purpose of this research is to yield
increased are just around this area. In the case of antenna c3s, the optimized result between the small antenna and the
the bandwidth decreased due to by using annular sector slot slightly wide bandwidth.
embedded on the ground plane. Moreover, the bandwidth of
antenna c1 is also decreases, because of without using the
II. METHODOLOGY
truncated tip Is, but it is slightly wider than antenna c3s.
The methodology instead of literature study, qualitative
Keywords-singly-fed, truncated tip, annular sector slot, and quantitative analysis related microstrip antenna,
triangular-patch. especially truncated tip using annular sector slot antenna,
feeding probe, and mobile satellite communications.
Ensemble version 8.0by moment method software is
I. INTRODUCTION used to design antennafor mobile satellite communication.
To obtain circular polarization (CP)operation, some There are some advantages i.e. for industry and research
designs by embedding a cross slot of unequal slot lengths department to develop technology of telecommunication,
in the circular patch [1] or inserting slits of different especially for design antenna with the new one of
lengths at the edges of a square patch [2] or truncated tip technology.
of equilateral triangular antenna [3] or using proximity The conclusion is enclosed of this paper that it
feed embedded on below radiating patch antenna [4] have contributes the valuable analysis of singly-fedcircularly
been proposed recently. In the case of the equilateral polarized triangular microstrip antenna with truncated tip
triangular antenna with a truncated tip [3], for RHCP the using annular sector slot for mobile satellite
probe-fed is usually located in the right half of the communications.
triangular patch. Conversely, LHCP radiation can be
obtained in the left half of the triangular patch. In this III. ANTENNA CONFIGURATION
research, the new phenomena happen if the patch antenna Fig.1 shows the configuration of antenna design. The
changed become triple truncated tip with case Is> Ip(see triangularpatch has a side length of a = b and using a
Fig.1), probe-fed RHCP and LHCP located on the left and conventional substrate (relative permittivity 2.17 and loss
right half of the triangular patch, respectively. In the case tangent 0.0009). The antenna is fed by single probe which
Is<Ip, the RHCP and LHCP can be obtained with the rule located on right half for LHCP. Here, any three of small
above [3], but if case Is = Ip, both of RHCP and LHCP can triangular tip wherein two of all are the same side length
not happen, only linear polarization can be obtained. In Is.It is affected to excite more magnitude current path
this case, the function of two truncated tip with length Is around this area which moving to y direction and x
are as switch to move variation of polarization, if the direction, hence increasing the bandwidth. The others
probe-fed exist on the same place. In addition, the triangular tip has side length Ipowing to the truncated-tip

C4-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

perturbation, the effective excited patch surface current The bandwidth c3sis almost the same with c1. It is caused
path in the y direction is slightly more length than that in by using double truncated tip Is on the below side of the
the x direction, which gives the y-directed resonant mode patch antenna thus the total of vector current distributions
a resonant frequency slightly smaller than of the x- become increased are just around this area. In the case of
directed resonant mode. That is, the dominant mode antenna c3s, the bandwidth decreased due to by used
(TM10 mode) of the triangular patch can be split into two annular sector slot embedded on the ground plane.
near-degenerate orthogonal resonant modes of equal Moreover, the bandwidth of antenna c1is also decreases,
amplitudes and 900 phase difference for LHCP operation. because of without using the truncated tip Is, but it is
slightly wider than antenna c3s.
Fig.2 shows that the value of gain and axial ratio
(top view) (Ar)for simulation of new model antenna at the resonant
frequency. They are as followed that antenna c1 operates
at the frequency 2.76 GHz, gain RHCP= 6.66 dBic, Ar =
substrate
2.91 dB, antenna c3is frequency operation = 2.9 GHz, gain
LHCP = 6.98, Ar = 3.02 dB, antenna c3sis frequency
LHCP operation = 2.505 GHz, gain LHCP = 6.08, Ar = 1.75 dB.
RHCP
In addition, eachantennais fed by probe-fed at the same
loci on the patch antenna. It is clear that antenna c1 and c3
did not satisfy the targets yet, especially the axial ratio. It
is due to by the loci of feeding are still not maximize yet
on the surrounding of patch antenna.Moreover, peak gain
patch slot
probe_fed antenna c3s at the frequency resonant is lowest than the
others. It is caused by annular sector slot embedded on the
(side view) ground plane can decreased of gain. In addition, the
bandwidth of gain c3 is the widest than the others. It is due
substrate ground to used the truncated tip Is and without using annular
sector slot.
Aluminium plate
Fig.1. Configuration of simulated antenna, slot on the Gain-RHCPc1 Arc1 Gainc3 Arc3 Gainc3s Arc3s
ground plane 8 8

Moreover, the annular sector slot embedded on the


6 6

Axial ratio [dB]


ground plane with wide of radial w = 1 mm, it is meant
Gain [dBic]

for decreasing the frequency operation, therefore the


antenna can be design more small than the previous
4 4
antenna. In addition, the annular sector slot can appear the
others mode (TM20 and TM30) atthe higher frequency
operation. Placing of this slot on the around of ground 2 2
plane can affect the surface current path, and then effect
to the performance of antenna.
In this paper, the method of moment(Ensemble 0 0
version 8 software) is employed to simulate the model 2.4 2.5 2.6 2.7 2.8 2.9 3
with an infiniteground plane.Consideration of the efficient Frequency [GHz]
thickness of the antenna(see Fig.1) allowed either the Fig.2. Gain and axial ratio vs frequency
substrate thickness for triangular patch to be defined with
the single substrate or single layer (h = 1.6 mm). The new Fig. 3 shows the relationship between the reflection
model antenna result (c3s) compared to the others that the coefficient (S-parameter) and frequency for the simulation
characteristic of the others antenna are the same design Rx antenna. From this figure, it can be seen that the S-
but without annular sector slot (c3) and the same design parameter of new model antennac3s at the resonant
without truncated tip Is, without annular sector slot (c1) to frequency by comparison of the others (S11-c1 = -13.55 dB
know the improvement of performance each other of and S11-c3 = -13.81 dB) is the best about by -21.07 dB. It
antenna. caused by used annular sector slot and thelocation of this
slot on the ground plane which likes the hyperbolic
IV. RESULTS position respect to null potential or central antenna. The
Fig.2 to Fig.4 shows the result for simulation among bandwidth of S-parameter of the new model antenna c3s is
of the new model antennac3s, c3 andc1, in the case of the widest than the others. It is caused by loci of feeding
frequency characteristic, S-parameter,and input which optimized on that place of patch antenna compared
impedance. The bandwidth c3is widest than the others. the others. In addition, it is also the effect of perturbation

C4-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

area on the both of below patch antenna (Is) can enhance the purpose design. If we want to design small antenna,
the bandwidth of S-parameter. owning the enough bandwidth, antenna c3s will be better,
but if we want to design wideband antenna, so antenna c3
0 is should be chosen, especially for applicationmobile
satellite communication.
The future work will be done to design small antenna
S-parameter [dB]

that owning wide bandwidth,based on the new model


-10 antenna by optimizing the perturbation area and slot.

REFERENCES
-20 [1] H. Iwasaki, A circularly polarized small-size
S-parameter c1 microstrip antenna with a cross slot, IEEE Trans.
S-parameter c3
S-parameter c3s Antenna Propagat.,vol.44, pp1399-1401, Oct. 1996
[2] K.L. Wong and J.Y.Wu, Single-feed small circularly
-30 polarized square microstrip antenna, Electron. Lett.,
vol. 33, pp.1833-1834, Oct.23,1997
2.4 2.5 2.6 2.7 2.8 2.9 3 [3] C.L. Tang, J.H. Lu, and K.L. Wong, Circularly
Frequency [GHz] polarized equilateral-triangular microstrip antenna
Fig.3. S-parameter with truncated tip, Electron. Lett., vol. 34, pp. 1227-
1228, June, 1998.
Fig.4 depicts the input impedance characteristic of Rx. [4] J. T. S. Sumantyo, K. Ito, D. Delaune, T. Tanaka, and
This figure shows that the real part of simulation is H.Yoshimura Simple satellite-tracking dual-band
difference of each others, but in the case antenna c3sreal triangular patch array antenna for ETS-VIII
impedance by closed50 at the frequency applications, Proc.IEEE Int. Symp. Antennas and
operation.Moreover, the reactance part of new model Propagation, pp. 25002503, 2004
antennac3s is the best than the others by closed 0 at the
resonant frequency.
Muhammad Fauzan Edy Purnomo was born in
150 150 Banjarmasin, Indonesia, in June 1971. He received the
B.E. and M.E. degrees in Electrical Engineering from
100 100 University of Indonesia, Jakarta, Indonesia in 1997 and
50 50 2000. He is presently with the Electrical Department
Xin[]

University of Brawijaya, Malang, Indonesia where he is


Rin[]

0 0 working toward as lecturer. His main interests are in


the areas of microstrip antennas, array antenna for
-50 -50 mobile satellite communications, and Synthetic
Aperture Radar (SAR).He has been ever be a student
-100 Re c1 Imc1 Re c3 Imc3 Re c3s Imc3s -100
member of the IEICE and IEEE.
-150 -150
2.4 2.5 2.6 2.7 2.8 2.9 3 Sapriesty Nainy Sari was born in Medan, Indonesia,
Frequency [GHz] in April 1988. She received the B.E. and M.E. degrees in
Fig.4. Input impedance Electrical Engineering from Institut Technology
Sepuluh Nopember, Surabaya, Indonesia in 2009 and
2011. She is presently with the Electrical Department
V. CONCLUSION University of Brawijaya, Malang, Indonesia where she
The new model antennawas studied in order to get a is working toward as lecturer. Her main interests are
compact, small, and simple configuration. The results of in the areas of Digital Signal Processing (DSP) and
characteristic performance among the new model antenna Communication Network.
are difference, but any two of them can be developed for
mobile satellite application. They are c3 and c3s depend on

C4-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Improvement in Performance of WLAN


802.11e Using Genetic Fuzzy Admission
Control
Setiyo Budiyanto
Electrical Engineering Department, Faculty of Engineering, Mercu Buana University
JL. Raya Meruya Selatan, Kembangan, Jakarta, 11650
Phone: 021-5857722 (hunting), 5840816 ext. 2600 Fax: 021-5857733
budiys1@gmail.com

AbstractThe Development of WLAN is growing rapidly less understood and has a lot of interdependence whereas
along with the possibility of multimedia services fuzzy logic is able to work based on human intuition and
transmission through the wireless network. Until now, logic, the combination of the two algorithms is expected
WLAN has been recognised as a most reliable wireless data to generate a mechanism that allows a better performance
communication and it has a transmission rate more speed
improvement.
than WiMAX as well as celluler system. To ensure this
application and to maintain the quality of service, WLAN Studies that use fuzzy logic and genetic algorithms
needs an adaptive admission control system to guarantee on admission control as in [1] fuzzy logic is used as an
the channel availability for each connection request in high admission control in high speed networks such as ATM
speed transmission rate. In this paper, we proposed a (Asynchronous Transfer Mode), this scheme is an
Genetic Fuzzy Algorithm as an admission control in WLAN improvement over conventional admission control
802.11e. Simulation will be done to investigated the ability schemes. In [2], fuzzy logic tuned by genetic algorithm is
of Genetic Fuzzy Algorithm as an admission control in used for call admission control in ATM networks. ATM
WLAN 802.11e in relation with Quality of Service technique that uses statical multiplexing complicate for
Guarantee.
the application of mathematical models, hence the fuzzy
Keywords ; WLAN 802.11e, Admission Control, Genetic system is very suitable to be applied. Furthermore, [3]
Fuzzy System Fuzzy Logic is used to control parameters such as cell
congestion status, load availability, and the total
I. INTRODUCTION interference. Fuzzy rules are used for admission criteria,
from the simulation results, obtained an improvement
Since the release of the IEEE 802.11 standard in when compared to classical admission control strategy.
1999, the applications running on the WLAN flatform Fuzzy logic is also used as an Adaptive Contention
increasingly diverse, such as voice to video streaming. Window (CW) based on the ambiguity of information
But the Medium Access Control (MAC) on the IEEE from the channel in [4],. This scheme then compared with
802.11 standard was originally designed for best effort the scheme of differentiation, it was found that this
applications (such as e-mail, web browsing) so it can not scheme has the capability of adaptation for streaming
meet Quallity of Service requirements for many types of applications. [5], the combination of fuzzy logic and
new applications develop. genetic algorithms used for optimal access network and
To support Quality of Service, Enhance Distributed promising in the heterogeneous wireless networks.
Channel Access (EDCA) was introduced in IEEE In this paper, we propose the application of Genetic
802.11e WLAN standard, which was built as a derivative Fuzzy System (GFS) as the admission control in WLAN
of the Distributed coordination function (DCF), equipped 802.11e. This is a new proposal because no one has
with a prioritization of the four access categories (AC). proposed this scheme before. GFS will be applied as an
This is achieved by variations in the size of contention admission control by considering the parameters of
window (CW) in back-off mechanism in each category. collition rate and network load so that decisions can be
The continued development of multimedia services led taken with proper admission.
to the need in the admission control is increasing as well,
so it introduced an adaptive admission control to improve
performance of WLAN 802.11e. The use of fuzzy logic II. IEEE 802.11E MAC LAYER [6]
and genetic algorithms as adaptive admission control has The IEEE 802.11e refer to the specifications
been widely used in research compared to other artificial developed by The IEEE for Wireless Local Area
intelligence algorithms, both algorithms are preferred to Networks (WLAN). MAC Layer of The IEEE 802.11e is
apply, it is because they do not require complex distinguished by the previous 802.11 standards by the
mathematical models and easy to implemented. Genetic availability of the Access Category (AC) aimed at
algorithm allows to find solutions to problems that are prioritization of data. Includes 802.11e Enhance
C5-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Distributed Channel Access (EDCA). The IEEE 802.11e higher priority AC gets smaller AIFS values.
has four transmission queues, each acting as a single Formulation of AIFS as follows:
entity Enhance DCF, which is an Access Category (AC). AIFS [AC] = SIFS + AIFS [AC] x Slot Time (2)
Therefore EDCA works with four AC, where each AC, SIFS = Short Inter-Frame Space
dealing with one different access channels b. CWmin, CWmax
This is the value of backoff counter which is uniformly
distributed random value between the contention
window CWmin and CWmax. The higher priority AC
getting smaller value of CWmin and CWmax.
c. TXOP (Transmission Opportunity) limit
This is the maximum duration of transmission after the
medium requested. TXOP obtained from the EDCA
mechanism called EDCA-TXOP. During the EDCA-
TXOP, a station can transmit multiple data frames from
the same AC, where SIFS time period, split between the
ACK and data transmission sequence. The higher
priority AC get the larger of it's TXOP limit. TXOP
for each AC-I is defined as:

TXOP [i] = (MSDU [i] /R) + ACK +SIF +AIFS [i] (3)
Figure 1. Enhance Distributed Channel Access (EDCA) [7]
MSDU [i] is the packet length to the AC-I, ACK is the
Each AC consists of a queue-free delivery and a time required to transmit an acknowledgment, R is the
channel access function with its own parameters, namely physical transmission rate, SIF is the time period are
the minimum and maximum Contention Window required by SIF, AISF [i] is the time of AIFS in AC-I.
(CWmin, CWmax), Arbitration Interframe Space (AIFS)
and the duration of the Transmission Opportunity III. IEEE 802.11E MAC LAYER [6]
(TXOP).
EDCA access mechanism can be described as This research consists of two major parts namely
follows, when the medium is busy before the backoff designing a Genetic Fuzzy System (GFS) to be applied to
counter reaches zero, then the backoff should be stopped the 802.11e WLAN admission control and testing of the
temporarily, and the station must wait for a period of scheme on a single WLAN system.
AIFS. When the medium is idle again, during the AIFS, At this early stage, to design a model of genetic
backoff counter minus one. algorithm scheme is applied to the WLAN 802.11e
After the transmission failed, a new CW value is EDCA admission control, as shown in Figure 2.
calculated by Presistence Factor (PF), which is also a
unique value according type of AC. CW value is
calculated based on the following provisions:

CWner [AC] ((CWold [AC] + 1) x PF) 1 (1)

After entering the MAC layer, each data packet is


received from upper layers are assigned with a specific
user priority value between 0-7. Each packet of data that
has been given a priority value is mapped into the Access
Category. Applications that are background traffic such
as FTP, mapped into the Access Category AC_BK.
Applications that are best effort such as web browsing
mapped into Access Category AC_BE. Streaming video
applications such as video confference mapped into
Access Category AC_Vi, while the voice application is
mapped into the Access Category AC_VO.
EDCA parameters are periodically sent by Access
Point, parameters that are sent can be dynamically
changed depending on network conditions. EDCA
parameter values are different for each AC, the
parameters are:
a. AIFS (Arbitration Inter-Frame Space)
Each AC starting backoff procedure or begin
transmission after a period of AIFS replaces DIFS. The
Figure 2. System Model of Genetic fuzzy Admission Control

C5-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

In the figure 2 shown a modification of conventional The model for the input membership functions used
EDCA admission control system by adding the GFS as a is the triangular model, it is intended to avoid too much
device that responsible for determining whether a request overhead to the process of fuzzy on the MAC layer
will be served or not.
GFS output is obtained from the process of genetic Figure 4. Input Membership functions
algorithms and fuzzy rules by observing the condition of
the network. The following figure illustrates this idea, as Membership
Degre
a note that the genetic learning process aims to design or
optimize the KB (Knowledge Base). Consequently, a
GFS is a design method for fuzzy system of basic rules
that combine evolutionary techniques (genetic algorithms
to achieve automatic generation or modification to all or
part of the KB).
0. 001 0. 005 0.02 0.03
Network load

Membership
Degre

0.3 0,4 0.5 0.6


Network load

Figure 3. Genetic Fuzzy Rule Base System [8] B. Genetic Process


A set of parameters describe the fuzzy rules, The general form of Genetic Algorithm as described
fuzzy membership functions, and search a set of by Goldberg [10]. Genetic Algorithm is a stochastic
parameter values that match based on the optimization search algorithm based on the mechanism of natural
criteria. Knowledge Base Parameters, set the selection and natural genetics. Genetic algorithms,
optimization space, phenotype space that must be different from conventional algorithms, starting with the
changed into a single representation of genetics. For the initial set of random solutions called population. Each
purpose of finding the genotype space, the GA requires individual in the population of individuals called single
some mechanism to derive new variants of candidate (or chromosome), represents one potential solution to the
solutions. The purpose of search process is to maximize problem. Individuals evolve through successive
or minimize a fitness function that describes the desired iterations, called generations. During each generation,
behavior of a system. individuals were evaluated using a fitness measure. To
create the next generation, new chromosomes called
A. Fuzzyfication Interface offspring (offspring) is formed by either merging two
Input fuzzy membership functions obtained from the individuals from current generation using crossover and /
measurement network load and the collision rate is used or modify an individual using a mutation operator. A new
as fuzzy membership functions at the MAC layer [9]. generation is formed with a good selection of individual
fitness according to their value. After several generations,
The number of packet collision the algorithm converges on the best individual / superior,
Collision rate = (4) which is expected to represent the optimal solution or
The number of packets transmitted near optimal solution to one problem.

While the network load is used as the input fuzzy 1) Generate An Initial Population Of Encodec Rules
membership functions were also measured at the MAC Intial population can be generated from the output of
layer. Network load is represented as a time when the fuzification set. The code is obtained by concatenated
wireless medium busy represented by transmission rule using AND Operator. Location on the chromosome
apportunity (TXOP), the time needed to transmit an indicate the start and end of a particular rule. The total
MSDU, TXOP obtained from equation (5) number of fuzzy sets in the DB is L [11] :

TXOP[i] = (MSDU[i]/R) + ACK + SIF + AIFS[i] (5) L = La + Lc (7)


where:
The total network load can be represented as the sum La = Ni, where I = 1 to n
of TXOP that existed at all AC I at all stations j, which is: Lc = Mj, where j = 1 to m

Net_load = queue_ength[j][i] xTXOP [i] (6) n and m is the number of input and output variables. Ni is
the number Ni represents the number of linguistic terms

C5-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

associated to input variable Xi and Mj the number of Using this methodology, a stronger rule can evolve with
linguistic terms associated to output variable Cj. The every new generation.
general structure of a rule with AND operator is [16] :
3) Crossover and mutation
if X1 is Y1 AND X2 is Y2 then Z1 is C1 (8) According to the theory of Genetic Algorithm, a
crossover operator selects substrings of genes of the same
X1, X2 are input variables, Y1, Y2 is Linguistic Value, length from parent individuals which are known as off-
Z1 is output variables and C1 is value. springs from the same point, replaces them and generates
a new individual. This point can be selected randomly
For implementing fuzzy rules, we uses fuzzy mamdani [13]. For designing chromosome, we used binary
membership functions used in Term set1: {High, encoding .Different rules can be represented in form of
Medium, Low} while term set 2 consist of output label chromosomes labeled as individuals. Here, single point
set {Strong accept, Weak Accept, Strong Reject and crossover operator has been implemented.
Weak reject} for output variables. Different combinations
will be utilized for chromosome representation scheme.
IV. IMPLEMENTATION
2) Fitness Function This research will be implemented in Network
The encoding scheme which is discussed as follows : The Simulator-2 or The NS-2. The NS-2 used is NS 2.28
rule be in the form : If A then C, whre A is Antecedent because EDCA module is implemented in NS-2.28
and C is consequent: The predictive performance of a version made by Sven Wietholter and Christian Hoene
rule can be summarized by a 2 x 2 matrix, which from the Technical University Berlin Telecommunication
called a confusion matrix, as illustrated in table. 1. Networks Group, EDCA module was used because it has
The labels in each quadrant of the matrix have the been verified and used by many researchers by many
following meaning: [12] : researchers as well as having good documentation
[14,15,16].
Table 1. Confusion Matrix In the The NS-2.28, 802.11e WLAN is implemented
Actual Actual in the classes. Modifications done on a class-802_11e.h
Positive Negative mac, mac-802.11.cc, priq.h and priq.cc so it can measure
Positive the collision rate and network load.
TP FP
Prediction
Negative
FN TN V. CONCLUSION
Prediction
Fuzzy rule base is used for optimization or search
Where ; problems, and genetic algorithms are widely known and
TP = True Positives = Number of examples satisfying A used for global search techniques with the ability to
and investigate a global search space for solutions that fit
FP = False Positives = Number of examples satisfying A with a single scalar performance measurement. In
but not C addition to the ability to find the nearest optimal solution
FN = False Negatives = Number of examples not in the a complex search space, the structure of the genetic
satisfying A but satisfying C code and performance features of the genetic algorithm
TN = True Negatives = Number of examples not makes it suitable as a candidate to be combined with
satisfying A nor fuzzy system. The ability of the fuzzy system is expanded
with use of genetic algorithms to develop a broad range
Therefore, CF(Prediction)=TP/(TP+FP) (9) of approaches to designing a fuzzy system fundamental
rules.
Prediction accuracy is measured by (9) by looking for The use of soft computing especially fuzzy rule base
proportion of the examples that have predicted class C, for admission control in 802.11e WLAN has been done,
that is actually covered by the rule antecedent. Rule however the results still can not meet the expected level
Completeness (true positive rate) can be measured by the of QoS. Use of Genetic Fuzzy, is expected to optimize
following equation. the search for fuzzy membership functions so as to
improve QoS as expected..
Comp = TP / (TP + FN) (10) Previous research was conducted on a fix WLAN
networks, in this study will be conducted on wireless
By combining (9) and (10) we can define a fitness mesh networks with multimedia traffic so the proposed
function such as: algorithm can be tested more optimal.

Fitness = CP x Comp (11)


REFERENCES
For each rule, degree of fitness is calculated according to
the above mentioned fitness function. According to a [1] Gao, Deyun and Cai, Jianfei, Admission Control in IEEE
defined termination criterion, new offspring is generated. 802.11e Wireless LAN, Nanyang Technological
University, Singapore, University of Hongkong, 2006
C5-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

[2] Barolli, Leonard et.all, A CAC Scheme for Multimedia [11] Cordon, O., Herrera, F., Hoffmann, F., Magdalena, L.:
Applications Based on Fuzzy Logic, Proceedings of the Genetic Fuzzy Systems, Evolutionary Tuning and
19th International Conference on Advanced Information Learning of Fuzzy Knowledge Bases, Advances in Fuzzy
Networking and Applications (AINA05) 2005 system-Applications and Theory, Vol. 19, pp.89-
[3] Piyaratna, Sanka et.all., A Genetic Algorithm Tuned Fuzzy 93,97,179-183,World Scientific, USA (2001)Electronic
Logic Based Call Admission Controller for ATM Publication: Digital Object Identifiers (DOIs):
networks, University of Adelaide, 1997 [12] Freitas, A.: A Survey of Evolutionary Algorithms for Data
[4] Dini, Paolo and Cusani,Roberto, A Fuzzy Logic Approach Mining and Knowledge Discovery, 31-36 , AAAI Press,
to Solve Call Admission Control Issues in CDMA Brazil (2003)Article in a conference proceedings:
Systems, EUSFLAT - LFA 2005 [13] Akerakar, R., Sajja, P.S., Knowledge-Based Systems,
[5] Naoum-Sawaya, Joe, Ghaddar, Bissan, A Fuzzy Logic Jones and Bartlett, Massachusetts (2010)
Approach for Adjusting The Contention Window Size in [14] Kevin Fall, Kannan Varadhan, The ns Manual, The
IEEE 802.11e Wireless Ad Hoc Networks, University of VINT Project, 2009
Waterlo, Canada, 2005 [15] S.McCane, S.Floyd, NS Network Simulator ,available at :
[6] IEEE 802.11e, Wireless LAN Medium Access Control www.isi. edu/nsnam/ns/
(MAC) and Physical Layer Extension in the 2.4 GHz [16] Wang, Yue, A Tutorial of 802.11 Implementation in ns-2 ,
Band, Supplement to IEEE 802.11 Standard, IEEE , MobiTab Lab.
September 1999
[17] Mankad, Kunjay, Sajja, Pritti Srinivas and Alkerkar
[7] IEEE 802.11e, Wireless LAN Medium Access Control Rajendra,Evolving Rules Genetic Fuzzy Approach-An
(MAC) and Physical Layer Extension in the 2.4 GHz education Case study, International Journal of Soft
Band, Supplement to IEEE 802.11 Standard, IEEE , Computing (IJSC), Vol. 2, No.1, February 2011
September 1999
[18] Kejik, Petr, Hanus, Stanislav, Comparison of Fuzzy Logic
[8] Oscar Cordon, et.al., Genetic Fuzzy Systems: Evolutionary and Genetic Algorithm Based Admission Control
Tuning And Learning Of Fuzzy Knowledge Bases, World Strategies for UMTS System, available at :
Scientific Publishing Co. Pte. Ltd., Singapore, 2004. http://www.radioeng.cz/fulltexts/2010/10_01_
[9] Munadi, Rendy, R.Rumani, Layla, Performance Analyze 006_010.pdf
of IEEE 802.11e WLAN For Mixed Traffics TCP-UDP [19] Alkhawlani,Mohammed, Ayesh, Aladdin, Access Network
Using Adaptif Admission Control Mechanism, IGCES Selection Based on Fuzzy Logic and Genetic Algorithms,
2008, Desember 2008, Malaysia Hindawi Publishing Corporation Advances in Artificial
[10] D. E. Goldberg, Genetic Algorithms in Search, Intelligence Volume 2008, Article ID 793058, 2008
Optimization, and Machine Learning. Addison-Wesley,
1989

C5-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Characterization of Tilted Fiber Bragg Grating as


a Sensor of Liquid Refractive Index
Eka Maulana1, Sholeh Hadi Pramono2, A. Yokotani3
Department of Electrical Engineering, Brawijaya University1,2
Department of Electrical Engineering, University of Miyazaki3
ekamaulana@ub.ac.id

are informations though the surface of the cladding can


Abstract We have developed a fabrication technique of be detected, while normal FBG can observe only
tilted fiber Bragg gratings (TFBG) for measuring sensors mechanical phenomena such as change in length since
of refractive index of liquids. We demonstrated that a the cladding prevents the optical information to the core
simple technique using a combination of 266-nm laser and from the outside. Though the temperature indeed can be
a phase mask with a period of 1.065 m was quite effective defected using the normal FBG, this is also measured by
for the fabrication of the TFBG. Using fabricated TFBGs
mechanical volume change due to the thermal expansion.
which had the tilted angles of 3.3, 6.7, 7.3, 8.0, and 9.9,
we tried to measure the refractive index of liquids which Fabrication of TFBG has been conventionally performed
have different indices. Water, ethanol, and glycerine using Lloyd mirror interferometer by 244-nm Ar+ ion
solutions (12%, 24%, 35%, 46%, 66%, and 84%) were laser and the spectra observed in previous work4). In
used as samples. For the measurement, a 10 mm long addition, it has been reported that refractive index of
TFBGs were covered with a sample liquid drops. The liquid is able to detect in principle by using the envelope
transmission spectra in the cladding mode and core mode of the cladding mode of TFBG5). However, adjustment
were observed by an optical spectrum analyzer. We have of the Lloyd mirror causes a instability of the period of
directed our attention to the fact that wavelength of the grating and furthermore, use of Ar+ ion laser results
cladding mode shifts to be longer with the increase of
in a large difficulty when this technique is considered to
refractive index of sample liquids. Utilizing this
wavelength shift, we proposed a new measurement method. apply on a commercial basis.
As a result, we could successfully measured the refractive In this research, we have developed a simplified
index of liquids within a range from 1.00 to 1.41 with a fabrication technique of TFBG using a combination of
maximum sensitivity of 3.0x10-3. In addition, we have 266-nm laser and conventional phase mask which is able
found that a contact length of only 2.4 mm is necessary to to use without a complicate optical adjustment. Besides,
obtain 90% of signal intensity of 10 mm long TFBG.. we also tried to characterize the fabricated TFBG as a
sensor for refractive index of liquids. As a result, we
Index Terms Fiber Bragg Grating, refractive index,
phase mask, cladding mode. found a new method to estimate the index of liquid with a
wider measurement range compared to the conventional
method that has been reported in previous work5).
I. INTRODUCTION
II. TFBG PROPERTIES
T he fiber sensors are widely used in physical sensing
such as temperature, strain, vibration, pressure,
liquid level and so on1). The increasing of fiber
The FBGs are made using laser beam interference
technique. Fundamental structure of FBG and TFBG are
sensor development for these purposes has many shown in Figure 1. A single core mode is produced in the
advantages, ie, electro-megnetic immunity, small size, FBG transmission spectrum. Basically, the wavelength
stability, harmless, and high sensitivity2). shift in the core mode is used to detect mechanical
Photosensitivity of fiber core was reported by Hill et al. change in the fiber, therefore wavelength of core mode is
in 19783). Since then, this invention has been a utilized to measure physical parameters6).
significant background for the many kinds of fiber sensor
developments. Especially, the fiber Bragg gratings
(FBG) which consists of a periodic modulation of the
refractive index in the core of a single mode optical fiber
have become widely used for distortion sensors.
Recently, in addition to the FBG sensors, tilted fiber
Bragg grating (TFBG) have become to attract
considerable attention for sensing application. Because
in TFBG, not only the properties of the core but also
informations the cladding affects the reflection spectrum.
Figure 1. Structure of (a) FBG (b) TFBG
Therefore in TFBG, non-mechanical phenomena which

C6-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The wavelength of core mode in the FBG ( ) period tfbg a long the longitudinal direction which
can be calculated by the following equation, follows the equation 3.

, (1) , (3)
where, neff.core is effective refractive index of the core,
and is the grating period. where, pm and ext are grating period of the phase
FBGs are intrinsically insensitive to the mask and the external tilt angle between the grating and
environment, because the core modes are the sample fiber, respectively. A phase mask of 10 mm
well-screened from incident of the light from outside long was used in this experiment.
due to the presence of the cladding7). On the other
hand, in the case of the TFBG which has a tilt angle ,
not only the core mode but also a number of cladding
modes are observed in the reflection spectrum. The
reflection wavelengths of the cladding modes
( ) are calculated using the following
equation,

, (2)
where, neff.cladding is the effective refractive index of
the cladding which is corresponding to each ext

reflecting order in the cladding mode. The


wavelength and amplitude of the cladding mode are Figure 2. Experimental setup
affected by optical properties of the surrounding The fiber was fixed on a rotary stage to adjust the ext
material. The spectral behavior in the core and the easily. The ext were chosen at 5, 10, 11, 12 and 15,
cladding modes have beed reported in previous which were corresponding to the incident angle of
work8). modulated beam to the fiber surface. Since refraction
occurs between air and fiber material by the UV beam
III. EXPERIMENTAL METHOD during fabrication, the tilt angles in the fiber core
became 3.3, 6.7, 7.3, 8.0 and 9.9. The probe light
A. Fabrication of TFBG with a wavelength range from 1520 to 1610 nm was used
The experimental setup for fabrication of TFBG is for the transmission spectral measurement. Two
shown in Figure 2. We used a 4 Nd:YAG laser and a mechanical splicers were used for connecting the fiber to
wavelength converter to produce pulsed 266-nm UV the light source and the OSA. The typical irradiation
laser beam. The beam was reflected by five mirrors and period of the UV beam to obtain an enough intensity for
linierly focused on a sample fiber by three cylindrical measurement was 20 minutes. We checked the spectral
lenses. The laser pulses with an energy of 50 mJ/pulse change during TFBG fabrication.
were produced by this laser. The beam was introduced to B. Refractive Index Measurement
an optical fiber core through a phase mask made of silica
We put a droplet of sample liquid which covered
glass. In this technique, periodically modulated UV
whole the TFBG whit a length of 10 mm for refractive
beam was produced by interference of diffracted two
index measurement. Experimental setup to measure the
laser beams due to the phase mask. The minimum
refractive index of liquid is shown in Figure 3. Two
distance between the phase mask and the fiber sample
holders were used to keep the TFBG stable on the glass
was approximately 1 mm. Tension of the fiber was kept
plate without applying tension. The liquids used were
at 5.9x10-4 N during fabrication process with the UV
include water, ethanol, and glycerine solutions.
beam irradiation
A H2 loaded SBG-15 (Newport corp.) photosensitive
optical fiber was used for the sample fiber. This fiber is a
single mode and germanium- boron-codoped. We used
sample fibers of 250 mm long. The polymer jacket at the
center part of the fiber was removed by 50 mm long for
UV beam irradiation. The polymer jacket at both ends of
the fiber were also removed by 20 mm long in order to Optical
Spectrum
connect an optical spectrum analyzer (OSA) and an ASE
Analyzer
light source. The fiber Bragg grating was made in the Figure 3. Refractive index measurement procedure
center part of fiber using phase mask technique. A phase
mask with a grating period 1.065 m was used. This The reason why we have chosen the glycerine solution
phase mask creates a grating in the fiber core with a is that the refractive index of the solution can be easily

C6-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

adjusted in wide index range by simple mixing of the the core mode compared to 7.3-TFBG was observed.
glycerine and water9). The concentration of glycerine The peak wavelength and the intensity were 1580 nm
solution used in the experiment was from 12% to 84%. and 2 dB, respectively. The cladding mode were
The detailed information for index of sample was observed in a range form 1520-1578 nm. The maximum
summarized in Table 1. intensity of the cladding mode was 11.5 dB at 1548 nm.
Table 1. Refractive index of sample We observed two coupling modes in the cladding mode
Sample Ref.Index as well.
Air 1.0003
Water 1.3255
LP11
Ethanol 1.3539
Glycerine 12% 1.3417
Glycerine 24% 1.3579
Glycerine 35% 1.3727
Glycerine 46% 1.3876 LP1n
LP2n
Glycerine 66% 1.4146
Glycerine 84% 1.4389
We observed the core and the cladding modes in the
transmission spectra and investigated the relationship
Figure 5(a). transmittance spectra 7.3-TFBG
between the spectral change and to the change in
refractive index.

IV. RESULT LP11


A. Characteristic of Fabricated TFBG
Transmittance spectra of 0-TFBG (namely normal
FBG) after two minutes irradiation time is shown in
Figure 4. Only the core mode LP11 was observed in this
spectrum. The intensity of the core mode LP11 was 9.5 LP1n
LP2n
dB at 1544 nm.

Figure 5(b). Transmittance spectra 8-TFBG

LP11

Figure 4. Transmittance spectra 0-TFBG


Figure 5(a) shows the transmittance spectra of the
7.3-TFBG after 20 minutes irradiation time. We
investigated not only core mode LP11, but also the
Figure 5(c). Transmittance spectra 9.9-TFBG
cladding modes in a spectral range approximately from
1520 to 1563 nm. The core mode shifted to the longer Figure 5(c) shows the transmittance spectra of the
wavelength and reached 1565 nm, and its intensity 9.9-TFBG after 20 minutes irradiation. In this case, the
decreased to 2.5 dB. The maximum intensity of 9 dB in core mode was disappeared. The cladding modes were
the cladding mode was observed at a wavelength of 1546 observed in a range from 1520 to 1580 nm. Although
nm. In the cladding mode, two coupling modes (LP1n and superposition of the two coupling modes were not
LP2n) were observed. apparently observed, we could confirm that both of them
Figure 5(b) shows the transmittance spectra of the were present because the wavelength difference between
8-TFBG after 20 minutes irradiation. In the case of two adjacent peaks were almost same as the those in the
8-TFBG, the longer wavelength and smaller intensity of case of 8-TFBG.

C6-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

B. Characteristic of Liquid Mesurements The resolution of refractive index is shown in Figure


Using the 8-TFBG which exhibits the strongest 8. We estimated the spacial resolution of detection using
coupling in cladding mode, the experiments for 8-TFBG, The resolution of the optical analyzer is 20
measuring the refractive index of liquids were pm, then the sensitivity of refractive index change by this
performed. The result are shown in Figure 6. In Figure 6, method is estimated to be 9.2x10-2 to 3.0x10-3 depending
spectral change of a selected one peak in the cladding on the index.
modes is indicated. We selected a peak at 1543.76 nm
which was the strongest peak in 8-TFBG. As shown in
the figure, the peak wavelength shifted to longer as the
refractive index of liquid become larger. As a result,
wavelength shift from 1543.76 to 1544.40 nm
corresponding to the index from 1.00 to 1.41. In addition
to the wavelength change, the smooth change in the peak
intensity was also observed. Laffont et al. have used this
change in intensity to estimate the index of liquid and
demonstrated that the refractive index of liquids from
1.35 to 1.44 was able to estimated by calculating area of
the envelope of cladding modes. In this work, we
concentrated to investigate the change in wavelength
intending the wore accurate measurement.

Figure 8. Resolution of refractive index


The spacial resolution of detection is shown in
Figure 9. Using 8-TFBG, it was found that only 2.4 mm
is necessary to contact with the sample liquid in order to
get 90% of signal change at 10 mm droplet.

Figure 6. Refractive index measurement of liquids in 8-TFBG

Figure 9. Spacial resolution of detection in 8-TFBG

V. DISCUSSION
Two modes have been investigated in the TFBGs
transmittance spectra. These modes are the core mode
and the cladding mode. The amplitude of transmittance
spectra become larger by irradiation time. When the
tilted angle of TFBG became larger, the amplitude of
core mode getting smaller and its wavelength shift to the
Figure 7. Relative wavelength shift of TFBG with different tilt angle
longer. In cladding mode, transmittance spectra shows
Similar experiments have been done for other TFBG two coupling modes. At 9.9-TFBG, the core mode
with different tilt angles. Figure 7 shows the relative almost disappeared, it has a cladding mode only. The
wavelength shift to the refractive index of the liquids and amplitude of 9.9-TFBG transmittance spectra after 20
air. The maximum correlation of relative index is minutes different with others. It has small amplitude.
achieved at 8-TFBG. As the tilted angle become larger, We investigated one peak in cladding mode for liquid
the correlation between the index and obtained data measurement. The results show that wavelength shifts to
become stronger. the longer when the refractive index of liquid was

C6-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

increase. Relative wavelength shift to be increasing technique and 266-nm laser.


exponentially against the refractive index of liquid The fabricated TFBG could be used to measure
sample. The maximum transmittance intensity and refractive index of liquid from 1 to 1.41 at
sensitivity were achieved at 8-TFBG. Wider dynamic 8-TFBG
range was achived at 3.3 and 6.7-TFBG. Figure 10 The sensitivity was 9.2x10-2 to 3.0x10-3 for
shows the peak wavelength as a function of refractive 8-TFBG depending on the index.
index of liquids. The square dot shows the measured It was found that only 2.4 mm was enough to
peak wavelength with 8-TFBG. By interpolating the contact for measurement refractive index of
measured data, a smooth correlation curve has been liquid.
obtained in the index range from 1 to 1.41. The circle dot
indicates the data from previous work presented by ACKNOWLEDGMENT
Laffont et al.5). Comparing these two curves in Figure 10, We would like to acknowledge and extend our
we can say that our estimation method indicates the gratitude to Allah SWT, the greatest creator who makes
wider measurement range. Our refractive index range everything possible and to the following person who
was 0.41 while the Laffonts method range was 0.09. have made the completion of this paper among those: Dr.
Agung Darmawansyah, our research team, our advisor,
and all of the member of Photonic Applications
Laboratory in UoM.

REFERENCES
[1] X Dong, et.al.: Tilted Fiber Bragg Grating; Principle and
Sensing Applications, Photonic Sensor, 1,6-30, 2011.
[2] Yin S et.al.: Fiber Optic Sensors. Second Edition, CRC
Press, New York, 2008.
[3] Hill K.O and Meltz G: Fiber Bragg Grating Technology
Fundamentals and Overview, Journal of Lightvawe
Technology, 15(8), 1263-1276, 1997.
[4] Othonos A and Kalli A: Fiber Bragg Gratings, Artech
House, Boston, 1999.
Figure 10. Peak wavelength compared by Laffont method in 8-TFBG [5] Laffont G and Ferdinand G: Tilted Short-period Fibre
Resolution of refractive index measurement depend Bragg Grating Induced Coupling to Cladding Modes for
on optical spectrum analyzer resolution, it was 20 pm. Accurate Refractometry, Meas.Sci. Technol. 12,
The resolution was measured by this method estimated to 765-770, 2001.
-2
be 9.2x10 to 3.0x10 .
-3 [6] R Kasyhap: Fiber Bragg Gratings, Academic Press, San
Diego, 1999.
[7] Erdogan E: Cladding-mode Resonance in Short- and
VI. CONCLUSION Long-period Fiber Grating Filters, J. Opt. Soc. Am. A, 14
Several TFBGs have been fabricated and its (8), 1760-1773, 1997.
transmittance spectra during fabrication has been [8] A Cusano, et.al.: Single and Multiple Phase Shifts Tilted
Fiber Bragg Grating, Research Letters in Optic,1-4, 2009.
investigated. We have also measured the refractive index [9] Rheims J: Refractive Index Measurement in the near-IR
of liquid using wavelength shift monitoring in a cladding using Abbe Refractometer, Meas. Sci. Technol, 8,
mode and transmittance response of TFBGs by liquid 601-605, 1997.
droplet. Based on our experiment, we conclude that:
TFBG could be fabricated using phase mask

C6-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Video Streaming Analysis on Worldwide


Network Interoperability for Microwave Access
(WiMAX) 802.16d
Dwi Fadila Kurniawan, Muhammad Fauzan E.P. dan Widya Rahma M.
Department of Electrical Engineering Faculty of Engineering UB
df_kurniawan@ub.ac.id, mfazanep@ub.ac.id

Abstract-In the recent years, more and more conditions can be met by the WiMAX.
information services require high-speed data access. Video WiMAX is a basic standardized IEEE 802.16
streaming is a real-time service with high-speed data technology that allows transfer of data to access
access which conveys information such as audio and video wireless broadband access as an alternative to cable or
networks using Internet Protocol (IP). Using the streaming
DSL (Digital Subscriber Line). WiMAX can provide
technology clients can play the video in real time
condition. However, its strongly influenced by the access to the type of fixed, nomadic, portable and
bandwidth. Insufficient bandwidth for the streaming mobile wireless broadband to the condition of LOS and
process will cause losses and greater delay[1]. Therefore, NLOS. Just with one Base Station, the theoretical
in order the video streaming service to approach its ideal coverage of the cell radius could reach 50 km. WiMAX
conditions it is necesary to be applied on a network which also includes QoS features that enable services such as
has a high speed data access and large bandwidth. Such voice and video with low delay. According to the
conditions can be fulfilled by the WiMAX network WiMAX Forum, the system can transmit data at speeds
802.16d, because it is the network technology based on up to 75 Mbps per carrier for the type of fixed and
international standard IEEE 802.16 which enable to
portable access. In a network with mobile access types,
transfer data to wireless broadband access as an
alternative to cable or DSL. WiMAX can provide the based on its specifications, it can generate speeds of
folllowing types of access : fixed, nomadic, portable and more than 15 Mbps with a radius up to 3 km. This
mobile wireless broadband on the line of sight (LOS) and indicates that WiMAX technology can be used through
non line of sight (NLOS) conditions[2]. Based on the notebooks and PDAs which can be implemented on
calculations, by varying the distance 1 km - 15 km between mobile phones.
transmitter and receiver for LOS and 1 km - 5 km for In this paper, the calculation of video streaming
NLOS, the value of the propagation losses on NLOS is parameters on the network of WiMAX 802.16 analyzed
found to be much larger than on LOS. In LOS conditions, were pathloss, bit energy to noise ratio (Eb / No), bit
the value of bit error probability is smaller than the NLOS
error rate (BER), packet loss probability of streaming
conditions for all types of modulation. The best conditions
occur in LOS using QPSK modulation with 2.6 Mbps data video, delay end-to-end throughput as well.
rate with bit error probability 2.6184x10-45 and packet
loss probability of video streaming is 9.1200x10-4. II. METHODOLOGY

The first step of methodology used in this paper is


I. INTRODUCTION modeling the system in order to simplified architecture
of end to end WiMAX network created to facilitate the
The current telecommunications technology has calculation and analysis of data end-to-end delay. Fig. I.
evolved to the needs of high-speed data access. Video below shows the picture of end-to-end delay of video
streaming is a real-time service with high-speed data streaming in IEEE 802.16d WiMAX network.
access which conveys information such as audio and
video networks using Internet Protocol (IP). Using the
streaming technology, in ideal conditions clients can tpacketizatio
play the video in real time. Ideal conditions of the video tenc tprop ttrans tprop ttrans tdepacketization
streaming is strongly influenced by the bandwidth. tprop ttrans tdec
Inadequate bandwidth in the process stream will cause
the loss and greater delay. Therefore, in order that tw
service streaming video applications approach ideal
conditions it needs to be applied on a network that has a Fig. I. Modelling end-to-end Delay on the 802.16d
high data access speed and wide bandwidth. Terms - WiMAX network

C7-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Based on that model Performance parameters of video With the same calculations for different distances
streaming on the 802.16d WiMAX network being between the BS to the SS, the obtained results as shown
analyzed include the end to end delay, propagation in Fig.2.
losses, energy bit per noise, bandwidth, probability of
bit error, packet loss, and throughput. Performance is
reviewed from several conditions, namely LOS, NLOS
outdoor and indoor NLOS.

III. RESULTS AND DISCUSSION

The calculation of performance parameters of video


streaming on the 802.16d WiMAX network, consist of
the value of pathloss, RSL, the probability of bit errors,
packet loss probability, end to end delay and
throughput. All performance parameters are computed Fig. 2. Graph of the distance values at RSL LOS
on LOS and NLOS conditions. To simplify the process
of analysis and calculation, some secondary data used is Fig. 2. shows that the greater the distance between BS
as shown in Tables I and II, it shows the specifications and SS, the smaller RSL (received power level of the
of the base station and CPE (Customer Premises receiver).
Equipment) on the WiMAX IEEE 802.16d.
TABLE I Non Line of Sight (NLOS) Conditions
BASE STATION DEVICE SPECIFICATION[3] In this condition, the value loss of NLOS
Parameter Value propagation will be calculated with the distance
Transmitter Power 27 dBm between the transmitter and the receiver changes from a
Maximum EIRP 44 dBm distance of 1 km - 5 km. By using equation (3), the
value of path loss in NLOS conditions can be calculated
TABLE II as follows:
SUBSCRIBER STATION DEVICE SPESIFICATION [4] d
Parameter Value PL = A + 10 log + PL f + PL h + s
d0 ..(3)
Outdoor Indoor NLOS
Profile For the distance between transmitter and receiver as far
NLOS
Receiver Power 24 dBm 24 dBm as 1 km, the value of path loss can be calculated by
Antenna Gain 17 dBi 13 Bi using the steps as follows:
- Calculation of reference path loss value (A)
4 d 0
A. Calculation of Propagation loss (Pathloss) A = 20 log
LOS Condition ..(4)
The calculation of LOS propagation loss is often With = c/f = 0,086 m,
called the Free Space Loss (FSL). The calculation of d0 = 100 m. Than,
this attenuation will be used to calculate the amount of 4 3,14 100
power received by the Receiver Signal Level (RSL). A = 20 log
In this condition the value of free space loss will be 0 ,086
calculated if the distance between the transmitter and = 83,3231 dB
the receiver changes from a distance of 1 km - 15 km
and if the system works at a frequency of 3.5 GHz. By - Calculation of path loss ()
c
using equation (1), loss propagation at a distance of 1 = a b .h t +
km in LOS conditions can be calculated as follows[1]: ht (5)
If the area observed is assumed in urban areas, the
FSL = 32.45 + 20 log d + 20 log f...(1) value of a, b and c using the data in Table III for the
= 32.45 + 20 log 1 + 20 log 3500 terrain type B.
=195.6604 TABEL III
PARAMETER UNTUK TIPE TERRAIN YANG BERBEDA [3]
By using equation (2), the calculation of the signal level Parameter Tipe A Tipe B Tipe C
at the receiver can be calculated as follows:
A 4.6 4 3.6

RSL ( dB ) = EIRP FSL + G r .(2) B 0.0075 0.0065 0.005

C 12.6 17.1 20

Efek shadow (s) 10.6 9.6 8.2

C7-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

- Calculation of the frequency correction factor (PLf)

If f = 3.5 GHz = 3500 MHz, then


17 ,1
= 4 0 , 0065 32 +
32
= 4,3264

the frequency correction factor (PLf) value is


3500
PLf = 6 log = 1.4582
2000

Calculation of antenna height correction factor


user (PLh) Fig. II. Graph of RSL value and distance on NLOS
h
PLh = 10.8 log r
2 Based on Fig. II, it can be seen that the greater the
......................(6)
distance between BS and SS, give greater the value of
If r = 2 m, then:
path loss. Fig. II also shows a comparison of the RSL to
2
PL = 10.8 log = 0 the distance in NLOS conditions. The farther the
2
h
distance between BS and SS, RSL value will lower it
- Shadow fading variation (s) means that power received of receiver getting weaker.
S value can be seen in Table III. For the terrain type B,
the value of s = 9.6 dB. For different types of terrain, B. Calculation of Energy-bit per Noise (Eb / No)
the magnitude of the constants a, b, c, and the shadow The calculation of Eb / No value will be used for the
effect (s) which depends on the type of terrain it can be measurement of bit error probability. In the calculation
seen in Table III. Having obtained the required values, of Eb / No below, use the under conditions LOS lowest
the calculated value of the path loss for NLOS value of RSL, ie -188.8214 dBm and -106.8852 dBm in
conditions with a distance of transmitter and receiver as outdoor NLOS and -110.8852 dBm in indoor NLOS.
far as 1 km as follows:
d
Condition of Line of Sight (LOS)
PL = A + 10 log + PL f + PL h + s The calculation of Eb / No with the bandwidth (B) =
d0 3.5 MHz, using QPSK modulation technique with a
1000
PL = 83.2942 + 10 4.3264 log + 1.4582 + 0 + 9.6 data rate (R) used = 2.6 Mbps is as follows:
100
= 137.6451 dB

In NLOS condition, two types of CPE were used, ie


outdoor and indoor NLOS NLOS with the antenna gain = -188.8214 10 log(2.6x106) + 228.6 dBW
10 log(273 + 37)
respectively - each of 17 dBi and 13 dBi. By using = -165.2973 dB
equation (3.7), the calculation of the signal level at the
receiver side with NLOS outdoor CPE and the distance
between BS and SS as far as 1 km can be calculated as
follows:
In the same way its possible to obtain the value of Eb /
..(7)
No using QPSK modulation technique 4 Mbps, 16-
QAM with data rate 5.3 Mbps and 7.9 Mbps, and 64-
QAM with data rate 11.9 Mbps and 13.2 Mbps.

On the other hand, the calculation of the signal level Conditions Non Line of Sight (NLOS)
at the receiver side with indoor NLOS CPE and the In NLOS conditions two types of CPE,outdoor and
distance between BS and SS as far as 1 km can be indoor were used. Value of Eb / No for outdoor NLOS
calculated as follows: using QPSK modulation techniques with a data rate (R)
used = 2.6 Mbps is:

= -106.8852 10 log(2.6x106) + 228.6 dBW


10 log(273 + 37)
= -83.3611 dB

C7-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Pvs-size= headerUDP/RTP/IPv6+(PLa + PLv) .(11)


Value of Eb / No for indoor NLOS using QPSK = 480 + (1920 + 6720)
modulation techniques with a data rate (R) used = 2.6 = 9120 bit
Mbps can be calculated: = 1140 byte
Big each packet of audio and video as well as the
number of audio packets and video packets streaming
video applications using IPv6 generated per second can
= -110.8852 10 log(2.6x106) + 228.6 dBW 10 log(273 + 37)
= -87.3611 4dB be calculated as follows:
Pa-size = headerUDP/RTP/IPv6 + Pla ..(12)
= 480 + 1920 = 2400 bit
Pv-size = headerUDP/RTP/IPv6 + PLv .(13)
= 480 + 6720 = 7200 bit
Pa = BCODECA/PLa .(14)
In the same way to obtain the value of Eb / No for = (64.103)bps / 1920 bit = 33,333 paket/s
outdoor and indoor NLOS CPE using QPSK Pv = BCODECA/PLv (15)
modulation technique 4 Mbps data rate, 16-QAM with = (224.103)bps / 6720 bit = 33,333 paket/s
data rate 5.3 Mbps and 7.9 Mbps, and 64-QAM with Ba = Pa-size x Pa ...(16)
data rate 11.9 Mbps and 13.2 Mbps (Table IV). = 2400 bit x 33,333 paket/s
= 79999,2 bps = 80 kbps
TABLE IV
VALUE EB / NO OF MODULATION TECHNIQUE IN LOS AND
Bv = Pv-size x Pv ...(17)
NLOS CONDITIONS = 7200 bit x 33,333 paket/s
= 239997,6 bps = 240 kbps
Eb/No
Mod
LOS
Outdoor Indoor So the actual bandwidth of video streaming that is
NLOS NLOS expressed by the equation 18:
QPSK
2.6 Mbps
2.9530e-017 4.6120e-009 1.8361e-009 Bvs= Bv + Ba + bandwidth overhead .(18)
QPSK = 240000 bps + 80000 bps +
1.0952e-017 1.7104e-009 6.8093e-010
4 Mbps {5% x (240000 + 80000)bps}
16-QAM = 336000 bps
5.7289e-018 8.9473e-010 3.5620e-010
5.3 Mbps
16-QAM
2.2851e-018 3.5689e-010 1.4208e-010 D. Calculation of Loss Packet Video Streaming
7.9 Mbps
64-QAM The probability of packet loss in streaming video with
8.8969e-019 1.3895e-010 5.5317e-011
11.9 Mbps headerUDP / RTP / IP is 60 bytes (8 byte UDP header,
64-QAM RTP header 12 bytes, and 40 byte IP header) and
7.0075e-019 1.0944e-010 4.3569e-011
13.2 Mbps
payload of 840 bytes of video and audio payload of 240
bytes[6], ie:
Table IV shows that the greater the data rate used, the
1.1
smaller the value of bit energy per noise. Energy value
of the smallest bit per noise present in LOS conditions,
while in NLOS conditions, CPE outdoor NLOS noise = (60 + 840 + 240) x 8 x 10-7
energy per bit larger than the indoor NLOS CPE. = 9,120 . 10-4

C. Calculation of Bandwidth Video Streaming


Video streaming will be analyzed using the Condition of Line of Sight (LOS)
H.264/AVC video codec with codec bandwidth between
The value of the BER, or often called the probability
64 kbps - 240 Mbps and AAC-LC audio codec for the
of bit error (PBE), using QPSK modulation technique
codec bandwidth of 16-576 kbps. The format used is a
with 2.6 Mbps data rate and Eb / No = 2.9530e-017 can
CIF image with a frame rate of 30ms. By using
be calculated using equation (19).
equations 9 and 10 it will get the value of streaming
video data packets on IEEE 802.16d WiMAX network
Eb
using IPv6, namely: Pbe . QPSK = Q 2

No (19)
PLa = BCODECA x frame rate .(9)
= (64.103)bps x (30.10-3) s = 1920 bit
= Q ( 2 2.9530 10 -17
)
PLv = BCODECv x frame rate .(10) = Q (7.6851 x 10-9)
= (224.103)bps x (30.10-3) s = 6720 bit
With x = 1.0425 x 10-4, then :
So that large data packets streaming video on IEEE
802.16d WiMAX network using IPv6 by equations 11
are as follows:

C7-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Conditions Non Line of Sight (NLOS)


The calculation of the value of bit error probability
and packet loss for NLOS conditions equal to the
calculations in LOS conditions, where the difference is
only on the value of Eb / No only.
with :

There for,

Then the probability of packet loss in video


streaming WiMAX 802.16d networks with QPSK
modulation is calculated using equation (20), namely: Fig. III. GraphBit Error Rate of WiMAX 802.16d network

Based on the Fig III., it can be seen that the value of bit
error probability is very small in LOS conditions. While
in NLOS conditions, the probability of bit error in the
NLOS outdoor larger than the indoor NLOS. This can
occur because of differences in CPE specifications are
On the other hand, according to equation (21), the used in both circumstances.
probability of bit error on QAM modulation can be
calculated as: Table V.
Probability Packet Loss Video Streaming
Probability of Packet Loss
For 16-QAM, Type of
Outdoor Indoor
Modulation LOS
M 1 / 2 1
1/ 2
2 3 log 2 M Eb NLOS NLOS
Pb16 QAM == 1 erfc ...(21) QPSK 2,6
log 2 M M 1 / 2 2( M 1) No 9.1200e-004 9.1200e-004 9.1200e-004
Mbps
3
( )
2 3 log 2 16 1/ 2 QPSK 4
Pb16 QAM == 1 erfc 5.7289 1018 Mbps
9.1200e-004 9.1200e-004 9.1200e-004
log 2 16 4 30 16-QAM
9.1200e-004 9.2000e-004 9.1705e-004
5,3 Mbps
16-QAM
9.1200e-004 9.1705e-004 9.1519e-004
7,9 Mbps
Then the probability of packet loss in streaming 64-QAM
video 802.16d WiMAX network with 16-QAM 9.1200e-004 9.1346e-004 9.1292e-004
11,9 Mbps
modulation is calculated using equation (22) namely: 64-QAM
9.1200e-004 9.1330e-004 9.1282e-004
13,2 Mbps

For 64-QAM,
M 1 / 2 1
1/ 2
2 3 log 2 M Eb
Pb 64 QAM == 1 erfc
log 2 M M 1 / 2 2 ( M 1) No
7
Pb16 QAM ==
2
log 2 64
1 erfc
8
3 log 2 64
126
(8 . 8969 10 19 ) 1/2

Then the probability of packet loss in streaming


video 802.16d WiMAX network with 64-QAM
modulation is calculated using equation (3.22) namely: Fig. IV. Graph of Packet Loss probability of Video Streaming on
LOS and NLOS condition

C7-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Fig. IV shows the relationship between the packet loss [4] Datasheet CPE Easy ST dan Pro ST Airspan
probability of video streaming with data on LOS and Network Inc.
NLOS conditions. In QPSK modulation type, ie the data [5]Kwang-Cheng Chen and J. Roberto B. de Marca,
rate of 2.6 Mbps and 4 Mbps, the packet loss 2008 Mobile WiMAX. London : John Wiley &
probability is very small streaming video since the Sons
value of bit error is also small. While on the QAM [6]Forouzan, Behrouz. 2000. Data Communication and
modulation type, the higher the data rate, the lower the Networking. United States : McGraw-Hill
probability of packet loss video streaming. [7]Freeman, Roger L. 1994. Reference Manual for
Telecommunications Engineering 2nd Edition.
IV. CONCLUSIONS AND RECOMMENDATIONS Toronto : John Wiley & Sons
Based on the calculation and analysis of the video
streaming performance on the 802.16d WiMAX
network, the conclusion is obtained as follows: The First author, Dwi Fadila Kurniawan received the Master Degree
packet loss probability of video streaming in LOS in CDMA (Code Division Multiple Access) Multimedia from the
conditions have the same value on all modulation Institute of 10 November, Surabaya, in 2001. He worked as a lecturer
in electrical engineering departement the University of Brawijaya,
techniques, ie 9.1200 x 10-4. This can occur because
Malang, Indonesia. His research has been in the areas of microwave,
the value of bit error probability is very small. On the
antenna propagation, and mobile communication.
other hand, in NLOS conditions by using QPSK
modulation technique the value is 9.1200 x 10-4. Using The second author, Muhammad Fauzan Edy Purnomo was born
QAM techniques, the value of packet loss probability is in Banjarmasin, Indonesia, in June 1971. He received the B.E. and
inversely proportional to data rate. M.E. degrees in Electrical Engineering from University of Indonesia,
Jakarta, Indonesia in 1997 and 2000. He is presently with the
Electrical Department University of Brawijaya, Malang, Indonesia
References where he is working toward as lecturer. His main interests are in the
[1]Schwartz, Mischa. 1987. Telecommunication areas of microwave, mobile communication, microstrip antennas,
Network. Addison-Wesley. array antenna for mobile satellite communications, and Synthetic
Aperture Radar (SAR). He has been ever be a student member of the
[2]Andrews, Jeffrey G., Arunabha Gosh, Rias
IEICE and IEEE.
Muhamed. 2007. Fundamental of WiMAX :
Understanding Broadband Wireless Networking. The third author, Widya Rahma received the engineering degree
Massachusetts : Pearson Education Inc. in telecommunication from Electrical Department University of
[3]Datasheet Base Station MicroMaxd Airspan Network Brawijaya in 2010. His research has been in the areas of the mobile
Inc. communication and microwave.

C7-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Statistical Beam Propagation of Terrestrial Free-


Space Optical Communication Using
Gamma-Gamma
Ucuk Darusalam, 1Purnomo Sidi Priambodo, Harry Sudibyo and Eko Tjipto Rahardjo
Study Program of Opto-Electrotechnique & Laser Application
Department of Electrical Engineering, Faculty of Engineering
Universitas Indonesia, Depok, Indonesia
E-mail: 1pspriambodo@ieee.orgpspriambodo@ee.ui.ac.id

AbstractWe present an experimental of Free-Space charactheristics of light for example light attenuation
Optical Communication (FSOC) system characteristical caused by the O-H absorption such as rain, fog, and
performance in a turbulence medium. The FSOC system is snow. Other degradation are caused by Rayleigh and Mie
fiber detection via TPS (Tube Propagation Simulator)and scattering and difraction as well. The physical properties
using 1550 nm optical modem as the main source of of atmosphere are random fluctuation in temperature,
communication and EDFA with output of +23 dBm).The
pressure and wind speed. These charactheristics cause the
index structure of 10-15 - 10-13as representation atmosphere
index turbulences areused for calculateintensity distribution medium of the atmosphere behave random fluctuation
model (scintillation) using gamma-gamma. The results of index of refraction. The random fluctuation of the
experiment shows that in the weak to moderate scale of propagation medium is called turbulence, which the size,
turbulence, highest value of mean SNR and high quality dimension and density of the air change randomly in
mean BER are achieved for spherical waves. While from space and time. Due to index of refraction fluctuates
measurements the <BER> is in the range of 10-6 10-11. randomly, the intensity of light that propagate along the
Keywords-component; free-space optical communication medium suffer attenuation and scintillation. Those all
(FSOC), turbulence media, Scintillation,< Prfade>,< BER>. phenomena finally degrade the strength of signal
performance of FSOC in the receiver system.
I. INTRODUCTION Some research works have been devoted to study
Free-Space Optical Communication (FSOC) system these phenomena intensively in order to enhance the
has been implemented widely in many contries so rapidly FSOC performances and mitigate the effect of
because its provide high link of capacity, free-license, turbulence. The signal strength suffers from degradation
low cost of deployment, easy of maintenance, and could and also has fluctuation of intensity at the receiver then
be integrated with existing communication system [1]- the FSOC system is designed to be amplified by EDFA.
[3]. The latest development of FSOC is used as an The EDFA is configured in a saturated regime condition
integrated space-terestrial network e.g. to enhance to boost the signal strength at the receiver, in order to
communication links for satelite to satelite crosslinks, up- mitigate signal successfully[10] [11]. The effect of
and-down between space platforms and aircraft, ships, turbulence also cause the beam wandering in receiver
and other ground platforms, and among mobiles and side. To overcome this wandering problem, an array
stationary terminals terestrial [4]. The potential of link detector system has been implemented at receiver and
capacity of FSOC have been achieved at the scale of 4.10 have been reported succesfully [12]. Another work also
Gb/s with the length of transmission 2.4-Km amplified by studied intensively in transmitter system in order to
Erbium Doped Fiber Amplifier (EDFA) [5]. Enormous mitigate the effect of turbulence. The multi input multi
bandwidth also have been investigated by modulated output (MIMO) method is implemented, where the
32x40 Gbit/s of WDM system in FSOC over 1,2-Km multiple laser diodes are applied at the transmitter and
using laser diode 1550-nm [6]. FSOC also has been multiple photodetectors are applied at the receiver
integrated with the broadband network in Japan with the system. The MIMO system is reported succesfully
length transmission of 2-Km by implementing 800-nm overcoming the turbulence effect and enhance the FSOC
laser diode and tested on natural environment such as rain performance [13].
and fog [7]. Another work also showed that FSOC has In this work we use the FSOC of fiber detection
many advantages of free of EMI, inexpensive method in order to analize its performance in turbulence
deployment and more faster, while RF signal was medium. The turbulence media is using Tube Propagation
transported through the link [8]. Evenmore FSOC have Simulator (TPS) that designed to capable simulate the
been used as wireless broadband in order to support the turbulence as well as at atmosphere. We use optical
optical fiber system in metropolitan area by using LED modem of 1550 nm as the main source of optical
transmitter [9]. communication equiped with EDFA with output of +23
dBm. The output beam of EDFA is collimated and
The major problem of FSOC system is the media of
transmitted through TPS, passing the turbulence media.
propagation is atmosphere, which its natural

C8-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

=
TPS is modelled in laboratory by a simulation of using of
plastic tube filled with the flow of hot water vapour (1)
(steam) and mixed with the cold air at temperature of Where is the quantum eficiency of photodetector, Ps is
160C. This turbulence media is called random media of the received signal intensity, is the light frequency, h is
tube propagation simulator. The motivation of this work is planck constant, and B is the bandwidth. Eq. 1 is the
to investigate the characteristical performance influenced value of signal to noise ratio (SNR) by ignoring the
by scale of turbulence that is designed from weak to
background illumination, circuit and thermal noise which
strong turbulence.
called limited shot-noise. The parameter of BER (bit
error rate) in the form basic modulation OOK (on-off
II. BASICS THEORY
keying) is represented as [15]:
Free-Space optical communication system is
lightwave communication that using free-space for =

(2)
propagation medium rather than optical fiber. The
fundamental difference of FSOC and optical fiber Eq. 2 represents the value of BER by considering the
communication systemis that FSOC is not guided at free- random noise in the photodetector that lead to mistaken
space, whereas the optical fiber is guided and immune bit from 0 to be 1 or vice versa [15].
from the surrounding noise. The FSOC are consists of In the case of turbulence in weak scale that lead to
three main parts TX, Free-space terestrial medium, and irradiance fluctuation or scintillation the governing
RX [14]. FSOC consist of laser diode as an optical equation PDF (probability of density function) on the
photodetector is the lognormal and modelled in Eq. 3:
~ +
Pr =< " >= $ %& ( ,((3)
transmitter (TX) and photodiode as the optical detector

(RX) gathered with the optical system to direct the
optical beam [14]. The laser beam is collimated via Where-& .0, 1 + 13 4 = -& 56 is the flux variance and
optical lens configuration system, which called telescope
dependent upon the diameter of aperture. Due to the
transmitter to direct the optical beam through air to reach
nature of turbulence is random fluctuation, the value of
the receiver lens and focused into the photodetector as as
SNR is no longer of deterministic but rather than mean
shown in Fig. 1.
value and can be expressed as [15]:

Atmosphere
Direct Detection Method
= (4)
8 9: < = <
T Beam R
; >
X Expander X

In the presence of optical turbulence the PDF (Eq.3) is


Receiver Lens considered as conditional probability that must be
averaged over the PDF of the signal in order to determine
the unconditional mean of BER [15]:
~ +
Pr =< " >= $ %& ( ,(
Figure 1. The FSOC system.


(5)
%& ( is the gamma-gamma distribution of unit mean as
There are several advantages of FSOC system which
are listed as implementing smaller antenna (telescope),
the representation of PDF:
?@ ABC
( = ( I?H@ .2KLM(4, ( > 0 (6)
smaller size and weight of the components, power
?9@ / H
concentration in a very narrow beam, and enormous & D E D F
bandwitdh. FSOC, furthermore is considered to be more
compact, simple configuration device, and inexpensive And for the case of spherical wave the parameter of and
compared to its technological competitor such as optical as the representation of atmospheric trubulences, are:
L=
fiber and microwave communication. For that reason, it
S b
is now being developed so vastly for many areas of (7)
R .UVC< a
communication. The simple configuration of FSOC NOP R _] aH
X<] \
system is the direct detection method, which means at the RWXB .XYZ< B .[\C [ ^ a
receiver side the optical beam is directly collimated by a Q `

M=
lens onto photodetector, as shown in Fig. 1. The benefit
of Direct Detection method are simple and unnecesary to c[] (7)
S X<] \b
< [^
R .[XC WXB .\VC a
use the optical fiber as the point of focus spot from the
NOPR aH
X<]
receiver lens. This method also reduce the effect of beam
RWXB .VZ< B .\<Z< C [ ^ a
wandering. However there is a disadvantage of direct Q `
detection method due to shot noise caused by influenced
of environment temperature outdoor. Also a mandatory
requirement to locate the detector outside the door. III. METHOD OF EXPERIMENT
Moreover it requires the optical filter to reduce the
background noise of another optical sources such as
The FSOC system on the experiment is shown in
comes from the sun or another that may be detected by
Fig.2. And the TPS (Tube Propagation Simulator) is also
the photodetector.
shown in Fig. 3. While the the scheme of turbulence scale
When the turbulence is assumed absence on the
is shown in Table 1. Optical modem of 1550 nm is used
medium of propagation or in the atmosphere the SNR is
in FSOC system, equiped with EDFA with gain of +23
represented as [15]:

C8-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

dB. Beam collimator is collimating the beam output of a. <Prfade> of strong turbulence
EDFA transmitted through turbulence media in TPS and
reach the lens focuser at Unit RX. Focused beam from Plane Wave
lens focuser directed into fiber (SMF/MMF) to measure *Spherical Wave
Gaussian Wave
the scintillation by Power Meter.

b. <BER> of strong turbulence

Plane Wave
*Spherical Wave
Gaussian Wave

Figure 2. Experiment diagram of FSOC fiberdetection method. c. <Prfade> of moderate turbulence

Plane Wave
*Spherical Wave
Gaussian Wave

d. <BER> of moderate turbulence

Figure 3.Set-up of turbulence medium as the optical beam


propagation (random media of tube propagation simulator).
Plane Wave
Table. 1. The scale of turbulence designed in TPS. *Spherical Wave
Turbulence Exhaust Intake Cold Steam Gaussian Wave
Fan Air Generator
No Off Off Off
Turbulence
Weak On On Off
Turbulence (TAC = 16 0C)
Moderate On On On
Turbulence (TAC = 16 0C) (TSG = 30-50
0
C)
Strong On On On
(TAC = 16 0C) (TSG> 510C) e. <Prfade> of weak turbulence
Turbulence

IV. RESULTS AND DISCUSSIONS


Plane Wave
*Spherical Wave
Gaussian Wave
The results of simulation with gamma-gamma
distribution is compute the means Probability of fade
(<Prfade>) and BER (<BER>) for each scale turbulence
and model of beam waves (plane wave, spherical wave,
dan gaussian wave). The results are shown in Fig 4.a-f.
f. <BER> of weak turbulence

Plane Wave Figure 4.The characteristical performances of FSOC system with


*Spherical Wave gamma-gamma simulation for wach beam waves model at three scale of
Gaussian Wave
turbulences.

While the results of measurement of FSOC system at


TPS for the various scale of turbulence are shown in Fig.
5.a f:

C8-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table 2. The characteristics of means Probability of fade<Prfade> and


<BER> from simulation of beam waves.
Strong Turbulence
Turbulence Charactheristics of <Prfade>&<BER>
Conditions
Srong <Prfade>&<BER>achieved at lowest order at
Turbulence spherical wave
Moderate <Prfade>&<BER>achieved at lowest order at
Turbulence gaussian wave.
Weak <Prfade>achieved at the same order for all
a. <Prfade> of strong turbulence
Turbulence beam waves
<BER> achieved at lowest order at spherical
Strong Turbulence wave.

The comparison of results from simulations and


measurements can bes summarized as shown on Table 3
as follows:

Table 3. The characteristics of <Prfade> and <BER> from


b. <BER> of strong turbulence measurements.
Turbulences Simulations Measurements
Orde Orde Orde Orde
Moderate Turbulence <Prfade> <BER> <Prfade> <BER>
-2 -4 -4
Srong 10 10 10 10-6
Turbulence
Moderate 10-2 10-4 10-4 10-6
Turbulence
Weak 10-1 10-8 10-10 10-11
Turbulence

c. <Prfade> of moderate turbulence From the the results of simulation and measurements
can be well understood that:
The order <Prfade> and <BER> is getting lower
ModerateTurbulence
as the rise of <SNR>
The order <Prfade> and <BER> is getting lower
as the rise of scale turbulences.
The difference results of simulation and
measurements is caused by the index
scintillation in gamma-gamma model is the
d. <BER> of moderate turbulence means from three beam waves model.
The results from measurements is more exact
value from the scintillation distribution of the
Weak Turbulence received power.
The gamma-gamma simulation by all means is
approaching the results of measurements.
The highest characteristical performances of
FSOC system is well achieved at strong
turbulences with the order of <Prfade> and
e. <Prfade> of weak turbulence <BER> are 10-1, 10-8, 10-10, and 10-10,
respectively.
Weak Turbulence
The effect of intensity deterioration caused by the
random absorption, diffraction, and scattering of beam
wavesthat cause a random mean SNR. The higher
intensity fluctuation on the photodetector causes the
probability of fade become more higher also. The fade
probability means that the profile intensity is fluctuated
f. <BER> of weak turbulence
Figure 5. <Prfade> and <BER>measurement in three scales of by the beam wandering at the receiver as well. The beam
turbulences. spot also moves randomly, hence the photodetector
receive a random wandering at the same time. This can
From the results of simulation using gamma-gamma degrade the performance of the FSOC system in fiber
which the distance of propagation is L = 1000 m can be detection method. The higher of scale of turbulence will
summarized as the Table 2 as follows: rise up the fade probability, hence the mean BER is going
to lower quality as the low of mean SNR. The high value

C8-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

of mean SNR will cause the mean BER also goes to a


high quality.
The beam wandering occurs along the random REFERENCES
medium (tube propagation simulator) can be explained by
considering that the profile of Gaussian beam from [1] H. E. Nistazakis, T.A. Tsifsis, and G.S. Tombras, Peformance
transmitter is spherical wave. The divergence of the analysis of Free-space optical communication systems over
optical beam will occur when the random medium exhibit atmospheric turbulence channel, IET Communication, vol. 3 iss.
8, pp. 1402 1409, 2009.
random index refraction structure. Due to this divergence,
[2] E. Ciaramella, Y. Arimoto, G. Contestabile, M. Presi, A. DErrico,
the mean SNR also decreases signifficantly, espescially V. Guarino, and M. Matsumoto, 1.28 Terabit/s (32x40 Gbit/s)
in the case of strong turbulence. Beam wandering also WDM ransmission System for Free Space Optical
exhibits the strong scintillation in the photodetector hence Communications, IEEE Journal on Selected Areas in
this lead to degrade the intensity of received power, Communications, vol. 27, no. 9, pp.1639 - 1645, Dec. 2009.
hence it causes the mean SNR decrease. [3] Kazuhiko Wakamori, Kamugisha Kazaura, Member, IEEE, and
Ikuo Oka, Experiment on Regional Broadband Network Using
In order to enhance the performance of FSOC system Free-Space-Optical Communication Systems, Journal of
in the scheme of fiber detection method, a new technique Lightwave Technology, vol. 25, no. 11, pp. 3265 - 3273, Nov.
is required to elevate the value of mean SNR. The mean 2007.
SNR value can be elevated by rising the received power [4] Vincent W.S. Chan, Free-Space Optical Communications,
Journal of Lightwave Technology, vol.24 no.12, pp. 4750-4762,
in the photodetector and minimize the effect of Dec. 2006.
scintillation or fluctuation signal power. Rising the power [5] Dong-Yiel Song et al., 4 10 Gb/s terrestrial optical free space
received by photodetector could be achieve using large transmission over 1.2 km using an EDFA preamplifier with 100
aperture lens at the receiver, to minimized effect of the GHz channel spacing, Optic Express, Vol. 7, No. 8, pp. 1634
beam divergence, due to turbulence. The large aperture 1645, Oct. 2000.
of receiving lens could anticipate the spot movement of [6] E. Ciaramella, "1.28 Terabit/s (32x40 Gbit/s) WDM Transmission
System for Free Space Optical Communications," IEEE Journal
Gaussian beam hence still focused to sensing area of on selected areas in communications, Vol. 27, No. 9, pp. 1639 -
photodetector as well. While to minimize the strong 1645, Dec. 2009.
fluctuation of the received power or scintillation could be [7] Kazuhiko Wakamori, "Experiment on Regional Broadband
achieved by using spatial diversity. By using the spatial Network Using Free-Space-Optical Communication Systems,"
diversity system, scintillation in the photodetector can be Journal of Lightwave Technology, Vol. 25, No. 11, pp. 3265 -
3273, Nov., 2007.
minimized [16]. Another technique to reduce the effect of
[8] Hakki H. Refai, Transporting RF Signals over Free-Space Optical
scintillation due to turbulence is by using photodetector Links, Free-Space Laser Communication Technologies XVII,
with a large sensing area. This technique is called array edited by G. Stephen Mecherle, Proceedings of SPIE Vol. 5712,
photodetector, which sensing large optical beam after pp. 46 - 54, 2005.
propagate through the random media and mixed the [9] E. Leitgeb, Free Space Optics Broadband Wireless Supplement
to Fiber-Networks," Free-Space Laser Communication
signal output from each photodetector into the signal Technologies XV, G. Stephen Mecherle, Editor, Proceedings of
processing method in order to maintain the BER quality SPIE Vol. 4975, pp. 57 - 68, 2003.
[12]. [10] Mohammad Abtahi et al., "Suppression of Turbulence-Induced
Scintillation in Free-Space Optical Communication Systems
CONCLUSION Using Saturated Optical Amplifiers," Journal of Lightwave
Technology, Vol. 24, No. 12, pp. 4966 - 4973, Dec., 2006.
We report the characteristical performance of FSOC [11] Yoon-Suk Hurh et al., Weather-Insensitive Optical Free-Space
Communication Using Gain-Saturated Optical Fiber Amplifiers,
system in the fiber detection method by using random Journal of Lightwave Technology, VoL. 23, No. 12, pp. 4022 -
media of tube propagation simulator. TPS is employing 4025, Dec., 2005.
steam of hot water vapour that mixed with cool air from [12] Shiomi Arnon & Norman S. Kopeika,"Free-space optical
Air Conditioner.By those could be obtained conditions of communication: detector array aperture for optical communication
Rytov variance factors at various scale turbulence (weak through thin clouds," Optical Engineering 34(2), pp. 518-22,
February 1995.
to strong scale). From the simulation and experiments the
[13] Stephen G. Wilson et al.,"Free-Space Optical MIMO
lowest order of Probability of fade <Prfade> and <BER> Transmission With Q-ary PPM," IEEE Transactions on
is achieved at weak turbulence which the characteristical Communications, Vol. 53, No. 8, pp. 1402-1411, Aug., 2005.
of <BER> are 10-8 by simulation and 10-11 by [14] Olivier Bouchet et. al, Free-Space Optics, London W1T 5DX
measurement. Hence the performance of system degrade Newport Beach, CA 92663 UK, 2004.
by the presence of turbulence. On the other hand, for [15] Larry C. Andrews and Ronald L. Philips, Laser Beam Propagation
through Random Media, 2nd Ed., SPIE Press, Washington USA,
weak, moderate and strong scale of turbulencesstill 2005.
contribute higher mean of SNR and BER, it means that [16] W.O. Popoola et al., Free-space optical communication
the characteristical performances of FSOC system is high employing subcarrier modulation and spatial diversity in
(lowest order of <Prfade> and <BER>). From the atmospheric turbulence channel," IET Optoelectron., Vol.2 No.1),
experiments the quality of BER is still in the limit of pp. 1623, 2008.
system performance, i.e. in the range of 10-4 10-8 and
10-6 10-11.

C8-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Maximum Power Point Tracking


Using Fuzzy Logic Control for Buck Converter
in Photovoltaic System
Mahendra Widyartono1), Sholeh Hadi Pramono2), and M. Aziz Muslim3
1)
Student of Master Degree Program, 2)3)Lecturers
Electrical Engineering Department, Engineering Faculty, Brawijaya University, Malang, Indonesia
mahe.lucretia@gmail.com, sholeh_hp@ub.ac.id, muh_aziz@ub.ac.id

DC-DC converter is used to convert the DC input


AbstractPhotovoltaic (PV) systems are power voltage that varies into controlled DC output voltage at
source systems that have non-linear current voltage the desired voltage level. The basic form of DC-DC
characteristics (I-V) under different environments converter is buck converter, are also called step-down
condition. The system consists of PV generator (cells, converter. As the name implies, step-down converters
modules, PV array), energy storage (batteries), buck produce a dc output voltage of the average lower than
converter, and resistive load. The proposed maximum the input dc voltage. In DC-DC converter, average
power point control is based on fuzzy logic to control the output voltage is controlled by the duration of the
switch of the buck converter. Buck converter is used to switch on and off (ton and toff). This method is known
convert DC input voltage that varies into controlled DC as pulse-width modulation (PWM) switching [3].
output voltage at a desired output voltage. Voltage and
Maximum Power Point Tracking (MPPT) is a sub-
current output from PV module were used as input
parameters of fuzzy control to generate optimum duty system designed to extract maximum power from
cycle so that maximum power can be generated in power source [4]. In the case of solar power source,
varying operating condition. With fuzzy MPPT, the the maximum point varies due to the influence of
current and voltage through the load is drop from 1,10 changes in electrical characteristics as function of
A to 1,06 A and from 16,60 V to 15,95 V. Using proposed temperature, solar iradiation, heating and others. With
maximum power point tracking (MPPT) method, the the change of temperature and solar iradiation, the
system have better stability even in dynamic operating voltage and current output of the PV modules are also
conditions. changing and reducing efficiency of PV systems.
Index TermsPhotovoltaic system, Maximum Power
MPPT maximizes power output of the panels in
Point Tracking, Fuzzy Logic Controller, Buck Converter. different conditions to detect the best working point
of the power characteristics and then controls the
I. INTRODUCTION current or voltage on the panel [4].
Photovoltaic energy applications have been General requirement for MPPT is simple and low
increasing along with the rapid depletion of cost, fast tracking the changing conditions, and
conventional energy sources such as petroleum, fluctuations of small output [5]. More efficient
natural gas and coal [1]. These applications include methods for solving this problem becomes very
water pumps, refrigerators, air conditioners, vaccine important. Fuzzy Logic Controller (FLC) is suitable
storage, electric vehicles, military and aerospace to control a non-linear systems through manipulating
application. PV energy considered to be the primary its membership function and rule base. Choosing the
energy in many countries that have a large solar parameters to obtain the maximum operating point
iradiation. PV system technology developed rapidly and a good control system depends on the designer
along with the development of technology in power experience [5]. Due to the nature of PV system is
systems to provide safe and pollution-free energy non-linear, i.e. current and voltage that varies
sources. depending on environmental conditions, it is very
PV system is power source system with non-linear important to operate the PV system at the condition of
I-V characteristic under different environments maximum power point. This will improve the
conditions (temperature and solar iradiation) [1]. The efficiency of PV systems.
system consists of PV generator (cells, modules, PV
array), buck converter, energy storage (batteries) and II. PHOTOVOLTAIC MODELING
resistive load. The simplest PV system has no
electronic control [2]. This simple system can not A. Photovoltaic cell model
control the PV system to generate maximum power. The simplest equivalent circuit of PV cell is
To overcome this limitation, electronic circuits are current source paralel with a diode (Fig. 1). The
introduced to control the battery charging, conversion output of current source proportional to the amount of
DC to DC voltage and convert DC voltage to AC solar iradiation on the PV cell (IPV). In this model, the
(inversion).

D1-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

open circuit voltage andd short circuit current is a key This point represents
epresents the maximum efficiency in
parameter [6]. convertering
ing sunlight into electricity [7].
[7

Figure 1. Equivalent circuit of one diode PV model.


model

Short circuit current depends on the intensity of


sunlight, while the open circuit voltage is affected by
the material and temperature. Equations of this model
are :

/
1 "1$ Figure 2. I-V characteristic for Wuhan Rixin MBF75 PV module

"2$ III. FUZZY MPPT


The purpose of fuzzy control is to extract
ln 1
1* "3$ maximum power from PV modules at a certain certa level
of solar iradiation [8]. Fuzzy logic control has several
advantages such as suitable for use on systems that are
I-V
V characteristic of PV cells can be defined as not linear and cann work with imprecise inputs.
inputs Fuzzy
follows : control (Fig. 3) using input voltage (V) and current (I)
and generates a duty cycle (D) output
outp that used as
!" # $ # buck converter input. The input voltage and current for
exp ' 1( "4$
%& # fuzzy control is from the output voltage and power
from PV module. Fuzzy logic control consist of three
stages : fuzzification, inference method and
Where IPH is the photovoltaic current, ID is the diode defuzzification.
current, RS is the series resistance and RP is paralel
resistance of PV cells.
B. I-V curve of PV cells
The relationship of current-voltage
voltage is used to
measure the electrical characteristics of PV devices.
devices
The I-V curve describes the flow of voltage through
the imposition of a short-circuit
circuit current ISC to open
Figure 3. Fuzzy logic controller.
controller
circuit voltage VOC. This curve is used to obtain the
level performance of PV systems (cells,cells, modules, PV
array). I-VV curve is obtained by performing A. Fuzzification
experiment with exposing PV cells or modules at the Fuzzification stage is a stage where the input
level of constant iradiation, maintaning the cell variable was changed into the language (linguistic)
temperature, varying the load resistance, and then based on the membership
mbership function. Triangular and
measuring the resulting current and voltage
volt [7]. I-V trapesium membership function with seven fuzzy
curve for Wuhan Rixin MBF75 PV modules can be subsets VVS (very veryy small), VS (very small), S
seen in Figure 2. Horizontal axis is for voltage and (small), M (medium), B (big), VB (very big), VVB
vartical axis is for current. (very very big) is used (Fig. 4). Variable V and I are
PV cells can operate on a wide range of areas of used as input, and variable D as output.
current and voltage. Simply by varying the load
resistance from zeroero (short circuit) to infinity (open B. Inference method
circuit), it is possible to determine the highest At this stage, Mamdani method is used to control
efficiency PV cells deliver maximum power. Because the generated output.
utput. The design of basic rules (rule
power is the result of voltage multiplied by current, base) consists of 49 fuzzy control rules. This rule
then the point of maximum power (Pm) appears in the implemented by computer and used to control the duty
I-V curve where the outcome of the current (Imp) cycle of buck converter in order to obtain maximum
multiplied by voltage (Vmp) is maximum. No power is power from PV modules in different conditions. These
generated on the condition of short circuit or open rule were expressed as IF-THEN
THEN statements as follows
circuit conditions, so that maximum power is
generated only at one point on the curve called knee. R1 : IF V is VVS and I is VVS THEN D is VVB.

D1-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

R2 : IF V is VVS and I is VS THEN D is VVB.


Fuzzy rule base used for fuzzy MPPT can be seen
in Table 1.

TABLE I. FUZZY RULE BASE

I VVS VS S M B VB VVB

VVS VVB VVB VVB VVB VB VVB VVB

VS VVB VVB VVB VB B M S


S VVB VVB VB B M S VS (a)

M VVB VB B M S VS VVS

B VB VVS VVS S VS VVS VVS

VB B M S VS VVS VVS VVS

VVB M S VS VVS VVS VVS VVS

C. Defuzzification
At this stage, the outputs of fuzzy logic control is
changed from linguistic variables into numeric
variables using membership function. With (b)
defuzzification, fuzzy logic control can generates
analog output signal that can be converted into digital
signals and control the power converter of MPPT
system. Centroid type of defuzzification is used for
this research.
IV. SIMULATION OF FUZZY MPPT
The MATLAB/Simulink software is used for the
simulate fuzzy MPPT with PV module and resistive
loads. The system consist of :
A. PV Module Block (c)
Simulate the non-linear I-V characteristic of Figure 4. Membership function : (a) first input V, (b) second input
Wuhan Rixin MBF75 PV module. Table 2 I, (c) output D.
summarized specifications of the PV module.
B. Fuzzy Controller Block
TABLE II. PV MODULE SPECIFICATION Simulates the fuzzy MPPT process and computes
Brand Wuhan Rixin the desired duty cycle of the buck converter using
Model MBF75 solar panel voltage and current. The fuzzy controller
Material Polycrystalline Silicon
block performs the fuzzification, inference method,
and defuzzification process.
Power output (max) 75 W
Voltage output (max) 17,5 V C. Buck Converter Block
Current output (max) 4,29 A DC DC converter is used to convert the DC input
Open circuit voltage 21,5 V voltage that varies into controlled DC output voltage at
Short circuit current 4,72 A the desired voltage level. Buck converter (Fig. 6)
Open circuit voltage -0,35% / C produces a dc output voltage of the average lower than
temperature coefficient the input DC voltage. A capacitor (C) with a value of
Short circuit current +0,036% / C 2200 F is used to reduced module ripple voltage.
temperature coefficient The equation of the buck converter circuit is as

1
Working temperature - 40 ~ 90C follows :

2 3 . - ./ #/ 5 6 (5)
-./
-0 1
- 1
= (./ .59: ) (6)
-0 8
< = + #=>? (./ .59: ) (7)

D1-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Figure 5. Simulation of fuzzy MPPT system using MATLAB/Simulink.

Cu
rre
nt
(A)
V 1000 W/m2
200 W/m2
Figure 6. Buck converter circuit (L=1mH, C=2200F,
RL=80m, RC=5m).
t (s)
D. PWM Block
Generates the pulse signals for the buck converter
based on the desired duty cycle. Figure 7. Load current without fuzzy MPPT and with fuzzy MPPT
E. Load
A 15 ohm resistive load is connected to PV
module via buck converter.
V. RESULT AND ANALYSIS Vo
This chapter contains the results and analysis of lta
fuzzy MPPT simulation system (Fig. 5). Fuzzy MPPT ge
(V)
simulation uses two operating conditions. Case 1
without the fuzzy MPPT (e.g., direct connection of 1000 W/m2
module PV and the load). Case 2 with fuzzy MPPT. 200 W/m2
The solar iradiation used for simulation is vary
between 200 ~ 1000 W/m2. Figure 7 and 8 show the t (s)
load current and voltage characteristic of the two
conditions.
With the change of solar iradiation, the current Figure 8. Load voltage without fuzzy MPPT and with fuzzy MPPT.
through the load R = 15 ohms also changed. Figure 7
shows that in case 1 (without fuzzy MPPT) by VI. CONCLUSION
changing of solar iradiation from 1000 W/m2 to 200
From the simulation results and analysis, it can be
W/m2 resulted the load current drop from 1,38 A to
concluded that PV system using fuzzy MPPT has
0,81 A. While case 2 (using fuzzy MPPT), the load
better performance than the system without MPPT.
current drop from 1,10 A to 1,06 A.
This can be seen on the load current and voltage
This condition is also hold for the load voltage
curves which are more stable than the system without
(Fig. 8). In the condition without fuzzy MPPT (case
MPPT. System with fuzzy MPPT have better stability
1), the load voltage drop from 20,74 V to 12,18 V.
even in dynamic operating conditions.
While using the fuzzy MPPT (case 2) the load voltage
down from 16,60 to 15,95 V. These results indicates
that PV system using fuzzy MPPT has better
performance than PV system without using fuzzy
MPPT.

D1-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

REFERENCES Mahendra Widyartono received Bachelor


Degree from Institut Teknologi Sepuluh
[1] Masoum, M, A, S an Sarvi, M. 2005. A new fuzzy-based Nopember, Surabaya, Indonesia, in 2006, in
maximum power point tracker for photovoltaic applications. electrical engineering. Currently, he is
Iranian Journal of Electrical & Electronic Engineering, Vol. 1. working toward Master Degree in Electrical
Iran. Engineering Department at Brawijaya
[2] Markvart, T and Castaner, L. 2003. Practical Handbook of University, Malang Indonesia. His current
Photovoltaics Fundamentals and Applications. Elsevier research interest is solar power system and
Advanced Technology. Oxford, Inggris. renewable energy.
[3] Mohan N, Undeland T, M, and Robbins, W, P. 1995. Power Sholeh Hadi Pramono received Bachelor
Electronics. Converters, Applications, and Design. (2nd Degree from Electritrical Engineering
Edition). John Wiley & Sons, Inc. Department, Brawijaya University in 1986.
[4] Daoud, A, Midoun, A. A Fuzzy Logic Based Photovoltaic He received his Master Degree and
Maximum Power Tracker Controller. Department of Doctoral Degree both from University of
Electronics, Faculty of Engineering, University od Sciences Indonesia, in 1995 and 2010, respectively.
and Technology of Oran. Algeria. Since 1987 he is with Electrical
[5] Patcharaprakiti N., et al. 2005. Maximum power point Engineering Department, Brawijaya
tracking using adaptive fuzzy logic control for grid-connected University. His current research interest
photovoltaic system. Elsevier Ltd. includes fiber optics, telecommunication
[6] Khaligh, A and Onar, A, C. 2010. Energy Harvesting : Solar, and renewable energy.
Wind, and Ocean Energy Conversion Systems. CRC Press M. Aziz Muslim received Bachelor Degree
Taylor & Francis Group. Boca Raton, Florida. and Master Degree from Electritrical
[7] Foster, R., et al, A. 2010. Solar Energy Renewable Energy Engineering Department of Institut
and the Environtment. CRC Press Taylor & Francis Group. Teknologi Sepuluh Nopember, Surabaya,
Boca Raton, Florida. Indonesia, in 1998 and 2001, respectively.
[8] Simoes M,G, Franceschetti N, N, Friedhofer, M. 2008. A In 2008 he received Ph.D degree from
Fuzzy Logic based Photovoltaic Peak Power Tracking Kyushu Institute of Technology, Japan.
Controller, IEEE-ISIE International Symposium on Industrial Since 2000 he is with Electrical Engineering
Electronics, Vol. 1,pp. 300-305. Department, Brawijaya University. His
current research interest is computational intelligence and its wide
applications in electronics, power systems (including renewable
energy), telecommunications, control systems and informatics.

D1-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

A Computational Fluid Dynamics Study of 6.5


Micron AA 1235 Annealing Treatment in Sided
Blow Inlet Outlet Furnace
Ruri A. Wahyuonoa), Wiratno A. Asmoro b), Edy Sugiantoro c), and Muhamad Faisal d)
a,b,d)
Department of Engineering Physics, Institut Teknologi Sepuluh Nopember Surabaya
c)
PT. Supra Aluminium Industri (SAI), Jalan raya Kasrie 146 Pandaan - Pasuruan
E-mail address: r_agung_w@ep.its.ac.id, wiratno@ep.its.ac.id, eds@supra-aluminium.co.id,
muhamad.faisal11@mhs.ep.its.ac.id

during rolling process. This coolant oil is added to avoid


Abstract Annealing is the last stage of aluminum foil direct surface friction between work rolls and coil of
production process which often causes undesired condition aluminum which caused many defects [3] [4].
of foil. It is mostly caused by improper treatment of The consequent of rolling process is carrying coolant
annealing. In this paper, annealing treatment for oil which embedded inside the rolled aluminum. The
aluminum alloy AA 1235 in foil annealing furnace (FAF) carrying oil needs to be removed from the rolled
has been analyzed. A combined study was conducted by
aluminum. Therefore, annealing is employed as the
means of Computational Fluid Dynamic (CFD) to evaluate
thermal distribution inside the two FAF A and FAF B purpose. Basically, annealing is a heat treatment given
during heating. Furnaces performance from the to soften the metal due to cold work [1] [5]. It removes
temperature control response and conduction time for physical stress of the metal so that some of the
heating of aluminum is also analyzed. The FAF A has a mechanical properties are back to normal. Annealing in
better temperature distribution than FAF B, but there is aluminum foil production is a part of finishing process.
saturated airflow between the aluminum roll in second It is employed to remove both physical stress and
stage. Based on temperature control response, settling carrying coolant oil of aluminum foil [2], [3].
time of evaporation temperature is achieved about 4 hours It is often found that the aluminum foils still have
for FAF B and cant be reached in FAF A whereas it is
worse wet-ability (usually called as weta) and some of
desired to be reached in 1 hour. It is suggested to change
the proportional mode control to higher value in order to them are too sticky. It is induced by non-evaporated
get fast settling time since the furnace employs PID coolant oil trapped inside the roll of aluminum.
controller. There is big different between theoretical and Improper heat treatment of annealing process may be
actual conduction time of aluminum foil that indicates caused by insufficient heat in the furnace or temperature
improper work of insulating material of furnace so that control in the furnace. In this study we collaborate with
there is much heat losses. PT. Supra Aluminium Industri (SAI), one of growing
aluminum industries in Indonesia, which mostly work
KeywordsCFD, Annealing treatment, FAF, AA1235. with AA 1235 (non heat treatable alloy). As the problem
remains, data of quality control of SAI show that there is
I. INTRODUCTION still undesired quality of final product after pass through
annealing process.
E very rolling mill company especially aluminum foil
production, there are many kind of defect and
undesired quality of aluminum foil. They are caused by
Foil annealing furnaces (FAF) employed in SAI are
two kind of sided blow inlet-outlet furnace. They have
improper conditions and treatments of two main specific structure and dimension, thermal distribution
production processes which consist of rolling and characteristic, and also response to the temperature
finishing [1] [2]. It employs a set of cold works in control. However, the treatment of annealing process
rolling process that include some passes through rolling that given to roll of aluminum foil is same to the all of
furnace [2]. The aim of this study is to evaluate the
to obtain the desired thickness of aluminum foil. At the
overall annealing treatment including temperature
next process, finishing, aluminum foil is also passed
control, thermal distribution, and furnaces performance
through some steps. They are separating, slitting, since AA 1235 must be treated in proper heat treatment
rewinding, annealing and packaging [3]. to get high quality product.
Rolling process that usually employed in aluminum
company is categorized to cold work. It reduces II. THEORETICAL APPROACH AND REAL PROCESS
thickness of aluminum coil to particular thickness of
Annealing is an additional heat treatment to soften the
aluminum foil by external force from work rolls. It is
metal. It removes physical stress resulting from cold
operated below the re-crystallization temperature of
working (cold rolling) given during overall production
aluminum alloy. There is also coolant oil that sprayed
process of rolled aluminum foil [1] [3]. Annealing
along the surfaces of aluminum coil and work rolls

D2-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

applies heat by convection through the atmosphere shock. The thermal shock effect can be reduced by
inside an annealing furnace. To avoid oxidizing any applying graded pre-heating.
un-evaporated lubricant residues or forming magnesium
oxide on magnesium-bearing alloys, annealing may be III. METHOD
carried out in a dry, inert (low O2) atmosphere such as First analysis of the annealing problem is temperature
nitrogen gas. A large integrated aluminum rolling plant and airflow distribution since decrease in temperature in
may have its own nitrogen generating plant for this some volume of chamber can induce incomplete
purpose [2], [6]. evaporation. This has caused to some rolls of aluminum
Non-heat-treatable aluminum alloy, commonly foil is still in worse wet-ability and/or sticky. This
heated for 1.5 2 hours in the range of operating analysis is conducted based on the simulation results of
temperature 635 765oF or equivalent to 335 445oC Computational Fluid Dynamics (CFD) simulation
[6], [7]. The heat released to the rolled aluminum has intended to analyze temperature and air flow
another objective. It also evaporates the carrying coolant distribution in the empty and filled chamber of Foil
oil inside rolled aluminum. So thats why, annealing Annealing Furnace (FAF). The furnace is distinguished
chamber must be dry (very low oxygen intensity) to as FAF A and FAF B which the aluminum is in specific
avoid oxidizing of coolant oil in the surfaces. orientation inside the chamber.
Annealing process in SAI is batch annealing. It
means loading a furnace with a batch of metal, roll of A. Computational Fluid Dynamics
aluminum foil, and holding it there until the annealing The computational fluid dynamics, usually
process is complete. Rolls of aluminum foil are annealed abbreviated as CFD, is a branch of fluid mechanics
as a single batch, depending on the size of the foils and using numerical methods to analyze and solve problems
the size and shape of the furnace [2]. In batch annealing, that involve flows of fluid. Numerical method is built by
heat conveyed by the furnace atmosphere to the outside employs the governing equations such as conservation
surfaces of the foils must be conducted through the of energy, momentum and continuity. Energy
metal to the innermost layers, and sufficient time must conservation is determined as equation shown below
be allowed for all parts of each foil to absorb enough [8], [9].
heat to achieve the planned anneal [1], [3]. Batch

annealing is an efficient approach and is the most (E ) + .(r (E + p )) = .keff T
commonly used method in high-production aluminum t (1)
+ .( eff . ) + S h
foil mills. r

240 where keff is effective conductivity which the value is


220
equal to sum of k and kt (thermal conductivity for the
Evaporating (225 oC ~ 15 hr)
200
presence of turbulence). The two terms on the right side
represent the energy transfer by conduction and
180
Drying (180 oC ~ 60 hr)
viscosity dissipation.
Temperatur (oC)

160
For the solid region (i.e. newborn body), energy
140 transfer is calculated by employing equation as follow
Pre-heating 2 (160oC ~ 8 hr)
120 [8], [9]:
100 Pre-heating 1 (130 oC ~ 8 hr)
r
80 ( h) + .(v h) = .( kT ) + S h (2)
60
t
40
where is solid density, h is sensible enthalpy, k is
0 10 20 30 40 50 60 70 80 90 conductivity constant of newborn, T is newborn skin
Time (hours)
Fig. 1. Heat treatment scheme of batch annealing in SAI
temperature, and Sh is volumetric heat source.
The equation (1) and (2) are complemented by
The annealing scheme is describe as three stages of continuity and conservation of momentum defined
thermal treatments (See Fig. 1). They are heating, below:
soaking and cooling. In heating stage, aluminum foil is
heated to particular temperature up to 5 hours.
. u = 0 (3)
Temperature setting depends on the thickness of du
aluminum foil. Soaking stage holds annealing chamber = F p + 2 u (4)
temperature to particular value for 15 20 hours. This dt
step also includes evaporating and drying. The last where p is normal pressure (N/m2), F is body force on
stage, cooling, chills amount of rolled aluminum for two solid region.
hours inside the annealing chamber. Itll be pulled out For natural-convection flows, faster convergence of
later if the temperature reaches 70oC [2]. numerical calculation can be retained with the
Evaporation of carrying coolant oil of 6.5 micron Boussinesq model. It sets the fluid density as a function
aluminum foil is estimated to occupy 15 hours of of temperature. The Boussinesq model is represented by
heating with temperature setting 225oC. Since the equation below:
presence of receding fold (RF) on aluminum foil after = 0 (1 (T T0 )) (5)
annealing, it is identified that the mechanism of
preheating (big temperature different) induces thermal

D2-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

where is thermal expansion coefficient (1/K), T0 dan qn 2



Veq
0 represent the operational parameter. This model is
Qcv = m& e q heq +
& + gz eq
accurate as long as the density changes are small or it is 2
q =1
valid if satisfying for (T T0 ) << 1. (10)
pn Vip
2

B. Thermodynamic Analysis m& ip hip + + gz ip
2
The analysis of conduction rate has been developed. p =1
The heat transfer and thermodynamic (control volume)
approach is used to determine how long the aluminum & = AV , (10) can be rewritten as,
Since m
foil steadily reaches the setting temperature furnace. The qn Veq
2

first assumption is the type of material must be solid or
Qcv = AeqVe q heq +
& + gz eq
rigid body so that the roll of aluminum foil is same as 2
rigid cylinder. The Fourier equation that represent
q =1
(11)
conduction rate is given below [10]. pn Vip
2

AipVip hip + + gz ip
q dT 2
= k (6) p =1
A dx
Since the aluminum foil is assumed to be cylindrical, the The calculation of energy in control volume (furnace)
cross-section area become a circle. The equation (6) can provides the data of heat accumulated inside the
be written: chamber. From this value, it can be determined the
theoretical settling time of air chamber and annealed
= k (2rL )
dT dT
qr = kA (7) aluminum in the FAF.
dr dr
Integrating (7) for r1 to r2 in left side and T1 to T2 in right IV. RESULT AND DISCUSSION
side, so that we obtain:
A. Thermal Distribution
2kL(T1 T2 )
qr = (8) FAF A has the setting basket to hang the roll of
r aluminum foil in front-rear direction. The heat is blown
ln 2 to spherical surface of aluminum roll. The orientation of
r1 aluminum rolls inside the chamber makes the capacity
In evaporating phase, the temperature different is 65oC. of FAF A is only 32 rolls. The CFD simulation result of
The aluminum foil on evaporation temperature (225oC) temperature and airflow distribution is given as follow.
has conductivity coefficient 222 W/m K. In this study,
specification of aluminum roll is 82 cm width, 34 cm
OD (Outer Diameter) and ID (Inner Diameter) 8 cm. By
using (8), the heat needed for aluminum foil roll is 5.413
kW. As the time setting for transient response during
pre-heating to evaporating is 1 hour, the released heat
which needed is approximately 51,356 kWh .
The energy balance on a control volume is given as
equation below.

dE cv pn
V
2

= Q& cv W& cv + m& i hi + i + gz i
dt p =1 2 (9)
qn
V
2
Fig. 2. Temperature distribution of FAF A in (a) right-
m& e he + e + gz e left view and (b) front-rear view
q =1 2
This Fig. 2 expresses temperature distribution of FAF
There are no work applied in the control volume so that A chamber. It shows that the chamber has better
the value of W& cv equals to zero. Potential energy temperature distribution in bottom to half of chamber
difference of inlet and outlet can be neglected since the height. The upper stage reaches temperature setting in
value is too small. Steady state analysis results as the center.
follow:

D2-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Fig. 3. Airflow distribution of FAF A in (a) right- left


view and (b) front-rear view Fig. 6. Airflow distribution of FAF B in (a) right- left
view and (b) front-rear view
Based on Fig. 3, lower velocity magnitude of air is
distributed in upper side. However, it wont affect much Based on the result on Fig. 5, temperature of FAF B
to annealing in FAF A since the upper side of chamber chamber cant reach the set point in almost all of area.
isnt fully filled by rolls of aluminum foil. It shows that Only several rolls of aluminum in the upper side get air
the airflow distribution is almost well (average airflow temperature 1 2 oC lower than the set point
magnitude is about 2.09 ms-1). The higher airflow temperature. The highest airflow magnitude (2.66 3.2
magnitude (3.35 4.19 ms-1) is only distributed in ms-1) in FAF B is achieved in bottom to half of chamber
bottom of chamber. then it drops until 0.38 ms-1 on the upper side. Fig. 6
clearly shows that the fourth stage of aluminum rolls
isnt supplied adequate airflow to blow up the vaporized
carrying oil.

Fig. 4. Temperature distribution on roll of aluminum foil


inside FAF A
Fig. 7. Temperature distribution on roll of aluminum foil
The distributed heat in the roll of aluminum annealed inside FAF B
in FAF A is shown as Fig. 4. In the figure shows that
Comparing to FAF A, the distributed heat in the roll
almost all of aluminum is well treated by the proper
of aluminum annealed in FAF B isnt better as shown as
heat, especially in the side closed to inlet flow. This
Fig. 7. In the figure above shows that the second row of
condition can minimize the weta and/or sticky of
aluminum foil inside the chamber isnt get the proper
aluminum foil.
heat. Only half of aluminum foil rolls in first row is
heated in the desired temperature. It probably induces
some weta condition of aluminum rolls.

B. Evaluation of Temperature Control and Furnaces


Performance
The temperature control on both FAF A and FAF B is
recorded in overall annealing time which consumes 93
95 hours. Notice that the FAF A and FAF B employ PID
controller to control the temperature of annealing.
Transient and steady response of temperature control in
FAF A is given in the figure below.
Fig. 5. Temperature distribution of FAF B in (a) right-
left view and (b) front-rear view

D2-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

250 Table 2. Settling time for evaporation temperature


set point of FAF B
200
Zone T Set 0.5oC Tinit evap.
Temperature (K)

150 1 1 0.97
2 1 0.93
100 Metal Z1 1 0.97
Air Temperature at Zone 1 Metal Z2 ~ ~
50 Air Temperature at Zone 2
Air Temperature at Zone 3
Metal Temperature Both of FAF A and FAF B have a quite big different
0 of conduction time theoretically and actual, taken from
0 10 20 30 40 50 60 70 80 90
Time (hours)
response of temperature control. As usual, this data
Fig. 8. Response of temperature control of annealiang analysis indicates that improper heat treatment is
process in FAF A occurred while annealing. Two conditions that might
become the cause of this condition are undesired heat
The steady conduction time of aluminum foil rolls in process/heat transfer and inappropriate control mode for
FAF A is theoretically obtain by dividing conductive temperature annealing.
heat transfer by accumulative evaporation heat. Based
on thermodynamic calculation, the conduction time of C. Discussion
aluminum foil in FAF A is 0.152 hour. This value is
Considering the result of temperature and airflow
lower than the actual conduction time which needs 1 4 distribution from CFD simulation, FAF A has good
hours to settle. The detail data of settling/conduction thermal distribution than FAF B. However, the settling
time of aluminum foil in FAF A is as in Table 1. time to evaporating phase in FAF A is about 1 4 hours.
Table 1. Settling time for evaporation temperature The FAF B has average settling time to evaporation
set point of FAF A phase about 1 hour. It fit to transition setting time of
pre-heating and evaporating. The temperature and
Zone T Set 0.5oC Tinit evap. airflow distribution for FAF B is worse than FAF A.
1 1 0.96 That is caused by the profile of airflow inside the
2 1 0.96 chamber is different. Comparing to furnace that has
inlet-outlet in the side of chamber, the airflow of FAF B
3 1 0.96
is worse than the FAF A. This condition is caused by the
Metal Temp. ~ 4 geometry of blade sticked in the inlet and outlet zone is
different to FAF A. The orientation of aluminum foil roll
The recorded temperature response of annealing in is also affect to airflow distribution. It is recommended
FAF B is follow. to change the blade of FAF B as the FAF A has or
change the orientation of aluminum roll annealed in the
250
chamber to get better het treatment.
Comparing settling time of metal/aluminum in to
200 conduction time of aluminum oil rolls in each FAF,
there is big different value. Theoretically in FAF A, it
only need about 0,016 0,152 hour to reach the set point
Temperature (K)

150
temperature. However in fact, aluminum foils need 4 to
reach the set point temperature. Moreover aluminum foil
100 in FAF B cant achieve the set point temperature. It is
Air Temperature at Zone 1
probably caused by two problems explained in the
Air Temperature at Zone 2 previous point. They are improper tuning controller and
50
Metal Temperature at Zone 1 the condition of insulating material. Due the FAF A and
Metal Temperature at Zone 2 B still using PID controller, it should be check that the
0 value of proportional constant, time derivative and time
0 10 20 30 40 50 60 70 80 90
Time (hours)
integral setting is based on transient response. Since the
settling time is too much longer then the proportional
Fig. 9. Response of temperature control of annealiang constant should be substituted to higher value to get fast
process in FAF B response. The other problem may be caused by the
insulating material (e.g. glass wool, grafite, gypsum,
The evaporation settling time based on control
etc) inside the annealing chamber doesnt work properly
response in FAF B (see Table 2) is about 1 hour for
so that there is so much heat losses during the annealing
aluminum in zone 1 and cant be reached for aluminum
process. In order to reduce the heat losses, it is
in zone 2 (see Fig. 9). The conduction time for annealing
recommended to check the condition or thermal
aluminum foil in FAF B is 0,042 hour theoretically.
conductivity of the insulating material.

D2-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

V. CONCLUSIONS REFERENCES
Annealing treatment of AA 1235 in foil annealing [1] The Aluminum Association. 2007. Rolling Aluminum: From the
Mine Through the Mill. The Aluminum Association, Inc.
furnace has been analyzed. FAF A has quite better [2] Visual Quality Characteristic of Aluminum Sheet and Plate, the
temperature and airflow distribution which is set point Aluminum Association Inc., 4th Edition February 2002
temperature and higher airflow magnitude is distributed [3] Annisa Kesy Garside, Penentuan Setting Parameter Proses
Finishing Rolling untuk Aluminium Foil dengan Thickness Exit
in upper side of chamber. The worst temperature and
7 Mikron di PT. Supra Aluminium Industri. Laporan Magang
airflow distribution is possessed by FAF B. The Dosen, Program Hibah A1, Jurusan Teknik Industri FT,
upper-right side of chamber gets lower temperature so Universitas Muhammadiyah Malang, 2005.
that it may induce weta. There is heating problem due [4] Smith, W. F. 1990. Principle of Materials Science and
Engineering 2nd Edition. New York: McGraw-Hill Publishing
the big difference between conduction time of real Company.
process and theoretical calculation. It is probably caused [5] Jing Zhang, Fusheng Pan, Rulin Zuo, Chenguang Bai. The low
by improper control tuning of PID controller in the temperature precipitation in commercial-purity aluminium
sheets for foils. Journal of Materials Processing Technology.
furnace and heat losses by under works of insulation 2008; 206: 382 387.
material. [6] Ozgul Keles, Murat Dundar. Aluminum foil: Its typical quality
problems and their causes. Journal of Materials Processing
Technology. 2007; 186: 125 137.
VI. ACKNOWLEDGMENT [7] R. J. Vidmar. (1992, August). On the use of atmospheric plasmas
Thanks to Dr.-Ing. Doty D. Risanti and Dyah Sawitri, as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online].
21(3). pp. 876880. Available:
M.T. for the helpful comments on the analysis of http://www.halcyon.com/pub/journals/21ps03-vidmar
annealing treatment. This study was supported by PT. [8] J. Blazek. Computational Fluid Dynamics: Principle and
Supra Aluminium Industri Pasuruan for giving Applications. ELSEVIER SCIENCE ltd. 2001.
[9] Fluent manual. Modeling Heat Transfer. Fluent Inc.. September
measurement data of FAF and Indonesia-Germany Fast 29. 2006.
Track Scholarship from Directorate of Higher Education [10] Incropera, F. P. and D. P. DeWitt. 1996. Fundamentals of Heat
for the grant. and Mass Transfer 4th Edition. U.S.A.: John Wiley & Sons, Inc.

D2-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The Height Control Systems of


Hydraulic Jack Using Takagi Sugeno
Fuzzy Logic Controller

Fitriana Suhartati1, Ahmad Fahmi2


1
Electrical Engineering Department of Brawijaya University,
2
Electrical Engineering of State University of Malang
1
fitrianas@ub.ac.id

transfer function or the dynamic equations of the


systems.
Abstract More diverse types of cars with different
heights create difficulties when technician make In this research, hydraulic jack model used pump
improvements on the part located under the car, this actuator as a DC motor, height sensor used
condition will affect the time taken and the results of potentiometer, and height controlling used pump
repairs. Therefore, it is necessary to drive an automatic controlling actuated by DC motor.
height adjustable hydraulic jack according to the type and
height of the car to be repaired. This research designed a
II. HYDRAULIC SYSTEMS
hydraulic jack height control system based fuzzy algorithm
using Takagi Sugeno method. Takagi Sugeno fuzzy The hydraulic systems is a combination of various
controller was programmed into the microcontroller mechanical components such as oil reservoirs, pumps
AT89S51. The level sensor consisted of a series of and accessories, actuators, valves, connections and
potentiometers and the disk can change the level of the jack conductor, hydraulic oil contained many non-linearity
to a voltage shift with an average error of 2.63%. Fuzzy
such as pressure-flow characteristics of the regulator
inputs are error and error position, each using three
membership functions. While the fuzzy output is the
valve, due to the frictional forces on the actuator and the
magnitude of the voltage that goes to the hydraulic pump drying-moving parts of valve-valve, wear between the
that consists of 1.21 V, 1.35 V, 1.55 V, and rule base valve and its seat.
consists of 9 rules. Based on the test results, Fuzzy As a result, a wide range of phenomena arise due to
Inference System can work as expected and the system non-linearity of this nonlinearity. (Hayashi, S., 2002).
generates an error of 0.05% to 1573% for no-load test, and
generates an error 1.81% to 2.67% for the test with a load
of 26 kg.
Keywordshydraulic jack, Takagi Sugeno fuzzy, error,
error

I. INTRODUCTION
The development of automotive rapidly that increase
the number and variety of vehicles make maintenance
and repairs are done differently for each type of car. One
variation of the car is different height of each type. Such
as jeep would be higher than a sedan and car
modification cars that usually lower. Figure 1 Bottle Type Hydraulic Jack Schematic
The various height of the car raises a matter of Courtessy: www.hyjack.net
convenience for people who will do the repair parts are
located at the bottom (under the car) and ultimately will Where:
affect the time taken and the results of repair. This a. Reservoir
problem is necessary to drive automatic hydraulic jack b. Main Cylinder
can be adjusted to the person who will fix the car. c. Piston
This research designed a height control systems of d. Pump
hydraulic jack model based on Takagi Sugeno fuzzy e. Screws relief
algorithms which is simple and reliable to be applied as a f. Oil channel to the piston
control on a wide range of systems using only input g. Check Valves
variables and output without having to know the system

D3-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

III. DESIGN AND IMPLEMENTATION below:


The height control of this hydraulic jack model as
shown in figure 2.

Figure 4 Block Diagram of Fuzzy Logic Controller


Figure 2 Block Diagram of Control Systems of Hydraulic Jack Courtessy: Kuswadi, S., 2000

Based on the design of the hardware block diagram in a. Determine the input variables and output variables.
fig. 2, there are two ways of working tools, which Input variables for fuzzy controller are error and
controls the initial speed and control of the opening and error, while the output variable is deltaOutput,
closing the valve. Height that was desired and that has with
been achieved perform through the LCD monitor. Err(n)=SP(n)PV(n) (1)
Variable used in the design can be seen in Fig. 3 deltaErr(n)=Err(n)Err(n-1) (2)
below. Output(n)=Output(n-1)+deltaoutput(3)

b. Fuzzification is a process to convert crisp input


become fuzzy input.

Figure 3 Variable Used in Jack


Figure 5 Diagrammatic of Membership Function of Error

where:
Hreq = height total desired
H2 = Height of objects that affect Hreq
Hreff = Set point as a result of the difference between
H2 and Hreq
Hcurr = output of jack, from condition has not lifted up
to Hreff
Figure 6 Diagrammatic of Membership Function of Error
DC motors drive a prototype lever hydraulic jack
rated voltage source of +12 volt dry batteries as a power
c. Fuzzy logic controller rules is based on experience
supply.
and in the form of If-Then. After the crisp input is
The desired height is determined by the A (65mm), B
converted into fuzzy input, according to Takagi
(75mm) and C (85mm), height of the car with a sliding
potentiometer. Microcontroller as a fuzzy logic Sugeno method it is processed based on 9 standard
controller receives input from the difference in height of rules below:
one of the buttons with sliding potentiometer and 1. If error = PS and error = PS, then output =
calculate the height of the jack of potentiometer that has 1.21V.
been converted by the ADC. 2. If error = PS and error = M, then output =
After the weight and speed are involved in each range, 1.21V.
, so that fuzzification process result membership degree 3. If error = PS and error = PB, then output =
of each input value. 1.21V.
Further evaluation rule, where the entries have been 4. If error = M and error = PS, then output =
involved in the rule base, defuzzification using Takagi 1.35 V.
Sugeno method generate the output (control signal). 5. If error = M and error = M, then output =
1.35 V.
IV. FUZZY LOGIC CONTROLLER 6. If error = M and error = PB, then output =
1.21 V.
Fuzzy logic controller algorithm as shown in fig. 4

D3-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

7. If error = PB and error = PS, then output = Table 5 Testing Result of Hreq 65 mm and Href 53
1.55 V. Href (mm) LCD Display Actual Height
8. If error = PB and error = M, then output = (mm) (mm)
1.55 V. 52 52.4
9. If error = PB and error = PB, then output = 52 51.5
1.55 V. 53 51 51.1
52 51.5
V. TEST AND ANALYSIS 51 51.4

A. Height Sensor Testing Table 6 Testing Result of Hreq 75 mm and Href 63


The test of existing potentiometers results errors Href (mm) LCD Display Actual Height
ranged from 1.54% to 4:16% with an average error (mm) (mm)
2.63%. 62 62.4
63 62.7
B. Control Systems Testing 63 62 61.8
This test use three references as the desired height 61 61.4
(Hreq) are 85 mm, 75 mm, and height of 65mm and as 62 62.3
reference (href) are 75 mm, 65 mm, 59 mm and 53 mm.
Measurement using the actual height of the jack-term Table 7 Testing Result of Hreq 85 mm and Href 73
slide. Href (mm) LCD Display Actual Height
(mm) (mm)
1. No Load Testing 71 71.3
Table 1 Testing Result of Hreq 65mm and Href 65mm 72 72.5
Href (mm) LCD Display Actual Height 73 71 70.5
(mm) (mm) 72 71.9
65 65.5 72 72.2
66 65.6
65 66 66.2 From the test results shows that the average error for
66 65.5 testing without a load range from 0.05% to 1.573% and
66 66.3 for testing with a load of 26 kg of 1.81% to 2.67%.

Table 2 Testing Result of Hreq 65mm and Href 59mm


Href (mm) LCD Display Actual Height VI. CONCLUSIONS
(mm) (mm) From the test results can be drawn the following
60 60.2 conclusions:
60 59.6 1. Potentiometer circuit and the disk is used as a
59 60 60 height sensor is able to change the height of the jack
60 60 to shift electrical quantities of voltage with an
60 59.7 average error of 2.63%.
2. ADC 0804 series that is used to convert analog data
Table 3 Testing Result of Hreq 65mm and Href 53mm
into digital data as input to the microcontroller with
Href (mm) LCD Display Actual an average error 0.52%.
(mm) Height (mm) 3. DAC 0808 series that is used to convert digital data
54 53.7 into analog data with an average error of 1.495%.
54 53.6 4. Fuzzy Logic Controller to work in accordance with
53 54 53.7 a system that is expected and the system generates
54 53.5 an error of 0.05% up to 1573%. For testing without
54 53.5 load and 1.81% to 2.67%. For testing with a load of
26 kg.
Table 4 Testing Result of Hreq 75mm and Href 75mm
Href (mm) LCD Display Actual Height REFERENCES
(mm) (mm) [1] ATMEL Corp. 8-Bit Microcontroller with 4 Kbytes Flash
75 75.5 AT89C51,ATMEL,(www.atmel.com), 1996.
76 76.4 [2] Elektro Indonesia.Teknologi Sistem Fuzzy, ElektroIndonesia.
(http://www.elektroindonesia.com), 1995.
75 76 76.3 [3] Hayashi,S., Nonlinear Phenomena in Hydraulics
76 76.4 System,Tohoku University, 2002.
76 76.3 [4] Kuswadi, Son, Kendali Cerdas, EEPIS Press, 2000.
[5] Malvino, Albert Paul. Prinsip-Prinsip Elektronika, Edisi ketiga,
Alih bahasa: Hanapi Gunawan, Penerbit Erlangga, Jakarta,
2. Testing with Load 26 kg 1996.

D3-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

[6] Mihajlov,Miroslav,Vlastimir Nicolic, Dragan Antic, Position Fitriana Suhartati was born in Sidoarjo on 17th October 1974. She
Control of electro-hydraulic Servo System Using Sliding Mode hasgraduated from electrical engineering magister program at Sepuluh
Control Enhanced by Fuzzy Controller, Facta Nopember Institute of Technology, Surabaya, Indonesia, in 2003. Her
UniversitatisSeries:Mechanical Engineering Vol I No. 9, Serbia major field of study is control systems.
Montenegro, 2002. Since 1998, she has teached in electrical engineering department of
[7] Reznik,Leonid, Fuzzy Controllers,Victoria University of Brawijaya University, Malang, Indonesia. She has many publications,
Technology, Newnes, Melbourne, 1997. and she written a book Adaptive Control Systems (TEUB, Malang,
[8] Ross, Timothy J. Fuzzy Logic With Engineering Aplication. 2009). Her research interest is in the field of intelligent control systems
McGraw-Hill Inc., 1995. and adaptive control systems with application to motor and solar
[9] Sullivan, James A, Fluid Power:Theory and Applications. energy systems.
Prentice-Hall,Virginia, 1975.
[10] Zuhal, Dasar Teknik Tenaga Listrik dan Elektronika Daya, PT. Ahmad Fahmi was born in Malang on 31st July 1973. He
Gramedia Pustaka Umum, Jakarta, 1993. hasgraduated from electrical engineering magister program at Sepuluh
[11] www.hyjack.net/animation Nopember Institute of Technology, Surabaya, Indonesia, in 2005. His
major field of study is control systems.
Since 1998, he has teached in electrical engineering department of
State University of Malang, Indonesia. He has many publications, and
he written a book Robotics (UM, Malang, 2009). His research interest
is in the field of control systems and fuzzy logic with application to
motor and renewable energy.

D3-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

An Application of Adaptive Neuro Fuzzy


Inference System (ANFIS) with Subtractive
Clustering for Lung Cancer Early Detection
System
Mochamad Yusuf Santoso1) Syamsul Arifin2)
1) Department of Engineering Physics, Faculty of Industrial Technology ITS Surabaya Indonesia
1)
uchups55@gmail.com, 2)syamsul@ep.its.ac.id

Abstract - Cancer is a disease that related with work for helping doctor to make decission.
uncontrolled cell growth. To date, lung cancer is one of the
most deadly disease. An application of ANFIS with 1.1 Lung Cancer Identification
subtractive clustering for lung cancer early detection system Lung cancer is a disease characterized by
was developed in this study. Characteristic and chest x-ray uncontrolled cell growth in tissues of the lung. It is also
datas were used in this study. The data used to build best the most preventable cancer. Cure rate and prognosis
ANFIS model, that will be applied in the software. Results depend on the early detection and diagnosis of the
from the software was validated with doctors decission.
disease. Lung cancer symptoms usually do not appear
Parameters that used to determine system performance are
RMSE, VAF, and the succes rate. The best ANFIS model until the disease has progressed. Thus, early detection is
for characteristic data was obtained in ra = 0,4; RMSE for not easy. Many early lung cancers were diagnosed
training = 0,1193, RMSE for testing = 0,2030, VAF for incidentally, after doctor found symtomps as a results of
training = 93,34%, VAF for testing = 82,28%, the success test performed for an unrelated medical condition4].
rate of software for training data = 96 % and for testing There are two major types of lung cancer: non-small
data = 96%. While for chest x-ray data, the best model was cell and small cell. Non-small cell lung cancer (NCLC)
obtained in ra = 0,4; RMSE training = 0,0185, RMSE testing comes from epithelial cells and is the most common type.
= 0,1063, VAF training = 99,85%, VAF testing = 94,84%, the Small cell lung cancer begins in the nerve cells or
success rate of software for training data = 95,56 % and for
hormone-producing cells of the lung. The term small
testing data = 88,46%.
cell refers to the size and shape of the cancer cells as
Index Terms: ANFIS, characteristic, chest x-ray, lung
seen under a microscope. It is important for doctors to
cancer, subtractive clustering distinguish NSCLC from small cell lung cancer because
the two types of cancer are usually treated in different
I. INTRODUCTION ways. Lung cancer begins when cells in the lung change
and grow uncontrollably to form a mass called a tumor (or
Cancer is a disease associated with the uncontrolled a lesion or nodule). A tumor can be benign
cell growth. Today, lung cancer is one of the most deadly (noncancerous) or malignant (cancerous). A cancerous
desease. According to World Health Organization (WHO), tumor is a collection of a large number of cancer cells that
every year there are more than 1.3 million cases new of have the ability to spread to other parts of the body. A
lung cancer and bronchitis in the world, and the mortality lung tumor can begin anywhere in the lung [
rate approximately 1.1 million [ HYPERLINK \l "rhd11" HYPERLINK \l "Per03" 5 ].
1 ]. In Indonesia, 1 of 1000 persons is a new sufferer of
lung cancer, it means that more than 170.000 new 1.2 Adaptive Neuro Fuzzy Inference System (ANFIS)
sufferers annually2]. Both in Indonesia and other
Adaptive Neuro Fuzzy Inference System (ANFIS)
developed countries, reported that most of cases diagnosed
is combination of fuzzy inference system (FIS) which
when its were in advance stage (stage III and IV).
illustrated in neural network architecture. Fuzzy
An artificial intellegent system for lung cancer early
inference system which used is first order Takagi-
detection based on characteristic and chest x-ray was
Sugeno-Kang (TSK) model, for computaion simplicity
designed by [ HYPERLINK \l "Ari11" 3 ]. But, this
and convenience6].
software has the best performance around 66,6%. Then,
ANFIS structure consists of five layers represent
the aim of this study is to develop these artificial
neural network architecture is shown in fig1. The square
intellegent with deifferent clustering method, subtractive
node is an adaptive node, it means parameters value can
clustering. It be expected to improving system
change in the midst of training process. The circle node is
performance. The used subtractive clustering, for making
non adaptive node with fixed value. There are different
decicion based doctors experties consistently. This system
equation for each layer.
D4-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

1.3 Subtractive Clustering


Subtractive clustering method was proposed by [7].
The method make each data points are considered as the
candidates for cluster center. In subtractive clustering, a
data point with the highest potential, which is a function
of the distance measure, is considered as a cluster center.
The potential of each data point is estimated by the

, = 234 -./0"-01 /
following equation:

where 5 =
6
(7)
Fig. 1. ANFIS structure [ HYPERLINK \l "Jan93" 6 ]
78
Layer 1 Pi is the potential of ith data point, n is the total number
Mathematical equation for this layer dependent on of data points, xi and xj are data vectors in data space
type of membership function. For example, if gaussian including both input and output dimensions, is a
membership function: positive constant and is selected as 4, and ra is a positive

, = = = 1,2
constant defining the neighborhood range of the cluster or
(1)

, = = = 1,2
simply the radius of hypersphere cluster in data space.
(2) Each time a cluster center is obtained, the data
points that are close to new cluster center are penalized in
Fig 1 illustrated an ANFIS with two inputs (x and
y). The output ( , is inputs membership degree.
order to facilitate the emergence of new cluster centers.
The revising of the potential is done by subtraction as
Membership function that used is gaussian with parameter
shown in the following equation:
and c, called premis parameter. Its value can be
/=" = # /
<- > A
determined from ANFIS training in MATLAB software.
, = , ,; . ?@

where B = C. D
(8)
Layer 2
Layer 2s fuction is to multiply every input signal

, = = . , = 1,2
Pi* is the i-ths new potential value, is squash factor, a
which comes from layer 1s output. The equation is:
positive constant greater than 1. The positive constant rb
(3)
is somewhat greater than ra and it helps avoiding closely
The node in layer 2 is non adaptive node (fixed spaced cluster centers.
parameter). Node number in this layer show the created To accept or reject new cluster center, the following
rule number. criteria was suggested by [7]:

> H
Layer 3 E"
E F
Every node in layer 3 is non adaptive node that If
show normalized firing strength, the i-th node output ratio
<H
E"
accept as a cluster center and continue

, = = , = 1,2
!"
with all node output. The equation is:
E F
else if
!# $!
(4)
reject and end the clustering process

Let KL 2 = shoertest of the distances between


If there are more than two rules, then the fuction can be
else
extend, devided wi with all w for entire rules.
and

+ 1
MN"O E"
Layer 4 all previously found cluster centers

78 E F
Every node in this layer is adaptive node with if

%, = = & + ( +
equation: accept as a cluster center and continue
(5) else
In layer 4, there are normalized firing strength from layer reject set the potential at to 0. Select the

the new and re-test


3 and parameter p, q, r, called consequent parameter. As data point with the next highest potential as
wll as premis parameter, its value resulted from ANFIS
training in MATLAB software. end if
end if
Layer 5

accept ratio H, reject ratio , cluster radius ra and squash


There is a single node for summing all outputs form Subtractive clustering has four parameters, namely,

), = = " " "


!+
layer 4. The equation is:
!"
(6) factor (or rb). These parameters have influence on the

values of H and will result in small number of rules.


Layer 5s output will be used for making decicion from number of rules and error performance measures. Large

Conversely, small values of H and will increase the


the created system [6].
number of rules. A large value of ra generally results in
fewer clusters that lead to a coarse model. A small value
of ra can produce excessive number of rules that may

D4-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

result in an over-defined system. The suggested values for compared with doctors decicion. The validations result
and ra are 1.25 1.5and 0.15 ra 0.30 [7]. show the success rate of software for making decision.

II. METHOD 1.5


ra = 0,4 training

2.1 ANFIS Modeling 1

output
0.5
In this early system development, characteristic and
0
chest x-ray datas were used in training for ANFIS
-0.5
modeling. Characteristic data provides information about 0 5 10 15 20 25 30 35 40 45 50
data ke-
normal and suspected patient. There four kinds of ra = 0,4 testing
1.5
characteristic data for identification: amount of cigarette
1
consumed per day, duration of smoking, occupation, and

output
0.5
cough. Chest x-ray data that used for training was
0
obtained from [8].
-0.5
Subtractive clustering was employed in training 0 5 10 15 20 25
data ke-
process. This method will generate data to make its
Fig 4: Validation graph
natural membership function. One of the subtractive
clusterings parameters is ra, becomes varibael for
obtaining some ANFIS models. Fig 2 shows the III. RESULTS AND DISCUSSIONS
subtractive clusterings parameters in MATLAB and fig 3 3.1 ANFIS Model
shows the ANFIS training process for ra = 0,4. 3.1.1 Characteristics Data
The result of ra variation in design for ANFIS model
for characteristics data shown in table 1. Its also show
the result from ANFIS model validation for training and
testing datas, represented in RMSE and VAF.

Table 1 Characteristics Data Validation Result For ra Variation


RMSE VAF (%)
ra MF
Training Testing Training Testing
0,1 47 0,1235 0,2033 93,99 82,46
0,2 42 0,1231 0,2030 94,01 82,49
0,3 28 0,1241 0,2056 93,30 81,76
0,4 19 0,1193 0,2030 94,34 82,28
0,5 15 0,5389 2,2692 -15,37 -2107,9
Fig. 2. Subtractive clusterings parameters
0,6 9 0,5374 1,1564 -32,31 -473,01
0,7 8 0,3627 1,0305 47,82 -360,36
0,8 6 0,1856 0,2893 86,23 64,27
0,9 5 0,1908 0,2641 85,43 70,23
1 4 82,39 44,92 82,39 44,92

From table 1, its obtained that greater ra value, the


number of membership function will be smaller. The
smallest RMSE and the highest VAF for training were
Fig. 3. ANFIS training process obtained fot ra = 0,4. For testing datas, the smallest
RMSE was obtained for ra = 0,2 and 0,4; while the
2.2 ANFIS Model Validation highest VAF was obtained for ra = 0,2. The best ANFIS
The best ANFIS model, choosed upon its validated model is the model which use ra = 0,4 because it has the
result, Root Mean Square Error (RMSE) and Variance smallest RMSE for training. Moreover, ra = 0,4 has
Accounted For (VAF). The model validated with the real smaller number of membership function than ra = 0,2.
results, doctors decicion. The best ANFIS model has Acoording to [7], excessive number of rules that may
minimum RMSE value and maximum VAF value. Fig 4 result in an over-defined system.
shows the characteristics validation graphics for ra = 0,4.
The blue point is the real value and the red one is the Table 2 VAF and RMSE ANFIS Model Comparison for Characteristics
Data
estimated value. From fig 4, it was obtained that mainly
Data Cluster RMSE VAF (%)
the red point coincide with the blue one. It means that the 2 MF 0,49921 52,3337
ANFIS model can estimates the output almost perfect. Training 3 MF 0,60747 57,3042
2.3 Software Design and Validation SUBTRACTIVE 0,1193 94,34
2 MF 0,415454 66,60485
The best ANFIS model used as basis for designing Testing 3 MF 0,34802 54,15432
early detection software. The softwares result will be SUBTRACTIVE 0,2030 82,28

D4-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

With ra = 0,4, it was resulted 19 clusters. It means Table 4 VAF and RMSE ANFIS Model Comparison for Chest X-ray
Data
for each inputs, the are 19 membership functions in
Data Cluster RMSE VAF (%)
gaussian form. Then, this model used to design early
2 MF 0,364194 48,8421
detection software for characteristics data. Training 3 MF 0,29113 56,5538
The comparison for RMSE and VAF result for SUBTRACTIVE 0,0185 99,85
characteristics data between this study and [3] shown in 2 MF 0,25199 65,45689
table 2. From table 2, it was obtained that the result of this Testing 3 MF 0,275235 62,49139
study better than [3]. It was caused by subtractive SUBTRACTIVE 0,1063 94,84
clustering method can produces membership function
naturally, so that its more suittable with the system.
3.2 Early Detection Software
3.1.2 Chest X-ray Data The software have been created shown in fig 5 and
The result of ra variation in design for ANFIS model fig 6. Tabel 5 and table 6 give the comparison of
for characteristics data shown in table 1. Its also show softwares success rate. Form those tables, it was obtained
that either this study or [3]s study resulting sotfware with
the result from ANFIS model validation for training and
success rate more than 90%. It was caused by success rate
testing datas, represented in RMSE and VAF. calculation based linguistic variable only. In creating
software code, there is a value which used for making
Table 3 Chest X-rays Data Validation Result For ra decicion. For both studies, its value are not fixed.
Variation
RMSE VAF (%)
ra MF
Training Testing Training Testing
0,1 2 0,1550 0,3229 89,20 52,74
0,2 5 0,1131 0,0646 89,20 98,05
0,3 5 0,0210 0,0702 99,80 97,75
0,4 5 0,0185 0,1063 99,85 94,84
0,5 4 0,0316 0,1210 99,55 93,13
0,6 4 0,0572 0,1963 98,53 81,95
0,7 3 0,1689 0,2233 87,17 77,76
0,8 3 0,1584 0,2760 88,71 65,03
0,9 2 0,1546 0,1837 89,25 84,73
1 2 0,1754 0,2012 86,16 81,74

Table 4 shows that ra variation not always resulting Fig. 5. Early detection characteristics data software
different number of membership function. Althougt there
are any same number for several ra value, all of it RMSE
and VAF value are different. It shows that change of ra
Table 5 Characteristics data softwares success rate comparison
will resulting the change of ANFIS parameters, premis
Data Cluster Success rate
and consequent. 2 MF 96%
From the training result, minimum error and best Training 3 MF 98%
VAF were obtained for ra = 0,4. While for testing, SUBTRACTIVE 96%
minimum error and best VAF were obtained for ra = 0,4. 2 MF 91,43%
So, the model with ra = 0,4 was choosed to the best Testing 3 MF 97,15%
ANFIS model. This model then used to design early SUBTRACTIVE 95,56%
detection software for chest x-rays data. With ra = 0,4, it
was resulted 5 clusters. It means for each inputs, the are 5
membership functions in gaussian form.
The comparison for RMSE and VAF result for chest
x-rays data between this study and [3] shown in table 4.
From table 2, it was obtained that the result of this study
better than [3]. It was caused by subtractive clustering
method can produces membership function naturally, so
that its more suittable with the system. Beside that,
image processing in [3] was done for all chest x-ray
region. In this development, chest x-ray was processed
with GLCM, take only the region that contain chest
Fig. 6. Early detection chest x-ray software
image.

D4-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table 6 Characteristics data softwares success rate comparison [5] Perhimpunan Dokter Paru Indonesia, "KANKER
Data Cluster Success rate PARU : PEDOMAN DIAGNOSIS &
2 MF 91,43% PENATALAKSANAAN DI INDONESIA,"
Training 3 MF 97,15% 2003.
SUBTRACTIVE 95,56% [6] Jyh-Shing Roger Jang, "ANFIS: Adaptive-
2 MF 90% Network-Based Fuzzy Inference System," IEEE
Testing 3 MF 85% TRANSACTIONS ON SYSTEMS, MAN, AND
SUBTRACTIVE 88,46% CYBERNETICS, VOL. 23, NO. 3, pp. 665-685,
1993.
IV. CONCLUSIONS AND FUTURE WORKS
[7] S. L. Chiu, "A Cluster Estimation Method with
A new method of lung cancer detection system has Extension to Fuzzy Model Identification," in
been developed by using ANFIS subtractive clustering. IEEE Internat. Conf. on Fuzzy Systems, 1994, pp.
Its can improve systems performance. The best ANFIS 1240-1245.
model for characteristics data was obtained in ra = 0,4;
[8] Sungging Haryo Wicaksono, "Design of Lung
RMSE for training = 0,1193, RMSE for testing = 0,2030,
Cancer Prediction System Based On Image
VAF for training = 93,34%, VAF for testing = 82,28%,
Pattern Recognition," Surabaya, 2011.
the success rate of software for training data = 96 % and
for testing data = 96%. While for chest x-ray data, the [9] Sylvia Ayu Pradanawati, "Pengembangan Sistem
best model was obtained in ra = 0,4; RMSE training = Kecerdasan Buatan Berbasis Adaptive Neuro
0,0185, RMSE testing = 0,1063, VAF training = 99,85%, Fuzzy Inference System Untuk Diagnosa
VAF testing = 94,84%, the success rate of software for Penyakit Kanker Paru-paru," ITS Surabaya, 2011.
training data = 95,56 % and for testing data = 88,46%. [10] Badan Pusat Statistik, "Perkembangan Beberapa
For further study, this system can be improved not Indikator Utama Sosial-Ekonomi Indonesia,"
only for detection, but alsocan determine lungs stage. Jakarta, 2010.
Moreover, this system could be applied in a website that [11] Sri Kusumadewi, Analisis dan Desain Sistem
could be accessed by everyone. Fuzzy Menggunakan Tool Box MATLAB.
Yogyakarta: Graha Ilmu, 2002.
ACKNOWLEDGEMENT
[12] Ratih Setyaningrum, "Kemampuan Expert System
The study described in this paper has been - ANFIS untuk Diagnosa Kesehatan Pekerja
developed in Instrumentation and Control Laboratory, Industri dan Mencari Solusinya," in Seminar
Engineering Physics Department, Faculty of Industrial Nasional Aplikasi Teknologi Informasi,
Technology, Institut Teknologi Sepuluh Nopember. The Yogyakarta, 2007, pp. L15-L20.
authors acknowledge the Fast Track DDIP (Double [13] Agus Priyono et al., "Generation of Fuzzy Rules
Degree Indonesia Prancis) Grants from DIKTI with Subtractive Clustering," Jurnal Teknologi,
pp. 143-153, 2005.
(Directorate General of Higher Education Indonesia) for
having supported. [14] Tarig Faisal, Mohd Nasir Taib, and Fatimah
Ibrahim, "Adaptive Neuro-Fuzzy Inference
System for diagnosis risk in dengue patient,"
V. REFERENCES Elsevier: Expert System with Application, pp.
[1] rhd. (2011, Maret) FAJAR Online. [Online]. 4483-4495, 2011.
http://www.fajar.co.id/read-20110302235529- [15] Adi Purnomo and Sulistyo Puspitodjati, "Aplikasi
merokok-dan-kanker-paruparu Pemrograman C# untuk Analisis Tekstur Kayu
[2] Tjandra Yoga Aditama, "Situasi Beberapa Parquet dengan Menggunakan Metode Grey
Penyakit Paru di Masyarakat," Cermin Dunia Level Co-occurrence Matrix (GLCM)," Fakultas
Kedokteran, pp. 28-30, 1993. [Online]. Teknik Industri Universitas Gunadarma, 2009.
http://www.kalbe.co.id/files/cdk/files/10SituasiPe [16] Arna Fariza, Afrida Helen, and Annisa Rasyid,
nyakitParu084.pdf/10SituasiPenyakitParu084.htm "PERFORMANSI NEURO FUZZY UNTUK
l PERAMALAN DATA TIME SERIES," pp. D77-
[3] Syamsul Arifin, "Design of Artificial Intellegence D82, Juni 2007.
Software for Lung Cancer Diagnosis using [17] Mesothelioma Health Information. [Online].
Adaptive Neuro Fuzzy Inference System," in 3rd http://www.mesothelioma-
International Conferences and Workshops on health.org/images/normlungX.jpg
Basic and Applied Sciences, Surabaya, 2011, p. [18] Elisna Syahruddin. (2006, Juni) kankerparu.org.
T002.
[4] American Society of Clinical Oncology, "Guide
to Lung Cancer," Alexandria, 2011.

D4-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

PID Design for 3-Phase Induction Motor Speed


Control Based on Neural Network
Levenberg Marquardt
Dedid Cahya H1, Agus Indra G2 , Ali Husein A3, Ahmad Arif A4
Politeknik Elektronika Negeri Surabaya
1
dedid@eepis-its.edu, agus_ig@eepis-its.edu,3ali husein@eepis-its.edu,4arive_76ers@rocketmail.com
2

Induction motor rotation settings can be done with a


Abstract PID control is a control that is often used in variety ways, by changing the number of pairs of poles,
the industrial world because the PID control can overcome set the grid voltage, or by adjusting the size of the
the existing problems. But it still has a PID control frequency. For the regulation of induction motor
weaknesses in terms of tuning which is done by trial and rotation by changing the grid voltage, will produce a
error. Many adaptation methods are used for PID
limited rotation arrangement (the narrow setting). While
parameter tuning to, but this time it will be used Neural
Network (NN) training method using the Levenberg
the settings using the frequency changes, the change was
Marquardt (LevMar). With the use of NN training done in more rounds can be smooth or linear according
LevMar would eventually get an optimal PID parameters to the change in frequency.
are used to drive a three phase induction motors with fast
to match what is desired. The result of using NN LevMar b. Rotary Encoder
without PID is enough good where the rise time is almost 1 This sensor is used to convert rotation into linear
second, osilation about 20 RPM, but the overshoot is too motion or digital signals. This sensor monitors the
big almost half of the set point given. rotation of a rotary movement of the tool, which in this
case is the wheel that is connected to the 3-phase
Index TermsPID, Neural Network, Levenberg induction motor to determine the rotary motion of the
Marquardt, tuning, trial and error.
motor.

I. INTRODUCTION

C urrent technological developments have created


a variety of technological advances, particularly in
the field of control technology. One of the controllers
are still widely used in industrial process control
systems is the PID controller.
PID controller parameter adjustment requires the
Opto Piringan
strengthening of the proportional gain (Kp), integral
Fig. 1. Rotary Encoder
gain (Ki), derivative gain (Kd) in an induction motor
c. Inverter
parameter changes, such as changes in load torque. To
Inverters used to convert the DC voltage source into
obtain the desired performance, PID controllers with
the AC source, where the resulting stress can be a
fixed gain can be used to plant induction motor with
constant or variable value. A voltage source inverter is
parameter changes in a particular range. As for the
called an inverter (voltage source inverter) when the
conditions outside the range, strengthening the PID
output voltage constant while the current source inverter
controller parameters need to be adjusted again.
(current source inverter) if the output current constant
Neural Network with Levenberg Marquardt training
and the variable DC link inverter (variable DC linked
method will be used for the tuning process in order to
inverter) when the output voltage can be controlled or
gain Kp, Ki, and Kd is appropriate if the plant works
controlled larger and smaller than the input voltage.
outside of a predetermined range, so the plant will
continue to work optimally.
d. PID control
Characteristics of the PID controller is strongly
II. LITERATURE STUDY influenced by the large contribution of the three
a. Induction Motor parameters P, I and D. Tuning constants Kp, Ti, and Td
will lead to protrusion of the nature of each element.

D5-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

One or two of the three constants can be tuned more x = the weights and biases in the network
prominent than others. Constant that stands out that will
contribute to the effect on the response of the system. Jacobi matrix is a matrix of first derivatives of the
weights and the bias error in the network. Jacobi matrix
between input layer and hidden layer is a matrix that
contains the error derivative of the weights between
input layer and hidden layer along with the bias. While
the Jacobi matrix between the hidden layer and output
layer contains the error derivative of the weights
between the hidden layer and output layer along with the
bias.
Fig. 2. Block diagram PID controller
Jacobi matrix element between the input layer and
hidden layer
e. Neural Network (6)
Neural network or artificial neural networks (ANN) is Jacobi matrix element in bias hidden layer
a distributed information processing structure in the (7)
form of directed graph. The advantages of this neural Jacobi matrix element between the hidden layer and
network is a network can learn where there are two output layer
stages in the operation of the ANN. At this stage of (8)
learning to adjust to any provision of input connections Jacobi matrix element in bias output layer
to the network produces the desired output with the (9)
structure and parameters of the optimal ANN. There are
two stages of learning, namely supervised learning (with
III. SISTEM PLAN
supervision) and unsupervised learning (without
supervision). While the initial testing phase input in the At this stage the hardware design and make the
form of the unknown information is given as input the Levenberg Marquardt algorithm for neural network PID
network. Each cell will perform computation by tuning that aims to control the plant to fit the desired.
activation function connection with the influence of Here is a block diagram of control system Neural
weight gained during the learning process. Network with Levenberg Marquardt training method.

f. Levenberg Marquardt
Levenberg Marquardt algorithm can be performed NNOut
Output
using the second derivative approach without having to PLANT

calculate the hessian matrix. If the feed forward neural Input NNErr

network using the work function of the sum of square


hessian matrix can be approximated by:
(1)
And the gradient can be calculated by:
(2) Input Hidden Layer Output NN
NN dan dan
With J is the Jacobian matrix containing first derivatives Bias Hidden Bias Output
Bobot NN Bobot NN
of the weighting network error and bias network. I-H H-O
(V) (W)
Levenberg Marquardt algorithm can be calculated with
Fig. 3. Block diagram NN LevMar Without PID
the approach to compute the Hessian matrix in which to:
(3)
Where have 1 piece of data input to the NN NN where
it will split itself into two pieces of input nodes, 3 hidden
Weighted so that repairs can be calculated:
nodes and one output node. So the dimension of the
(4)
Where I is the identity matrix and e is a vector of size pno matrix jacobiannya to 2 x 13 where the "2" is derived
that can be determined by the equation JTJ. With the from the data input into the NN and "13" comes from the
input dimensions are ni, nh dimension is hidden and the number of weights and biases that are connected from
output dimension is no. So the total weight can be the input layer to hidden layer. So the dimension of the
calculated by hessian matrix is 13 x 13 which is a product of the JT
(5) with J.
So the dimension of the Jacobian matrix is pno x w Here are the stages of the control system are assigned
while the Hessian matrix dimensions w x w. the value of NN LevMar for weights and biases are
connected:
a. Step 1
The first step taken to set the initial values of the
weights connected between the input and hidden layer
(v) and the hidden and output layer (w) are random.
Determine the value of and where there are no

D5-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

provisions on how much the value of and , but many be carried out continuously until the same error with the
studies using = 0.1 and = 10. error limit.
While the overall LevMar NN algorithm is the
b. Step 2 following can be summarized as follows:
The second step is performed by calculating the START
function forward (feed forward)
~ Each hidden node input signal summing weights as
Inisialisasi Jaringan
follows: Random bobot V dan W
Set dan

Where:
Zinh = signal input for hidden node h Hitung maju pada simpul
Xi = value input for node i Hidden dan Ouput
Vih = value weight between input node i and hidden Zh = f(v,in), Yo = f(w,zh)

node h
V0h = value bias at hidden nodeh
Hitung sse
~ Calculate the value of hidden nodes based on the
1
sigmoid activation function. = ( )2
2
=1

Where: Hitung matriks Jacobian


Zh = value hidden node h J(x)

~ Each hidden node output signal summing weights as


follows: Hitung selisih bobot
= ( + )1
Dimana, g = JTe
Where:
Youto= signal input to output node o
Zh = value hidden to node h Koreksi pembobot
= +
Who = value weight between hidden node h and output
node o
W0o = value bias at output node o
TIDAK
~ Calculate the value of the output node based on the Ebaru < SSE
sigmoid activation function YA

Reduce (/) Increase (x)


YA
Where:
TIDAK
Yo = value output node o error < error limit

c. Step 3
The third step is done by calculating the value of END
error where the error function approximated by Sum Fig 4. Flowchart NN LevMar
Square Error (SSE). Where to compare the value of each
output (Yo) with a target (tk) with the following
equation IV. SIMULATION RESULT
In the Sub is the result of simulation by the method of
training neural networ LevMar NN to be compared with
simulations by using this NN BackPro where the
d. Step 4 comparison of the results can be seen which one is better
The fourth step is done by calculating the Jacobian for NN training.
matrix (J) which contains the first derivative of the
weights and bias error. A. NN simulation LevMar
e. Step 5
The fifth step is done by calculating the difference in
weight

f. Step 6
The sixth step is done by calculating a new weight
Having obtained the new weights are calculated as the
error back to the step 3. If the error is reduced, the new
do ( / ) and return to step 2 to step 7. If a new error is
not reduced then do (x) and return to step 5. This will

D5-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

change set point that is not large overshoot of about 200


Fig 5. Sheet NN settings LevMar
RPM.
Set Point = 300 RPM Set Point = 1000 RPM and load 50%

Fig 6. Graph speed of 300 RPM for NN LevMar


Fig 9 .Graph of speed with load of 50% for the NN LevMar
From the graph it was found that rise time of 0.5 From the graph the response to load change 50% found
seconds. For the overshoot of about 150 RPM. that the system is able to restore to its original set point
Stabilized within 20 seconds and the steady state error of while the open loop system can not return to its original
about 15 RPM. state.
Set Point = 1500 RPM B. NN simulation BackPro

Fig 7. Graph-speed 1500 RPM for NN LevMar


Fig 10. Sheet NN settings BackPro
From the graph it was found that rise time of about 1
second. For the overshoot of about 600 RPM. Stabilized Set Point = 300 RPM
within 20 seconds and the steady state error of about 20
RPM

Set Point altered by the period 2000

Fig 11. Graph speed of 300 RPM for NN BackPro

From the graph it was found that rise time of 0.5


seconds. For the overshoot of about 150 RPM. and
steady state error of about 100 RPM.

Fig 8. Graph of velocity with the period 2000 to NN LevMar Set Point = 1500 RPM

From the graph the response to changes in set point


period of 2000 found that the change in set point showed
that when the transformation of a large enough set point
overshoot produced large about 500 RPM, but when the

D5-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

V. ANALYSIS
From the simulation results performed breaking can be
done to analyze the results of these simulations which
are categorized into 3 pieces, namely the fixed speed,
the speed varies according to period, and administration
expenses

Fixed speed
On testing the speed of response is obtained that
LevMar NN NN LevMar takes about 1 second rise time
and began to stabilize an average of 20 seconds. Its
Figure 12 Graph of the speed of 1500 RPM for NN BackPro
steady state error of not more than 20 RPM. However
Overshoot produced quite large for large yag RPM
From the graph it was found that rise time of about 1 about 500 RPM
second. For the overshoot of about 600 RPM. Stabilized While the testing of the response rate was obtained
within 25 seconds and the steady state error of about 20 that BackPro NN NN BackPro takes about 1 second rise
RPM. time and began to stabilize an average of 30 seconds. Its
steady state error of not more than 50 RPM. However
Set Point altered by the period 2000 Overshoot produced quite large for a large RPM about
500 RPM

Speeds vary according to the period


Of testing the speed of response to changes in NN
LevMar set point was found that the changes will affect
a very large overshoot in terms of its becoming quite
large about 500 RPM with a rise time of about 1 second.
Changes are not too big to be a more rapid rise time of
0.5 seconds.
While testing the response speed of NN backPro to
changes in set point was found that the changes will
affect a very large overshoot in terms of its becoming
Figure 13 Graph of velocity with the period 2000 to NN BackPro quite large about 200 RPM with a rise time of about 1
second. Changes are not too big to be a more rapid rise
From the graph the response to changes in set point time of 0.5 seconds.
period of 2000 found that the change in set point showed
that when the transformation of a large enough set point Load given
overshoot produced enough large about 200 RPM, but To test NN LevMar to changes in load was found that
when the change set point that is not too large overshoot when the load under 54% of the system is able to return
of about 50 RPM. to the set point, but typing a given load of more than
55% rate can not be returned to its set point
To test NN BackPro to changes in load was found that
when the load under 54% of the system is able to return
to the set point, but typing a given load of more than
Set Point = 1000 RPM and load 50% 55% rate can not be returned to its set point.

VI. CONCLUSION
Once the testing is done by performing a simulation on
visual basic 6.0 obtained the following conclusion:
~ Overshoot LevMar NN generated by nearly half from
a set point given
~ Time to reach set point with a range of 1 second with
the assumption that the provisions of the motor is used
in accordance with the motor simulation
~ NN LevMar achieve faster convergence which is
about 20 seconds while the NN BackPro takes about 30
Fig 14. Image speed with load of 50% for the NN BackPro seconds
~ The process of adaptation is performed for the NN
From the graph the response to load change 50% found LevMar tend to be slow compared to NN where NN
that the system is able to restore to its original set point BackPro BackPro able to respond to a change of pace
while the open loop system can not return to its original well with the relatively short time is about 60 seconds.
state. ~ The oscillations that occur in less than LevMar NN
NN BackPro for high RPM, while about 10 RPM to low

D5-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

RPM, while about 20 RPM to high RPM BackPro to


about 20 RPM and low RPM to about 100 RPM. AUTHOR

REFERENCES Dedid CH, born in Pasuruan, Indonesia,


[1] Ratna Ika Putri, Mila Fauziyah, Agus Setiawan, December 27, 1962. Educational
Penerapan Kontroller Neural Fuzzy Untuk backgrounds:
Pengendalian Motor Induksi 3 Fase Pada Mesin Engineer in Electrical Engineering
Sentrifugal, INKOM, Vol. III, No. 1-2, Nopember Institute of Technology Sepuluh
2009. Nopember Surabaya, Surabaya
[2] N. N. R. Ranga Suri and Dipti Deodhare, Parallel Indonesia (1986).
Levenberg-Marquardt-based Neural Network MT Electrical Engineering Institute of
Training on Linux Clusters - A Case Study, AI & Technology Sepuluh Nopember
Neural Networks Group Centre for Artificial Surabaya, Surabaya Indonesia (2002)
Intelligence & Robotics Bangalore Post-graduate student in Electrical Engineering, in
[3] Cia Ju Wu, A Neural Networks Based Method For Institute of Technology Sepuluh Nopember
Fuzzy Paramater Tuning Of PID Controllers, Surabaya-Indonesia (2007- ow)
Journal of the Chinese Institute of Engineers, Vol.
25, No. 3, pp. 265-276; 2002 Agus Indra Gunawan, Born Agustus 21,
[4] Rahmat, Perbandingan Algoritma Levenberg 1976. Educational backgrounds:
Marquardt Dengan Metode Backpropagation Engineer in Electrical Engineering
Pada Proses Learning Jaringan Syaraf Tiruan Institute of Technology Sepuluh
Untuk Pengenalan Pola Sinyal Nopember Surabaya, Surabaya
Elektrokardiograph, Seminar Nasional Aplikasi Indonesia
Teknologi Informasi 2006 (SNATI 2006) ,
Yogyakarta; Juni 2006
[5] Tianur, Kontrol Kecepatan Motor Induksi Ali Husein Alasiry, born in Maluku,
Menggunakan PID-Fuzzy, Jurusan Teknik Indonesia, Oktober 27, 1973.
Elektronika, Politeknik Elektronika Negeri Educational backgrounds:
Surabaya;2010 Engineer in Electronics Engineering
[6] Huailin Shu, dkk, Decoupled Temperature Control from Institute Technology Sepuluh
System Based on PID Neural Network, ACSE 05 Nopember (ITS) Surabaya(1998).
Conference, Cairo Egypt; Desember 2005 M.Eng degree in Mechanical and
[7] Cesar Souza, Neural Network Learning by the Control Engineering from Tokyo
Levenberg-Marquardt Algorithm with Bayesian Institute of Technology (2004)
Regularization (part 1) , cesarsouza.
Blogspot.com;Nopember 2009
[8] Cesar Souza, Neural Network Learning by the Ahmad Arif Asror, born in Pasuruan,
Levenberg-Marquardt Algorithm with Bayesian Indonesia, Januari 15, 1990.
Regularization (part 2) , cesarsouza. Educational backgrounds:
Blogspot.com; Nopember 2009 Politeknik Elektronika Negeri Surabaya
(2008-ow).

D5-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Zelio PLC-based Automation of Coffee


Roasting Process
1
M. Aziz Muslim, 2Goegoes Dwi N, 3Ali Mahkrus
Electrical Engineering Department, Faculty of Engineering, Brawijaya University
1
muh_aziz@ub.ac.id, 2nisways@gmail.com, 3aly_alfath@yahoo.com

efficient centered automation systems for overall


Abstract Pusat Penelitian Kopi dan Kakao processes. This system can be operated in automatic
Indonesia located in Jember, East Java, has developed mode as well as in manual mode. We proposed to use
coffee roaster machine, with the capacity of 10 kg as well as Zelio PLC as the bases of automation system. Using a
50 kg. For economic and reversible reasons, it uses wood
PLC system means flexibility, since we can modify the
for combustion. In fact, starting from roasting process up
to tempering process the machine must be operated by field system (such in case of relay aging or system
operator step by step. modification) easily, without having to replace all
To overcome these difficulties, we developed an efficient existing instruments, by modifying the program inside
centered automation systems for overall processes. This PLC.
system can be operated in automatic mode as well as in
manual mode. To implement this system, we employed II. COFFE PROCESSING
Programable Logic Controller (PLC) type Zelio
SR3-B261BD (as the main PLC) and SR3-XT43BD (as an A key part of coffee production is roasting process. In
extended PLC). PLC programming is done using Function this process, aroma and distinctive taste of coffee from
Block Diagram (FBD) model. Pt-100 and Thermostat are the coffee beans are formed through heat treatment.
used to sense temperature at roaster cylinder and Coffee beans naturally contain quite a lot of potential
temperer. Experiments showing satisfactory results
compared to previous system. For example, with automatic
compounds forming distinctive taste and aroma of
mode, using 10 kg coffee with water content of 12% and coffee. During roasting process, there are three stages of
fuel wood with water content of 15,33% resulting medium physical and chemical reactions run in sequence, i.e,
class roasted coffee in 25 minutes, whis is 15 minutes faster evaporation of water from the beans, the evaporation of
than using previous system. volatile compounds (such as aldehydes, furfural,
ketones, alcohols and esters), and the process pyrolysis
Index Terms Coffee Roaster Machine, Temperature
(browning beans). Pyrolysis itself is basically a
Sensor Pt-100, Thermostat, Zelio PLC SR3-B261BD,
SR3-XT43BD, Function Block Diagram. decomposition reaction of hydrocarbon compounds such
as carbohydrates, hemicellulose, and cellulose which
generally occurs after the roaster temperature above
I. INTRODUCTION 180oC. Chemically, the process is characterized by the
release of CO2 gas in large amounts of space roaster.
I ndonesia is one of the largest coffee-producing
countries in the world. Statistic shows that 95,9% of
1,30 million Ha plantation area is owned by the personal
Being physically, characterized by changes in the
original color of coffee beans a yellow-green to brown.
Roasting time varied from 7 to 40 minutes depending on
and the rest is owned by PTPN and private. Hence, this
the type of equipment, quality of coffee, as well as fuel.
sector plays an important role as income generator for
Roasting process terminated when the aroma and taste of
Indonesian farmer [1][2].
coffee has reached the desired one and the color is
Coffee been processing has big impact in the quality
changed from the original seeds of yellow-green to dark
of coffee. One of important steps in the processing is
brown, blackish-brown, and black [1].
roasting process. Pusat Penelitian Kopi dan Kakao
There are two processes conduct by two machines
Indonesia located in Jember, East Java, is a central for
developed at the Pusat Penelitian Kopi dan Kakao
Coffee and Cacao research in Indonesia. They have
Indonesia. The first process is the roaster process,
developed a coffee roaster machine, with the capacity of
conduct by two kind of machines, first is with capacity of
10 kg as well as 50 kg. For combustion, wood fuel is
10 kg (depicted in Figure 1, while the inner side of the
used with the reasons of economic, reversible, and
roaster is presented in Figure 2) and the other is with 50
according to market needs. In fact, starting from roasting
kg of capacity. After completion of roasting process, the
process up to tempering process the machine must be
temperature of the coffee bean outing from the roaster
operated by field operator step by step, which is of
cylinder must be reduced quickly below 30oC so that the
course not efficient [1][3].
taste and aroma of coffee do not lost due to the hot
To overcome these difficulties, we developed an
temperature. The process is called tempering process.

D6-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

This process is conducted by means of tempering including a monitor (display) small, integrated on the
machine, such as depicted in Figure 3. module and extension modules are either direct
conversion of the temperature sensor to the voltage or
the addition of discrete I/O, as well as direct monitoring
capabilities to facilitate the Human Machine Interface
(HMI). In general, Zelio also has analog and discrete I
/O. We used Zelio PLC with the type of SR3-B261BD. It
has 16 input ports, which are can be set as 16 discrete
input or 10 discrete input with 6 analog inputs. This PLC
has 10 ports of discrete output. Figure 4 shown the Zelio
SR3-B261BD.

Figure 1. Roaster of 10 kg Capacity

Figure 4. The Zelio SR3-B261BD

The extension analog module used in this study is the


Zelio SR3-XT43BD (depicted in Figure 5.). Using this
extension module we can control directly the analog
input and analog output. The analog input of the PLC are
voltage, current, and an output of temperature sensor
pt-100. While the output is the form of voltage.

Figure 2. Schematic Diagram of Inner Side of the Roaster

Figure 5. The Zelio SR3-XT43BD

As an advantageous of using Zelio PLC is it supports


Function Block Diagram (FBD) as the programming
languange which is relatively simpler than using ladder
diagram. Further description of FBD follows.

B. Function Block Diagram (FBD)


Figure 3. Tempering Machine FBD is a graphical data flow-based programming,
widely used for control process purposes involving
III. PROGRAMMABLE LOGIC CONTROLLER (PLC) complex calculations and analog data acquisition.
SYSTEM
Visually, this kind of programming can be seen in Figure
A. Zelio PLC 6. In Figure 6, the left side is the system input, while the
right side is the system output. In between is the space to
Zelio is generally referred to mini PLC, applied in
place the desired functions. The functions is in the form
small industries. Zelio can also be used for simple
of an image block. Of which block is the function of
Automation Lighting Control with free customized
logic, as in Figure 7 and the non-logic, as in Figure 8.
program. Even it can also functioned as the master
control security system. Equipped with several features,

D6-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

IV. AUTOMATION OF ROASTING PROCESS

A. General Description
Figure 11 shows the overall process controlled by our
proposed automation system. A block diagram of our
proposed process control schema is depicted in Figure
12.
Figure 6. Function Block Diagram

Figure 7. Logic Function Block Diagram

Figure 11. The Overall Coffee Bean Process

Figure 8. Non-logic Function Block Diagram


Figure 12. Block Diagram of The Proposed Process Control
Schema
Output latching using ladder diagram is shown in
Figure 9, while the same function using FBD is shown in In accordance with the block in Figure 12, the parts of
Figure 10. In both figures, x1 is input 1 (a normally open the system include:
push botton), and x2 is input 2 (a normally closed push 1. Zelio (mini PLC) functioned as the main
button), while Y1 is motor driving output. When x1 is controller of the entire process.
pressed, the output (motor) will remain in ON condition 2. Fan/blower system that serves as a controller in
unless x2 is pressed. roaster burner.
3. AC motors, we used 4 AC motors placed in
space heater motor, vacuum coffee beans, coffee
stirrer, and vacuum blower heat.
4. DC motors, we used DC motors for
closing/opening doors of roaster and
closing/opening doors of temperer.
5. Sensors, consist of temperature sensors Pt-100,
thermostat, and limit switches.
6. Alarms are used when there is a shortage of wood
Figure 9. Output Latching using ladder diagram in burner or system failure, feeding raw material
to be roasted and when overheating occurs.

B. Process Control Strategy


In this section, control strategy of overall process
including the task of controller is described. All of this
explanations are based on the processes in Figure 11 and
control schema Figure 12. The explanation is as follows:
1. Roasting process. This process begins by manually
Figure 10. Output Latching using FBD
heating the burning area under cylinder roaster.

D6-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Starting from the initial heating, cylindrical roaster temperature of the coffee bean is already under
was switched on. This is done to avoid expansion 30oC (read by temperature sensor of thermostat
of part of the cylinder. When the temperature of the type), the beans will be issued through the holes
hot cylinder has reached the desired temperature in the tempering and go into the container of
(150o-170oC), the coffee beans are automatically roasted coffee beans.
inserted into the cylinder by using a vacuum Program of proposed control strategy in FBD is given
suction machine with a capacity of 36.85 kg of in Figure 13. The program is then loaded into the PLCs
coffee beans. However, in practice, the engine memory to implement the control strategy.
vacuum is not constantly suck all the coffee beans,
but with PLC control, a vacuum is sucking an
average of 10 Kg in 45 seconds, then release the
suction that eventually entered into a cylindrical
roaster in 20 seconds. The process was repeated 5
times so it can suck an estimated 50 kg in 5 minutes
and at the same time put the coffee beans into rotary
cylinder. The cylinder is then rotated constantly by
the motor, to make roasting process evenly occurs
on the coffee beans. A temperature sensor is placed
to measure real time in-cylinder temperature and
sending this data to the PLC.
The heating process of the cylinder is continued to
reach the temperature of 180oC to 220oC ( 10% of
the 200o C) according to the cylinder heat rise and
their normal temperature in roasting. The
difference in reference temperature is caused by the
difference of water content of wood used in
combustion and water content of roasting coffee.
The smaller the water content of coffee and wood,
the heat will rise faster than the high water content. Figure 13. Function Block Diagram of The Proposed Control Strategy
To supply oxygen into the heating system we used a
DC motor as fan / blower. Motor speed can be set V. EXPERIMENTAL RESULTS
according to the analog signal sent to the fan. If the In automatic mode control, duration of roasting
combustion temperature exceeds 200oC, then the process varies according to the water content of fuel
fan will be turned off. When the temperature wood, water content of roasting coffee and weight of
decreases from the desired value (from 170oC to coffee. The higher the water content of wood the longer
130oC), then the fan will rotate with a maximum roasting duration. Table 1 summarized the results of
speed. When the fan is spinning at a maximum, but three experiments.
still cannot raise the combustion temperature, and Table 1. Experimental Results
even drops below 115 oC, then the PLC will send a
Coffee Water Water Roating
signal to the siren failure as a sign that there has Trial
Roaster
Weight Content of Content of Duration
been a fuel shortage, this is followed the turning Type
(Kg) Coffee (%) Wood (%) (minutes)
off of a fan if the temperature is below the 1 10 10 12 15,33 25
minimum fan system. Once the wood fuel is 2 50 30 11,8 12,69 34
3 50 30 12 13,82 35
inserted, the temperature will rise to the desired
point.
Table 1 shows satisfactory results since it still less
After the roasting process goes according to plan,
than the maximum roasting time (40 minutes). The most
and the set temperature and time is reached, the
important point actually is not in the reducing of roasting
cylinder remain rotates while the door opening.
time, but in the ease work of the operator. Using the
Roasted coffee will go out to the tempering
proposed control system, in automatic mode, all
machine. Before the doors of roaster open, the
processes can be controlled easily from control panel .
temperer mixer and cooling blower are activated
first.
VI. CONCLUSSIONS
1. The Tempering Process. This process is the final
step. Within 15 seconds before coffee bean set to In this study, we developed an efficient centered
tempering, a mixer has been activated, followed automation systems for overall processes of producing
by the fall of all coffee bean in the temperer. This roasted coffee. This system can be operated in automatic
is done to prevent the buildup of the hot coffee mode as well as in manual mode. A Zelio PLC of type
beans into one side of the temperer. When the SR3-B261BD (as the main PLC) and SR3-XT43BD (as
an extended PLC) were employed as process controller.

D6-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

PLC programming is done using Function Block M. Aziz Muslim received Bachelor Degree and
Master Degree from Electrical Engineering
Diagram (FBD) model. Pt-100 and Thermostat are used Department of Institut Teknologi Sepuluh
to sense temperature at roaster cylinder and temperer. Nopember, Surabaya, Indonesia, in 1998 and
Experiments showing satisfactory results compared to 2001, respectively. In 2008 he received Ph.D
degree from Kyushu Institute of Technology,
previous system. In the term of roasting time, maximum Japan. Since 2000 he is with Electrical Engineering
roasting time is reduced from 40 minutes 35 minutes. Department, Brawijaya University. His current
research interest are control systems and computational intelligence
And using the proposed control system, in automatic including its wide applications in electronics, power systems,
mode, all processes can be controlled easily from control telecommunications, control systems and informatics.
panel . Goegoes Dwi Nusantoro received Bachelor
Degree from Brawijaya University and Master
ACKNOWLEDGMENT Degree from Gajah Mada University, Indonesia,
in 1999 and 2005, respectively. Since 2006 he is
Authors thank to Pusat Penelitian Kopi dan Kakao with Electrical Engineering Department,
Indonesia at Jember, for giving us facility and Brawijaya University. His current research
opportunity to conduct this research. interest are electronics control systems (embedded
control system) and robotics.

REFERENCES Ali Mahkrus joined Electrical Enegineering


[1] Suharyanto, Edi, Sri Mulato, Pengolahan Primer dan Sekunder Department of Brawijaya University as an
Kopi, Pusat Penelitian Kopi dan Kakao Indonesi, Jember, 2006 undergraduate student in 2005. This study is a
[2] Mulato, Sri, Development and Evaluation of a Solar Cocoa part of his endeavour for fulfilment of Bachelor
Processing Center for Cooperative Use in Indonesia, Degree. Finally he was awarded the Degree in
Dissertation.Hohenheim University. Stuttgart-Hohenheim, 2011.
2001
[3] Ali M, M. Aziz M, Goegoes D.N, Otomatisasi Mesin Sangrai
Kopi Berbasis PLC Zelio Berbahan Bakar Kayu, Bachelor
Degree Thesis, Malang, 2011

D6-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Prediction of CO and HC on Multiple Injection


Diesel Engine Using Multiple Linear Regression
Bambang Wahono, Harutoshi Ogai
Graduate School of Information, Production and Systems, Waseda University
bambangwahono80@fuji.waseda.jp

relationship between a dependent variable and one or


AbstractIn recent years, diesel engine has been more independent variables. The dependent variable is
equipped some control devices such as multiple injection sometimes also called the predictand, and the
equipment with common rail system and turbocharger. In independent variables are called the predictors. MLR is
order to control the large number of control parameter based on least squares. The model is fit such that the
appropriately in consideration of CO and HC as the sum-of-squares of differences of observed and predicted
engine output objectives, the model construction which
values is minimized.
reproduces the characteristic value of CO and HC from
control parameter is needed. In this research, the multiple B. The Mathematical Model Equation
linear regressions were applied to construct the engine
model. Using the experimental data of a single cylinder
The model expresses the value of a predictand variable
diesel engine, the prediction model of CO and HC on as a linear function of one or more predictor variables
multiple injection diesel engines was built and compared and an error term:
with the conventional method on estimation accuracy. y i = 0 + 1 xi1 + 2 xi 2 + ..... + p xip + ei (1)
Where, yi is the predictand variable in observation i.
Index TermsEngine, modeling, MLR, multiple
xip is the value of pth predictor variable in observation i.
injection
0 is the coefficient constant. p is the coefficient on the
pth predictor. p is the total number of predictors. ei is the
I. INTRODUCTION
error term.

T HE big problem in the diesel engine is the exhaust


gas emission such as CO and HC. CO and HC are
harmful emission not only for human health but also
The model (1) is estimated by least squares, which
yields parameter estimates such that the sum of squares
of errors is minimized. The resulting prediction equation
for the environment. Many approaches have been is:
proposed to reduce these emissions [1]. In recent years, y i = 0 + 1 x i1 + 2 x i 2 + ..... + p x ip (2)
diesel engine has been equipped some control devices
such as multiple injection equipment with common rail Where, the variables are defined as in (1) except that
system and turbocharger. In order to control the large ^ denotes estimated values. The error term in equation
number of control parameter appropriately in (1) is unknown because the true model is unknown. Once
consideration of CO and HC as the engine output the model has been estimated, the regression residuals
objectives, the model construction which reproduces the are defined as:
characteristic value of CO and HC from control ei = y i y i (3)
parameter is needed. In this research, the multiple linear Where, yi is the observed value of predictand in
regressions were applied to construct the engine model. observations i and y i is the predicted value of predictand
Using the experimental data of a single cylinder diesel in observations i.
engine, the prediction model of CO and HC in multiple The difference between the observed value yi and the
injection diesel engines was built. predicted value y i would on average, tend toward 0. For
this reason, it can be assumed that the error term in
II. CONSTRUCTION OF MODELING
equation (1) has an average or expected value of 0 if the
In this research, we used the multiple linear probability distributions for the dependent variable at the
regressions to construct the mathematical modelling of various level of the independent variable are normally
the multiple injection diesel engine. distributed. The error term can therefore be omitted in
A. Multiple Linear Regression calculating parameters [3].
Then, the sum of squared residuals (SSE) equation is:
Multiple linear regression (MLR) refers to the n
establishment of multiple linear regression model SSE = e
i =1
i
2 (4)
utilizing historical sample data. Multiple linear
regression is the theory and method, a mature and Where, n is the number of observation. The sum of
quantificational analysis method [2]. Multiple linear squared regression equation is:
regression is a method used to model the linear

D7-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

n
SSR = ( y
i =1
i yi ) 2 (5)

Where, y i is the mean of the y values. In the case of


simple regression, the formulas for the least squares
estimates are:
=[ 0 1 2 .. p]T =(XT X)-1 XY (6)
Where, X and Y are the following column vector and
matrix:
1 x11 x12 .. x1 p y1
y
1 x21 x22 .. x2k
X = and Y = 2 Fig. 1. Single cylinder diesel engine experimental device
.. .. .. .. .. ..

1 xn1 xn2 .. xnp yn
SSE
R = 1 (7)
SST
SSR
p (8)
F =
SSE
( n p 1)
(9)
tj =
j

c ij [ SSE ]
( n p 1)
cij=(XT X)-1 i,j=0,1,2,p (10)
Fig. 2. Single cylinder diesel engine schematic view
Where, F is the statistic value, tj is relationship
parameter R and t statistic value. The correlation The experimental device of this research is Yanmar
coefficient R indicated that the matching level of the TF70 V-E diesel engine with 4 cycle horizontal type
calculation datum by the regression equation and the water-cooling and equipped with a turbocharger.
original datum, the result is the better when R is more
close to 1. Statistic values indicate the significance of the Table I Specification of a diesel engine
Engine type 4-cycle, 1cylinder, DI
multiple linear regression equation, whose values obey F 78 mm 80 mm
Bore Stroke
distribution. On the condition of less effective regression Top clearance 0.98 mm
analysis result, the statistics values of t correspond to non Con-rod length 115mm
significant variables should be rejected in turn according Compression ratio 21.4
to the value of tj. Then the regression analysis will be Cylinder capacity 0.382L
carried out again with the remaining significant factors. Maximum output 5.5/2600 KW/min-1
Full-length 640 mm
Finally, the prediction model of output is identified.
Full-height 474 mm
Full-width 330.5 mm
III. EXPERIMENT
In this research, we used the single cylinder diesel
engine experimental device to get the experiment data.
We used experiment data to build the model.
A. Experimental Device
Combustion model could be applied to calculating
many engine indices, BSFC, gas emission, pressure, etc.
In the current research, multiple linear regression model
is constructed, and only CO and HC are taken as
optimization objectives. These objectives are formulated
from groups of experiment data. The experiments with
multiple injections are performed on a diesel engine
experimental device (in Fig. 1) included the diesel Fig. 3. Multiple injection pattern
engine schematic view (in Fig. 2) whose specifications
are listed in Table I. The multiple injections include two B. Experimental Condition and Result
pilot injections and main injection, as shown in Fig.3. In this research, the diesel engine is set with three
stage injection pilot1 injection, pilot2 injection and main
injection. Then, the rotation speed 1500 rpm, EGR rate
0% and the engine temperature is set about 90 degrees.
The engine control parameters are set as Table II and the

D7-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

engine optimization objectives are listed as table III. Then, the regression equation for CO and HC can be
Table IV shows the data was obtained from Diesel expressed as:
engine. In Table IV, x1, x2, x3 and x4 as control y1= 24.6057+0.0060x10.0041x20.0030x3+0.0174x4
parameters (input). Then, y1 and y2 represents the y2= 60.35840.1760x10.1421x2+0.0543x3+0.1951x4
characteristic value of the optimization objective The predicted results of CO and HC are evaluated
(output). using correlation coefficient. The predicted result,
Table II Diesel engine control parameters experiment data and absolute error of CO and HC is
Control
Meaning Unit
Variation showed in Table VI, Fig. 4 and Fig. 5
Parameter Range
Table VI The predicted result, actual data, absolute error of CO and HC
Pilot 1 injection deg. -70,-50,-40,-3
x1 CO (%) HC (ppm)
timing ATDC 0
No
Pilot 2 injection deg. actual predict error actual predict error
x2 -40,-20,-15
timing ATDC
1 1.64 1.599228 2.49% 257 254.5442 0.96%
Main injection deg.
x3 -8~0
timing ATDC 2 1.6 1.631564 1.97% 253 254.4677 0.58%
x4 Engine Speed rpm 1500
3 1.62 1.613605 0.39% 253 254.7935 0.71%
Table III Optimization objectives 4 1.72 1.705824 0.82% 253 250.7749 0.88%
Optimization Meanin Uni
Objective g t 5 1.75 1.75494 0.28% 252 251.4144 0.23%
y1 CO % 6 1.75 1.786686 2.10% 252 251.8588 0.06%
pp
y2 HC 7 1.71 1.71181 0.11% 250 250.6663 0.27%
m
8 1.73 1.708817 1.22% 251 250.7206 0.11%
Table IV Data from input and output
engine 9 1.72 1.723193 0.19% 249 250.97 0.79%
piot1(T) piot2(T) main(T) CO HC
speed 10 1.73 1.68546 2.57% 252 250.6342 0.54%
deg deg deg r.p.m. % ppm
x1 x2 x3 x4 y1 y2 11 1.64 1.665097 1.53% 249 250.4934 0.60%
-70 -40 -3 1523 1.64 257 12 1.65 1.686789 2.23% 248 246.1185 0.76%
-70 -40 -8 1524 1.6 253
13 1.65 1.683796 2.05% 246 246.1728 0.07%
-70 -40 -2 1524 1.62 253
-50 -40 -4 1522 1.72 253 14 1.69 1.698172 0.48% 247 246.4222 0.23%
-50 -40 -3 1525 1.75 252 15 1.7 1.720926 1.23% 245 244.3264 0.27%
-50 -40 -2 1527 1.75 252
-50 -40 -6 1522 1.71 250 16 1.77 1.785008 0.85% 245 244.6943 0.12%
-50 -40 -5 1522 1.73 251 17 1.71 1.729905 1.16% 244 244.1635 0.07%
-50 -40 -4 1523 1.72 249
18 1.76 1.744282 0.89% 243 244.4128 0.58%
-50 -40 -3 1521 1.73 252
-50 -40 -2 1520 1.64 249 19 1.82 1.781749 2.10% 245 244.1788 0.34%
-40 -20 -5 1522 1.65 248 20 1.78 1.778756 0.07% 244 244.2331 0.10%
-40 -20 -4 1522 1.65 246
-40 -20 -3 1523 1.69 247 21 1.73 1.723653 0.37% 244 243.7023 0.12%
-30 -20 -2 1521 1.7 245 22 1.68 1.72066 2.42% 243 243.7566 0.31%
-30 -20 -6 1524 1.77 245
23 1.75 1.71168 2.19% 243 243.9195 0.38%
-30 -20 -5 1521 1.71 244
-30 -20 -4 1522 1.76 243 24 1.8 1.767373 1.81% 244 243.9295 0.03%
-30 -15 -6 1525 1.82 245
25 1.78 1.74701 1.85% 243 243.7887 0.32%
-30 -15 -5 1525 1.78 244
-30 -15 -4 1522 1.73 244 26 1.73 1.744016 0.81% 244 243.843 0.06%
-30 -15 -3 1522 1.68 243 average absolute average absolute
1.32% 0.37%
-30 -15 0 1522 1.75 243 error error
-30 -15 -7 1524 1.8 244
-30 -15 -6 1523 1.78 243
-30 -15 -5 1523 1.73 244

IV. RESULT
Based on the multiple linear regression equation, the
regression coefficients for each objective are listed as
Table V:
Table V regression coefficients
y1-CO(%) y2-HC(ppm)
j o o
-0.176
1 0.0060
0
-0.004 -24.605 -0.142 -60.358
2
1 7 1 4
-0.003 Fig. 4 The prediction and experiment of CO
3 0.0543
0
4 0.0174 0.1951

D7-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

minimum absolute error of CO is 0.03% and the average


absolute error of CO is 0.37%. From Fig. 4 and Fig. 5,
the coefficient correlation of CO is 0.87968 and the
coefficient correlation of HC is 0.958748. It can be
regarded that the multiple linear regression method can
effectively estimate the objectives.

V. CONCLUSIONS
In order to control the large number of control parameter
appropriately in consideration of CO and HC as the
engine output objectives, the model construction which
Fig. 5 The prediction and experiment of HC
reproduces the characteristic value of CO and HC from
control parameter is needed. In this research, the
Differences of the predicted values with the multiple linear regressions were applied to construct the
experiment data are shown in Fig. 6 and Fig. 7. engine model. The accuracy of predictions made using
multiple linear regression models depends on how well
the regression function fits the data, there should be
regular checks to see how well a regression function fits
a given data set. This can be done through regular
updates or monitoring to ensure that the error values are
always below a pre-specified error threshold. A pre
analysis of the control parameter is necessary for
successful MLR predicting as the result of the analysis
showed. In this paper, we have reported our predicting
model of CO and HC in multiple injection diesel engines
by multiple linear regression. It can be regarded that the
multiple linear regression method can effectively
Fig. 6 The difference of predicted value and experiment data of CO estimate the objectives.

ACKNOWLEDGMENT
The author would like to thanks INPEX Scholarship
Foundation for financing the study in Waseda
University, Japan.

REFERENCES
[1] P.K. Karra, S.C. Kong, Diesel Engine Emissions Reduction
Using Particle Swarm Optimization, Combustion Science and
Technology, 182:7,Taylor and Francis, pp. 879903.
[2] J. Zhang, Y. Li, J. Cao, Sensor situation based on the multiple
linear regression forecast, 2011 IEEE International Conference
Fig. 7 The difference of predicted value and experiment data of HC on Computer Science and Automation Engineering (CSAE),
pp.47-50, China, 10-12 June 2011.
From table VI, Fig. 6 and Fig. 7, the maximum absolute [3] N. Amral, C.S.Ozveren, D. King, Short term load forecasting
error of CO is 2.57%, the minimum absolute error of CO using Multiple Linear Regression, 42nd International
is 0.07% and the average absolute error of CO is 1.32%. Universities Power Engineering Conference, pp.1192 1198,
The maximum absolute error of HC is 0.96%, the Brighton, 4-6 Sept. 2007.
[4]

D7-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Acceptance of Mobile Payment Application in


Indonesia
Hendra Pradibta
Informatics Management, State Polytechnics of Malang
ndropradibta@yahoo.com

Abstract - The Unified Theory of Acceptance and Use services such as mobile payment. Moreover,
of Technology (UTAUT) model with two additional development towards Cash Less Society also supported
variables (perceived of Risk and perceived of trust) is used the growth of this mobile service application. Yet, the
to assess the users perception towards the adoption of adoption of mobile payment has not been as good as
mobile payment application. The results of this research
expected. Users perceptions towards mobile payment
show that from the correlation analysis performance
expectancy, effort expectancy, social influence and still need to be observed further to tackle this issues.
perceived of trust have positive relationship towards The greatest problems in the adoption of technology
behavioural intention to use mobile payment application. such as mobile payment is lower respond from
Whereas, perceived of risk hasnegative relationship on users(Schierz et al., 2009). Therefore, this research
behavioural intention. From the results, it can be attempts to describe users perceptions towards the
concluded that although Indonesian consumers have adoption of mobile payment.
willingness to use mobile payment application, they are
still considering trust and risk as main determinant to use This research propose Unified Theory of Acceptance
mobile payment application. and Use of Technology (UTAUT) model combine with
trust and risk to investigate users behavioural intention
Keywords: mobile payment, UTAUT, risk and trust
towards technology adoption. So far, there is little
research regarding the acceptance of mobile payment in
Indonesia. Thus, this research will provide a
I. INTRODUCTION comprehensive study about factors that affecting
consumer to adopt the technology. The findings of this
Over the past several years the number of mobile research would be beneficial for both academics and
telephone users has increased significantly. Driven by business practitioners (vendors). From academic point
the sharply increasing of mobile usage and the of view, this research offers a framework to identify the
evolvement of its functionality (Viehland and Leong, determinants of users perception on mobile payment
2007), mobile telephone has become common devices application. On the other hand, from business
in our daily activities(Hwang et al., 2007). More and perspective, this research would give guidance in order
more people rely on mobile devices to conduct their improve the mobile payment usage in Indonesia.
business activities. Furthermore, this condition has
underpinned the shift of traditional commerce to II. LTERATURE REVIEW
electronic commerce, which utilizes technology to
support the performances. From several forms of A. Mobile Commerce
electronic commerce, mobile payment has turned into
one of the promising business model in the near future. The widespread usage of mobile telephone and the
Mobile payment enables consumers to performs their emerging of wireless technology have shifted the
activities such as paying goods and services using business activities in general. Many businesses have
mobile devices (Kim et al., 2009a). Mobility and wide utilized mobile telephone as an alternative instrument
reach characteristics which are addressed with mobile for delivering services (Medhi et al., 2009), such as
telephone has supported the penetration of mobile advertising, commerce and financial.
telephone adoption for commerce activities.It can be Many types of mobile financial application emerge
seen from several countries that has been utilized and are available in several countries such as MobilPay
mobile payment as alternative payment methods for (Germany), Paybox (UK), PayDirect (US) and many
commerce transactions, such as MobilPay (Germany), more (Norman, 2002).In line with the widespread of
Paybox (United Kingdom), PayDirect (United States) mobile commerce, mobile payment has appeared as an
and many more (Norman, 2002). Concerning interesting subject and become promising mobile
Indonesia, within five years time, the number of mobile services in thefuture(Karnouskos and Vilmos, 2004).
telephone subscriber has increased dramatically from 30 Several industries have been influenced by the emerging
million in 2004 to 180 million users by the end of 2009 of mobile payment applications, including financial
(Asia, 2010). This number shows that Indonesia has big services, retail, telecommunication, information
potential opportunity to get exploit in mobile telephone services, entertainment, and technology (Smith, 2006).

E1-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

It seems that business practitioners have assured that III. RESEARCH FRAMEWORK
mobile payment may generate competitive advantages
for their business.
Theoretically, mobile payment can be defined as a Performa
payment for services or goods which is conducted Perceived
through mobile devices instead of paying with cash
Effort Behaviour
(Karnouskos, 2004). In this business model, mobile
devices are employed for initiation, authorization and Perceived
completing the payment process.
Social

B. Mobile Payment Application in Indonesia


Fig.1 Research Framework
Over the past several years there has been dramatic
increase of mobile telephone market in Indonesia. In This research adopts the Unified Theory of
2004, the number of mobile telephone subscribers in Acceptance and Use of Technology (UTAUT) model
Indonesia reached 30 million users and dramatically (Venkatesh et al., 2003) as the basic framework to
increased to 180 million only in five years time investigate the users perception of mobile payment
(Euromonitor, 2010). The mobile subscriber penetration application. Unified Theory of Acceptance and Use of
in 2009 demonstrates that Indonesia is potential market Technology model has been introduced to explain how
for mobile telephone and mobile services. It is users differences influence the adoption of technology (
understandable if Indonesia has predicted to be the third Park et al., 2007). Basically, UTAUT model is develop
largest mobile telephone market after China and India from eight user acceptance models: Theory of Reasoned
(Asia, 2010). Action, Technology Acceptance Model, Motivational
Model, and Theory Planned Behaviour, a combined
Innovation in mobile applications seems become an
Theory of Planned Behaviour/Technology Acceptance
attractive and promising market, thus, it encourages
Model, model of PC Utilization, innovation diffusion
telecommunication companies to develop various
theory and social cognitive theory (Venkatesh et al.,
mobile applications such as mobile news, horoscope,
2003). From the research, Venkantesh et al. (2003) has
logos, ringtones, and mobile payment. Apparently,
formulated four key constructs (performance
among these applications mobile payment has risen into
expectancy, effort expectancy, social influence, and
promises mobile application. According to Central Bank
facilitating condition) as direct determinants of
of Indonesia (Bank.Indonesia, 2010) total of electronic
behaviour intention and behaviour, while attitude
money transactions including mobile payment
toward using technology, self efficacy and anxiety are
transactions has reached 60 billion rupiah by the end of
theorized not to be direct determinants of intention. In
June 2010. This number has increased 50% from the
addition gender, age, experience, and voluntariness of
same month in 2009. Yet, only few providers are
use are considered to moderate the impact of the direct
offering this form of services to their consumers. It is
determinants on behaviour intention and behaviour. The
obvious that mobile payment market still have
most important finding in this study is that UTAUT
opportunity to be expanded further. There are several
model can perform 70% of variance in usage intention
mobile payment applications that are familiar for
better that TAM studies alone. However, UTAUT
Indonesian consumer and are used as research objects in
model is not perfect in describing users behaviour. In
this research, i.e. Nada SambungPribadi application,
specific technology adoption such as mobile commerce,
download content application, mobile banking
revision and modification may be needed (Venkatesh et
application, and e-wallet application.
al., 2003). Hence, this research framework has added
Alongside with these ICTs developments, it seems perceived of risk and perceived of trust as new core
that users perceptions about e-payment have been constructs to investigate users perception towards
increasing. According to Central Bank of Indonesia technology usage.
(Bank.Indonesia, 2010), in May 2010 total of electronic
A. UTAUT
money circulation in public increased four times
compared with that in 2009. It is obvious that market Unified Theory Acceptance and Use of Technology
has accepted the adoption of electronic money as the consist of four key constructs as direct determinants of
complement of cash money. However, not all of behavioural intention and behaviour (Venkatesh et al.,
consumers are familiar with the use of electronic money 2003). Performance expectancy, effort expectancy, and
in e-payment model such as mobile payment. Therefore, social influence are as direct determinants of
it is still needed to investigate why consumers still take behavioural intention, whereas, facilitates condition as
into consideration to use e-payment and what factors direct determinant for behaviour. This research has
which influence them to use it. proposed key constructs from UTAUT model, which
hold direct relationship with behavioural intention.
Thus, performance expectancy, effort expectancy and
social influence are selected as the key determinants that

E1-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

influence users perception towards mobile payment respondents, 66 peoples (66%) are male and 34 of them
application. are female which represents 34% of total respondents.
Performance expectancy is used to measures how In addition, a reliability analysis was used for
much people perceive that using technology is useful to measured the questionnaire items. Validity is defined as
improve job performance. This determinant has three the extent to which the indicator really measures the
items used to investigate users perception regarding the model (Bryman and Bell, 2007). Because this research
technology adoption. Effort expectancy is defined as has adopted concept from previous research and
how ease of use is associated with the users experience literature reviews as constructive model (Kim et al.,
and their acceptance to adopt the system. Four items 2009b; Wu and Wang, 2005; Venkatesh et al., 2003),
will be performed in this determinant to examine users therefore, it can be considered as valid concept.As
perception regarding the technology adoption. Social expected the results of the measurement is shows good
influence refers to how people feel that others advices degree of reliability since each variables obtain
and recommendation to employ a certain systems is coefficient alpha greater than 0.5(Hair et al., 1995;
important. Three questions have been proposed in the Cronbach, 1951).
online survey to examine users perception regarding Table 1. Cronbachs Alpha
the technology adoption. These questions have been
developed based on items used in estimating UTAUT Constructs/ Variables Cronbachs N of
model. Alpha items
Performance 0.870 3
Expectancy (PE)
Effort Expectancy 0.905 4
(EF)
Social Influence (SI) 0.611 3
Perceived of Risk 0.859 4
(PoR)
Perceived of Trust 0.847 4
(PoT)
Behavioural Intention 0.855 3
(BI)

Fig. 2 UTAUT Model Furthermore, the correlation analysis technique was


used to measures the relationship between variables.
B. Perceived of Risk
This analysis is commonly used in quantitative analysis,
Perceived of risk is defined as the extent to which which is appropriate for this research. Pearsons Product
the prospective user expects the technology (mobile moment is tends to be more accurate to measure
payment application) to be risky. This determinant using relationship between numeric data (Oakshoott: 2001),
four items, which investigate the users perception hence, this research employed Pearsons to analyse the
regarding losses or harm that will be occurred within the relationship between behavioural intention variables
adoption of technology. These four questions have been with five other variables (performance expectancy,
used as determinant items in previous research in which effort expectancy, social influence, perceived of risk
investigate the usage of mobile commerce technology and perceived of trust).
(Wu and Wang, 2005).
V. RESULT AND ANALYSIS
C. Perceived of Trust
It can be seen from the data collection that the
Perceived of trust is defined, as consumers believe majority of the respondents age is between 20 to 30
that particular system will be conducted based on the years old that represents 84% from the total
procedures and their expectations. This construct respondents. Respondents with age above 30 are 13
proposes four questions, which focus on the users trust peoples (13%) and 3 peoples are under 20 years old
regarding the process of mobile payment application. with 3% of total.
These four questions are developed based on the
From the results about respondents mobile payment
previous research in mobile payment nature (Kim et al.,
applications it can shows that Nada SambungPribadi
2009b).
(NSP) is the most popular mobile payment application
IV. METHODOLOGY with 44 peoples from the total 100 respondents. Mobile
banking application gains 36% (36 peoples) from the
The online survey was launched in May 2010 until total of 100 respondents, and place it in the second
July 2010 by placing the address (URL) in social position for the mobile payment application usage.
networking site (Facebook) and group associated with
mobile application services. The survey received 100 Correlations analysis is performed to measure
responses from the consumers. From the total of 100 the relation between two variables. The Correlations
E1-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

table below shows that all variables are significantly combination of two additional variables (perceived of
correlated with Behavioural Intention variables, which risk and perceived of trust) will provide in depth insight
is shown by the significance value (p<0.05 and p<0.01). regarding the successful and the failure of mobile
From all five variables in the model research, four payment adoption.
variables have positive correlation with behavioural
intention (i.e. PE= 0.453, EF= 0.259, SI= 0.350, and REFERENCES
PoT= 0.521). Whereas, perceived of risk has negative [1] Asia, D. M. A. (2010) Indonesia:Mobile Penetration
correlation (PoR= -0.274). Available at:
http://comm215.wetpaint.com/page/Indonesia%3A+Mobil
Table 2. Correlations e+Penetration (Accessed: 29 June 2010).
[2] Bank.Indonesia. (2010) 'Jumlah Uang Elektronik ',
[Online]. Available at:
BI PE EF SI PoR PoT http://www.bi.go.id/web/id/Statistik/Statistik+Sistem+Pem
Pearson 1 .453 .259 .350 -.274 .521 bayaran/Uang+Elektronik/JmlUang.htm (Accessed: 30
Correlation July 2010).
(BI) [3] Bryman, A. and Bell, E. (2007) Business research
Nonetheless, the correlation table indicates weak methods. Oxford Oxford Univ. Press.
[4] Christer, C. (2006) Proceedings of the 39th Annual Hawaii
association towards behavioural intention because it International Conference on System Sciences (HICSS'06)
shows value <0.8. Relation between perceived of trust Track 6.
variable with behavioural intention is more likely to be [5] Cronbach, L. (1951) 'Coefficient alpha and the internal
the highest value (0.521). In conclusion it can be structure of tests', Psychometrika, 16, (3), pp. 297-334.
[6] Euromonitor (2010) Mobile Telephone Subscribtions
validated that each variables (partially) have significant Available at:
correlation with behavioural intention, but, it is http://portal.euromonitor.com/Portal/Statistics.aspx
considered as weak relationship. (Accessed: 15 March 2010).
[7] Hair, J. F., Anderson, R. E., Tatham, R. L. and Black, W.
VI. CONCLUSION C. (1995) Multivariate Data Analysis
[8] Hwang, R. J., Shiau, S. H. and Jan, D. F. (2007) 'A new
mobile payment scheme for roaming services', Electronic
As mention previously, this study attempts to describe Commerce Research and Applications, 6, (2), pp. 184-191.
user perception towards mobile payment in terms of [9] Karnouskos, S. (2004) 'Mobile payment: A journey
applying UTAUT model combined with risk and trust. through existing procedures and standardization initiatives',
IEEE Communications Surveys and Tutorials, 6, (4), pp.
1) The results show positive relationship for 44-66.
performance expectancy, effort expectancy, social [10] Kim, C., Mirusmonov, M. and Lee, I. (2009a) 'An
influence, and perceived of trust towards empirical examination of factors influencing the intention
behavioural intention to use mobile payment. It to use mobile payment', Computers in Human Behavior,
26, (3), pp. 310-322.
indicates that if performance expectancy value [11] Kim, C., Tao, W., Shin, N. and Kim, K. S. (2009b) 'An
increase, the value for behavioural intention empirical study of customers' perceptions of security and
variable also increases. This condition also applies trust in e-payment systems', Electronic Commerce
to others variable. Research and Applications, 9, (1), pp. 84-95.
[12] Medhi, I., Gautama, S. N. N. and Toyama, K. (2009) 'A
2) Perceived of risk has negative relationship on Comparison of Mobile Money-Transfer UIs for Non-
behavioural intention. It shows that if user Literate and Semi-Literate Users', in Greenberg, S.,
interpretation concerning the risk towards mobile Hudson, S. E., Hinkley, K., RingelMorris, M. and Olsen,
payment application is low, user intention to use D. R.(eds) Chi2009: Proceedings of the 27th Annual Chi
Conference on Human Factors in Computing Systems,
mobile payment application is also low. Vols 1-4. pp. 1741-1750.
3) Fivevariables (performance expectancy, effort [13] Norman, M. S. (2002) M-Commerce:
expectancy, social influence, perceived of trust and Technologies,Services,and Business Models. John Wiley
perceived of risk) have significant relationship on &Sons, Inc.
[14] Oakshott, L. (2001) Essential Quantitative Methods for
the users acceptance of mobile payment Business Management and Finance.
application, thus, it can be used to predict the result [15] Park, J. K., Yang, S. J. and Lehto, X. R. (2007) 'Adoption
of behavioural intention variable of mobile technologies for Chinese consumers', Journal of
From the descriptive analysis, it appears that Electronic Commerce Research, 8, (3), pp. 196-206.
[16] Schierz, P. G., Schilke, O. and Wirtz, B. W. (2009)
Indonesia consumers are having willingness to use 'Understanding consumer acceptance of mobile payment
mobile payment as alternative payment for their services: An empirical analysis', Electronic Commerce
transactions. Yet, they still consider trust and risk as Research and Applications.
main determinant on their perception towards mobile [17] Smith, A. D. (2006) 'Exploring m-commerce in terms of
viability, growth and challenges', International Journal of
payment. From managerial implication, the research Mobile Communications, 4, (6), pp. 682-703.
confirms the important of these five variables as the [18] Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F.
main determinants in order to increase the adoption of D. (2003) 'User acceptance of information technology:
mobile payment application. Therefore, mobile payment Toward a unified view', MIS Quarterly: Management
Information Systems, 27, (3), pp. 425-478.
providers have to concerning their application to meet [19] Viehland, D. and Leong, R. (2007) 'Acceptance and Use of
the user needs and wants, particularly on five variables Mobile Payments', ACIS 2007 Proceedings. pp. Wu, J.-H.
above. This research has validated the use of UTAUT and Wang, S.-C. (2005) 'What drives mobile commerce?:
model to investigate users acceptance regarding the An empirical evaluation of the revised technology
acceptance model', Information & Management, 42, (5),
adoption of technology. Moreover, with the pp. 719-729

E1-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Attitude Consensus of Multiple Spacecraft with


Three-Axis Reaction Wheels
Harry Septanto1, Bambang Riyanto Trilaksono2, Arief Syaichu-Rohman2 and Ridanto Eko
Poetro4
1
Center of Satellite Technology, Indonesian Institute of Aeronautics and Space
2,3
School of Electrical Engineering and Informatics, Insitut Teknologi Bandung
4
Faculty of Mechanical and Aerospace Engineering, Insitut Teknologi Bandung
1
hseptanto@gmail.com

a result in [1].
Abstract This paper deals with attitude consensus of
multiple spacecraft in a team where each spacecraft II. KINEMATIC AND DYNAMIC OF RIGID BODY
applies three-axis reaction wheels. Two control laws for SPACECRAFT
two different cases are presented. The attitude consensus
A. Vector Notation
Consider a vector as follows: = . Here, is
of multiple spacecraft is achieved under a connected
information exchange topology. Simulations run to verify
the effectiveness of the control laws in reaching the

column matrix whose three unit vectors , and ;


attitude consensus. a vetrix associated to the inertial reference frame, i.e. a

Index TermsAttitude consensus, connected graph,


= . is a column matrix
quaternion feedback, three-axis reaction wheels.
whose three components of expressed or decomposed

Note that subscript in and superscript in


I. INTRODUCTION into the inertial reference frame.
Recently, many research efforts have been dedicated
denote the frame of interest, i.e. inertial reference frame.
to analysis and design spacecraft formation flying via
The other two frames of interest would be denoted by
consensus approach. W. Ren in [1] proposed
subscript/ superscript and for the spacecrafts
quaternion-based control laws for three different cases,
fixed body frame and the spacecrafts desired frame,
including attitude alignment under undirected and
respectively. For brevity, the inertial reference frame,
directed information-exchange graph. Y. Igarasi et al in
the spacecrafts fixed body frame and the spacecrafts
3
[2] addressed passivity-based attitude synchronization
desired frame may write the inertial frame, the body
on under strongly connected
frame and the desired frame, respectively.
information-exchange graph. W. Ren in [3] proposed
Modified Rodriques Parameters-based control laws, B. Rotation Matrix
including passivity-approach attitude synchronization Rotation matrix is a matrix to transform a vector
under undirected connected information-exchange expressed in one frame to be expressed in another frame.
graph. H. Du et al in [4] proposed Modified Rodriques The set of all rotation matricesfor simplicity, a

orthogonal group in , i.e. SO 3 whose


Parameters-based continuous finite-time attitude rotation matrix is denoted by is the special

1 0 0
controllers for single spacecraft case and attitude

= = = 0 1 0! = "
synchronization case under directed

0 0 1
information-exchange graph. C. G. Mayhew et al [5] properties: ,

and det = 1.
proposed a quaternion-based hybrid feedback controller
for attitude synchronization under connected and acyclic
information-exchange graph. All of these researches In a rigid body general case, a rotation matrix for
used dynamic model of spacecraft rigid body with transforming a vector expressed in the inertial frame to
external control torque. be expressed in the body frame, & , is defined as
In practice, an actuator that may generate above type follows:

= &
of control torque is, for example, thruster. Nevertheless,
there is another actuator that also usually taken into & (1)

Let & and are rotating w.r.t. (with respect to) each
account on the research field about spacecraft control

other. Then relationship between & and is time


system, i.e. reaction wheel. This actuator is not an
external control torque. Principally, it absorbs

is also time dependent, & = & ( . Take time


(distributes) angular momentum from (to) the dependent. It implies the rotation matrix of these frame

derivative of & w.r.t. note that it could be


spacecraft.

interpreted as how observers in see the motions of


This paper addresses to attitude consensus of multiple

& then (2) is satisfied.


spacecraft in a team where each spacecraft applies
three-axis reaction wheels. This research is motivated by

E2-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

- = .)*&0- )
*&/1
)
*&/2
- 3 =4
5 & & =
*+ / D. Kinematic Equation
Consider ) -
)
*, * +C
-
S78&& 9& ) - = & S78&& 9
*, *, *,
*+ ; *<
declared in (3); the time derivative
(2)
*<
of rotation matrix & can be represented in a unit

where 4 5 & = 8&& & = =4&& 4&& 4&& >& is the


quaternion as follows:

angular velocity vector of & w.r.t. which is


) - =X ) -Z
*H+C *Y+C *J+C ;
decomposed in & and *< *< *<
0 4&& 4&&
(8)

?78&& 9 = @ 4&& 0 4&& B is denoting the where


4& &
4&&
0
= J& 8&&
*Y+C
skew-symmetric matrix of 8& . Note that 4
&
5 & is also *<
(9)

called absolute angular velocity of & since it rotates


) - = ? J& + I& " 8&&
*J+C
w.r.t. the inertial frame, . *<
(10)

Consider & = & = & & , where


& = & , and take time derivative of w.r.t. ,
In the unit quaternion, the successive rotation can be
then (3) is satisfied. represented by the quaternion multiplication as follows,
[9]:
) - =0=) - + & ) -
*C ; *+ ; *
H&* = H* H& = H * H&
+C
*< *< & *< (11)

0 = & )?78&& 9 +)
* +C
--)
* +C
- = where H&* = H * H& . Note that map is a
& *< *<
?78&& 9 &
group homomorphism, [10]. For convenience in

&* = H&* , * = * = H* = H * and


(3)
notation, the rotation matrices is written as follows:

& = H& .
Rotation matrix & represents the attitude history of
& w.r.t. . Practically, it may be obtainedeven
Consider &* = & * * = & &* , where
sun sensor and geomagnetic sensor. Meanwhile, 8&& = *& . Take time derivative of * w.r.t. * , then
indirectlyfrom reference sensor(s), e.g. star tracker,
&*
0 = & )?78&&* 9 +) - -.It implies ) - =
* +[ * +[
&* *< * *< *
may be measured by means of rate gyro sensor or

?78&&* 9 &* . that & 8&&*


=45 &* = 45&
computed from the attitude data.

4
5* = & 78&&
8* 9 8&&* = 8&&
8* , then the
Noting
C. Attitude Representation Using Unit Quaternion & &

From the Eulers theorem, an angular displacement of unit quaternion representation of attitude kinematic for
&* is as follows:
a frame w.r.t. another frame can be obtained by a single

angle correspond to column matrix F and angle G ,


rotation about an axis over an angle. The former axis and

) - =X ) - Z
*H+[ *Y+[ *J+[ ;
respectively, whose properties: F = F and F F = 1. *< * *< *< *
The Euler parameter composed of F and G is defined
(12)

as follows: where

H = =I J > K (unit 3-sphere) = J&* 8&&*


*Y+[
*<
(4) (13)

where I = cos , J = F sin and H =


O O
) - = ? J&* + I&* " 8&&*
*J+[
*< *
I +J J=1
(14)

Through fact (7) and (11), then (12)-(14) is defined as


The Euler parameter (or also called the unit kinematic equation of attitude error.
quaternion) has properties: the quaternion
multiplication (5) and conjugate of a unit quaternion (6) E. Dynamic Equation of Spacecraft with Three-Axis
that satisfies (7) Reaction Wheels

I I J J
The following assumptions are used in deriving the
H H =. 3
I J +I J +J J
equation of the rigid spacecraft dynamic with 3-axis
(5)
reaction wheels:

H = =I J > is in the origin of & .


The location of the reaction wheels mass center
(6)

H H = H H = =1 0 0 0> = U
coincidence with ] -axis of & , ^ -axis of &
(7) The rotation axis of each reaction wheels is

Note that the rotation matrix can be related to H and z-axis of & , respectively.
through Rodriques formula whose the map : K
SO 3 , where H = H .

E2-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

The transversal components of inertia moment the following:


of each reaction wheels are not considered
) - =X ) - Z
effective in operation. *H+ y [ *Y+ y [ *J+ y [
;

*< * *< *< *


(19)
There is no external torques applied to the
system.
attitude of u spacecraft body frame, & x , w.r.t. its
Meanwhile, kinematic equation that represents

neighbor body frame, & z , is as follows:


Hence, the equations of the spacecraft dynamic are
given as follows, [6]:

- +` ) - = ?78&& 97`8&& + ` 8&b 9


*8+aC
) -
*Y+ *J+
) - =. 3 (20)
*H+ ;
*8++C
`) y + { y + { y + {
_ c *< & z *< *< & z
*< *<

` )) - +) --=
*8++C *8+aC
(15)
*< *<

where a symmetric positive definite matrix `


B. Information-Exchange between Spacecraft in

kg m is the moment inertia of the spacecraft; a


Formation

diagonal positive definite matrix ` kg m is


Information-exchange between spacecraft is modeled


by a directed graph as follows:

N m is the control torque produced by the reaction | } } , } , }


the inertia moment of the reaction wheels;

wheels; and 8&b rad s


(21)

where } = x | u = 1,2, , t is the node set;


is the column matrix of

in & . In practice, a reaction wheel has a limited angular } } } is the edges set; and } = x z
reaction wheels absolute angular velocity decomposed

}} is the adjacency matrix of the graph |} , where


1 u, v t and u v.
velocity in operation. However, in this paper, the
reaction wheels are assumed to operate within the

directed graph. In a directed graph, the edge 7 x z 9


saturation limit. Note that undirected graph is a special case of

} denotes that spacecraft v can receive information


One may rewrite (15) as follows:

8&
lm & n q from spacecraft u ; x is the parent node and z is
` ` k ( p child node; and x z = 1 . Meanwhile, the edge
.?78& 97`8& + ` 8b 93 = .
& & &
3
` ` k 8&b p denoted by 7 x z 9 in the undirected graph
km np
j ( o corresponds to edges 7 x z 9 and 7 z x 9 ; and
x z = z x = 1 . If there is no edge between
) - spacecraft u and spacecraft v, then x z = z x = 0.
*8++C
` `
.?78& 97`8&& +` 8&b 93 = r
&
. 3 s
*<
` `
)
*8+aC
-
A balanced graph is a graph whose }z x z =
(16)
*<
z z x , where 1 i, j n . Every undirected
}

Using a fact 2.17.3 in [7], then (17) is equivalent to graph has symmetric } . Thus every undirected graph
(15) and (16). is a balanced graph. An undirected graph is connected if
there is an undirected path between every pair of
`` ) - = ?78&& 9`8&& ?78&& 9` 8&b
*8++C different spacecraft.
_ *<
c(17)
`` ) - = ?78&& 9`8&& + ?78&& 9` 8&b + ``
*8+aC
*<
IV. PROBLEM STATEMENT
As noted above, there is a redundancy in representing
III. SPACECRAFT FORMATION REPRESENTATION the same physical orientation using unit quaternion. The

orientation is the following: H = H 3 ,


relationship between quaternion and physical

where H K . Through this facts, agreement value of


A. Dynamic and Kinematic Equation

t -spacecrafts would be denoted by subscript (and attitude in 3 would be represented using two values
Index of a spacecraft in a formation composed by

sometimes both sub- and superscript) u and its local of unit quaternion in K .

both sub- and superscript) v , where 1 u, v t. achieved, the agreement value on 3 is the
neighbor would be denoted by subscript (and sometimes Nevertheless, when the attitude consensus is

Then, the first equation of (17) becomes as follows: following:

) 7H& ( = HF 9, 8& ( = 8F - as (
*8+
+ y & x
7` x ` 9m n = ? )8& - ` x 8&
& x & x
y C
& x x x
_
x x x
c
*<
(22)

? )8& -` 8b where & x HF 3 and 8F 3 , for 1 u


& x & x
(18)
x x x x
t. Regarding to (7), the corresponding agreement value
could be written on 3 as (23) or on K
Kinematic equation that represents attitude of u
spacecraft body frame, & x , w.r.t. desired frame, * , is
as (24).

E2-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

7H& ( = U9,_
Remark IV-2 Regarding the argument of globally
7 & x & z x & z asymptotically stable for quaternion-based attitude

_8&
control in [8], the attitude consensus designed to follow
( 8& ( = - as (
x & z
& x z (23) Definition IV-1 is necessary for globally asymptotically
stable guarantee.
7H& x & z ( = U,_
V. MAIN RESULT
_8& x
( 8&
& z
( = - as(
& x z
Lemma V-1 If for 1 u, v t and u v , x z =
First, it is worth to consider some following lemmas.
(24)

z x , then
where = =0 0 0> , 1 u, v t and u v.

}x }z u v )8&& x
x 8&
& z
z - & x & z

Definition IV-1 Let t spacecrafts in a team (18), x


where 1 u, v t and u v, exchange the information = }x 8&& x 7}z u v & x & z 9

the information state transmission direction model, |} .


each other such that there is a corresponding graph of Proof:
See [1].
The attitude consensus is achieved, if each spacecraft

its local neighbor, x , such that the spacecrafts in a


has a control torque depending on information states of
Lemma V-2 Let

= }x }
z x H& U ,
team satisfy the following conditions:
H& x & z 0 U > 0
z x & z

u H& x & z ( U = 0

<
then
} }
8&& 0 8& 0 >0 = 8&& x
u &
x & z
x z x v x & z
u 8&& ( 8& ( = 0,
x & z x z
< x z

)H& x & z 0 , 8&& xx 0 8& z 0 -


& z
Proof:

= 2 }x } _
z x 7I& 19
*Y+ y + {
U, . In addition, U, is an isolated point,
where
z x & z *<
where if the spacecrafts in a team is there at ( = 0, then
_+& x & z
*J+ y + {
n
*<
consensus is achieved since ( = 0. Note that this first & z
they will agree to stay there for all the time, i.e. attitude
} }

= x 8&& x & z & x & z
x
case corresponds to the leaderless consensus case.
z
x z
Now, consider the second case corresponding to the

Since spacecraft u uses information states of


leader-following consensus case. Let there is an addition

as a root of the corresponding graph |} that spacecraft v that measured at its own frame, i.e. & z ,
spacecrafta virtual leader spacecrafthaving index

at spacecraft u frame, i.e. & x . Therefore, 4


5 u v =
may transmits (and not receives) the information hence the information states is supposed that measured
where 1 u t, 1 v t + 1 = and u v. In this
states to one, several or all spacecrafts in a team (18),
4
5 4
5 = & )8&& 8& -.
x & z
u v x x z Then,
= }x }

z x z )8& x 8& z - &
case, the attitude consensus is achieved, if each
& x & z
information states of its local neighbor, x , such that x & z
spacecraft has a control torque depending on
.

Suppose x z = z x and 8&& ** = , where


= t + 1. Then, following Lemma V-1, becomes as
the spacecrafts in a team satisfy the following
conditions:
H& x & z 0 U > 0
u H& x & z ( U = u H& (
follows:
x & * } }
< <
U = 0 = 8&& x
x u v & x & z

8&& xx 0 8& z 0 >0


& z x z

Theorem V-3 Let t spacecrafts in a team exchange



u 8&& ( 8& ( =
x & z
< x z the information state (i.e. attitude H& x ) each other such
u 8&& x
( 8&& ** ( = 0,
transmission direction model, |} , is connected. Let there
< x
that the corresponding graph of the information state

)H& x & * 0 , 8&& xx 0 8&& ** 0 -


index as a root of |} that may transmits
is an addition spacecrafta virtual spacecrafthaving
U, . In addition, U, is an isolated point,
where

where if the spacecrafts in a team is there at ( = 0, then


(and not receives) the information states to one,

1 u t, 1 v t + 1 = and u v, the control


several or all spacecrafts in a team (18). Let, for
consensus is achieved since ( = 0.
they will agree to stay there for all the time, i.e. attitude
torque of each spacecraft in a team is as follows:

E2-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

= k }
z x & ( + 8 x 8& ( = }z & ( + 8 x 8& (
& x & x
x z x & z x (25) x x z x & z x (26)

where positive scalar , symmetric positive where positive scalar x z , symmetric positive
definite matrix 8 x > 0 , 7` x ` x 9 definite matrix 8 x > 0, 7` x ` x 9
> 0 and x z is the element of a corresponding > 0 and x z is the element of a corresponding
adjacency matrix of |} . If H& * K is a constant adjacency matrix of |} . Therefore, consensus is
and 8&& ** = =0 0 0> = then consensus is achieved with the agreement value 7 & x HF , 8F 9
achieved with the agreement value 7 & x HF , 8F 9 3 , where:
3 , where: HF = H& x ( = H& z ( ; and
HF = H& * = H& x ( = H& z ( ; 8F = 8&
& x
( = 8&
& z
( = 31
x z
and

8F = 8 = 8& ( = 8& (
& x & z Proof:
x z
= 31

The proof may be obtained through the same way as the
proof of Theorem V-3 above.
Proof:
Consider a corresponding Lyapunov candidate function VI. NUMERICAL EXAMPLES

= + tu=1 8 uu 7` x ` 98

as follows:
1 u
Simulations of some cases are presented here to verify
2 x u . Taking time the main results. All simulations are run use following

8&& H * = 0.7071 =1 0 1 0>T


constraints:
t x
derivative of it, one has

= + 8 u 7` x
u
` 9 1 0.1 0.1
x
x
(
u=1 ` = 0.1 0.1 0.1!
0.1 0.1 0.9
0.8 0.1 0.2
Considering Lemma V-2, (18) and (25), one has

} ` = 0.1 0.7 0.3!


= 8&& x
7?78&& xx 9` x 8&& x _ 0.2 0.3 1.1
x x 0.9 0.15 0.3
` = 0.15 1.2 0.4!
x

_?78& x
9` x 8&b xx 8 x 8&& x
9 0.3 0.4 1.2
` = 0.01"
& x x
}
x ` = 0.015"
= 8&& 8 x 8&& x
0
` = 0.02"
x x
x
0 1 0 0
Noting that = 0 implies 8&& x
= 1 0 1 1
= x z =r s
x
(18) and (25), & x & z = , if 8&& xx = 0 1 0 0
. Considering

Clearly, & x & z = implies H& x & z = U . 0 0 0 0
.

= 0.05
Note that U, is an isolated point, then the 8 = ` 1 ; 8 = ` 2 ; 8 =`3

time, if 7H& x & z , 8&& xx 9 correspond to this point at


spacecrafts in a team will agree to stay there for all the

( = 0. Otherwise, they will asymptotically approach to u


To simplify the notation, unit quaternion of

the agreement attitude such that H& x & z ( = +U at I J J J



spacecraft is denoted by
H& x = 1 2 3
( . However, the situation of H& x & z = U has u u u u .
the same agreement value in the physical space 3 ,
i.e. & x & z U = & x & z U . The situation also
& x +HF = & x HF .
1
(i)

0
implies Therefore, -1
regarding LaSalles theorem, they have globally 0 100 200 300 400 500
Time(s)
600 700 800 900 1000

asymptotically stable guarantee, i.e. attitude consensus 1


is achieved.
(i)

0
1

-1
0 100 200 300 400 500 600 700 800 900 1000
Remark V-4 The addition spacecraft having index Time(s)
in Theorem V-3 has the same property as virtual 1
(i)

0
leader in [1], i.e. transmits (and not receives) the
2

-1
desired agreement value. 0 100 200 300 400 500 600 700 800 900 1000
Time(s)

is no a virtual spacecraft. Hence, there is only |} and


1
Corollary V-5 Consider Theorem V-3 and suppose there i=1
(i)

0
3

i=2

for 1 u, v t and u v, the control torque of each


-1
0 100 200 300 400 500 600 700 800 900 1000
the information exchange topology is a connected. Let, Time(s)
i=3
desired

spacecraft in a team is as follows: Fig 1. Attitude of spacecrafts in a team in according to Theorem V-3

E2-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

1
ACKNOWLEDGMENT

(i)
0.5
0
0 50 100 150 200 250 300
The authors would like to gratefully acknowledge
Time(s) suggestions and comments of one of our draft paper on
0.5
the same subject from Prof. Wei Ren and his former
(i)

0
1

-0.5
student. This research is partly supported by Beasiswa
0 50 100 150
Time(s)
200 250 300
Unggulan, BPKLN, Kemendikbud, Indonesia.
1
REFERENCES
(i)

0.5
2

0
0 50 100 150 200 250 300 [1] W. Ren, Distributed Attitude Alignment in Spacecraft
Time(s) Formation Flying, In. J. Adapt. Control Signal Process, 2007,
1 21, pp. 95-113.
i=1
(i)

0
3

-1 i=2 [2] Y. Igarashi, T. Hatanaka, M. Fujia and M. W. Spong,


0 50 100 150 200 250 i=3300 Passivity-Based Attitude Synchronization in SE(3), IEEE
Time(s)
Transaction on Control System Technology, 2009, Vol. 17, No.
5.
Fig 2. Attitude of spacecrafts in a team in according to Corollary V-5 [3] W. Ren, Distributed Cooperative Attitude Synchronization and
Tracking for Multiple Rigid Bodies, IEEE Transactions on
Control Systems Technology, vo. 18, No. 2 March 2010.
Two figures above show that the spacecrafts in a team
[4] H. Du, S. Li and C. Qian, Finite-Time Attitude Tracking
converge to the same attitude. For a case with desired Control of Spacecraft With Application to Attitude
attitude information from the virtual spacecraft, the Synchronization, IEEE Transactions On Automatic Control,
multiple spacecraft converge to the desired attitude (Fig. Vol. 56, No. 11, November 2011.
1). For a case without any desired attitude, the multiple [5] C. G. Mayhew, R. G. Sanfelice, J. Sheng, M. Arcak and A. R.
Teel, Quaternion-based hybrid feedback for robust global
spacecraft converge to the common attitude (Fig. 2). attitude synchronization, Submitted to IEEE Transactions on
Automatic Control (Received: December 12, 2011) .
VII. CONCLUDING REMARK [6] P. C. Hughes, Spacecraft Attitude Dynamics, Dover
Publication, Inc., 2004.
This paper presented two control laws for two [7] D. S. Bernstein, Matrix Mathematics: Theory, Facts and
different cases. The attitude consensus of multiple Formula, Princeton Universiy Press, 2009.
spacecraft is achieved under a connected information [8] S. M. Joshi, A. G. Kelkar and F. T.-Y. Wen, Robust Attitude
exchange topology. Simulations run to verify the Stabillization of Spacecraft using Nonlinear Quaternion
Feedback, IEEE Transactions on Automatic Control, 1995, Vol.
effectiveness of the control laws in reaching the attitude 40, No. 10.
consensus. [9] M. D. Shuster, A survey of attitude representations, The
Journal of the Astronautical Sciences, Vol. 41, No. 4,
October-December 1993, pp. 439-517.
[10] C. G. Mayhew, R. G. Sanfelice and A. R. Teel, On the
non-robustness of inconsisten quaternion-based attitude control
system using memoryless path-lifting schemes, 2011 American
Control Conference on OFarrell Street, San Francisco, CA,
USA, June 29-July 01, 2011.

E2-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Implementing Nave Bayes Classifier and Chi


Square on the Abstract to Classify Research
Publication Topics
Imam Fahrur Rozi 1, Rudy Ariyanto 2
1
Magister Teknik Elektro Universitas Brawijaya, 2 Politeknik Negeri Malang
1
imam.rozi@gmail.com, 2 rudy.ariyanto@poltek-malang.ac.id

updating frequencies.
AbstractAbstract based-classification of research Several earlier works have extensively studied the
publication topics, in the past has been very much done in naive Bayes text classification. They used English text
the manual way. Sometime, it could be done difficultly by to be classified. NBC also could be implemented to
operator who dont have any good knowledge on all of
research topics including its coverage. In this research, we
classifiy text using Bahasa Indonesia, for example:
develop an automatic Indonesian publication document Indonesian News Document Classification (Wibisono,
classifier using Nave Bayes Classifier (NBC). The first 2005).
step of classification process is preprocessing (including In this research, we implement NBC to classify
stemming process, removing stopword and feature research publication abstract document based on its
selection). That pre-processing processes will be applied topic11 .This application was developed as web based
both in training process of training document collections
application, that we could access it online using internet
or testing process using testing documents. Training result
will be matched with testing document. The experiment connection. We also combine NBC with Chi Square
result shows that NBC could be used to classify abstract stochastic test as feature selection method.
document based on its topics effectively. NBC also has a
simple algorithm, so it makes simple to be II. UNITS
implemented.Feature selection by using Chi Square also
could improve the accuracy of this classification system, Some equations used in this research, are shown in
even in this system evaluation the effect of Chi Square is this section.
not too significant because of the limited dataset used in
A. Chi Square Test (2)
training or learning process.
Chi-square testing (2) is a well-known discrete data
Index TermsText Classification, Nave Bayes, Chi hypothesis testing method from statistics,
Square, Feature Selection whichevaluates the correlation between two variables
and determines whether they are independent or
correlated [2]. The test for independence, when applied
I. INTRODUCTION to a population of subjects, determines whether they are
positively correlated or not. 2 value for each term t in a
N AIVE Bayes Classifier has been one of the core
frameworks in the information retrieval research
for many years. Recently Nave Bayes is emerged as
category c can be defined by equation (1) [1].

research topic itself, because it sometimes achieves 2 t, c = (1)


good performance on various tasks, compared to more
complex learning algorithms, inspite of wrong
Where N: is the total number of training documents, A is
independence assumptions on Nave Bayes.
the number of documents in c containing t, B is the
Nave Bayes is also an attractive approach in the text
number of documents not in c containing t, C is the
classification task because it is simple enough to be
number of documents in c not containing t, D is the
practically implemented even with a great number of number of documents not in c not containing t. 2 was
features. This simplicity enables us to integrate the text used in TC problem [3] and showed promising results
classification and filtering modules with the existing [1].
information retrieval system easily. It is because that the In text classification or categorization, the
frequency related information stored in the general text implementation of Chi Square is used to measure the
retrieval systems is all the required information in nave lack of independence between a term or word or feature
Bayes learning. No further complex generalization (t) and a category or class (c) and could be compared to
processes are required unlike the other machine learning the Chi-Square distribution with one degree of freedom
methods such as SVM or boosting. Moreover, to judge the extremness [9].
incremental adaptation using a small number of new
training documents can be performed by just adding or 1
Web application resulted from this research could be accessed at
http:// dropbox.psmi.polinema.ac.id/tc

E3-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

B. Nave Bayes Classifier number of the category , V is the total number of


Nave Bayes classifier is a simple probabilistic categories. M is used to avoid the problems caused by to
classifier based on applying Bayes Theorm (from small 3 4 [7].
Bayesian statistics) with strong (naive) independence C. Text Classification Evaluation (Precision and
assumptions which assumes all of the features are Recall)
mutually independent. It uses Bayessian algorithm for
the total probability formula, the principle is according Two evaluation methods frequently used to
to the probability that the text belongs to a category evaluate the performace of information retrieval system
(prior probability), the next would be assigned to the areprecision dan recall. These methods are also
category of maximum probability (posterior commonly used as evaluation methods in text
probability). In simple terms, a nave Bayes classifier classification system. There are four terms used to
assumes that the presence (or absence) of a particular calculate precision and recall (true positives, true
feature of a class is unrelated to the presence (or negatives, false positives, and false negatives). For
absence) of another feature [4]. classification task, all of that terms compare the results
Suppose the training sample set is devided into k of the classifier under test with trusted external
categories, denoted as = { , , , , } , the judgments. The terms positive and negative refer to the
classifier's prediction (sometimes known as the
prior probability of each category is denoted as ,
observation), and the terms true and false refer to
where j = 1,2,3,,k.
whether that prediction corresponds to the external
For an arbitrary document denoted as = judgment (sometimes known as the expectation). This is
, , , , ! , whose feature words are denoted as illustrated by the table below:
, where j = 1,2,3,m, belongs to a specific category
. To classify the document , is to calculate the Table 2. Precission and Recall variable
probability of all documents in this case of a given ,
i.e. the posterior probability of category , calculated Actual Class
by the formula as follows [1] : (Expectation)
True False
# $% "&' # &' Predicted True a b
" = (2)
# $% Class False c d
(Observation)
Bayesian text classification is to maximize the value of
equation (2). Obviously, for all the categories given, the
denominator p(di) is a constant. Therefore, solving the By referring Table 2, then precision (P) and Recall (R)
maximum value of equation (2) is converted into solving could be define as follows[1,8]:
the formula followed [1] : 6 = )/ ) + 9 (5)
: = )/ ) + ; (6)
()* ()* Note that a+bis the total number of docs that the
" = " (3) classifier reported as positiveor true. For example, if a
classifier classifies 25 docs to belong to a certain
According to Bayesian hypothesis, the feature words w1, category, out of which 20 truly belong to the category
wj , wmof di = w1, wj , wmareindependent, the (are true positives) and a total of 30 docs belong to the
joint probability distribution is equal to the product of category, then the precision is 20/25=0.8 and recall is
the probability distribution of the various feature words, 20/30=0.67.
i.e [5,6]
III. METHODS
( Text classification process is used to classify several
" = ,, ,, !" = " text documents into some classes or some categories.
,=1 For example email classification that classify emails
into some classification based on its content, maybe
therefore formula (3) becomes as follows [5,6]: entertainment email, job purposed email, advertisement
email or spam.
()* ()* ( In this research we use one of supervised learning
" = " (4) method to classify the text document. Supervised
,=1 learning means that it uses the data collection (called as
training or learning document or dataset) which have
this formula called as classification formula. Where the
been manually classified into some categories
value of is the sample size of category devided
before.This learning result is used to classify the testing
by the total number of training set samples, denoted as . documents (testing datase) then. Table 1 ilustrates text
. There are many ways to calculate " , the classification process.
/%0
simplest way is " = , where 3 4 is the
/0 1 2
number of training document with feature attribute 5
among the category , 34 is the training document

E3-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table 1. Text classification illustration [1] used Chi Square Test as feature selection method. This
Category Training Documents Testing Documents method was briefly explained at Units section.
d1 ... dj dj+1 ... dn
C. Learning and Classifying
C1 C11 C1j C1(j+1) C1n
Because we used Nave Bayes Classifier (NBC) as
... ... ... ... ... ... ...
classifier method and NBC is one of machine learning
Cm Cm1 ... Cmj Cm(j+1) .. Cmn
algorithm, so we need some dataset. First, NBC would
learn from dataset to produce some probabilistic models
Generally, text classification goes through three main of each words in each category. By using the
steps: pre-processing, text classification and evaluation. probabilistic models returned from learning process,
Pre-processing phase aims to make the text documents NBC will justify or classify some sentences for the most
suitable to train the classifier. Then, the text classifier is proper category.NBC equations was briefly given at
constructed and tuned using a text learning approach Units section above.
against from the training data set. Finally, the text
classifier gets evaluated by some evaluation measures D. Evaluation
i.e. recall, precision, etc. The following sections are To evaluate the classifier system performance, we
devoted to these three phases. used Precision and Recall that were explained also at
Units section above.
A. Dataset Gathering
Data used in this research are collections of paper IV. RESULT AND DISCUSSION
abstract of SENTIA. SENTIA is national seminar held
Dataset that was used for learning and testing process,
by Politeknik Negeri Malang on information technology
we got from collection of SENTIAs publication
including its application.
abstract.
We used 276 training data. These data was collected
These abstract (training data) classified into 11
from abstract collection of SENTIA 2011 and SENTIA
categories (Electronics and Control System, Informatics
2010. SENTIA is an annual seminar organized by
Politeknik Negeri Malang. For testig purpose we used and Computer, Electricity, Telecommunication,
148 testing data that were collected from SENTIA 2009. Bioengineering, Economic and Bussiness, Government,
Education, Chemical, Machine Engineering and Civil
B. Pre-processing Engineering). These training data will be used to train
Preprocessing is used to make the documents that will and make the classifier probabilistic model.
be processed are ready and suitable to be processed by
NBC. There are 3 types of preprocessing method used in Table 3. Comparison between Classification without Preprocessing
this research. Result and Classification with Preprocessing
Time
1. Stopword Removing (second)
Stopword is words that are not relevant to be Classification without
processed. It means that stopwords are not relevant or Preprocessing 207.8
unnecessary in classifying document to a category. For Classification with
example, yang, di, kepada, untuk etc.By removing Preprocessing 116.6
stopwords, we could reduce the dimension of words that
will be processed by classifier. It means, we could also Table 3 shows the comparison of time spent to do
reduce the time spent to do the classification or learning both of classification with preprocessing and
process. classification without preprocessing. Figure 1 gives the
graphical illustration of data shown in Table 3. It shows
2. Stemming
that preprocessing implemented in text classification
Stemming is process to which attempt to reduce a could reduce time spent to do classification process. By
word to its stem or root(basic) form. For example: implementing the preprocessing before classification
Menghitung hitung process, we could reduce the number of word or feature
Perhitungan hitung to be processed, so that time spent to classify text could
be reduced too.
In several natural language processing, stemming is not
relevant or is not necessary to be done. But in this text
classification research, stemming is relevant to be
implemented, because this teks classification process
just aware in basic form of the word, not into the word
form effected by its affix. For example, we just need to
process the basic form of hitung instead the verb
resulted by adding prefix me- to hitung (menghitung).
3. Chi Square Test as Feature Selection Method (2)
In order to reduce the word dimension, we applied
feature selection method. For this current research we Fig. 1. Comparison between Time resulted by Classification without
Preprocessing and Classification with Preprocessing

E3-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

To evaluate the system performance, we calculate make text classification system could perform
precision and recall. In this paper we just show precision optimally. By using more big number of training
and recall calculation result of Electronics (ELE) and documents, probability model resulted by Nave Bayes
Informatics (IT) category. We choose both of ELE and could be better than using training documents in small
IT because they have the a lot of dataset used in training number. By using the better probability model, the
process.Table 4 shows the value of precision and recall system could optimally classify the documents .
resulted in Electronics (ELE) category and Informatics
(IT) category.

Table 4. Comparison of precision and recall value between ELEs and


ITs
ELE IT
Precision Recall Precision Recall
Classification
without 0.4 0.08 0.33 0.41
Preprocessing
Classification
with 0.4 0.12 0.4 0.51 Fig. 3. Comparison of precision and recall value effected by number of
Preprocessing learning/training documents (ELE and IT)
.
Figure 2 ilustrates the effect of preprocessing In this research, we used stemming and stopword
implementation in precision and recall value. This recall removing as preprocessing method. That
and precision value taken from precision and recall implementation of preprocessing was aimed to reduce
calculation in IT category. It shows that implementation the text dimension to be processed, by removing
of preprocessing also takes effect in precision and recall irrelevant words.
value. Preprocessing could improve the preformace of We also try to combine the preprocessing method
text classification system, it shown by precision and with Chi Square Test. Chi Square is also aimed to reduce
recall value resulted by classification with preprocessing the number of words that would be processed.We
that is bigger than precision and recall resulted by calculatedX2 for each term, and then we selectedsome
classification without preprocessing.By using highest ranked terms.The only selected terms will be
preprocessing, the words which are not relevant to be processed using Nave Bayes.
processed could be reduced.
V. CONCLUSION
There are some items we could conclude from this
research.
a. There are some kinds of method that could be used
to classify text document. One of them is Nave
Bayes Classifier (NBC).
b. Preprocessing aims to reduce the dimension of the
text document that would be processed. By using
preprocessing, not all of the words inside the
document will be processed, but only the selected
word that will be processed. By using
Fig. 2. Comparison of precision and recall value effected by preprocessing, the classification accuracy could be
preprocessing implementation
increased. Stemming and removing stopword that
was used in this research colud be used as
Number of training documents also take effect in
preprocessing method. Also Chi Square could be
system performance. For example, we show in Table 5,
used to reduce the dimension or feature to be
number of dataset that were classified in ELE and IT. processed.
c. From the experiment result, it proved that NBC
Table 5. Comparison of number learning documents in ELEand IT
category. could be used to automatically classify the text
document. The simplicity of NBC makes this
ELE IT algorithm simple and fast in processing (training
Number of training and classifying).
document in a certain 45 85 d. From the experiment result, the value of Precision
category and Recall are relatively small. It shows that
performance of this system is not optimal. It was
Figure 3 shows that recall value resulted by IT is caused by data training provided or used were not
bigger that ELEs recall value. Even precision value of large enough. The larger dataset provided and used
IT is same as ELE, we still could see that number of on training or learning process will take a good
dataset used in training/learning process is important to effect in classifier system performace.

E3-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

ACKNOWLEDGMENT [4] Kim.S., Han.K., Rim.H., Myaeng.S., 2006. Some Effective


Techniques for Naive Bayes Text Classification, IEEE
We would like to thank to DR. M. Sarosa Dipl. Ing., Transactions on Knowledge and Data
M.T. for allowing us to copy the collection of SENTIAs Engineering,18(11),1457-1466.
[5] WANG Jun-ying, GUO Jing-feng, HUO Zheng, 2006. Design
publication abstract. and Implementation of Chinese Text Categorization System,
Microelectronics & Computer.23.
[6] Gao Yuan, Liu Da-zhong,2008.A Comparison Study of Chinese
REFERENCES Text Categorization, Science& Technology Information,.2.
[7] Yang Ye, Peng Hong, Lin Jia-yi, Chen Shao-jian, 2004. The
[1] Thabtah, Fadi. Ali, Mohammad. Zamzeer Mannam and Hadi, Bayesian Text Categorization Based on Extraction of Effectual
M.W. 2009. Navie Bayessian Based on Chi Square to Features, Systems Engineering.9(22).
Categorize Arabic Data. Communication of IBIMA Vol. 10, [8] Manning, D. Cristopher, Prabakhar Raghavan dan Hinrich
ISSN: 1943-7765. Schutze. 2009. An Introduction to Information Retrieval.
[2] Snedecor, W., and Cochran, W. 1989. Statistical Methods, CambridgeUniversity Press.
Eighth Edition. Iowa State University Press. [9] Zheng, Zhaohui. Wu, Xiaoyun. Srihari, Rohini. 2004.Feature
[3] Yang, Y., and Pedersen, J.O. 1997. A comparative study on Selection for Text Categorization on Imbalanced
feature selection in text categorization. In Proc. of Int'l Data.SIGKDD Exploration, Vol. 6, Issue 1.
Conference on Machine Learning (ICML), , pp. 412-420.

E3-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Analysis and Implementation of Combined


Triple Vigenere Cipher and ElGamal
Cryptography Using Digital Image As a
Cryptographic Key
KomangRinartha1), AgungDarmawansyah2), Rudy Yuwono3)
STMIK Stikom Bali1)
Electrical Engineering Department University of Brawijaya2,3)
1)
rinartha@stikom-bali.ac.id, katak_negara@yahoo.com
2)
agungdarmawansyah@yahoo.com, 3)rudyyuwono@yahoo.com

AbstractCryptography commonly use in our life, II. THEORY OF CRYPTOGRAPHY


especially on internet communication. On internet
There are several definitions of cryptography that
communication there are many possibilities of secret
information which is not allowed to the public, therefore it has been presented in the literature. Definitions used in
needs an information security for the information that is the old books (before the 1980's), states that
confidential and important to its safe and intact accepted cryptography is the science and art to maintain
by the users. One way that can be used in securing the confidentiality by encrypting messages into a form that
delivery of information, is encryption of codes that are not is difficult to understand. This definition may be
easily to be understood.
appropriate in the past because cryptography is used for
The research proposes a cryptographic algorithm which
is a combination of cryptographic Triple Vigenere Cipher
safety critical communications such as communications
with ElGamal cryptography. In general, data security in the military, diplomats, and spies. But this time is
using key that contain only a number and letter, but in this more than just privacy cryptography, but also for the
research also developed a key in the form of digital images. purpose of data integrity, authentication, and
From the results, Triple Vigenere Cipher cryptography non-repudiation.
and ElGamal cryptography can be combined in order to
form a new cryptographic algorithm, which is done by 2.1. Vigenere Cipher Cryptography
changing the mathematical model in each of these
cryptographic algorithms. In this research, the message is Vigenere Cipher (1523-1596) was one of the
secured in the form of a picture message with the type of classic cryptographic techniques named after Blaise de
bitmap and jpeg. The result of decryption of secured Vigenre. Vigenere Cipher is a polyalphabetic
messages using combined cryptographic algorithms have cryptography that using keywords to perform the
100% similarity level to the original bitmap picture encryption process. Each letter of the message is
messages and the level of similarity varies for jpeg picture encrypted with a key letter is associated, as well as the
messages.
decryption process.
Keywords: Cryptography, Triple Vigenere Cipher,
ElGamal, Digital Image

I. INTRODUCTION

C ryptography is a method used to encode the


information needed while maintaining the
confidentiality of public communications or to prove the
authenticity of a message.
Vigenere Cipher and ElGamal cryptography,
generally using the numbers of each digit only limited
numbers with the numbers 0 to 9, so that when the attack
occurred, each digit has a substantial opportunity to be
known. To anticipate the possibility of tracking the
private and public keys, digital images are used which is
a collection of numbers 0 to 255.

Figure 1.Vigenere table

E4-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

In Vigenere Cipher cryptography, there are several produceoutputplain textmessage.


processes performed on a message. An original message On several cryptographic systems like RSA,
secured using encryption process. Decryption is ElGamal and Diffie-Hellman requires fast powering
performed to read the messages that have been theorem and Fermat's Little Theorem.
encrypted. Keys used in encryption and decryption
process is the same key, this is because the Vigenere 2.3. Entropy
Cipher is a symmetric cryptography. In an efficient cryptography, a key must be used to
Encryption is a process that converts plaintext to secure data. Perfect secrecy is difficult to achieve. But
ciphertext.Vigenere Cipher encryption process is done the best thing to do is build a computationally secure
using a mathematical model or by using the Vigenere cryptography. In the secrecy that is
table. notcompletelyperfect there is a possibility some of the
cipher text shows key information. So that Shannon
C = P + K mod 26 ..................................... (1) introduced a concept called entropy to calculate the
uncertainty of a result.
Decryption is the reverse with encryption, a EntropyH(x) ofxis avalue thatdependson
process that converts cipher text into plain text. As well theprobabilityp p ofthe possibility ofx.
as encryption, decryption can be performed using a
mathematical model or by using the Vigenere table. H p p = ! p log p .................. (7)

P = C K mod 26 ..................................... (2) With H p p is theentropy, p is theprobability


ofappearance ofthe symbolto thei.
Where C is a cipher text, P is the plain text, K is the
key and the mod 26 is the remainder (modulus) with 26.
III. ANALYSIS
2.2. ElGamalCryptography 3.1. Triple Vigenere Cipher
In the ElGamal cryptography there are three Initial analysis ofthis study wasto
processes used, such as create public key by the analyzeandimprove thestrength ofVigenereCipher
recipient, the process of encryption by the sender, and Cryptography. VigenereCipherCryptographywillbe
the decryption by the receiver. strengthenedtoTripleVigenereCipher. Picture
Create public key which is performedby the messagesonthis algorithmwillbe processedoneach
userwhowillreceive themessage, requiringthreeinputs pixelcomponenttoeachpixelcomponentofthe key
areprocessed toproduceanoutputandis writtenin imageon the correspondingcoordinates.
mathematical form: Vigenere Cipher cryptography in securing digital
images useVigenere table as a reference that has been
A = g mod p ................................................... (3) modified so that all the color intensity from 0 to 255 can
be processed.
With the first input is p, the second input is g and
the third input is a which is processed to produce output 0 1 2 3 4 . . . . 252 253 254 255
in the form of numbers A. 1 2 3 4 5 . . . . 253 254 255 0
2 3 4 5 6 . . . . 254 255 0 1
For the encryption process is done by those who 3 4 5 6 7 . . . . 255 0 1 2
would do the sending messages with the public key 4 5 6 7 8 . . . . 0 1 2 3
provided by the parties who would receive the message, 5 6 7 8 9 . . . . 1 2 3 4
. . . . . . . . . . . . .
requiring three inputs are processed to produce the two . . . . . . . . . . . . .
outputs are written in mathematical form: . . . . . . . . . . . . .
. . . . . . . . . . . . .
252 253 254 255 0 . . . . 248 249 250 251
C = g mod p ................................................... (4) 253 254 255 0 1 . . . . 249 250 251 252
C = m. A mod p .............................................. (5) 254 255 0 1 2 . . . . 250 251 252 253
255 0 1 2 3 . . . . 251 252 253 254

With the first input is a plain text message m, the Figure 2.Modification of the Vigenere Table
second input is a number k which is a random number,
the third input is the numbers (A, p, g) which is a public The mathematical model of the Vigenere Cipher
key that is processed to produce output in the form encryption process which has been modified will bea
of C and C . Generally, the resulting cipher text is form of:
(C ,C ).
For the decryption process to be performed by the C = P + K mod 256 ............................... (8)
receiver, it requires three inputs which are then
processed into an output and is written in mathematical The mathematical model Vigenere Cipher decryption
form: process which has been modified will be a form of:

message = C C mod p ........................ (6) P = C K mod 256 ............................... (9)

Withthe first inputis C , the second inputisC and Where C is a ciphertext, P is the plaintext, K is the key
thethirdinputisthe numbers (a, p) which is processedto

E4-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

and mod 256 states remainder (modulus) with 256. Vigenere Cipher and ElGamal, this algorithm also
Triple Vigenere Cipher has three processes in the processes each pixel component of the input image. The
process of encryption and decryption. Because it has selection of a prime number p is the number 257 with the
three processes in each process, the possible modes are: same process on the ElGamal algorithm. Processes in
a. EEE the combined algorithm can be described as follows:
(encryption(encryption(encryption(message)))) Mathematical form of create public key :
TVig(message,K1,K2,K3) = (P + K1 + K2 +
A=((g + 1)(TVig(a1,a2,a3,a4)+ 1) (mod 257) 1) ...... (14)
K3)(mod 256)
b. EED Mathematical form of encryption :
(decryption(encryption(encryption(message))))
TVig(message,K1,K2,K3) = (P + K1 + K2 - C1 = ((g + 1)k (mod 257) 1) ............................ (15)
K3)(mod 256) C2 = ((m + 1)(A + 1)k (mod 257) 1) .............. (16)
c. EDD Mathematical form of decryption:
(decryption(decryption(encryption(message))))
TVig(message,K1,K2,K3) = (P + K1 - K2 - Message= (((C1 + 1)(TVig(a1,a2,a3,a4) + 1))1 (C2 + 1)
K3)(mod 256) (mod 257) 1) ..................................................... (17)
d. EDE
(encryption(decryption(encryption (message)))) IV. DISCUSSION
TVig(message,K1,K2,K3) = (P + K1 - K2 + 4.1. ETV Create Public Key
K3)(mod 256) ETV create public key process in the application
e. DDD program is shown in Figure 3 and Figure 4.
(decryption(decryption(decryption(message))))
TVig(message,K1,K2,K3) = (P - K1 - K2 - K3)(mod
256)
f. DDE
(encryption(decryption(decryption(message))))
TVig(message,K1,K2,K3) = (P - K1 - K2 +
K3)(mod 256)
g. DEE
(encryption(encryption(decryption(message))))
TVig(message,K1,K2,K3) = (P - K1 + K2 +
K3)(mod 256)
h. DED
(decryption(encryption(decryptio(message))))
TVig(message,K1,K2,K3) = (P - K1 + K2 -
K3)(mod 256) Figure 3. ETV Create public key

3.2. ElGamal Cryptography


In the ElGamal cryptography there are three
processes used, such as create public key by the
recipient, the process of encryption by the sender, and
the decryption by the receiver.The processes inthe
ElGamalcryptographycan be explained asfollows:
Mathematical form of create public key :

A = ((g + 1)(a+1) (mod 257) - 1) ......................... (10)

Mathematical form of encryption :

C1 = ((g + 1)k (mod 257) - 1) ............................. (11)


C2 = ((m + 1)(A + 1)k (mod 257) - 1) ............... (12)
Figure 4.Result of ETV create public key
Mathematical form of decryption :

Message= (((C1 + 1)(a + 1))1 (C2 + 1)(mod 257) 1) 4.2. ETV Encryption
..................................................................................................... (13) ETV encryption process in the application program
is shown in Figure 5 and Figure 6.
3.3. Combine Algorithm (ETV)
Cryptography to be built is a public-key
cryptography is the process includes create public key,
encryption and decryption. The entire process will use
the digital image as input variables. Similar to Triple

E4-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

V. CONCLUSION
This research proposed a new cryptographic
algorithm design is a combination of Triple Vigenere
CipherCryptographyand ElGamalCryptography. From
the design, implementation and testing of cryptographic
software obtained the following conclusion:
1. Triple Vigenere Cipher cryptography and
ElGamalcryptography can be combined using a
mathematical model of the Triple Vigenere Cipher
and ElGamalthat have beenmodified, which have
similar characteristics with ElGamal cryptography.
Characteristics of the algorithm are a public key
cryptography, message expansion in cipherimage,
Figure 5. ETV encryption time of encryption process is not much different
from the ElGamal encryption, decryption processing
time and create public key processing time longer
than the ElGamalcryptography and Triple Vigenere
Cipher, combined cryptography has several modes
as well as the Triple Vigenere Cipher cryptography
is used in create public key and decryption, as well
the combined algorithm has four private key used in
the decryption process, thus increasing the security
of a digital image of the message can be obtained.
2. In the combined algorithm, the similarity of
messages and decrypt the result would be obtained if
the message in the form of bitmap digital images,
with 100% similarity in pixels and visually. When
using jpeg digital image, the result will be the same
Figure6.Result of ETV encryption visually, but the pixels are not 100% the same, due to
the compression techniques used in the jpeg image.
4.3. ETV Decryption 3. In the combined cryptography, entropy of the public
ETV decryption process in the application program key encryption will affect the results of the message.
is shown in Figure 7 and Figure 8. The greater the entropy of the public key, then the
encrypting result has a high randomness.

REFERENCES
[1] Adha, R.Vignere Cipher RotasiBerlapis.
http://www.informatika.org, October 2010.
[2] Afif, S.Kriptografi. http://javanusco.files.
wordpress.com, October 2010.
[3] Anonymous. PSEUDOCODE STANDARD.
http://users.csc.calpoly.edu, October 2010.
[4] Anonymous. Citra Digital. http://www.ittelkom
.ac.id, October 2010.
[5] Anonymous. PengantarKriptografi. http://
www.informatika.org, October 2010.
Figure 7. ETV decryption [6] Anonymous.
LandasanMatematikaUntukKriptografi.
http://haryanto.staff.gunadarma.ac.id, January 2011.
[7] Defls, H danKnebl, H. Introduction to
Cryptography - Principles and Applications.
Springer-Verlag Berlin Heidelberg.2007.
[8] Gonzalez, C dan Woods, E. Digital Image
Processing Second Edition. Addison-Wesley
Publishing Company, Inc.1993.
[9] Guiliang, Weiping, XiaoqiangdanMengmeng.
Digital Image Encryption Algorithm Based On
Pixels. Intelligent Computing and Intelligent
Systems (ICIS), IEEE International Conference on.
ISBN: 978-1-4244-6582-8. Page 769 772.
Xiamen, China.2010.
Figure 8.Result of ETV decryption

E4-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

[10] Hassan, M danHamdan, T. Alternatives To Visual [16] Mollin, R. An Introduction to Cryptography


Cryptography For Colored Images. Electronics, Second Edition. 6000 Broken Sound Parkway NW,
Circuits and Systems. ICECS. 12th IEEE Suite 300: Taylor & Francis Group, LLC.2007.
International Conference on. [17] Oppliger, R. Contemporary Cryptography. 685
ISBN: 978-9972-61-100-1. Page 1 4. Canton Street, Norwood: Artech House, Inc.2005.
Gammarth.2005. [18] Rinartha, K. Pengamanan Citra Digital
[11] Hoffstein, J., Pipher, J dan Silverman. An DenganMenggunakanPengembanganKriptografiKu
Introduction to Mathematical Cryptography. 233 nci Public Elgamal. Prosiding Seminar
Spring Street, New York: Springer NasionalTeknologiInformasidanAplikasinya
Science+Business Media, LLC.2008. Volume 2, Malang: PoliteknikNegeri Malang.2010.
[12] Jeyamala, C., GopiGanesh, S dan Raman, G.S. An [19] Rukmono, A. Triple Vigenre Cipher. http://www.
Image Encryption Scheme Based On One Time Pads informatika.org, October 2010.
A Chaotic Approach. Computing [20] Suhartana, G. Pengamanan Image True Color 24
Communication and Networking Technologies Bit MenggunakanAlgoritma Vigenere Cipher
(ICCCNT), International Conference on, ISBN: DenganPenggunaanKunciBersama.
978-1-4244-6591-0. Page 1 6. Karur.2010. http://ejournal.unud .ac.id, October 2010.
[13] Joux, A. Algorithmic Cryptanalysis. 6000 Broken [21] WahanaKomputer, Tim
Sound Parkway NW, Suite 300: Taylor and Francis PenelitiandanPengembangan.
Group, LLC.2009. KonsepJaringanKomputerdanPengembangannya,
[14] Kreherdan Stinson. A LATEX Style File for Jakarta: SalembaInfotek.2003
Displaying Algorithms. http://kambing.ui.edu, [22] Yogaswara, R. Implementasi Public Key
October 2010. Cryptography pada Multimedia Messaging Service
[15] Massandy, T. MenggunakanEnkripsiElGamal.
AlgoritmaElgamalDalamPengamananPesanRahasi http://www.ittelkom .ac.id, October 2010.
a. http://webmail. informatika.org, October 2010.

E4-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Heart Rate Variability Analysis on Sudden


Cardiac Death Risk RR Interval by Using
Poincar Plot Method
Ponco Siwindarto1, I.N.G. Wardana1, M. Aris Widodo2, M. Rasjad Indra2
1
Faculty of Engineering, Universitas Brawijaya
2
Medical Faculty, Universitas Brawijaya
e-mail: ponco@ub.ac.id

In the United States, cases of SCD are about 400,000


Abstract Death is the end of the biological functions deaths per year, mainly in men 20 to 64 years age [2],
that sustain life. Death can occur gradually or suddenly. and cases of cardiac arrests are about 300,000 per year
When a persons heart suddenly stops beating effectively [3].
and breathing ceases, the person is said to have
SCD mortality rate in patients with heart disease
experienced sudden cardiac death (SCD). SCD is not the
same as actual death. The important difference between who carry the risk of SCD can be reduced by preventive
the two dies is that the SCD patients is potentially treatment, by using the implantable cardioverter
reversible. If it is reverse quickly, the brain will not die. defibrillator - ICD [4]. The preventive treatment with
SCD mortality rate in patients with heart disease who ICD reduced mortality by about 30% [5].
carry the risk of SCD can be reduced by using the ICD therapy was initially given to patients who
implantable cardioverter defibrillator (ICD). ICD
survived from cardiac arrest or who failed in
treatment reduced mortality by about 30%, however, it
still requires a relatively large cost for the ICD farmokologis therapy [6]. But in its development,
implantation. By the large cost of ICD implantation, it several studies have shown that ICD is also effective for
should be installed only in patients who will experience patients who had never suffered cardiac arrest or
SCD. This study extracted the characteristics of people sustained ventricular tachicardia (VT) [7] - [9].
who would experience SCD by using the Poincar plot The ICD therapies have successfully reduced the
method, which is one of the methods of heart rate
mortality rate, however, the ICD implantation still
variability analysis. The study resulted that the Poincar
Plots of RR intervals from a person who would experience requires a relatively large cost. The cost of ICD
SCD were characterized by relatively large values of SD1 implantation; including devices, leads, and the cost of
and SD2, and small value of SD21. the hospital; is about $30,000 to $40,000 [10]. For the
large cost of ICD implantation, it should be installed
Index Terms Heart rate variability, Poincar plot, only in patients who will experience SCD. The problem
sudden cardiac death, SD1, SD2, SD21. is, how to know whether a person will experience SCD
or not. This study extracted the characteristics of people
who experience SCD by using the Poincare plot method,
I. INTRODUCTION
which is one of the methods of heart rate variability

D EATH is the end of the biological functions that


sustain life. Death can occur gradually or can also
suddenly. Sudden death can be caused by many things.
analysis.

II. HEART RATE VARIABILITY (HRV)


It could be due to sudden blockage of the airway as in
Heart rate is the number of heart beat for one minute
the case of strangled, or could be due to the sudden
periode of count, and the unit is beat per minute (bpm).
cessation of cardiac function.
Heart beats are caused by electrical depolarization of the
When a persons heart suddenly stops beating
heart muscle. The depolarization of the upper cardiac
effectively and breathing ceases, the person is said to
chambers, called atria is visualized by the P-wave. The
have experienced sudden cardiac death (SCD). SCD is
Q, R and S waves, which create the QRS complex,
defined as an unexpected death due to heart problems,
represent the depolarization of cardiac lower chambers
which occurs within a short interval of time (generally
known as ventricles. The interval between successive
one hour of symptoms onset) in a person with known or
heart beats is called RR interval (RRI) and it is the
unknown heart disease[1].
distance between the consecutive QRS complexes,
SCD is not the same as actual death. In actual death,
usually measured as the distance between the RR waves
the brain also dies while on the SCD, the brain is still
as shown in Fig. 1.
alive. The important difference between the two dies is
Variation of instantaneous heart rate or RR interval is
that the SCD patients is potentially recoverable. If it is
a consequence of constant interaction between the
recovered quickly, the brain will not die.
intrinsic activity of the sinus node and the influence of

E5-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

x = ( x1 , x 2 ,...x N )
and two auxiliary vectors:
x + = (x1 , x 2 ,...x N 1 )
(1)
Fig. 1. RR interval (RRI) duration derived from an ECG
x = (x 2 , x3 ,...x N )
so that each point:
the autonomic nervous system, various substances
circulating in the blood and present in the heart tissues (x i
+
)
, xi , i = 1....N 1
[11]. The control of heart rate is modulated by both in the plot corresponds to two successive heart beats.
sympathetic and parasympathetic branches of Poincar plot provides sumary information as well as
autonomic nervous system as well as many other detailed beat-to-beat information on the behavior of the
autonomic reflexes. heart [16] . Poincar plot shown in Fig. 2 can be divided
Breathing is one of the important factor modulating into three regions. All points described by consecutive
heart rate [11]. It causes heart rate acceleration during cardiac beats of equal duration (RRn = RRn+1) are
inspiration and its deceleration during expiration. located on the identity line. The points above the identity
Another example of a separate system regulating the line correspond to all prolongations (RRn < RRn+1), and
heart rate are the changes in blood pressure modulated the points below this line represent all shortenings of the
by baroreflex. interval between two consecutive beats (RRn >RRn+1).
All these systems and reflexes are responsible for There are several descriptors in the Poincar plot. The
changing of the duration of RR interval from one beat to following 3 descriptors of the Poincar plot were used in
another and this phenomenon is called heart rate the study [14], as shown in Fig. 3.
variability (HRV) [12]. HRV is a strong and SD1 is the standard deviation calculated from
independent predictor of mortality following an acute
myocardial infarction [13]. The higher HRV the better
prognosis in survivors of myocardial infarction or
patients with heart failure.
A number of parameters are used in HRV analysis.
The Poincar plot of RR intervals is one of the recent
methods. The analysis of Poincar plot is an emerging
method of nonlinear dynamics applied in HRV analysis.

Fig 3. Descriptors of Poincar plot, SD1 and SD2 as parameters that


measure short- and long- term HRV

resulting distribution if all points of the Poincar plot are


projected on a line perpendicular to the line of identity
(known as the width). SD1 measure the dispersion of
points in the plot across the identity line. This parameter
is usually interpreted as a measure of short-term HRV
presented by [15]:
Fig. 2. Poincar plot of RR interval SD1 = Var ( x1 ) (2)

where Var(x) is the variance of x,


III. POINCAR PLOT and:
Poincar plot is a graphical representation of temporal
correlations within the RR intervals shown in Fig. 1, x+ x
where each RR interval is plot as a function of the
x1 = (3)
2
preceding RR interval [14]. The Poincar plot is shown
in Fig 2, where the duration of the current cardiac beat SD2 is the standard deviation calculated from
(RRIn) is represented on the x axis, and the duration of resulting distribution if all points of the Poincar plot are
the following beat (RRn+1) on the y axis. projected on the identity line (known as the length).
Suppose an RR interval data vector of length N [15]: This standard deviation measure the dispersion of points
along the identity line. This parameter is usually

E5-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

interpreted as a measure of long-term HRV presented by


[15]:

SD2 = Var( x2 ) (4)

where Var(x) is the variance of x, and

x+ x
x1 = (5)
2
SD21 is the ratio of SD2 to SD1.
Fig. 4. RR interval time series (a) RR Interval Time Series for record
SD21 = SD2 / SD1 (6) 30 and (b) the 9000 s to 9300 s selected segment

by using Eq. 2, 4, and 6, and the result were SD1 = 51.2


IV. METHODS ms, SD2 = 58.9 ms, and SD21 = 1.15 ms.
This study used time series of RR intervals (RRI)
extracted from the data from two Physionet ECG
database [17]. The first was Sudden Cardiac Death
Holter Database. We used 17 ECG recordings (each of
about 24h in duration), which is ended with ventricular
fibrillation. The second was The MIT-BIH Normal
Sinus Rhythm Database. We used 17 long-term ECG
recordings of subjects referred to the Arrhythmia
Laboratory at Boston's Beth Israel Hospital (now the
Beth Israel Deaconess Medical Center). Subjects
included in this database were found to have had no
significant arrhythmias.
The first step of the study was determining the
positions of each R waves in records of all the ECG
samples. Second, computed the RR intervals (RRI),
and then ploted them as RR Interval Time Series. The
Poincar plots were made in all 5-minute segments
randomly selected from the RR Interval Time Series. Fig. 6. Poincare plot for segment 9000 s to 9300 s of RR Interval Time
Series of record 30 Sudden Cardiac Death Holter Database
For the sample of sudden Cardiac Death Database, the
segments were selected randomly from the beginning of
the RRI Time Series to shortly before the onset of The same procedure then was applied to all records of
ventricular fibrillation. Poincar plot descriptors SD1, the database. The result is shown in Table I. There are
SD2, and SD21 were computed based on Eq. 2,4, and 6. three descriptors that will be observed, that is SD1,
Outliers were removed before the average of SD21 were SD2, and SD21.
computed. The HRV characteristic related to sudden It can be seen from the table that the average value of
cardiac death was obtained by comparing the average SD1 and SD2 for Sudden Cardiac Death Holter
value of SD21 between The Sudden Cardiac Death Database are larger than for MIT-BIH Normal Sinus
Holter Database and The MIT-BIH Normal Sinus Rhythm Database. For Sudden Cardiac Death Holter
Rhythm Database. Database, the average values are SD1=163.3ms and
SD2=155.2ms instead of SD1=28.92ms and
V. RESULT SD2=87.96ms for MIT-BIH Normal Sinus Rhythm
Database. In other words, RR interval of Sudden
The RR Interval Time Series.
Cardiac Death Holter Database has more variability on
Fig. 4 shows an example of RR Interval Time Series both long-term and short-term variability than of
for Sudden Cardiac Death Holter Database, taken from MIT-BIH Normal Sinus Rhythm Database.
record 30 (a). This RR Interval Time Series then was SD21, the ratio of SD2 to SD1 has a smaller value on
randomly selected for 10 segments, each 5-minutes in the Sudden Cardiac Death Holter Database than on the
duration. Fig 4(b) shows one of the segments, which is MIT-BIH Normal Sinus Rhythm Database. The average
9000 s to 9300 s of time interval. values are SD21=0.989 for Sudden Cardiac Death
Holter Database and SD21=3.474 for MIT-BIH Normal
The Poincar Plot Sinus Rhythm Database. This descriptor shows a
Each selected segment of RR interval time series was relative variability between the long-term and the
used for generate the Poincar plot. Fig. 5 is the short-term variability.
Poincar plot of the segment selected in Fig 4. The
descriptor values for this Poincar plot were computed

E5-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table I. Comparison of Poincar plot between Sudden Cardiac [2] Concise Dictionary of Modern Medicine. McGraw-Hill
Death Holter Database and MIT-BIH Normal Sinus Rhythm Companies, 2002.
Database [3] Lloyd-Jones D, Adams RJ, and Brown TM. Heart disease and
stroke statistics---2010 update. Circulation 2010;121:e46--215.
[4] Al-Khatib, SM, Sanders GD, Bigger JT, Buxton AE, Califf RM,
and Carlson M. Expert panel participating in a Duke's Center for
the Prevention of Sudden Cardiac Death conference. Preventing
tomorrow's sudden cardiac death today: part I: Current data on
risk stratification for sudden cardiac death. Am Heart
Journa,2007; 153: 941-950.
[5] Kuck KH, Cappato R, Siebels J, and Ruppel R. Randomized
comparison of antiarrhythmic drug therapy with implantable
defibrillators in patients resuscitated from cardiac arrest: the
Cardiac Arrest Study Hamburg (CASH). Circulation 2000; 102:
748754.
[6] Mirowski M, Reid PR, and Mower MM. Termination of
malignant ventricular arrhythmias with an implanted automatic
defibrillator in human beings. N Engl Journal Med 1980;
303:322-324.
[7] Zipes DP, Camm AJ, and Borggrefe M. ACC/AHA/ESC 2006
guidelines for management of patients with ventricular
arrhythmias and the prevention of sudden cardiac death: a report
of the American College of Cardiology/American Heart
Association Task Force and the European Society of Cardiology
Committee for Practice Guidelines (Writing Committee to
Develop Guidelines for Management of Patients With
Ventricular Arrhythmias and the Prevention of Sudden Cardiac
Death). Journal Am Coll Cardiol 2006;48:e247-e346.
[8] Zwanziger J, Hall WJ, Dick AW. The cost effectiveness of
implantable cardioverter-defibrillators: results from the
Multicenter Automatic Defibrillator Implantation Trial
(MADIT)-II Journal Am Coll Cardiol 2006;47:2310-2318.
[9] Mark DB, Nelson CL, dan Anstrom KJ. Cost-effectiveness of
defibrillator therapy or amiodarone in chronic stable heart
failure: results from the Sudden Cardiac Death in Heart Failure
Trial (SCD-HeFT) Circulation 2006;114:135-142.
[10] Kadish A & Mandeep Mehra. Heart Failure Devices.
Implantable Cardioverter-Defibrillators and Biventricular
Pacing Therapy. Circulation. 2005; 111: 3327-3335.
[11] R. Hainsworth, Physiology of the cardiac autonomic system in:
Clinical guide to cardiac autonomic tests edited by M. Malik,
Kluwer Academic Publishers, London, 1998, pp. 3-28.
[12] Heart rate variability. Standards o measurement, physiological
interpretation, and clinical use. Task Force of the Working
Groups on Arrhythmias and Computers in Cardiology of the
ESC and the North American Society of Pacing and
Electrophysiology (NASPE), European Heart Journal 93, 1996,
pp. 1043-1065.
[13] Bigger JT, Fleiss JL, Steinman RC, Rolnitzky LM, Kleiger RE,
Rottman JN. Frequency domain measures of heart Standards of
heart rate variability. European Heart Journal, Vol. 17, March
1996.
[14] P Guzik, Jaroslaw P, Tomasz K, Raphael S, Karel HW, Andrzej
Rec: record number WT, and Henryk W. Correlations between the Poincar Plot and
Conventional Heart Rate Variability Parameters Assessed during
Paced Breathing. Journal Physiol. Sci. Vol. 57, No. 1, Feb.
VII. CONCLUSION 2007. pp. 6371.
[15] J. Piskorski, P. Guzik. Filtering Poincar plots. Computational
Poincar Plots of RR intervals from a person who Methods in Science and Technology 11(1), 2005. pp. 39-48.
would have sudden cardiac death are characterized by [16] Toichi M, Sugiura T, Murai T, Sengoku A. A new method of
assessing cardiac autonomic function and its comparison with
the relatively large values of SD1 and SD2, and small spectral analysis and coefficient of variation of R-R interval.
value of SD21. Journal Auton Nerv Syst. 1997;62:79-84.
[17] Goldberger AL, Amaral LAN, Glass L, Hausdorff JM, Ivanov
PCh, Mark RG, Mietus JE, Moody GB, Peng C-K, Stanley HE.
REFERENCES PhysioBank, PhysioToolkit, and PhysioNet: Components of a
[1] A. A. Sovari. (2011, Dec 5). Sudden cardiac death. Medscape New Research Resource for Complex Physiologic Signals.
Reference: Drugs, Diseases, and Procedures. Available: Circulation 101(23):e215-e220 [Circulation Electronic Pages;
http://emedicine.medscape.com/article/151907-overview#show http://circ.ahajournals.org/cgi/content/full/101/23/e215]; 2000
all. (June 13).
[18]

E5-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Lung Cancer Prediction In Imaging Test Based


On Gray Level Co-Occurrence Matrix
Sungging Haryo W.1). Agus M. Hatta2), Syamsul Arifin3)
Department of Engineering Physics, Faculty of Industrial Technology
ITS Surabaya Indonesia 60111,
email: mr.pascal@yahoo.com1), agus.hatta@yahoo.com2), syamp3ai@ep.its.ac.id3)
matrices and wavelet transform coefficients. Then, they
Abstract Lung cancer is the most causing death are stored as feature vectors. In this paper, chest X-Ray
among all types of cancer for both men and women, based image is processed and extracted by using Gray Level
on World Health Organization (WHO) with 19.7% Co-occurrence Matrix, then the extracted features stored
precentage from all cancer. This report presented results as inputs in Adaptive Neuro Fuzzy Inference Systems
of a research of lung cancer prediction in imaging test
(ANFIS) for lung cancer prediction in imaging test.
based on image processing and extracted using Haralick
Features in Gray Level Cooccurence Matrix. 9 Extracted
Haralick Features used as input data in 2 Generalized Bell II. LITERATURE REVIEWS
membership functions of ANFIS. The results are validated
by comparing training and testing results with the analysis A. Lung Cancer
of radiologist. Moreover the results indicate that this Lung cancer is a disease characterized by
method can predict the present of malignant cell of 92% uncontrolled cell growth in tissues of the lung. It is also
accuracy in imaging test. the most preventable cancer. Cure rate and prognosis
depend on the early detection and diagnosis of the
disease. Lung cancer symptoms usually do not appear
Index Terms ANFIS, Chest X-Ray, Gray Level until the disease has progressed. Thus, early detection is
Cooccurence Matrix, Haralick
not easy. Many early lung cancers were diagnosed
incidentally, after doctor found symtomps as a results of
I. INTRODUCTION test performed for an unrelated medical condition [2].
There are two major types of lung cancer:
Lung cancer is the most causing death for both men non-small cell and small cell. Non-small cell lung
and women based on World Health Organization cancer (NCLC) comes from epithelial cells and is the
(WHO) data with 19.7% precentage from all cancer [3]. most common type. Small cell lung cancer begins in the
Every year, more than 1.2 million lung cancer case have nerve cells or hormone-producing cells of the lung. The
been diagnosed. People who inhale cigarrete smoke term small cell refers to the size and shape of the
from other smokers (also called as secondhand smokers cancer cells as seen under a microscope. It is important
or passive smokers) also increase lung cancer risk, for doctors to distinguish NSCLC from small cell lung
although they are not smokers. cancer because the two types of cancer are usually
The lung cancer can be cured easily in initial stage treated in different ways. Lung cancer begins when cells
but may be impossible in the advanced stage. In the in the lung change and grow uncontrollably to form a
other hand early detection of lung cancer patient is mass called a tumor (or a lesion or nodule). A tumor can
difficult because its prognosis would appear when it be benign (noncancerous) or malignant (cancerous). A
comes to advanced stadium. Many of early lung cancers cancerous tumor is a collection of a large number of
were diagnosed incidentally, after the radiologist found cancer cells that have the ability to spread to other parts
symstomps as a result of test performed for an unrelated of the body. A lung tumor can begin anywhere in the
medical condition [1]. Imaging test is needed in lung lung [3].
cancer diagnosis process to discover the present of
malignant cell in the lung after a patient is suspected
from his/her medical history. Many researches in
medical image processing field has been proposed for
this purpose. A key function in different image
applications is feature extraction. The feature is a
characteristic that can capture a certain visual property
of an image either globally
For the whole image, or locally for objects or
regions. Different features such as color, shape, and
texture can be extricated from an image. Texture is the
variation of data at different scales. A number of
methods have been developed for texture feature Figure 1 X-Ray image of (a) normal lungs and (b) lung cancer
extraction. They can be extracted from co-occurrence

E6-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

Once a cancerous lung tumor grows, it may or may features which are extracted from texture analysis.
not shed cancer cells. These cells can be carried away in These features contain the information about the image
blood or float away in the natural fluid, called lymph, such as homogeneity,ty, contrast, the complexity of the
that surrounds lung tissue. Lymph flows through tubes image, and etc. They are used in many applications such
called lymphatic vessels that drain into collecting as biological applications and image retrieval.
stations called lymph nodes, the tiny, bean-shaped
bean
organs that help fight infection. Lymph nodes are
located in the lungs, the center of the chest, and
elsewhere in the body. The natural flow of lymph out of
the lungs is toward the center of the chest, which
explains why lung cancer often spreads there. When a
cancer cell leaves its site of origin and moves into a
lymph node or to a faraway part of the body through the
bloodstream,
am, it is called metastasis [4].
The stage of lung cancer is determined by the
location and size of the initial lung tumor and whether it
has spread to lymph nodes or more distant sites. The
typee of lung cancer (NSCLC versus small cell) and stage Figure 2 Direction of calculation in Haralick texture features
of the disease determine what type of treatment is
needed. Based on figure 2.3, Haralick texture features can be
extracted from eight directions. Four equations are used
B. Gray Level Co-occurrence
occurrence Matrix :
Texture analysis is an essential issue in computer
vision and image processing, such as in remote sensing,
content based image retrieval.
retrieval The Gray-Level $%

+, -+ , ,
Co-occurrence
occurrence Matrix (GLCM) is one of the statistic
method that can be used as texture analysis based on the ,
&'
'
$%
extraction of a gray-scale
scale image. Coocurance Matrix is

+. -+ , ,
extracted by considering the relationship between
betw two
neighborhood pixels. Based on the hypothesis that in a ,
texture configuration reccurence is occurs, the first pixel &'
'

$% $%
is known as a reference and the second is known as a

+,/. --+ , ,
neighbor pixel [5].
,
GLCM can be measured as follows : &' &0
2, 3,, . , 289 ",
(3)
1) Create the GLCM symmetrical
2) Calculate the probability of each combination, the 3 ,

, , , # , , , (
probability is calculated :
$% $%

+,4. --+ , ,
,
&' &0
, 2, 3,, . , 289 ",
(4)
, 0, )| , | |,
, ,
(1)

, , , , (
!"
14 derived features from Haralick
aralick are written as follows:

1) Angular Second Moment (ASM)


Where p(i;j) is the element (i;j)th
)th of the normalized ASM also known as uniformity or energy, measures
coocurence matrix. the image homogeneity. ASM is high when pixels are
,
, , , very similar.
, $% $% $% $%
&' &' , , ,
5' --+ ,
(2)
:
, (5)
&' &'

If the co-occurrence
occurrence matrix is symmetric then p(i,j) p( = 2) Contrast
(p(i,j) + p(i,j)T ) = 2 that T indicates the transpose matrix Direction of contrast calculation is to measure the
and will be 0, 45, 90 and 135. intensity or gray-level
level variations of reference pixel and
its neighbor.
3) Texture features calculations
In order to estimate the coocurence in texture
analysis using GLCM, Haralick proposed 14 statistical

E6-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

, = |
$% 4' $% $%
5: - :
<- - + ,
9) Entropy
;&0 &' &'
By extract the entropy features of a grayscale
|
(6) image, value of image which is needed for image
compressions.
$% $%

5I --+ , GH + ,
3) Correlation
In co-occurene matrix, gray lavel values linear , , (13)
dependency of a grayscale image is calculated in order &' &'
to obtain the correlation features. Which is represent the
relation between a pixel with pixels neighbor in eight If high entropy obtained, it is mean that a grayscale

+ , ,
directions. image has high contrast from one pixel with it is
$% $%
&' &' ?, ?. neighbour and cannot be compressed as a low contrast
5>
@ @
as a result low entropy
, .
(7)

5'0 JKL K MN G5 +,4.


10) Difference Variance
(14)
Where: 11) Difference Entropy
x = means of px $% 4'

5'' - +,4. GH+,4.


y = means of py
x = standart deviations of px (15)
&0
y = standart deviations of py

OPQ OPQ1
12) Information Measures of Correlation 1
5':
4) Sum of Squares (Variance)
KR OP, OQ
Sum of Squares is statistic equation for extract the
(16)
variance of image gray tone in a grayscale image.
$% $%

5A -- ? :+ , ,

S'>
(8) 13) Information Measures of Correlation 2
&' &'

T 1 NR+U 2.0(OPQ@ OPQ W


X (17)
5) Inverse Difference Moment / Homogeneity
Inverse Difference Moment also sometimes called
Where
homogeneity, measures the local homogeneity of a $% $%

OPQ --+ , GH + ,
grayscale image. Homogeneity returns the measures of
the closeness of the distribution of the GLCM elements , , (18)
to the GLCM diagonal. &' &'
$% $%
1
5B -- + , ,
13
HX and HY are entropies of px and py
: (9)
&' &'

6) Sum of Average $% $%

OPQ1 --+ , GH +, +.
Sum of average calculate the average or mean of a
grayscale image. ,
:$%
(19)
&' &'

5D - +,/. (10) OPQ2


&:
(20)
$% $%

7) Sum of Variance - - +, +. GH +, +.
:$%
&' &'
5E - 5F : +,/. (11)
&:
14) Maximal Correlation Coefficients
8) Sum of Entropy 5'A XT YNMG KLHNZ[ N HN JK \N G5 ]
:$% (21)
5F - +,/. GH+,/. (12)
&:

+ , + , ,
Where
,
] , -
In equation of sum of entropy, in some case the
probability is equal to zero. Causing the log(0) cannot be +, +. ^
^
(22)
defined, therefore to solve this problem, it is
recommended to use log(p+) is an fluctuative small
positive constant.

E6-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

III. METHODOLOGY D. Image Region of Interest Selection


It is It is neccessary to segmented lung region of
A. Image Resizing chest x-ray images for inspect the present of cancer
Resize the initial image is needed in image nodule in lung. Region of Interest is used to select subset
preprocessing.Chest X-ray image is enlarged or of chest image samples to identified the malignant cell.
shrinked, depend on its amount of pixel by resizing the In the current research, the equalized image is specified
resolution in one dimension, row or column. Then its region of interest (ROI). Using the syntax :
another dimension (column or row). All images input
are resized in to 220 x 210 pixels, neglected their aspect I1=roipoly;
ratio. This algorithm can process all images input, I2=roipoly;
regardless their early resolution..
Notice that I1 and I2 are used to select two ROI,
B. Image Grayscaling which is refer to the number of lung in human
Image grayscaling is needed to yield 8-bit images respiratory systems. When the syntax is runned, it create
from RGB images input. 8-bit image (or grayscale an interactive polygon tool, related with the image of
image) stored as matrix data which its value represent chest X-ray scan that displayed by using Imshow(I)
gray level or intensities of image in 0-255 range. Each algorithm, equalized chest image is the targeted image.
pixel in grayscale image is represented by value of the
matrix. Lower value of matrix represent dark colour, and
bright colour for higher one. Image convertion
Algorithm in MATLAB to convert chest X-ray image
from RGB to grayscale is written as :
I = rgb2gray(RGB)

This function also remove the hue and saturation


information of resized image. In matrix equation,
rgb2gray algorithm is written in equation

0,2989xb + 0,5870xe + 0,1140xg (30)


Figure 3 selected area of ROI in chest X-Ray images

As shown in figure 3, if cursor is moved to the


Where I is matrix of grayscale image, R, G, and B are
targeted image, it will be changed in to crosshair
matrixs of Red, Green, and Blue colour in RGB image.
symbol. Lung area is selected by selecting polygons
twist. It also can be moved or resized by moving the
C. Histogram Equalization crosshair symbol. Targeted area is rounded by blue line.
There are some methods to enhance an image, such First region of lung declared as I1 in MATLAB
as image sharppening, deblurring, noise removing, and workspace, while I2 is read as second lung region. The
histogram equalization. The last mentioned method is next objective is to separate lung region by eliminate
used in current research. After convert the chest X-ray in other organs and tissues appeared in chest X-ray. First
to grayscale image, histogram equalization is needed to step is obtain the In from following equation :
adjust the image intensities and enhance image contrast.
; ' 3 : R 2
Repose the previous subsection. If grayscaled chest (33)
image is written as I in MATLAB workspace and
represented as m x n matrix in distributed intensities If value of single pixel in In matrix is less than 1, it
with magnitude from 0 to L-1, where L equals to 256. If converted to 255, while for image with intensity 1< In<5
KHN h [ [N Z [j
H is equalized chest image histogram of I, then : is converted to 0.
O
[G[K \ kNL G5 + RN
(31)
255, < 1
5 l0, 1 < n < 5 o
(34)

, G[NLh ZN
Image histogram in MATLAB choose the grayscale
transformation T to minimize :

c1(T(k)0-c0(k) (32) Let R0 is the targeted image or equalized chest image,


after In calculated, next objective is to eliminate all

b; b0 ;
object except In. If Rn is the segmented image, then :
Where c0 is the cumulative histogram, c1 is the
(35)
cumulative sum of histogram for all intensities k. The
b < 0
equation is based on constrain that T should be
5 b l o
0,

b , G[NLh ZN
monotonic and c1(Ta)) always less than c0(a) by more
than half the distance between initial histogram. In
MATLAB algorithm, image histogram equalization of
chest image is written as : H = histeq(I);

E6-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Result of segmented image from targeted image is


shown in figure 4 The extracted features of chest X-Ray image are :
Energy, Correlation, Contrast, Entropy, Inverse
Difference Moment, Sum Average, Sum Variance, Sum
Entropy, and Difference Average 70 chest X-Ray image
are processed. Table 1 show the example of extraction
results from 10 samples

Table 1. Haralick feature extractions of chest X-Ray image (1)

Num Energy Correlation Contrast


1 0.92877 0.71049 258.87782
2 0.90857 0.83260 211.87290
Figure 4 Segmented chest X-ray image
3 0.90045 0.70289 369.72523
E. Image Matrix Reduction and Binarization 4 0.94552 0.74382 179.60087
Grayscale image or 8-bit image can be
considered as one dimension matrix with n columns and 5 0.94495 0.69726 206.96194
m rows with varies intensities in range 0-255. In order to 6 0.95238 0.73182 162.76329
reduce the residual visual information after the its
7 0.83631 0.87499 293.95611
segmented, the chest X-ray image is reduce their matrix
to remove the bone and other soft tissues and get the 8 0.92629 0.78637 209.76820
visual representation of malignant cell in the lung. It is 9 0.94926 0.76420 156.44920
also assumed that malignant cell has higher intensities
(which is represented with higher number in image 10 0.92289 0.79031 216.08230
matrix).
Table 2. Haralick feature extractions of chest X-Ray image (2)
F. Image Feature Extraction
Feature extraction of segmented image is Inv. Diff. Sum
Num Entropy
neccesary to capturing visual content of chest images fo Moment Average
indexing & retrieval. In the current research, Gray Level 1 0.27850 0.98395 7.24767
Coocurrence Matrix (GLCM) is used as feature
2 0.32912 0.98686 10.39091
extraction method. GLCM often used in image
recognition and compression by considering the 3 0.36748 0.97708 10.20861
relationship between two neighborhood pixels. Based 4 0.22134 0.98887 5.64567
on the hypothesis that in a texture configuration
reccurence is occurs, the first pixel is known as a 5 0.22542 0.98717 5.50204
reference and the second is known as a neighbor pixel. 6 0.19839 0.98991 4.87229
Then statistical features of the image is extracted from
Haralick equations which are extracted from texture 7 0.51377 0.98178 20.10787
analysis 8 0.28090 0.98700 7.98238
9 0.20756 0.99030 5.33632
IV. RESULTS AND DISCUSSIONS
10 0.29111 0.98660 8.39117
When processed image of chest X-Ray is obtained,
the next step is extract the image in order to get the
numerical information of the image and will be used as
data input in ANFIS. There are 9 extracted features for
each image which are derived from Haralick Features of
Gray Level Cooccurence Matrix. In Haralick Feature
Extraction Process, some paramaters should be
determined, i.e :

1. Image : The input image is gray scale image


2. Input bits : Gray level resolution of the image input
in this case, 256 gray level image is used, hence the
input bits is equal to 8.
3. The distance between pixel in feature calculations.
In the current research the distance of pixel is set to
1
4. The angle of feature calculations. It can be 0o, 45o,
90o, or 135o. Where 0o is selected, therefore the
gray level calculations will count in horizontal
directions (right and left side of reference pixel)

E6-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

xu = Output Target
Table 3. Haralick feature extractions of chest X-Ray
X image (3) where
2 :

Num
Sum Sum Diff. xwu 1= Output Training
Variance Entropy Av. n = Number of training data Target
1 1529.50234 0.26245 2.03841 0
2 2319.44702 0.31598 1.66829 Output
-1
3 2119.04656 0.34456 2.91122 1 3 5 7 9 11 13 15 17 19 21 23
4 1222.52621 0.21021 1.41418 Figure 6 Testing Results
5 1160.28484 0.21258 1.62962
1 is represent that there are malignant cell present
6 1051.05972 0.18830 1.28160 in the lung from processed Chest X-Ray
X image, while 0
7 4409.11707 0.49555 2.31462 represent the normal lung. If the output results are less
than 0.5 then it classified as normal lung, in the other
8 1754.03879 0.26790 1.65172 hand, if the results are > 0.5 it classified as lung cancer
9 1170.49981 0.19786 1.23188 image. From the testing graphic plot in figure 6, the
validation results can be seen in table 4
10 1844.86317 0.27771 1.70144
Table 4. Results of Validation
Extracted features from Chest X-ray
X image are set
as training and testing data which contain of the desired Classified Misc. Accuracy
input and output data pairs. Membership function 23 2 92%
parameters can be estimated in training phase of ANFIS.
This project uses the ANFIS Editor GUI menu bar to
load a FIS S training initialization, and then save the V. CONCLUSIONS AND FUTURE WORKS
trained FIS. To open the ANFIS GUI, following syntax A new method of lung cancer detection system has
is typed in MATLAB command window : been developed by using Haralick Features of Gray
Level Cooccurence Matrix as feature extraction method
anfisedit
to get the ANFIS input data from initial Chest X-Ray
X
image for cancer detection purpose in imaging test.
Before extracted, the image are processed through
1.30 several stages, i.e. (1) Resizing, (2) Grayscaling, (3)
Histogram equalization for contrast enhancement, (4)
Lung segmentation based on their region of interest, and
0.80 (5) Image matrix reduction by specific reduction
r factor.
Target
There are nine features (Energy, Correlation,
Output Entropy, Inverse Diff. Moment, Sum Average, Sum
0.30
Variance, Sum Entropy, Inf. measure of correlation 1,
and Inf. measure of correlation 2) appropriate as data
-0.20 1 4 7 10 13 16 19 22 25 28 31 34 37 40 43 input in ANFIS as information of malignant
ma cell present
in the lung Based on testing results,
results ANFIS parameters
Figure 5 Training Results with 9 inputs features can predict lung cancer in imaging
test with 92% accuracy with 2 missclasified from 25
In order to obtain the training performance numerically, images
Root Mean Square Error (RMSE) value of each training
is calculated by using the following equation
vu&' xu xwu :
t
X REFERENCES
RMSE
n [1] Le Kim. Automated Detection of Early Lung Cancer and
Tuberculosis Based on X Ray Image Analysis.
Analysis International
= 0.135026 Conference on signal, speech, and Image Processing WSEAS.
2006. 110
25 data are used in testing phase for validation. to load [2] American Society of Clinical Oncology. Guide to Lung Cancer.
Alexandria. Conquer Cancer Foundation. 2011: 2.
the testing data, testing button is selected and data
da is [3] Floche. Backgroundd information Non-small
Non Lung Cancer.[pdf]
uploaded from MATLAB workspace. Testing phase or (URL:http://www.roche.co.id/fmfiles/re7229001/Indonesian/m
model validation is required to test the performance of edia/background.library/oncology/lc/Lung.Cancer.Background
model in data fitting process. er.pdf accesed on July 30, 2011)
[4] Anonymous. Kanker Paru Pedoman Diagnosis dan
Penatalaksanaan di Indonesia.
ndonesia. Perhimpunan Dokter Paru
Indonesia. 2003
[5] Haralick, Robert M. Textural Features for Image Classification.
Classification
IEEE Transactions Onn Systems, Man, And Cybernetics. 1973,
3(6) : 612-619

E6-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Optimal EDR Methods for


Sleep Apnea Classification
Mungki Astiningrum1, Sani M. Isa2, Aniati Murni Arimuthy3
Faculty of Computer Science, University of Indonesia
Depok 16424/Jawa Barat, Indonesia
mungki.astiningrum@ui.ac.id, sani.muhammad@ui.ac.id, aniati@cs.ui.ac.id

Abstract The purpose of this study is to compare mouth stands [1]. In this case, it Is thought to be an
performance of the EDR methods for sleep apnea obstruction at the URT of patient. In order to prevent the
classification. EDR methods used are two algorithm, R blockage, an intense activity in the chest and abdomen is
Wave Detection and RR Interval Correction, and using
observed. Central sleep apnea (CSA) is the state in the
Naive-Bayes Classification. Data obtained from the
absence of both respiratory effort and air flow together.
polysomnography recordings related to the 7 different
patients are used for evaluations. Data of each subject taken
Central apneas grow by the corruption of the central
at a specific time frame for 15 minutes. timescales are chosen regulation of respiration. Mixed sleep apnea is the state
based on annotation data with apnea detection. Results of starting with central sleep apnea and continuing the
both algorithm shows have generated signal similarity model absence of oral and nasal air flow when the respiratory
(wave form),and the classification results for the RR- effort begins. How the respiratory effort after the central
intervals correction method is slightly better than the R- sleep apnea starts is still a unresolved research topic [2].
wave detection method, for R Wave Detection, correctly The device used for measuring and recording
classified 0.5333 and kappa statistic 0.0395, for R-R Interval
physiological signals during sleep is called as
correction , correctly classfied 0.5333 and kappa statistic
polysomnograph and the signals retrieved from the device
0.0676
are called as polysomnography (PSG). By the use of PSG,
it is possible to observe the physiological changes in
Index terms Apnea Classification, ECG, EDR, R-R humans during sleep. Various physiological signals of
Interval. the subjects are recorded simultaneously by the PSG
device, which has an embedded multi-channel data
acquisition system. The recording process made as analog
I. INTRODUCTION recordings in the 90s has left its place to digital recorders
after the development of digital systems. Thus, the
The most important one of the sleep repiration prevention of errors caused by the hardware chaos of
disorders is sleep apnea. Sleep apnea is a common analog systems is provided [3]. By the use of these
disorder in which there is a pause in breathing or shallow devices, Electroencephalogram (EEG), Electrocardiogram
breaths during sleep. There are three types of sleep apnea, (ECG), Electromyogram (EMG), Electrooculogram
central,obtructive and mixed apnea. Obstructive sleep (EOG), breathing, Pulseplethysmograph (PPG) and
apnea (OSA) has the highest prevalence. Together with various desired or necessary signals of subjects in sleep
the absence of respiratory effort in the lungs, the absence are recorded. In this way, the subjects statuses are
of air flow inside the mouth and nose is defined as central determined during the night sleep and their diagnosis and
sleep apnea. Despite the respiratory effort, the lack of air treatment outcomes can be delineated. The classification
flow in the nose and mouth is obstructive sleep apnea. of sleep apnea is also realized by the investigation of
The situation starting with central sleep apnea and these physiological signals obtained from the PSG device.
continuing as obstructive sleep apnea is defined as mixed The following physiological activities in your body
sleep apnea. Mixed apnea subjects can be treated by the are recorded during polysomnography [11].
methods applied to the subjects with obstructive sleep
apnea. Obstructive sleep apnea is the most common sleep Brain activity is measured with EEG
apnea syndrome. Obstructive sleep apnea is the state of (electroencephalogram). Disruptions in sleep stages
may suggest narcolepsy or REM sleep behavior
absence of oral and nasal air flow despite the respiratory
disorder.
effort. Although the diaphragm and intercostal muscle
activity continued, exchange of air through the nose and
E7-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Eye movements are recorded with a EOG (electro- normally visible in 50-75% in the ECG. Fig. 1 shows a
oculargram). This helps to determine the presence of typical example of an ECG signal. The duration of a
sleep stages particularly REM sleep stage. heartbeat is the time interval from one R wave to next R
Muscle activity such as face twitches, teeth grinding wave, also known as RR-Interval [5]
and leg movements, is measured by EMG
In 2004, Chazal et al, suggested an obstructive sleep
(electromyogram). This helps to determine if the REM
sleep is present during sleep. Frequent leg movements apnea detection using ECG signal. Features used in these
may indicate a periodic limb disorder such as restless studies are the statistical measurement of variables
leg syndrome which is a sleep disorder because these derived from RR-intervals and ECG-derived respiratory
movements often disrupt your sleep. signal (EDR) [6].
Airflow in and out of the lungs while you are asleep is
measured with a nasal airflow sensor.
Snoring activity is measured with the help of snoring
microphone. Very loud snoring is indicative of sleep
apnea
The percentage of oxygen in your blood is measured
(oxymetry) by a bandage like oxymeter probe or
sleeve that fits painlessly on one of your fingers. Low
oxygen levels may indicate a sleep apnea.

Fig 2. Schematic representation of normal ECG

II. DATA AND METHODOLOGY

Data obtained from signals and derived from


simultaneously recorded ECG signals of the
polysomnography recordings related to the 16 different
subjects have been used for evaluations. They were
obtained from Polysomnographic Database in the
PhysioNet databank which is a web-based library of
physiologic data and analytic software sponsored by the
US National Institutes of Health [7]. The methods are gets
respiratory rate by measuring the number of ECG samples
in R-R interval and its advantage lies in its simplicity. The
other detects the rate by measuring the size of R wave in
QRS signal. This algorithm can detect the rate more
Fig 1. Polysomnography Process robustly but it is complicated and requires the ECG signal
base line to be stabilized.
The electrocardiogram (ECG) is a simple and low-cost A. Data
non-invasive recording that can be used to get respiratory The data related to the 16 different subjects have been
information. In consequence, different techniques have obtained from MIT-BIH Polysomnographic Database.
been proposed to derive the respiratory signal from the The database is a collection of recordings of multiple
electrocardiogram [4]. ECG is a graph produced by an physiologic signals during sleep. The database contains
electrocardiograph, which records the heart's electrical over 80 hours worth of four, six, and seven-channel
activity within a certain time. Besides being used for the polysomnographic recordings, each with an ECG signal
diagnosis of heart disease, ECG also useful for diagnosing annotated beat-by-beat, and EEG and respiration signals
pulmonary embolism, hypothermia, and sleep disorders. annotated with respect to sleep stages and apnea for every
ECG graph of the healthy subject cycle consists of a P 30s epoch [8] . In this database,all 16 subjects were
wave, a QRS complex and a T wave. A small U wave is
E7-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

male,aged 32 to 56 (mean age 43), with weight ranging Data of each subject taken at a specific time frame for 15
from 89 to 152 kg (mean weight 119 kg). There were two minutes. timescales are chosen based on annotation data
subjects that divided into 2 record, subject with code with apnea detection. Spesific time frame of each subject
slp01 and slp02, so total records are 18. are shown in table3.

Table 1. Data for Types of Apnea Table 3. Specific Time Frame


From Physionet Database.
Subjects T
Subject Time Apnea Types Code
No Start Stop
Code h m s HA OA CA Mix
slp03 [00:15:00.000] [00:29:59.996]
1 slp01(a+b) 5 0 0 v v v -
slp16 [01:44:00.000] [01:58:59.996]
2 slp02(a+b) 5 15 0 v v - -
slp32 [01:53:30.000] [02:08:29.996]
3 slp03 6 0 0 v v v v
slp45 [03:56:00.000] [04:10:59.996]
4 slp04 6 0 0 v v - -
slp59 [01:35:00.000] [01:43:56.400]
5 slp14 6 0 0 v v - -
slp60 [00:11:30.000] [00:26:29.996]
6 slp16 6 0 0 v v v v
slp67x [01:57:00.000] [02:11:59.996]
7 slp32 5 20 0 v v - -
8 slp37 5 50 0 - v - -
9 slp41 6 30 0 - - - - B. Methods
R Wave Detection [10]
10 slp45 6 20 0 v v v -
Intrathoracic impedance increases with inspiration
11 slp48 6 20 0 v v - -
and, as a result, the size of ECG on the vertical axis is
12 slp59 4 0 0 v v v - reduced. On the contrary, it decreases with expiration and,
13 slp60 5 50 0 v v v - as a result, the size of ECG on the vertical axis is
14 slp61 6 10 0 v v v - enlarged. A method of acquiring respiration
re signal from
15 slp66 3 40 0 v v - - an ECG based on the physiological theory above.
1. QRS wave of ECG signal
16 slp67x 1 17 0 v v v -
2. Acquisition of ECG signal
3. Measuring the size of R wave
The data obtained consists of the types of sleep apnea
4. Respiration signall detection before filtering
with patient information in accordance with the code and
5. First differentiation
ation of signal obtained in 4
the length of recording time are shown in Table 1.
6. Respirationn signal obtained through the band-pass band
ECG filtering of signal from
rom the first differentiation
R-R Interval correction [10]
Ann. Sleep Stage and Apnea The experiment is uses the respiratory pulse, which is
BP
physiological interaction between the respiratory system
EEG and the circulatory system. Because of change in heart
rate synchronized with respiration, the R-R R interval of
RN ECG is short during inspiration,
inspirat and long during
expiration. The following is a method of acquiring
RA respiration signal from an ECG based on the
physiological theory above.
EOG
1. QRS wave of ECG signal
2. Acquisition of ECG signal
EMG 3. Measuring R-R interval
4. Respiration signal al detection before filtering
Fig 3.. View of Polysomnography Recording (ECG, BP, EEG, RN, RA, 5. First differentiation
ation of signal obtained in 4
EOG, EMG Signals and Reference Sleep Stage and Apnea Annotations) 6. Respiration signal obtained through the band-pass band
fitering of signal from thee first differentiation
Seven of them have been used for evaluations,
subjects with code slp03, slp16, slp32, slp45, slp59,
slp60, slp67x. Chosen because they have a recording with
a diversity of types of apnea and respiratory available.

E7-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Naive-Bayes Classification
A Naive-Bayes classifier is a probabilistic classifier based
on Bayes theorem with strong (naive) independence
assumptions. Naive Bayes classifier assumes that the
presence (or absence) of a particular feature of a class is
unrelated to the presence (or absence) of any other
feature. This classification method relies on transforming
the discrete decision labels output by the individual
matchers into continuous probability values.

III. RESULTS AND DISCUSSION

EDR calculation using the above two methods


performed on 7 subjects who had been selected
previously. EDR signals from the two methods for all
subject shown in following figures.
1.2
1.0
0.8
0.6
0.4 RRin
Rwave
0.2
0.0

CA
N
N

N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
OA
OA
OA

MA
Fig 4. Respiratory rate detection using the size of R wave
Fig 6. EDR Signals from RRinterval and Rwave with subjects code
slp03

2.0
Rwave
1.5 RRin

1.0

0.5

0.0
N
N

N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
MA
OA
OA
OA
OA
OA
OA
OA

OA
OA
OA

Fig 7. EDR Signals from RRinterval and Rwave with subjects code
slp16

2.00

1.50

1.00

0.50 Rwave
RRin
0.00
N NOAOAN N NOAOAOAN N N N N NOAOAN NOANOANOANOANOAN

Fig 8. EDR Signals from RRinterval and Rwave with subjects code
slp32

Fig 5. Respiratory rate detection using R-R interval

E7-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

1.50 calculation, and the x-axis shows the type of sleep apnea
that occurs.
Process with the naive-Bayes classification, performed
1.00
on each of the EDR calculation algorithm, R Wave
Rwave Detection and R-R Interval corection are, for R Wave
0.50 Detection, correctly classified 0.5333 and kappa statistic
RRin
0.0395, for R-R Interval correction , correctly classfied
0.00 0.5333 and kappa statistic 0.0676
N
N
N
N
N
N

N
N
N
N
N
N

N
N
N

N
N
OA

OA
CA
OA
OA
OA

OA
OA
OA
OA
OA

OA
OA
Fig 9 EDR Signals from RRinterval and Rwave with subjects code IV. CONCLUSION
slp45
Based on the results of the experiment, the respiratory
1.20 signal can be obtained from the ECG signal processing.
1.00 method used is to use the RR-interval correction and R-
0.80 wave detection. Results of both shows have generated
RRin signal similarity model (wave form).
0.60 The signal generated from the two methods are used
0.40 Rwave for sleep apnea classification using Naive-Bayes
0.20 Classification. The classification results for the RR-
intervals correction method is slightly better than the R-
0.00 wave detection method, with a kappa value of 0.0676.
N
N
N

N
N

N
N
N
CA
CA
CA
CA

CA
CA
CA
CA
CA
CA
OA
OA
OA
OA
OA
OA
OA
OA
CA

In general, the classification of sleep apnea from the


ECG signal can still be obtained even better. For further
Fig 10. EDR Signals from RRinterval and Rwave with subjects code research can be used classifier method except Naive-
slp59 Bayes Classification, then to the process of acquiring the
respiratory signal from ECG signal processing can be
1.00 performed by methods other than the two algorithms are
used in this paper.
0.80
RRin REFERENCES
0.60
0.40 Rwave
[1] Aydin, H.; Ozgen, F.; Yetkin, S. & Stcgil, L., Sleep and
Respiratory Disorders in Sleep, 2005
0.20 [2] Onur Kocak1, Tuncay Bayrak1, Aykut Erdamar1, Levent
Ozparlak2, Ziya Telatar3 and Osman Erogul, Automated
0.00 Detection and Classificationof Sleep Apnea Types Using
N N N N N CACACACAOACAOAOACAOACAOAOANOAN N N N NOAOAN N N
Electrocardiogram (ECG) and Electroencephalogram (EEG)
Features, 2010
Fig 11. EDR Signals from RRinterval and Rwave with subjects code [3] Erogul, O,Engineering Approaches in Sleep Studies,
slp60 Proceedings of 9th Sleep Medicine Congress, , 2008
[4] Lorena S. Correa, Eric Laciar, Vicente Mut, Abel Torres, and
Raimon Jan, Sleep Apnea Detection based on Spectral Analysis
1.20 of Three ECG - Derived Respiratory Signals, 2009
[5] Sani M. Isa, Mohamad Ivan Fanany, Wisnu Jatmiko,Aniati Murni
1.00
Arimuthy, Optimal Features Selection and Cross Validation of
0.80 Classifiers for Apnea Detection, ICACSIS 2010
[6] Chazal P, Penzel T, and Heneghan C, Automated detection of
0.60
obstructive sleep apnoea at different time scales using the
0.40 electrocardiogram. Physiological Measurement. 2004 July; 25:
RRin 967-983.
0.20
Rwave [7] www.physionet.org, visited at the date 20.02.2012.
0.00 [8] Y Ichimaru,GB Moody, Development of the polysomnogaphic
N N CAOAN N CACA N CACACA N CACACA N CACA N N CA N N N CACA N CA N database on CD-ROM, Psychiatric and Clinical Neurosciences
1999, 53:175-177
[9] Boyle, J., Bidargaddi, N., Sarela, A. and Karunanithi, M.,
Fig 12. EDR Signals from RRinterval and Rwave with subjects code
Automatic Detection of Respiration Rate From Ambulatory
slp67x
Single-Lead ECG, 2009
[10] J.M. Kim, J.H. Hong, N.J. Kim, E.J. Cha, T.S. Lee, Two
The figures above show the results of the acquisition Algorithms for Detecting Respiratory Rate from ECG Signal,
respiratory signal from RR-interval and Rwave 2007
[11] http://mediconweb.com/health-wellness/polysomnography-a-
sleep-study/, access date of 16 March 2012
E7-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Automated Detection of Congested Central Vein


Liver Histology of Mice Infected with
Plasmodium berghei Using CellProfiler 2.0
Tur Rahardjo1,Dwi Ramadhani1 and Siti Nurhayati1
1
Center for Technology of Radiation Safety and Metrology,
National Nuclear Energy Agency of Indonesia
dhani02@batan.go.id

on the image by marking the central vein first using an


Abstract Malaria is initiated by Plasmodium sporozoites image analysis performed with image analysis software
infections, which are inoculated by mosquitoes. then detection the congested area inside central vein. The
Histopathologic lesions often described in the liver of results can be documented by saving the overlay image
rodent with malaria are congested central vein with
with the marked target cells.
neutrophils and eusinophils within the lumen. Detection of
congested central vein has a possibility to do automatically
using image analysis software. Here the used of
CellProfiler an open access cell image analysis software for
automated detection congested central vein liver histology
of mice infected with Plasmodium berghei is reported. The
results are compared to the manual detection. Wilcoxon
rank test was used for statistical analysis with H0
hypothesis that means there was no significant difference
between manual analysis and those with CellProfiler.
Totally 10 images were analysed for both manually and
using CellProfiler. Results showed that there were no
significant difference between manual and automatic
counting (p>0,05). Overall it appears that in our research
analyzes with CellProfiler are comparable but not better
than manual. Fig 1. Congested central vein [3]

Keywords CellProfiler, Central Vein, Congested, CellProfiler is freely available modular image analysis
Pipelines, Plasmodium berghei software that is capable of handling hundreds of
thousands of images. The software contains
I. INTRODUCTION already-developed methods for many cell types and
Malaria is the most serious and widespread assays and is also an open-source, flexible platform for
parasitic disease of humans. It affects at least 200 to 300 the sharing, testing, and development of new methods by
million people every year and causes an estimated 3 image analysis experts. CellProfiler uses the concept of a
million deaths per year. Malaria is initiated by 'pipeline' of individual modules. Each module processes
Plasmodium sporozoites, which are inoculated by the images in some manner, and the modules are placed
mosquitoes. The disease is characterized by a range of in sequential order to create a pipeline: usually image
clinical features from asymptomatic infection to a fatal processing, then object identification, then
disease [1]. There are four species of Plasmodium that measurement. Most modules are automatic, but
infect man and result in four kinds of malaria fever: P. CellProfiler also allows interactive modules (for
falciparum, P. vivax, P. ovale, and P. malariae [2]. example, the user clicks to outline a region of interest in
Malarial involvement of liver is now a known entity each image). Modules are mixed and matched for a
with it is specific histopathological lesions. specific project and each module's settings are adjusted
Histopathologic lesions often described in the liver of appropriately. Upon starting the analysis, each image (or
rodent with malaria is congested central vein with group of images if multiple wavelengths are available)
neutrophils and eusinophils within the lumen (Fig. 1) travels through the pipeline and is processed by each
[2,3]. Detection of congested central vein commonly module in order [5].
done manually under microscope. This process has a Here the used of CellProfiler an open access cell
possibility to do automatically using image analysis image analysis software for automated detection
software. With the availability of digital photography, congested central vein liver histology of mice infected
the congested central vein detection process can be done with Plasmodium berghei is reported. The results are

E8-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

compared to the manual detection of congested central 2.6. Statistical analysis


vein in liver histology. The advantages using Cellprofiler
is it could be instructed to process images in batches of Totals congested central vein obtained by manually or
several hundred to automatically generate parasitemia with CellProfiler were compared using Wilcoxon test
values without the need for supervision. This also with H0 hypothesis mean there are no significant
eliminates factors such as user fatigue and lack of difference variation between was no significant
standardization that are often associated with manual difference between manually analysis and with
enumeration. CellProfiler. H1 hypothesis mean there was a significant
difference between manually analysis and with
II. MATERIALS AND METHODS CellProfiler. Significant level used in this research is
2.1. Mice 0.05 (5%).

Male Swiss mice ages 8 to 12 weeks were purchased


from Pusat Penelitian dan Pengembangan Gizi dan
Makanan, Kementerian Kesehatan Indonesia.

2.2. Parasites and infections

Mice were inoculated intraperitoneally with 106


erythrocytes infected by P. berghei. Mice were subjected
to euthanasia at one week after inoculation. Fragments of
the liver were fixed by immersion in 10% buffered
formalin during 24 hours. These samples were then
dehydrated, and processed for paraffin embedding. Five Fig 2. Pipelines for detected congested central vein.
m sections were cut and stained with hematoxylin-eosin
(H&E). III. RESULTS
3.1. Automated and Manual Detection
2.3. Image acquisition Ten images were collected and subjected to the
automated, as well as being analyzed manually by
A Nikon Biophot microscope attached with Nikon pathologies. Scatter plots graph show linear relation
D3000 digital single lens reflects (DSLR) camera system (r = 0.55; Fig 3) between analyzes using CellProfiler and
was used to capture images of the smears. The slides with manual counting. In our pipelines the time needed
were examined under 10 objective lens. Images were for process one single image is approximately 17
captured at a resolution of 19361296 and saved as seconds.
JPEG files.
4.5
y = 0.4419x + 1.1512
R2 = 0.5551
2.4. Manual detection congested central vein 4

3.5

Ten images of liver histology section were analyzed 3


Manual Results

under personal computer using Microsoft Windows XP 2.5

SP 2 32-bit platform as operating system. Processor type 2

used inside the computer is AMD Athlon(tm) 64 X2 1.5

Dual Core 5000+ with memory (RAM) is 1.87 GB. . 1

0.5
2.5. Automated detection congested central vein 0
0 1 2 3 4 5 6 7 8
CellProfiler Results
An open access cell image analysis software
CellProfiler 2.0 r10997 that developed by Broad Fig 3. Scatter plots comparing congested central vein
Institute was used for an automated detection congested defined by manually and with CellProfiler.
central vein. CellProfiler (CP) runs on Microsoft
Windows XP SP 2 32-bit platform. Processor type used
3.2. Statistical analysis compare between automated
inside the computer is AMD Athlon(tm) 64 X2 Dual
and manual results
Core 5000+ with memory (RAM) is 1.87 GB. A
pipelines was developed to doing automatic detection Statistical analysis using Wilcoxon Rank test show
congested central vein (Fig. 2). that there are no significant different between manual
counting and automated counting (P = 1), because the
p-value is bigger than 0.05 it is mean H0 hypothesis is not
rejected.

E8-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

IV. DISCUSSION
Convert color image
Our pipelines consist several steps to detected the to grayscale color
congested central vein in liver histology. First we rescale
the image to speed up the time required for detected
congested central vein in the image, and then we convert
the images to grayscale images. Grayscale images show
bright color on objects and a dark color in background.
Because the central vein area is cover by a bright color Detection Central Vein
Using Threshold methods
then it can be easy to identify using the thresholding
methods in Identify Primary Objects module.
Unfortunately because sometimes the material inside
Morphology image
central vein is attached to the border line of the central consist dilate, fill
vein, then the central vein area that detected by holes and erode
thresholding method became very tight. image
In order to refine the central vein area results we apply
several images morph processing to get better central Invert images so material inside
vein detection. Based on our experiment dilate the the central vein can be detected
images, fill holes after dilate the images and last erode using threshold methods
the images can be used for getting a better detection
central vein area. Interestingly CellProfiler provided all
image morph processing in Morph module. To define Detected material inside the
which one is the congested central liver we must detect is central vein using threshold
there any materials inside the central vein. Because methods
thresholding method is detected the bright area and the
materials are in gray color, first we must invert the
images so the material inside the central vein became
bright and can be detected by thresholding methods. In Detection Central Vein that have
our pipelines, the congested central vein detection is a material in the lumen
based on parent-child relationship between the central
vein and the materials inside the central vein. The central
vein (parent) should define as the congested central vein
Fig 4. Flowchart automatic detection of congested
if it has at least one or more material (child) in it. It will
central vein defined by CellProfiler.
not define as congested central vein if the material inside
the central vein is not overlapping with the central vein.
Details of all steps of our pipelines are shown in Fig 4. REFERENCES
A significant variation between manually and [1] SIO, S.W., SUN, W., KUMAR, S., BIN, W.Z., TAN, S.S., ONG,
S.H., KIKUCHI, H., OSHIMA, Y., and TAN, K.S.
automatically detection of congested central vein MalariaCount: an image analysis-based program for the accurate
observed in one image. This happened because there are determination of parasitemia. J Microbiol Methods 2007,
large sinusoids areas and because the inside the sinusoid 68:11-18.
[2] HISAEDA, H., YASUTOMO, K., and HIMENO, K. Malaria:
areas there are many Kupffer cells then the pipelines also
immune evasion by parasite. Int. J. Biochem. Cell Biol. 37,
detected as a congested central vein. A large sinusoid 700-706.
area is also commonly histological lesions because [3] KHAN, Z.M., NG, C., and VANDERBERG, J.P. Early Hepatic
infection of Plasmodium, this phenomenon usually calls Stages of Plasmodium berghei: Release of Circumsporozoite
Protein and Host Cellular Inflammatory Response. Infection and
a sinusoid dilatation. Baheti et al research show that Immunity, 1992, 60(1), p. 264-270.
seventy five percent histological lesion in liver cause by [4] SILVA, A.P.C., RODRIGUES, S.C.O., MERLO, F.A.,
Plasmodium is sinusoid dilatation [7]. We are now in the PAIXO, T.A., AND SANTOS, R.L. Acute and chronic
histopathologic changes in wild type or TLR-2-/-, TLR-4-/-,
process of developing a better pipelines than can be used TLR-6-/-, TLR-9-/-, CD14-/-, and MyD-88-/- mice experimentally
for detected the congested central vein and can infected with Plasmodium chabaudi. Braz J Vet Pathol, 2011,
differentiate between the congested central vein and 4(1), 5-12.
sinusoid dilatation. [5] Carpenter, A.E., Jones, T.R., Lamprecht, M.R., Clarke, C.,
Kang, I.H., Friman, O., Guertin,D.A., Chang, J.H., Lindquist,
R.A., Moffat, J., Golland, P., and Sabatini, D.M. CellProfiler:
V. CONCLUSION image analysis software for identifying and quantifying cell
We have developed pipelines for CellProfiler phenotypes. Genome Biology, 2006, 7:R100.
[6] IVANOVSKA, T., SCHENK, A., HOMEYER, A., DENG, M.,
software that can be used to detect the congested central DAHMEN, U., DIRSCH, O., HAHN, H.K., AND LINSEN, L. A
vein in liver histology section of mice infected with fast and robust hepatocyte quantification algorithm including
Plasmodium berghei. Overall, our pipelines worked very vein processing. BMC Bioinformatics 2010, 11:124
[7] BAHETI, R., LADDHA, P., and GEHLOT, R.S. Liver
well to detection of congested central vein. Involvement in Falciparum Malaria A Histo-pathological
Analysis. JIACM CM, 2003; 4(1): 34-8

E8-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Telemonitoring Application in Health Safety


and Environment at PT. Pertamina Refinery
Unit IV Cilacap using Android Smartphone
Budi Santosa1, Bambang Yuwono2, Mariza Feary3
1,2,3)
Informatics Engineering Department, Universitas Pembangunan Nasional Babarsari
Tambakbayan , Yogyakarta, 55281, Indonesia Tel.:+62 274 485323
e-mail : dissan@upnyk.ac.id
Telemonitoring needs a certain media for transfer data
Abstract Health, Safety and Environment (HSE) is a from data source to data processing center. At least the
part of PT. Pertamina Refinery Unit IV Cilacap, media contains 3 criteria, data accuracy, long-distance
Indonesia. The main task of HSE is monitoring area and range and economically.
situation of PT. Pertamina Refinery Unit IV Cilacap,
especially fire-prone areas. The situation and condition B. Android
must be monitored 24 hours / 7 days. This research Android is an operating system for mobile devices,
proposed the solution how to monitor the dangerous area produced by Google. Google purchased the initial
far away from the location using mobile device.
developer of the software, Android Inc., in 2005. The
The methodology that used to develop this application is
Guidelines for Rapid Application Engineering
unveiling of the Android distribution in 2007 was
(GRAPPLE). Several tools that used to develop this announced with the founding of the Open Handset
application are Eclipse IDE Helios, Text Editor and Alliance, a consortium of 84 hardware, software, and
ZoneMinder which is used as a server for collecting data. telecommunication companies devoted to advancing
The result of this research is a Telemonitoring Application open standards for mobile devices. Google releases the
in Health, Safety and Environment at PT. Pertamina Android code as open-source, under the Apache
Refinery Unit IV Cilacap using Android Smartphone. The License. In this application, used Gingerbread Android
system has capability running in 2 ways. Firstly, from version (Android 2.3).
Android Smartphone (through smartphone web browser
or telemonitoring application) and secondly, from web C. IPCamera
browser which use zoneminder as a server. The
IPCamera is a type of digital video cameras used for
application is used to help the administrator monitoring
the condition and situation of area refinery unit from long
surveillance.
distance and also can be access from everywhere using D. ZoneMinder
mobile device.
Index Terms Android, Eclipse IDE Helios,
Application security and surveillance video cameras
Telemonitoring, ZoneMinder. on linux operating system, intended for single camera
and multi camera.

I. INTRODUCTION II. REQUIREMENT ANALYSYS AND DESIGN

H ealth Safety and Environment (HSE) is a part


division of PT. Pertamina Refinery Unit IV
The new developed system aimed to help
admininistrator monitored the condition and situation of
area refinery unit from the long distance. The
Cilacap, Indonesia. HSE handled the problems in the
field of environmental health and worker safety at PT. developed system have requirements below :
Pertamina RU IV Cilacap. But, the main focus of the The software shall to monitored condition of
tasks is to monitor the area and situation of PT. fire-prones area PT. Pertamina RU IV Cilacap.
Pertamina Refinery Unit IV Cilacap, especially fire- The software shall be able to do video
prone areas. Therefore many workers monitoring streaming.
directly into the field to monitor the situation and The software shall monitored anytime and
conditions. The situation and conditions must be everywhere.
monitored 24 hours / 7 days. The software shall be able to do automatic
Telemonitoring is the activity to remote monitoring storage.
of the situation by using communication equipments. In The software shall be able to download videos.
this research, application can be used from android The design phase consist of architecture design and
smartphone and pc web browser. The application interface design. The architectural design of the
already supported by 64 base to maintain its security. software describes how the application work. the design
phase consist of architecture design and interface
A. Telemonitoring
design. The architectural design of the software
Telemonitoring is the activity to remote monitoring describes how the application work.
of the situation by using communication equipments.

E9-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Chromium Browser
Webmin (DNS Server)
ZoneMinder Linux CCTV Server
Java Android script programming
B. HARDWARE
Hardware that used to develop the system consist of :
Smartphone Android
o 2.3.3 Android Version (GingerBread
OS)
o 1 GHz Processor
Fig. 1. Application Architecture using Android Smartphone o 2.6.32.9 Kernel Version
IP Camera
o VGA Camera Lens
o MJEPG Video Encoding Standard
Figure 1 describes how the application running
o 270 Remote Pan, 120 Tilt Control
through smartphone android. Administrator can
o Wifi IEEE 802.11 b/g
monitored the situation from smartphone android which
Wireless ADSL2 + Gateway
connect to WLAN PT. Pertamina RU IV Cilacap and
o Modem Linksys WAG54G2
directly access hse.telemonitoring.com /
o Wifi IEEE 802.11 b/g
192.168.100.10.
Notebook
In other way, smartphone android connect via
o Intel Core 2 Duo
WLAN PT. Pertamina RU IV Cilacap through the
o T5450 Processor 1.66 GHz, 667 MHz
server for automatic storage, download video data and
FSB, 2MB L2
o Cache
o RAM 1,5 GB DDR3
C. Files that Used in the System
There are 3 packages contained in this application.
Where in the package there are 8 java class (*.java).
Table 1 indicates file that used in this system
No File Name Remark
1 Package akseshttp Package contains classes that
manage basis64 and streaming
Basis64.java File that used to password
Fig. 2. Application Architecture using Personal Computer (PC) encryption for security
GambarBerubahListene Contains change image
r.java detection method and error
notification.
monitored multiple camera at the same time. PemisahStream.java File that used to separating the
Figure 2 describes how the application running image from http header
through Personal Computer (PC). PC connect via StreamKamera.java Implementation from
GambarBerubahListener.java
WLAN PT. Pertamina RU IV Cilacap then access interface and used to connect
telemonitoring.com through the server for automatic to the camera and take pictures
storage, control the camera and monitored multiple repeatedly
camera at the same time.
2 Package Package contains application
hse.telemonitoring menu
III. IMPLEMENTATION IpCameraActivity.java File that used to control the
camera
This section explained the implementation of the LoginActivity.java File that used to controlled
Telemonitoring Application in Health Safety and menu
Environment at PT. Pertamina Refinery Unit IV
3 Package Video Package to take byte data
Cilacap using Android Smartphone. IImgData.java Contains set bytes and get
bytes method.
ImgData.java Implementation from
A. SOFTWARE IImgData.java interface and
used to wrap the image data
Software that used to develop the system consist of :
Ubuntu 11.04 Natty Narwhal
Apache Webserver
Eclipse IDE Helios + Android SDK and ADT Application Display from Android Smartphone
Plugin
E9-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

IV. CONCLUSION
The conclusion of this research is that has been built
the Telemonitoring Application in Health Safety and
Environment at PT. Pertamina Refinery Unit IV
Cilacap using Android Smartphone. The system has
been succesfully tested and have capability running in
2 ways. Firstly, from Android Smartphone (through
Fig 3. User Interface Login
smartphone web browser or telemonitoring
application). Secondly, from web browser which uses
ZoneMinder as a server.

REFERENCES
[1] _________, 2011, Apache HTTP Server.
http://en.wikipedia.org/wiki/Apache_HTTP_Server, (accessed
at Nov 20, 2011).
[2] _________, 2011, FFmpeg. http://ffmpeg.org/index.html,
Fig 4. User Interface Camera (accessed at Nov 20, 2011).
[3] Charibaldi, Novrido. (2010). Solusi Pemrograman Java
Application Display from Android Smartphone Web (Dilengkapi Contoh Soal dan Penyelesaian). Pyramida,
Yogyakarta.
Browser (telemonitoring.com/zm/skin?=mobile) [4] Eclipse Foundation., 2011, Eclipse.
http://www.eclipse.org/org/, (accessed at Nov 20, 2011).
[5] Fowler, Martin. 2005. UML Distilled 3th Ed, Yogyakarta:
Andi.
[6] Geoffrey, S., 2011, BIND.
http://en.wikipedia.org/wiki/BIND, (accessed at Des 12,
2011).
[7] Gombang, 2011, Wi-Fi.
Fig 5. User Interface Application via Android Smartphone Web http://id.wikipedia.org/wiki/Wi-Fi, (accessed at Sept 14,
Browser / Menu IPCAM MOBILE VIEW 2011).
[8] Graemel, 2011, IP camera.
Application Display from PC Web Browser http://en.wikipedia.org/wiki/IP_camera, (accessed at Sept 14,
2011).
(telemonitoring.com) [9] Kadir, Abdul. 2002. Pengenalan Sistem Informasi
Yogyakarta: Andi.
[10] Macks, D., 2011, Server (computing).
http://en.wikipedia.org/wiki/Server_ %28computing%29,
(accessed at Nov 20, 2011).
[11] Nicolas Gramlich, Andbook : Android Programming,
Download 10 Oktober 2009, http://andbook.anddev.org/
[12] Nugroho, Adi. 2005. Analisis dan Perancangan Sistem
Informasi Dengan Metodologi Berorientasi Objek.
Fig 6. User Interface Application via PC Web Browser
Informatika. Bandung.
[13] OHA, Android.
Implementation telemonitoring.com aimed to help http://www.openhandsetalliance.com/android_overview.html,
administrator to controlled and stored data. There are (accessed at Sept 19, 2011).
[14] Samulo, A., 2011, Intranet.
three menus, IPCAM VIEW(hse.telemonitoring.com), http://id.wikipedia.org/wiki/Intranet, (accessed at Nov 2,
IPCAM MONITOR ZONEMINDER 2011).
(telemonitoring.com/zm/skin?=classic), IPCAM [15] Scott, C., 2011, Basic Access Authentication.
http://en.wikipedia.org/wiki/Basic_access_authentication,
MOBILE VIEW (telemonitoring. com/zm/skin?=
(accessed at Nov 10, 2011).
mobile). IPCAM VIEW used to controlled the camera. [16] Setiawan, A., 2007, Perancangan Dan Implementasi Sistem
IPCAM MONITOR ZONEMINDER used to automatic Monitoring Jarak Jauh Berbasis Protokol AX.25 Dengan
storage. IPCAM MOBILE VIEW used to store data in Menggunakan Mikrokontroler.
smartphone. http://digilib.ittelkom.ac.id/index.php?option=com_repository
&Itemid=34&task=detail& nim=111020129, (accessed at Oct
Application Display from ZoneMinder CCTV Server 13, 2011.
[17] Stachura, Max E. (2010). Telehomecare and Remote
(telemonitoring.com/zm/skin?=classic) Monitoring : An Outcomes Overview. Georgia : Advamed
[18] Triornis LTD, 2011, ZoneMinder.
http://www.zoneminder.com, (accessed at Nov 20, 2011.
[19] Webmin, 2006-2011, Webmin.
http://www.webmin.com/intro.html , (accessed at Dec 12,
2011).

Fig 6. User Interface Application Display from ZoneMinder CCTV


Server / Menu IPCAM MONITOR ZONEMINDER

E9-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

RIFASKES Geographic Information System


Based on Web
Istikmal, Yuliant S, Ratna M, Tody A W, Ridha M N, Kemas M L, Tengku A R
Electro and Commnucation Faculty, Telkom Institute Technology
itm@ittelkom.ac.id, ( yls,rmg,rmy,taw,tka)@ittelkom.ac.id, kemas.muslim@gmail.com

across the government health facilities.


Abstract Information access for medical care is a right The program in its implementation has obstacles in
for every community and an obligation of the state to the process of data retrieval and processing. Data
provide health care as mandated by the Act of 2009. This is retrieval is done by spreading the field blank to all
a demanding health care facilities information can also be
government health facilities, and then collected again
accessed easily. RIFASKES (Health Research Facility) is a
program of the Ministry of Health of Indonesia through after filled. These methods need a long time and great
the Balitbang Ministry of Health to monitor government cost considering its location spread throughout
health facilities, including health centers (puskesmas). Indonesia, especially puskesmas, in addition, not all
Monitoring including the condition of the building health entries can be collected and blank filled completely.
centers, the type and level of service Categories, number of This problem causes the data are incomplete and require
health workers, provision of medical equipment.
a long time, not to mention the data collected must be
Monitoring is done to optimize the role and functions of
government health facilities for public health, but is verified. Finally, data processing was inhibited, and
constrained in getting the data that has been done takes a long time, this affects to the analysis and policies
conventionally. In this study we created a web-based to be taken because the data is too late and did not
geographic information system to present data update properly.
RIFASKES and can be updated in real time and named Application of geographic information systems in this
SIGAPP KES. This research is a collaboration of IT
study intended to answer the above challenges in
Telkom and Balitbang Ministry of Health. This
application is designed to enable people to find RIFASKES program, that is research collaboration
information about the nearest puskesmas and to make between IT Telkom and Balitbang Ministry of Health.
easier the government in monitoring the condition with For the first phase of this study is targeted puskesmas in
well updated. This application also making easier for several cities and counties in western Java.
policy analysis in determining the appropriate authorities.
The application provides a graphical data analysis and
I.2 OBJECTIVES
geographic (GIS, Geographic Information Systems). The
data has been inputted are the cities and counties in Information and communication technology is
western Java and made in the indonesian version. This developing so rapidly, it should be used to facilitate the
application has been presented to the health minister and utilization of any person in getting information anytime
received a good reception for further development.
and anywhere. The use of computers as a tool is very
common and its use for communication and information
Index Terms RIFASKES, GIS, SIGAPP KES.
sharing can be optimized as much as possible. It is
evident from the many puskesmas have computer
facilities both in urban and rural [1]. Figure 1. Show as
I. INTRODUCTION much as 97.7% in urban are available computer and
computer is not available 2.3%, while in the rural as
I.1 BACKGROUND much as 79% of available computers and 21% are not
available.
G overnment of Indonesia has many various of health
facilities that are intended to provide health
services to the community. There currently are 693
RSUP (Government General Hospital) and the 9152
Puskesmas ( Community Health Center ) [1]. Certainly
not an easy task to monitor the condition of all health
facilitie, primarily puskesmas which located in
throughout Indonesia. Ministry of Health of Indonesia
through the Balitbang Ministry of Health implement the
program RIFASKES (Health Research Facility) which
aims to get the data and condition of government health
facilities. The data are needed to determine the measures Figure 1. Availability of Computers in the
taken in increasing and optimizing health services Community Health Center ( puskesmas ) [1]

E10-1
The 6th Electrical Power, Electronics, Communications, and Informatics
Informat International Seminar 2012
May 30-31,
31, Brawijaya University, Malang, Indonesia

Availability of computers in the puskesmas is Applications


expected to support the use and implementation of these data
applications later in the field. Today is also developing a GIS Software
geographic information system more attractive to Hardware
present data in the form of geographically referenced Application is a collection of procedures used to
mapping or visualization. process data into information.
information For example, the sum,
In this study we built an application called SIGAPP classification, rotation, geometry correction, query,
(Application of Geographic Information Systems) overlay, buffer, join table and so on.
which has the ability to build, store,
store manage and display 4. Data retrieval
geographically referenced information that can be used Data taken from the Balitbang ministries of health
for scientific investigations,, resource management, from the result of RIFASKES 2011. From the
planning, monitoring or supervision,
supervision as well as the sugesstion of Balitbang the data entered into the
analysis in any field . Because of this SIGAPP used in system is limited to first new refined. Here are
the health field then this application is named SIGAPP RIFASKES the data is entered into the system:
KES. a. General information
SIGAPP KES goal are to integrate RIFASKES Includes fiften information such as ID puskesmas,
program into an application geographic information puskesmas name, district code, clinic type, category
system based on WEB. This application is intended data of health centers, and educational background of the
RIFASKES program can be easily updated by each head clinic, condition and image building,
puskesmas and the data can be processed,
processed analyzed, and coordinates and address.
displayed either in the form of a graph and geographic b. Human Resources (Health
Health workers)
analysis. Includes seven main health workers such as doctors,
nurses, midwives,, dentists, sanitarian, Promkes, and
II. DESIGN AND METHODOLOGY
METHODOLO nutrition.
In making application SIGAPP KES conducted that c. Essential medical equipment,
equipment which consists of:
includes the stage of making the learning process 1. BP essential public health tool, such as
through references, data, geographic information stethoscope, bed check,
check blood pressure meter
systems, databases, web design and methodology are mercury, adult scales.
summarized as follows: 2. Essential medical equipment MCH (Maternal and
1. literature Child Health), which consists of the stethoscope, bed
Review of literature includes literature study of check, blood pressure meter mercury, clinical
information systems, database management, web, termometer, adult scales,, baby scales, dopler, and
mapping, researchh methodology, research kind ever hemoglobinnometer set (Sahli).
Sahli).
undertaken. 5. Data Preprocessing
2. The methodology used is waterfall, in this The data obtained can not be directly used for this
methodology the First Instance times is system need application, initial data processing to be done to a
analysis "requirements definition"
definition next is "system uniform data format before can be used.
and software design" and perform pre-processing the 6. Spatial Database Design and Software Design
data, then do the implementation and testing of Preparation of spatial databases based on spatial data
software design,, the final step is a software and attribute data that has been owned.
owned This spatial
development by performing the integration,
integration testing database design determining the amount and type of
and operation system maintenance.
maintenance This is done table / database that includes the attributes required
related to the system's ability to offer that requires a therein, and the relationship between a table with
special study of the needs of the system, system other tables.
pre-processing, design and development software.

Figure 2. stages of waterfall methodology [8]

3. System Requirements Analysis


Figure 3. HR database design
To be able to build this application requires at least
several components:

E10-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Table 1. Database tables and fields information such as address and type or category of
NO TABEL FIELD puskesmas, health workers held, and the essential public
catagory_name health tools and equipment essential maternal and child
1 Sdm_catagory id_category_sdm health.
id_group_sdm
group_name
2 group_sdm
id_group_sdm
Status_name
3 status_sdm
id_status

7. Software Development
Software development is a coding process based
database and software design that has been created in
a programming language.
8. Testing and Repair Figure 6. Search menu and tracking.
Software testing performed on every menu that is
created by using the blackbox methods. Users can utilize the tracking menu to look for a route
These applications use the Google map, while for the from where he was to the location of the targeted health
server and database using Xampp and AJAX are used centers, as shown in figure 6.
for web-based programming to create interactive
applications in GIS.

III. RESULTS AND DISCUSSION


III.1 SIGAPP KES for Public
This application is made into three main functions:
first to provide information to the public in finding
information nearest puskesmas. Community can look
directly through the map or menu search by city.

Figure 7. General information Health Center

After getting the location or community health center


sought to obtain general information by pressing the
menu centers on GIS or detailed information directly
from the search menu. Furthermore, by selecting the
menu of human resources and medical devices to obtain
information on health and medical devices are available
at the health center as shown in figure 8 and figure 9.
Figure 4. Initial view SIGAPP KES

Figure 4. An initial view web SIGAPP KES, after


entering the GIS map will be presented western Java as
in Figure 5, green tag indicates the location of
puskesmas, if we click it will display the name of the
puskesmas information.

Figure 8. Health personnel information

Figure 5. Location of health centers in the GIS

Furthermore the public can access information


directly from the puskesmas which consists of general Figure 9. Medical Device Information

E10-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

III.2 SIGAPP KES for Goverment Next on the menu to choose the level of statistical
The second major function of SIGAPP KES are for data to be seen whether the provincial, city, up to the
government. This function is used to look at the health district level. We can also see the data of each clinic.
center human resources information data, medical Figure 13 shows the doctor HR data statistics from the
devices, the type and category of health centers ( provincial level (western Java), Tasikmalaya city to
puskesmas ) from provincial to district level. Data are kawalu district.
presented in graphical form and GIS, this is to facilitate
the government in monitoring the development of health
centers as well as policy analysis function to take on the
latest conditions. Figure 10. display shows the login to
the government. There are two levels of logging that is a
government or puskesmas staff for the data update
function.

Figure 10. Login view of government

Once entered, the displayed menu is a list of all health


centers ( puskesmas ), looking at the data and statistical Figure 13. HR Data Doctor provincial, city and district.
analysis of the graphs and GIS. In the list of all our
health center can search by ID clinic, clinic name, or by
city. From these data shows that the spread of doctor in
West Java has not been evenly distributed, at the city
level, there are at most 3 doctors in three health centers
and at least one doctor at seven puskesmas. At the
district level kawalu consists of one doctor, two doctors,
and three doctors for each health center.
There is a threshold field in the statistics menu that
are used to simplify the data to see if there are
established standards, as shown in Figure 14. If the
threshold is loaded first then the standard is a minimum
of one doctor for every clinic. Visible to all health
Figure 11. Menu list and search the entire clinic centers, Tasikmalaya availability of doctors meet the
standards of one person.
On the menu there is a choice satitstik HR, BP Tools
and equipment KIA. If the selected SDM, it will display
a menu of options that you want to see (doctors, nurses,
etc..), Whereas if the tool will display a menu of what
tools will be statistical (stethoscope, bed, Sahli, etc..),
As shown in Figure 12 .

Figure 14. Statistics with the threshold

The next menu is a look at the statistics of medical


equipment, medical devices by selecting the BP or KIA,
it will display a menu of choices of medical devices who
want to be seen. Then we specify the data that we will
see whether at the provincial or city.
Figure 15. Statistics indicate the availability of a
stethoscope in west Java province and city Majalengka.
Figure 12. Statistics and menu choices

E10-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Seen from the graph there are 40 health centers do not


have a stethoscope and majelengka city, there are 9
health center does not have a clinical thermometer. With
these data the government can pay more attention to
health centers do not have requisite standard of medical
devices.

Figure 18. GIS information types of health centers

From the data shows that there are many health


centers in western Java are categorized as non PONED
and not the kind of care treatment centers. Government
Figure 15. Health Statistics Tool seeks to improve health centers to PONED and care
catagory to improve health services to the community.
Next is the analysis of data in geographic form.
Figure 16. display shows the initial menu of statistical
analysis is also equipped SIG city search menu.
Functions are included in the statistics menu of GIS. In
the statistics menu functions are included GIS to view
HR data, type of health center consisting of categories of
care and non PONED or PONED. Then there is a menu
to see the physical condition of health centers.

Figure 19. GIS doctors Human Resources Information

To view the GIS information from HR we can select


the SDM. Figure 19 and 20 show images in Tasikmalaya
HR information. Filled with the limits for a direct look at
where the health centers that meet or not meet the
standard criteria. The green color indicates more than
the standard, meets standard is yellow color, red color is
less than the standard. Equitable distribution of health
Figure 16. Statistics Display GIS workers can be seen that midwives better than doctors.

Categories puskesmas PONED or non PONED,


shown in the geographic centers of green to PONED and
red for non PONED. From the figure 17. Health centers
( puskesmas ) are generally seen in western Java is still a
lot of non PONED.

Figure 20. SIG Human Resources Information


Midwives

In the availability of government health workers


should pay more attention again. Generally, there is still
a shortage of health workers, especially doctors,
Figure 17. GIS information PONED category promkes, and dentists. Not to mention unequal
distribution in the region. General health workers in the
Health Centers are also classified as care and non rural difficulty in getting a good living facilities, and
care. Care health center means it can perform the service lack of available health facilities.
road to inpatient care. From the figure 18. Seen the
number of care centers are still small.
III.2 SIGAPP KES for Administrator

The third main function is to administrator. This


function is used to regulate user access to applications

E10-5
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

SAGPP KES. Administrator managed user accounts and IV. CONCLUSIONS AND RECOMMENDATIONS
government health centers authorized to view and
IV.1 Conclusions
change data. Figure 21. Display shows the admin login
menu SIGAPP KES application is made to help RIFASKES
program to be more optimal utilization in results. This
application is expected to benefit the community and
government. The application can update the data more
quickly, so that both the government and the public can
obtain puskesmas information better. With this
application the Government may monitor and take a
strategic policy to develop and improve the quality of
health services and health center facilities ( puskesmas ).
IV.2 Recommendations
This application is still far from perfect, so we expect
to continued this riset for some improvement. For future
Figure 21. Admin login menu display.
development, we can used map server and our own map
for easy processing of geography. Addition of data in
On the menu there is a list of admin users that are
which if the critical parameters such as drugs, health
currently active, there is a menu that user ca search by
information, disease information. There should also be
name, code and name of the clinic group. Figure 22.
developed GIS hospitals, laboratories, pharmacies. One
shows the admin menu.
of the roadmap of this research is to make Indonesia GIS
Health System.

REFERENCES
[1] Balitbang Ministry of Health of the Republic Indonesia,
preliminary results of RIFASKES 2011.
[2] Act ( UU ) No. 36 of 2009 on Health.
[3] Kaswidianti Wilis, Budi Santosa, Rifky Satya, "Geographic
Information System Health facilities in the town of Magelang
web-based", National Seminar on Informatics 2008 UPN
yogyakartaUU No. 36 of 2009 on Health.
[4] Software applications Healthmapper, WHO.
[5] Women Research Institute, Availability and Utilization of
Figure 22. Administrator menu display Health Services For Maternal, in 2008
[6] Women Research Institute, Utilization of Reproductive Health
Care for Poor Women, in 2007
Group code indicates that the user root as the main [7] RI health minister's decision 1457/menkes/sk/x/2003 number of
admin, while the user admin as admin for puskesmas minimum standards of health care in the district or city.
[8] Fathul Wahid, Information Systems Research Methodology: an
and Government code indicates that users of the overview, Media Informatics vol 2 no 1, June 2004.69 to 81.
government.
Istikmal ST. MT. was born on 11 november 1979 in Kebumen.
Graduate degree in STT Telkom and continuing education for S2 at
ITB. currently a lecturer in Telecommunications Engineering
Program, Faculty of Electro and Communications, Telkom Institute of
Technology, Bandung, Indonesia.

E10-6
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Fast and Accurate Interest Points Detection


Algorithm on Barycentric Coordinates using
Fitted Quadratic Surface Combined with Hilbert
Scanning Distance
1
Tibyani Tibyani and 2Sei-ichiro Kamata
Grad. School of Information, Production and System Waseda University
Kitakyushu, Fukuoka, Japan 808-0135
1
tibyani@akane.waseda.jp., 2kam@waseda.jp.

extracted from the model and image. A well-known


Abstract The main purpose of interest points detection measure called Hausdorff distance (HD) has been widely
algorithm on Barycentric coordinates for 3D objects based used to this task However, HD is very sensitive to outlier
on Harris operator is to find the fast computation of fitted points and noise [12].
surface differences (FSD) of the derivative data for
different points. A FSD method is fitted quadratic surface
Glomb [6], in his seminal work proposed four
(FQS) approach combined with Hausdorff (HD) approach approaches of interest points detection algorithms using
as conventional method. In this paper, the extension of extention Harris operator, i.e. Gaussian function (GF),
Harris operator using FQS-HD (EHO-FQS-HD) and the fitted quadratic surface (FQS), Hausdorff distance (HD)
extension of Harris operator using FQS-Hilbert scanning and fitted surface differences (FSD) to define the
distance (EHO-FQS-HSD) as a proposed method to averaged derivatives to form matrix E [4]. From his
interest points detection on Barycentric coordinates for 3D experimental results, the quality of FSD method showed
meshes data is analyzed. The quality of this interest points worser in computational cost for Harris operator values.
detection algorithm with EHO-FQS-HSD was measured To address the noise and computational problems, a fast
using the repeatability criterion. Experimental results and accurate measure is desired.
show that EHO-FQS-HSD is 5-10 faster than
EHO-FQS-HD. Moreover, it is a fast and accurate interest This paper is organized as follows. The conventional
points detector. 2D Harris operator analysis, Extension of Harris
operator analysis on 3D triangular meshes and The
Index Terms3D interest points detection, Harris method of the conventional EHO-FQS-HD to compute
operator, Fitted Quadratic Surface, Hilbert scanning the E matrix, including mathematics descriptions are
distance,Hausdorff distance, 3D triangular mesh described in Section 2. The proposed method of
EHO-FQS-HSD, which used to compute the E matrix is
described in Section 3. In Section 4, the experiments
I. INTRODUCTION result analyzed are designed to demonstrate the
performances of the proposed method. The experimental
T HE 3D interest points detection is a particular
processing step involved in computer vision and
pattern recognition algorithms. In the last decade,
results illustrate the fast and accurate of our proposed
method. It is about the experimental results using Hilbert
scanning distance and its comparison with Hausdorff
interest points detection methods have been widely used distance measures. Finally, Section 5 concludes this
in various applications including 3D retrieval, study.
recognition, registration and matching. Because of they
are simple, flexible and excellent for many applications. II. RELATED WORK
A method of the interest points detector for images
was introduced by Harris and Stephens [2], where their In this section, the conventional method of 2D Harris
method has an ability to respect to the information operator analysis, extension of Harris operator analysis
contents and repeatability touchstones [8], robust to on 3D manifold triangular meshes, fitted surface
noise [9], illumination change [10] and powerful differences method (FQS approach combined with HD
invariance to rotation and scale [8]. approach) as a conventional method to compute the E
matrix and Barycentric coordinates and manifold
The interest points detection can be view as a triangular meshes are introduced.
problem to determine the differences between two points
sets, i.e., to find the best transformation between a model
point set and image point set. In other worlds, given a
model point set, find the minimum or maximal value of
distance measures under the transformation in an image
point set. The points sets are usually feature points

E11-1
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

B. Extension of Harris Operator Analysis on 3D


Manifold Triangular Meshes
The interest points detection algorithm on
Barycentric coordinates for 3D manifold triangular
meshes is outlined in Figure 1. Given a vertex of a 3D
manifold triangular meshes object, a Harris operator
value associated with that points are calculated.
The steps of Harris operator extension analysis on
Fig. 1. Block diagram of the interest points detection algorithm on 3D meshes are as follows [6]:
Barycentric coordinates 1. For manifold triangular meshes data, the input of
this research is a set of vertices V 3 and a given
v0 V. The camera digitizer generally produces a
A. Conventional 2D Harris Operator Analysis surface of a 3D object to this input. Thus, this input
The Harris operator has been implemented in huge is reasonably to expect its neighborhood points to
applications in pattern recognition and computer vision sample a continuous surface of intrinsic 2-D space.
because of its efficiency and simplicity. Given a 2D 2. Let a neighborhood of v0 as a subset V V
image function f(x,y), a difference function e(MSE error) constructed of all points v V, obtained by starting
of two neighborhoods including image points p=[x,y]T in v0 and following the edges from the meshes edge
and p+p can be calculated as follows: graph, while the Euclidean distance || v0 - v || r,
where r is constant parameter.
Define a preprocess neighborhood set of points V
e( p , p ) = w (q )( f ( p + q + q ) f ( p + q ))
2 (1) 3.
q
and compute their centroid, then translate it to
[0,0,0]T.
where, q are the points in the Gaussian window function 4. Perform the regression to establish best fitting
W centered on (x,y), which defines the neighborhood plane.
area in the analysis.
5. Rotate the set so that plane normal points to [0,0,1]T
The Taylor expansion truncated to the first order to produce maximum spread (range of coordinates
approximation term shifted the image to obtain: values) is in the 0xy as plane. The set preprocessed
this way will be denoted with V.
6. Compute Harris operator from a given point
w (q ) f x f x w (q ) f fy
e( p , p ) = p q
x neighborhood indexed in 2-D space. The above
T q
p
w (q ) f y f x w (q ) f
q
fy preprocessing allows us to approximate that
q y
indexing on a point set V by using x and y
coordinates.
e( p , p ) = p T Ep (2)
7. Compute and define the derivatives which are
averaged to form matrix E.
where

f f
fx = (p + q) fy = ( p + q ) (3)
x y C. Fitted surface differences as a conventional method
to compute the E matrix.
with the directional first-order derivatives of image A FSD method is FQS approach combined with HD
function are fx and fy , respectively. approach [6]. This method in the state of art, namely the
FQS-HD.
Harris and Stephens applied the eigenvalues to the
matrix E, which consists of enough local information in In the FQS approach computation, a point set V can
conjunction with the neighborhood structure. In the fit a quadratic surface[16]. Derivatives calculation
computational process, to prevent the highly eigenvalue perform to fit a quadratic surface to the set of
calculation, they designed to entrust with each pixel in transformed points. Using least square approach to
the approximation function image the subsequent value: discover a paraboloid of the form:

S (x , y ) =
a 2 c
x + bxy + y 2 + dx + ey + f (5)
h ( p ) = det (E ) k (tr (E ))
2
(4) 2 2

with k is a constant From (5), the directional first-order derivatives of


image function fx and fy are ready to compute.

E11-2
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

f (x , y ) geometric realization is denoted by specifying the


fx = (6)
x x =0
coordinates of the vertices xi R3 for all i V. The
barycentric coordinates can be represented as an N x 3
f (x , y ) (7)
fy = matrix. To acquire the meshes, a piece-wise planar
y y =0 approximation by embedding the triangular faces
together,
Then to apply the integration of the derivatives with a
Gaussian function: T (P ' ) = U
NF
k =1
(
conv p t 1 , p t 2 , p t 3
k k k
) (17)

(
x2 + y2 )
X = nv 2 e 2
. f x (x , y ) dx dy The following Figure 2 depicts any point the meshes
2 2
(8)
R T(P), a manifold can be represented including index k
(
x2 + y2 ) of the triangle enclosing it and coefficients of the convex
Y = nv 2 e 2
. f y ( x , y ) dx dy
2 2
(9)
R
(
x2 + y2 ) (
x = u 1 p t1 + u 2 p t 2 + 1 u 1 u 2 p t 3 ; ) x i [0 ,1] (18)
Z = nv 2 e 2
. f x (x , y ). f y ( x , y ) dx dy
2
(10) k k k

nv =
1 (11) ( )
Vector u = u 1 , u 2 is called Barycentric coordinates.
2

where is a constant and nv is a normalization factor.


Using calculus theorem, the equations of (8) ,(9),
(10) can simplify the expressions to [7]

X = 2 a 2 + 2b 2 + d 2 (12)
Y = 2b 2 + 2 c 2 + e 2 (13)
Z = 2 ab + 2 bc + de (14)
Fig. 2. Barycentric coordinates and manifold triangular meshes
Last, to calculate the matrix E associated with the
points :
III. FITTED QUADRATIC SURFACE COMBINED WITH
X Z
E = (15) HILBERT SCANNING DISTANCE (FQS-HSD) AS A
Z Y PROPOSED METHOD TO COMPUTE THE E MATRIX
Given two finite points sets P {p1, pI} and Q
Because the proposed method use Barycentric {q1, qJ} such that each point p P and q Q, has
Coordinates [17-19], then if the object tessellation is integer coordinates. Firstly, the Hilbert scanning is used
uniform, i.e., almost all triangles in the manifold to convert them to new sets S {s1, sI} and T{t1,
triangular meshes have the same size, this computation tJ} in the 1-D sequence, respectively. Then the directed
can use a constant number of rings to all points, or use HSD from P to Q is computed by
the points contained in a ball of radius r and centered in
points vertices.

( )
The HD approach can compute the E matrix using a
d HSD (P , Q ) =
1 I
weighted average of the derivative 3D manifold
I
i =1 s i t j (17)
triangular meshes data for differents points. It can
perform the distance points between two points sets P
and Q using the difference fitted quadratic surface, where || . || is the Euclidean norm distance in the 1-D
space and function is defined as:


d HD (P , Q ) = max sup inf p q , sup inf p q (16) x (x )
p P qQ q Q p P (x ) = (18)
(x > )
D. Barycentric Coordinates and Manifold Triangular where, is called the threshold elimination function and
Meshes is a the threshold prefined.
The definition of a 3D data structure for boundary Then the directed HSD Q to P hhsd(Q,P) is obtained
representation, such triangular meshes, involves the similarly and HSD is defined by
topological entities coding, with the linked up geometric
information and of a suitable subsets of topological
relationships between such entities. A data structure is H HSD (P , Q ) = max (h HSD (P , Q ), h HSD (Q , P )) (19)
made up of vertices, edges and faces. The faces can be
represented as NF x 3 matrix of indices. The meshes

E11-3
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

For reasons of efficiency running time computation,


a triangular meshes reduction algorithm is applied to
each meshes for Dragon, Rhino, Parasaurolophus,
Buddha, chicken, Chef and T-Rex data sets, resulting in
a reduced meshes with approximately 50000 vertices per
meshes, where Garlands meshes is used for
simplification algorithm [13].

B. Comparison between the number of vertices and


interest points detection

Table I. Comparison between the number of vertices and


interest points detection using the proposed method
(EHO-FQS-HSD)

Fig. 3. 2-D Hilbert scanning (above) and 3-D Hilbert scanning (below)

IV. EXPERIMENTALS RESULTS


This section here describe the experiments
investigating performance of the extension of Harris
The comparison between the number of interest points
operator using EHO-FQS-HSD as a proposed method to
and the number of vertices in each model as shown in
interest points detection on Barycentric coordinates for
Table I. It can be depicted in the table that the number of
3D meshes data. The presentation of results is divided
interest points detection is significantly smaller than the
three parts. First, Comparison between the number of
number of vertices in all 10 surfaces.
vertices and interest points detection using the proposed
method of EHO-FQS-HSD. Second, The experiments
investigates the effect of the parameters on the C. Evaluation methodology
repeatability of interest points. Finally, Comparison the A quantitative evaluation of the repeatability of
proposed method of EHO-FQS-HSD with features extracted from the proposed method in different
EHO-FQS-HD method in the state of art. noisy condition is shown in Figure 5.

A. The data set


This research work on ten data sets which scanned
with the Minolta Vivid 910 scanner. Their data sets are
visualized on figure 4 [14] [15].

Fig. 5. Repeatability of a interest points detection analysis on on


Barycentric coordinates using the proposed method (EHO-FQS-HSD)

The parameter k is used in (4) to calculate the Harris


operator value for a given vertex. This parameter
requires to be adjusted experimentally and modified the
parameter in the range [0.1,0.4].

D. Comparison with other a method


The proposed method of EHO-FQS-HSD for
Fig. 4. The Dataset interest points detection algorithm on Barycentric
coordinates for 3D triangular meshes can be computed
faster than measure EHO-FQS-HD. Figure 6 shows the

E11-4
The 6th Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

running time in the experiment for computing 250 Harris Processing, volume 8, no. 7, pp. 964973, July 1999.
operator values. The noise which is used in the (references)
experiment is 1 to 7 and the has mean Gaussian noises [2] Harris, C., and Stephens, M., A combined corner and edge
detection, In: Proceeding of The Fourth Alvey Vision
from 0 to 100. Conference, pp. 147151, 1988.
[3] A.S. Mian, M. Bennamoun and R. Owens, A novel
representation and feature matching algorithm for automatic
pairwise registration of range image, International Journal of
Computer Vision. Copyright Springer Verlag. vol. 66, no. 1, pp.
19-40, 2006.
[4] A.S. Mian, M. Bennamoun and R. Owens, 3D model-based
object recognition and segmentation in cluttered scenes, IEEE
Transaction in Pattern Analysis and Machine Intelligence, vol.
28, no. 10, pp. 15841601, 2006.
[5] B. Taati, M. Bondy, P. Jasbedzki, and M. Greenspan, Variable
dimensional local shape descriptors for object recognition in
range data, In: Proceedings of International Conference on
Computer Vision 2007 3D Representation for Recognition
(3DRR), October 2007.
[6] Glomb, P., Detection of interest points on 3D data : extending
the Harris operator, In: Computer Recognition System 3.
Advances in Soft Computing, vol. 57, pp. 103-111. Springer,
Fig. 6. Comparison the proposed method (EHO-FQS-HSD) with Berlin, 2009.
method in the state of art, namely the Extension of Harris [7] Sipiran, I. and Bustos, B., Harris 3D: a robust extension of the
operator-Hausdorff distance (EHO-FQS-HD) for computing 250 Harris operator for interest point detection on 3D meshes, The
Harris operator values Visual Computer vol. 27, no. 11, pp. 963-976, 2011.
[8] Schmid, C., Mohr, R. and Bauckhage, Evaluation of interest
V. CONCLUSIONS point detectors, International Journal of Computer Vision.
Copyright Springer Verlag. vol. 32, no. 2, pp. 151-172, 2000.
In this paper, the interest points detection analysis on 3D [9] Vincent, E., and Laganiere, R., Detecting and matching feature
triangular meshes using extension of Harris operator points, Journal of Visual communication and Image
representation. volume 16, pp. 38-54, 2005.
combined with fitted quadratic surface (FQS) approach
[10] Moreels, P. and Perona, P., Evaluation of features detectors and
and Hilbert scanning distance (EHO-FQS-HD) is descriptors based on 3D objects, International Journal of
proposed. Computer Vision. Copyright Springer Verlag. volume 73, no. 3,
Our major contribution is the Hilbert scanning pp. 263-284, 2007.
distance application on interest points detection [11] G. Rote, Computing the minimum Hausdorff distance between
two points sets on a line under translation, Inf. Process. Lett.,
algorithm. volume 38, pp. 123-127, 1991.
We demonstrated the speed and accuracy of this [12] D.P. Huttenlocher, G.A. Klanderman, and W.J. Rucklidge,
algorithm in the presence of noise. That is to say, for Comparing images using the Hausdorff distance, IEEE
computing 250 Harris operator values the proposed fast Transaction in Pattern Analysis and Machine Intelligence, vol.
EHO-HSD is 5 10 times faster. Comparison with the 15, no. 9, pp. 850863, 1993.
[13] Garland, M., and Heckbert, P.S., Surface simplification using
conventional algorithm EHO-FQS-HD [6], our proposed quadric error metrics, In: SIGGRAPH, pp. 209216, 1997.
algorithm of EHO-FQS-HSD is superior. [14] (2010, Jan.) Queens Range Image and 3-D Model Database.
The future studies will aim at extending the [Online]. Available:
application fields, not just in matching objects, but also http://rcvlab.ece.queensu.ca/qridb/QR3D/DatabasePagexyz.htm
in 3D registration and recognition objects. l, 2009
[15] (2010, Jan.) Database for 3D object recognition in cluttered
scenes. [Online]. Available: http://www.csse.uwa.edu.au/
ACKNOWLEDGMENT ajmal/recognition.html
We would like to acknowledge: A.S. Mian dataset [16] Z.L. Cheng and X.P. Zhang, Estimating differential quantities
from the University of Western Australia and B. Taati from point cloud based on a linear fitting of normal vectors,
Journal of Science in China Series F: Information Sciences, vol.
Queens Range Image for providing 3D model range 52, no. 3, pp. 431444, 2009.
data. This research is sponsored and supported by [17] T. Tibyani and S. Kamata, Registering 3D objects triangular
Indonesian Government Scholarship (Beasiswa Luar meshes using an interest point detection on Barycentric
Negeri DIKTI-Kementerian Pendidikan dan coordinates, In: IEEE/OSA/IAPR International Conference on
Kebudayaan Republik Indonesia) Informatics, Electronics and Vision 2012 (ICIEV12), Dhaka,
Bangladesh, 18-19 May 2012.
[18] Bottema, O. On the area of a triangle in Barycentric
REFERENCES coordinates, Crux. Math. 8, 228-231, 1982.
[19] Coxeter, H. S. M. Barycentric Coordinates. in Introduction to
[1] S. Kamata, R.O. Eason, and Y. Bandou, A new algorithm for Geometry, 2nd ed, New York: Wiley, pp. 216-221, 1969.
N-dimenstional Hilbert scanning, IEEE Transaction on Image
[20]

E11-5
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

Generating Security Keys from Combination of


Multiple Biometric Sources
Primantara Hari Trisnawan
Computer Sciences, University of Science Malaysia
prima_at_ub@yahoo.com

Abstract Biometric is a personal information and is systems. It is more and more difficult to remember so
supposed to be unique. Biometric information can be lengthy passwords. Otherwise, by keeping the same
obtained generally from finger print or palmprint, iris, password for all systems, their passwords are prone to be
voice, or face by using such instrument and methods with
vulnerable. Moreover, some systems may even prevent
appropriate algorithms to read their raw information.
Each of biometric sources typically results in biometric people from keying the incorrect passwords in a certain
information which are different from one person to times, such as accessing a banks ATM.
another. By combining multiple biometric information Biometric is individual information and is considered
with considering security aspects, it is convincingly able unique. It is unlikely that two people have the same
to generate stronger key combinations. The key identical biometric, even for twin people. Biometric
generation is conducted by combining two or more
information can be taken from such sources as finger
biometric information with an algorithm of Longest
Common Sequences. The complexity of the number of print, palm print, iris, voice, and face. Generating key not
new combinations resulting from various combination of only includes digitizing from a biometric source, but it
two or more biometric sources is O(n2). By applying to also minimizes errors [1][2]. A single biometric has
some extent of the hamming distances between the various key lengths [1][6][7] depending on the methods.
database keys and the combination keys, the Never the less, in fact, some biometric information could
combination keys are acceptable and applicable in the use
for cryptography system.
meet a theft problem. They could be duplicated easily. A
solution to this problem and still keeping people with
Index Terms biometric, cryptography, key many keys is by using combination of biometric data.
generations, longest common sequences, combination of People are still able to have many keys without the need
multiple biometric sources. of memorizing various keys they might use. In order to
reduce, if not eliminate, this duplication problem by un
I. INTRODUCTION authorized people, combinations of biometric data are
applied to produce different but still secure unique keys.

I N recent years, the widely use of digital data and Combining data from multiple sources operates methods
data communication enabling people to deliver or algorithms and it results in various keys. By doing such
digital data among them dramatically increase. combination, it may lead to reducing percentage errors as
Obviously, digital data traversing communication media well.
are unsaved and easily eavesdropped. It is also supposed The methods in combining biometric keys to produce
to that private and personal digital data are frequently stronger unique keys are provided, such as concatenating
misused by non authenticated people. For this reasons, keys, adding keys and using Longest Common
people require an equipment to save their data or an Subsequences of keys. The first two methods will not
authentication tools of which their data are surely their reduce the errors nor keeping the length the same. The
own data. Hence, it is a need of cryptography which has last method can be considered good, as by using longest
capability of providing these requirements. common sequences bits which are the same in the
Meanwhile, people are likely to use their different sequence are preserved, whereas the not same bits in the
passwords for accessing different systems. In general, the sequence are omitted.
passwords are relatively simple and short in order to There can be error bits existing in original biometric
easily remember the passwords. For example, a user keys, which but are kept as low as possible. These error
employs one password (or key or account) to log into a bits are possibly measured as input for the combination
computer, and employs another password he/she has to process. The other thing is that there is a need to keep the
access building system. Thus, it would be difficult for key length not more than the shortest original keys, as
them to remember many passwords to corresponding quite short keys are easily broken by cryptanalysts using

E12-1
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

such brute force algorithm [3]. [2]. Reducing error, in particular background noise as
If new keys resulted from this combination is to be proposed by [1] [2] was based on Hadamard transform
applied in encryption and decryption which operates the [10] (also called as Hadamard Code) which encodes
exactly same keys without any tolerances, it may lead to a (k+1) bits into 2k bits. Meanwhile, reducing burst error as
problem. It is because the combination key must be used by [1][2] was based on Reed Solomon, whose
exactly the same as the key in data base. Nevertheless, feature is that two information can be added together with
if the keys are for digital signature and allowing to some the length of n without reducing the distance [11]. Fig 2
extent of hamming distance, it would be greatly shows the process of biometric binaries into biometric
acceptable and applicable properly. information with applying both mechanisms.
The main focus of this research is to compare methods
to combine various keys with different length. It also
includes how the algorithm is built with number of
generated biometric keys into new key combinations.
However, it should be kept in mind that newly combined
keys must be long enough in order to avoiding the keys Fig 2. Biometric Information Process.
from being breakable.
However, based on some research works as in
[1][2][6][7] and [9], biometric information have been
II. PREVIOUS WORK obtained with various bit lengths. These bit length
comparisons are shown in following table.
Biometric sources are taken from part of human body.
These sources include face [1], iris [7], fingerprint [6] or Table 1. Comparison of Biometric Information Sources
palm print, and voice [9]. Examples of sources are shown Biometric Source Bit Lengths FAR1 FRR2
in Fig1. Face [1] 240 bits - 28%
Iris [2][7] 140 bits 0,005% 0,235%
Fingerprint [6] 73 bits - 1%
Voice [9] 46 bits - 20%

Table 1 shows that some researches result in various


key lengths with different error rates. In general, most of
those researchers relied on the FRR rather than FAR,
which meant that it was related to the percentage of
Fig 1. Biometric Sources
authentic persons keys which should be accepted by the
system, but the keys were rejected. In practical
Voice biometric is extracted from digitized voice
application, a prominent reference says that an accepted
frequency [9]. Compared voice biometric to other three
value of FRR should be less then 20% [13], which is
kinds of biometric sources, the voice biometric is
argued by [1] that FRR at about 20-30% is still
considered not stable as the users voice has to remember
acceptable.
and maintain the same word and the same pace he/she
Based on Table 1, biometric sources produce different
utters. The three kinds of biometric information do not
key lengths. Voice only generates 46 bits [9], which is
require the owner to do anything, but he/she just presents
considered too short and breakable by about 70 seconds3
his/her part of body for being scanned to obtain the
[3]. Whereas, the finger print with 73 bits [6] is breakable
biometric information. However, for technical point of
in about 300 years. Therefore, biometric information with
view, the voice biometric generation is simpler than other
the keys more than 73 bits can be considered secure.
three biometric generations. The voice is ready in a form
In addition, an other research [8] applies entropy
of frequency signal, whereas the others are recognizable
analysis to reach the optimal security which is related to
in a certain pattern, such as circle, oval, bending line, etc.
Nevertheless, instead of four biometric information, there
1
are about 2 or 3 more biometric sources with few FAR stands for false acceptance (error) rate, determine an
references but not in profound explanation, including percentage of error rate at which an unauthentic person is accepted as
an authentic person. [http://www.cccure.org/Documents/HISM/039-
gait, key stroke and signature. 041.html]
After digitizing biometric sources into binaries, the 2
FRR stands for false rejection (error) rate, which a percentage of
resulted signals are processed to remove some errors. The error rate to determine at which an authentic person is rejected as
invalid person [http://www.cccure.org/Documents/HISM/039-
modern tools the researchers use include reducing error 041.html].
due to background noise, and reducing burst errors [1] 3
It is based on the time required to execute 106 decryptions per s.

E12-2
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

biometric template [8]. This entropy, based on Shannons III.1 Longest Common Subsequence (LCS)
entropy [12] which quantifies with regard to expected Longest Common Subsequence is to find common sub
value, measures the uncertainty regarding a random sequences from (usually two) groups of sequences. Given
sample. A biometric information source as a key sequence in X and in Y [4], and will result in LCS5. The
(comprising bits) is read many times to minimize the rule is illustrated as follows.
uncertainty of the key.
To sum up, most biometric sources, except voice,
provide appropriate key length which is suitable for
modern cryptography system. With FRR is less than 30%,
the biometric key is still acceptable.
This algorithm will show that for starting, cells in 0th
row and cells in 0th column are with value of 0. Value of
III. ALGORITHMS other cells depends on whether there is a commonness of
a character between two groups of sequences.
III.1 Strings (Bits) Matching The algorithm for LCS is composed of two main
methods. The first method, namely LCSLength(), is to
There are some algorithms or methods about how two
memo the common sub sequence characters from string X
groups of strings (or groups of bits) are to match and join
and string Y. It is precisely to mark the common character
together. The algorithms include concatenation [4],
in both sub sequences with the incremented value (in
adding two value of strings (bits) and string matching in
integer). This method is as follows.
particular using longest common subsequences [4]. The
concatenation of two group of string S1 and S2 with function LCSLength(X[1..m], Y[1..n])
length of L1 and L2 respectively, will result in a new C = array(0..m, 0..n)
string of S1 adjacently followed by S2 with the total for i := 0..m
C[i,0] = 0
length of an addition of L1 and L2. The second approach
for j := 0..n
is based on addition value, such as in ASCII4, of each C[0,j] = 0
character (or bit) of first group with value of each for i := 1..m
character (or bit) of the other group at corresponding for j := 1..n
if X[i] = Y[j]
position. This will result in another string (represented by C[i,j] := C[i-1,j-1] + 1
the resulted value) with at most length of either (L1 + 1) else:
or (L2 + 1). The last method is to match sub sequences of C[i,j] := max(C[i,j-1], C[i-1,j])
first group into sub sequence of second group, or vice return C[m,n]

versa. The result is a sub sequence of string too, whose


length is at most the same as the length of the shorter The second method, namely backTrace(), is to read out
string. the content which has been saved by in a variable which
Each of three methods has advantages and mark the same character in both groups in previous
disadvantages. The first method makes the key length is method.
longer. If the key is sufficiently long regarding to
function backTrace(C[0..m,0..n], X[1..m], Y[1..n], i, j)
security, the longer key will not be important. The second if i = 0 or j = 0
method produces the key with highly possibility of not the return ""
same (part of sub sequence of) the original keys. else if X[i] = Y[j]
return backTrace(C, X, Y, i-1, j-1) + X[i]
However, by addition two groups of string (or bits), other
else
operation in addition of other groups possibly makes the if C[i,j-1] > C[i-1,j]
same result. The final method make the key length return backTrace(C, X, Y, i, j-1)
relatively short and the key is part of string (or bit) sub else
return backTrace(C, X, Y, i-1, j)
sequence of the original keys. Hence, the third method is
likely to be implemented in generating keys from multiple
biometric sources. With combination keys taken by using III.2. Hamming Distance
this method will create much stronger combination key Hamming distance in 1950 as stated in [5] describes
than the previous method.. The Hamming distance between two n-tuples X and Y,

5
Longest Common Subsequences is of dynamic programming.
4
ASCII stands for American Standard Code for Information Dynamic programming is not actually related to programming, but is
Interchange, which is a character encoding based on the English related to creating a table whose cells are filled with value according to
alphabet. some rules[4].

E12-3
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

denoted by D(X, Y), is defined as the number of positions


in which the two words differ. This algorithm is simply
IV.2. Input Selection and LCS Output
by XOR-ing two groups of bits with the same length, and
then calculating the number of bit 1. The number of bit-1 With n input from biometric sources, two or more (or
means the number of bit difference in two group of bits. up to n) combination can be performed. The chosen
This can evaluate the difference between key recorded in combination is corresponding to such selector. Therefore,
database and key obtained from biometric information. the number of selector is the same as the number of input.
This selector with LCS output is shown in Figure 3.

IV. COMBINATIONS OF MULTIPLE BIOMETRIC


INFORMATION

IV.1. Combinations
In this research, multiple biometric information as keys
are combined in such a way to generate other keys. The
combination is merely based on mathematic formula; that
is combination. Combination formula is
n!
C kn =
k!(n k )!

where :
n : number of a set of n biometric information
k : number of k biometric information of a set of n.

Combining a number of n biometric information, in


this research, does not implement k = 0 and k = 1. A
number of k = 0 means that there is no key being
combined and thus generated. Whereas k = 1 means that
there is only single member in combination. Hence, the
total number of combinations regardless k = 0 and k = 1, Fig 3. Selector for n Input with Output from LCS
are
Assume that the selector operates on bit value. Each
n selector is active when its bit value is 1. To provide
Ctotal = C kn C 0n C1n combination with at least two input selected, the number
k =0
of bit 1 in set of selector has to be at least two, as well.
n
The output of AND is as input if the selector is active (bit
= C kn 1 n 1), whereas the output of AND is open circuit (not bit
k =0
0), if the the selector is in active (bit 0). All of
= 2n 1 n combination outputs from AND gates go to LCS
operation. In stead of processing LCS algorithm, LCS
where : Ctotal : total number of all possible block has a memory to hold all inputs coming from AND
combinations gates, temporary result and final result. The final result is
Therefore, in the formula, it shows that the complexity the generated key from multiple biometric information.
of Ctotal is still O(2n).
With regard to LCS which only performs combination
of two groups of string (or bit). Thus, for m input IV.3. Design of Implementation
combination, can be done in step by step combination, as To implement this proposed design, it needs to
follows considered two main implementation designs. The first is
LCS = I1 I2 I3 I4.. Im for generating keys by combining multiple biometric
= ((((I1 I2 )I3 )I4 .) Im sources then recording the biometric information keys,
while the other for application to which a user
With the regard to security, LCS should have authenticates his/her biometric sources with the recoded
appropriate length. It is supposed that the difference biometric information. It is to be consider that the
between two groups of keys are not wide. biometric information for inputs to this design have been

E12-4
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

refined from what some past works have produced as in V. DISCUSSION


[1][2][6][7] and [9].
IV.3.1. Recording Design In combining of multiple biometric information, it is
assumed that the biometric information as input for
In this stage, key combinations generated from multiple
generating multiple keys have been committed in past
biometric information are recorded and stored in a
researches and have been valid with such keys bit
database with a specific tuple of parameter. Every tuple
length, FAR and FRR. Thus, this research is merely
consists of value of selectors, and value of combination
related to how biometric information are combined
key corresponding to the selector.
together with consideration of security, which is key
Tuple = {selector value, combination key}
length. The key resulted from combination will have its
length about the shorter input biometric information key.
The diagram for recording design as this Fig 4.
The chosen combination can be selected using selector
value (in bit) to activate or pass the biometric input into
LCS block.
In recording implementation, it only needs to record
combination with related selector, then saves its result
together with the selector value into a tuple for the
database. In application, it needs additional block to
control which biometric information combination to be
selected based on a tuple, and compares the generated
combination with the combination key saved in this tuple.
The comparison of both generated combination key
Fig 4. Recording Combination of Multiple Biometric taken from a user and combination key in a corresponding
tuple is likely not to precisely the same, but with applying
such hamming distance, the comparison of both keys can
IV.3.1. Application Design be considered the same or valid.
In application design, a user authenticates his/her
biometric. It needs his/her part of body be presented to
instrument for accessing his/her biometric information. VI. CONCLUSION
The system will activate the selector to read the
combination and then compare its value with those in To conclude, the multiple key generation can be
database. The illustration is as this. implemented to the system which supports reading multi
biometric sources. The system can be implemented in
addition to systems which have been built by some
researches in the past works. Key generation from
multiple biometric sources can be implemented well. As
the key is a form of multiple biometric sources which
have to present at the same time, it is convinced that the
key is stronger than only single biometric source.
However, it may be suggestion to improve this system
with regard to keeping the length not less then the shortest
biometric keys when using LCS. This for example is by
repeating the bits or padding the bits.
Fig 5. Application for User Autentication.

The selector is activated by value a tuple from


ACKNOWLEDGMENT
database, then the output of the selector is compared with
the keys in the tuple. By using hamming distance, the
distance between these values are calculated. If the This research is acknowledged by Assoc. Prof. Dr.
distance is less than the defined distance (for tolerance), Azman Samsudin for Computer Security and
then the biometric keys are considered to be valid. Cryptography, at Computer Science in USM.

E12-5
th
The 6 Electrical Power, Electronics, Communications, and Informatics International Seminar 2012
May 30-31, Brawijaya University, Malang, Indonesia

REFERENCES [8] Jovan Dj. Golic and Madalina Baltatu, Entropy Analysis and
New Constructions of Biometric Key Generation Systems, IEEE
[1] B. Chen and V. Chandran, Biometric Based Cryptographic Key Transactions On Information Theory, Vol. 54, No. 5,, May 2008.
Generation from Faces, IEEE 2007 [9] Fabian Monrose, et al., Cryptographic Key Generation from
[2] Hao, F., Anderson, R., Daugman, J., Combining Cryptography Voice, In Proceedings of the 2001 IEEE Symposium on Security
With Biometrics Effectively, Technical Report UCAM-CL-TR- and Privacy, May 2001.
640, University of Cambridge, 2005. [10] M. Kunt, "On Computation of the Hadamard Transform and the R
[3] W. Stalling, Cryptography and Network Security: Principles and Transform in Ordered Form," IEEE Transactions on Computers,
Practices, 4th ed., Printice-Hall inc, 2006. vol. 24, no. 11, pp. 1120-1121, Nov., 1975
[4] S. Dasgupta, C. H. Papadimitriou, and U. V. Vazirani, [11] Reed, I. S. and Solomon, G., Polynomial Codes Over Certain
Algorithms, July 18, 2006. Finite Fields, SIAM Journal of Applied Math., vol. 8, 1960, pp.
[5] B. Bose, T.R.N. Rao, "Theory of Unidirectional Error 300-304.
Correcting/Detecting Codes," IEEE Transactions on Computers, [12] I.J. Taneja, Generalized Information Measures and Their
vol. 31, no. 6, pp. 521-530, Jun., 1982 Applications , 2001,
[6] Ulrike Korte, et. Al, A cryptographic biometric authentication http://www.mtm.ufsc.br/~taneja/book/node1.html
system based on genetic fingerprints, 2007, [13] U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, Biometric
http://www.secunet.de/fileadmin/Downloads/Englisch/Sonstiges/s cryptosystems: issues and challenges, Proceedings of the IEEE,
ecunet_Fachartikel_BioKey.pdf. Vol. 92, No. 6, pp. 948960, 2004
[7] Padma Polash Paul, and Md. Maruf Monwar, Human Iris
Recognition for Biometric Identification, IEEE, 2007.

E12-6
GRATITUDE

WE WOULD LIKE TO THANKS TO ALL THAT DESCRIBED BELOW WHO HAVE GIVEN US INVALUABLE SUPPORTS
AND PARTICIPANTIONS

RECTOR OF BRAWIJAYA UNIVERSITY


COMPUTER SCIENCE, UNIVERSITY OF SCIENCE MALAYSIA
GRAD. SCHOOL OF INFORMATION, PRODUCTION AND SYSTEM, WASEDA UNIVERSITY, JAPAN
UNIVERSITAS PEMBANGUNAN NASIONAL BABARSARI TAMBAKBAYAN YOGYAKARTA
FACULTY OF ENGINEERING, UNIVERSITY OF WOLLONGONG, NSW, AUSTRALIA.
ELECTRICAL AND ELECTRONIC ENGINEERING OF UNIVERCITY OF MIYAZAKI
FAKULTAS TEKNIK, UNIVERSITAS BRAWIJAYA
POLITEKNIK NEGERI BENGKALIS
POLITEKNIK NEGERI AMBON
POLITEKNIK PEMBANGUNAN NASIONAL BANJARBARU
BADAN PENGKAJIAN DAN PENERAPAN TEKNOLOGI (BPPT)
UNIVERSITAS GAJAYANA MALANG
UNIVERSITAS SEMARANG
FAKULTAS SAINS DAN TEKNOLOGI UNIVERSITAS AL-AZHAR JAKARTA
UNIVERSITAS ISLAM NEGERI SUSKA RIAU
INSTITUT TEKNOLOGI SEPULUH NOPEMBER (ITS)
POLITEKNIK NEGERI SAMARINDA
PUSAT SAINS ANTARIKSA LEMBAGA PENERBANGAN DAN ANTARIKSA NASIONAL (LAPAN)
ELECTRICAL ENGINEERING DEPARTMENT, FACULTY OF ENGINEERING, MERCU BUANA UNIVERCITY
FAKULTAS TEKNIK UNIVERSITAS MURIA KUDUS
FAKULTAS TEKNOLOGI INFORMASI DAN KOMUNIKASI, UNIKOM, BANDUNG
PT. SUPRA ALUMINIUM INDUSTRI (SAI) PANDAAN-PASURUAN
UNIVERSITAS TRUNOJOYO MADURA
UNIVERSITAS JENDERAL AHMAD YANI, CIMAHI
POLITEKNIK NEGERI BATAM
FAKULTAS MIPA UNIVERSITAS INDONESIA
PETRA CHRISTIAN UNIVERSITY, SURABAYA
FACULTY OF MECHANICAL AND AEROSPACE ENGINEERING, INSTITUT TEKNOLOGI BANDUNG
SCHOOL OF ELECTRICAL ENGINEERING AND INFORMATICS, INSTITUT TEKNOLOGI BANDUNG
INSTITUT TEKNOLOGI TELKOM, BANDUNG
FAKULTAS TEKNIK, UIVERSITAS BRAWIJAYA
FAKULTAS TEKNIK, UNIVERSITAS DARMA PERSADA, JAKARTA
POLITEKNIK ELEKTRONIKA NEGERI SURABAYA ITS
UNIVERSITAS ISLAM SULTAN AGUNG (UNISSULA), SEMARANG
FAKULTAS SAINS DAN TEKNOLOGI, UIN SYARIEF HIDAYATULLAH, JAKARTA
FAKULTAS TEKNIK, UNIVERSITAS BHAYANGKARA, SURABAYA
FAKULTAS TEKNIK UNIVERSITAS INDONESIA
POLITEKNIK NEGERI KUPANG
POLITEKNIK NEGERI MALANG
UNIVERSITAS ISLAM MALANG
UNIVERSITAS NEGERI MALANG
INSTITUT TEKNOLOGI BANDUNG
FAKULTAS TEKNIK UNIVERSITAS SULTAN AGENG TIRTAYASA CILEGON BANTEN
UNIVERSITAS GADJAH MADA YOGYAKARTA
CENTER FOR TECHNOLOGY OF RADIATION SAFETY AND METROLOGY,
NATIONAL NUCLEAR ENERGY AGENCY OF INDONESIA
LABORATORIUM SISTEM BERBASIS KOMPUTER TEKNIK ELEKTRO UNIVERSITAS HASANUDDIN
LABORATORIUM TEKNIK KOMPUTER DAN JARINGAN, POLITEKNIK NEGERI UJUNG PANDANG
POLITEKNIK NEGERI BALIKPAPAN
UNIVERSITAS MA CHUNG
STIMIK STIKOM BALI
FAKULTAS KEDOKTERAN UNIVERSITAS BRAWIJAYA
CENTER OF SATELLITE TECHNOLOGY, INDONESIAN INSTITUTE OF AERONAUTICS AND SPACE

AND OTHERS....

S-ar putea să vă placă și