Proceedings

2018 5th International Conference on Information Technology, Computer and Electrical (ICITACEE 2018)

‡’–‡„‡”ʹ͸Ȃʹͺ–ŠǡʹͲͳͺǡ‡ƒ”ƒ‰ǡ †‘‡•‹ƒ

                 †‹–‘”ǣ

‘ Šƒƒ† ƒ –ƒ

—ƒ™ƒ”‰—•‹›ƒ†‹

‘‹†‹‹†‹ƒ–‘

Ǥ”ˆƒ

iii

Proceedings

2018 5th International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE 2018)  ‘’›”‹‰Š–ƒ†‡’”‹–‡”‹••‹‘ǣ„•–”ƒ –‹‰‹• ’‡”‹––‡†™‹–Š ”‡†‹––‘–Š‡•‘—” ‡Ǥ ‹„”ƒ”‹‡•ƒ”‡’‡”‹––‡†–‘’Š‘–‘ ‘’›„‡›‘†–Š‡Ž‹‹–ǤǤ ‘’›”‹‰Š–Žƒ™ˆ‘”’”‹˜ƒ–‡—•‡ ‘ˆ’ƒ–”‘•–Š‘•‡ƒ”–‹ Ž‡•‹–Š‹•˜‘Ž—‡–Šƒ– ƒ””›ƒ ‘†‡ƒ––Š‡„‘––‘‘ˆ–Š‡ˆ‹”•–’ƒ‰‡ǡ ’”‘˜‹†‡† –Š‡ ’‡”Ǧ ‘’› ˆ‡‡ ‹†‹ ƒ–‡† ‹ –Š‡ ‘†‡ ‹• ’ƒ‹† –Š”‘—‰Š ‘’›”‹‰Š– Ž‡ƒ”ƒ ‡ ‡–‡”ǡ ʹʹʹ ‘•‡™‘‘† ”‹˜‡ǡ ƒ˜‡”•ǡ  Ͳͳͻʹ͵Ǥ ‘” ”‡’”‹– ‘” ”‡’—„Ž‹ ƒ–‹‘ ’‡”‹••‹‘ǡ‡ƒ‹Ž–‘ ‘’›”‹‰Š–ƒƒ‰‡”ƒ–’—„•Ǧ’‡”‹••‹‘•̷‹‡‡‡Ǥ‘”‰ǤŽŽ”‹‰Š–• ”‡•‡”˜‡†Ǥ  ‘’›”‹‰Š–̹ʹͲͳͺ„›    Publisher: ‡’ƒ”–‡–‘ˆŽ‡ –”‹ ƒŽ‰‹‡‡”‹‰ ‹’‘‡‰‘”‘‹˜‡”•‹–›    ǣͻ͹ͺǦͳǦͷ͵ͺ͸Ǧͷͷʹ͹Ǧ͸ȋ ǡƒ”–—„‡”ǣ ͳͺͺͻǦȌ ǣͻ͹ͺǦͳǦͷ͵ͺ͸ǦͷͷʹͺǦ͵ȋǡƒ”–—„‡”ǣ ͳͺͺͻǦȌ ǣͻ͹ͺǦͳǦͷ͵ͺ͸ǦͷͷʹͻǦͲȋ ǡƒ”–—„‡”ǣ ͳͺͺͻǦȌ    ††‹–‹‘ƒŽ ‘’‹‡•ƒ›„‡‘”†‡”‡†–‘ǣ ‡’ƒ”–‡–‘ˆ‡Ž‡ –”‹ ƒŽ‰‹‡‡”‹‰ ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ ŽǤ”‘ˆǤ Ǥ‘‡†ƒ”–‘ǡǤ Ǥǡ‡„ƒŽƒ‰ ‡ƒ”ƒ‰ǡ †‘‡•‹ƒͷͲʹ͹ͷ

iv

Greetings from the General Chair

 –Š‡ƒ‡‘ˆŽŽƒŠǡ‘•– ”ƒ ‹‘—•ǡ‘•–‡” ‹ˆ—Ž  ‡™‘—Ž†Ž‹‡–‘™‡Ž ‘‡‘—” ‘ŽŽ‡ƒ‰—‡•–‘ƒ––‡†–Š‡ͷ–Š –‡”ƒ–‹‘ƒŽ‘ˆ‡”‡ ‡‘ ˆ‘”ƒ–‹‘‡ Š‘Ž‘‰›ǡ‘’—–‡”ǡƒ†Ž‡ –”‹ ƒŽ‰‹‡‡”‹‰ʹͲͳͺȋ  ʹͲͳͺȌ‹ ‡ƒ”ƒ‰Ȃ †‘‡•‹ƒǤ  Š‡ͷ–Š  ʹͲͳͺŠƒ•ƒ–Š‡‡Dz ”‡‡‡ Š‘Ž‘‰›ƒ†ƒ”–˜‹”‘‡–ˆ‘”ƒ ‘‡ –‡†‘”Ž†DzǤŠ‹•ˆ‘”—’”‘˜‹†‡•”‡•‡ƒ” Š‡”•ǡƒ ƒ†‡‹ ‹ƒ•ǡ’”‘ˆ‡••‹‘ƒŽ•ǡƒ† •–—†‡–• ˆ”‘ ˜ƒ”‹‘—• ‡‰‹‡‡”‹‰ ˆ‹‡Ž†• ƒ† ™‹–Š —Ž–‹†‹• ‹’Ž‹ƒ”›™‘”‹‰‘” ‹–‡”‡•–‡† ‹ –Š‡ ˆ‹‡Ž† ‘ˆ ’‘™‡” •›•–‡•ǡ –‡Ž‡ ‘—‹ ƒ–‹‘ǡ ˜‡Š‹ —Žƒ” –‡ Š‘Ž‘‰‹‡•ǡ ‘–”‘Ž•ǡ ‹ˆ‘”ƒ–‹‘ ƒ† ‘’—–‡” –‡ Š‘Ž‘‰‹‡• ƒ• ™‡ŽŽ ƒ• ”‡‡ ’’Ž‹ ƒ–‹‘• ƒ† –‡”†‹• ‹’Ž‹ƒ”›‘’‹ –‘•Šƒ”‡ƒ†–‘•Š‘™–Š‡‹”™‘”•ƒ†‘˜‡Ž–›–‘–Š‡™‘”Ž†Ǥ  ™‘—Ž†Ž‹‡–‘‡š’”‡••›Š‡ƒ”–›‰”ƒ–‹–—†‡–‘–Š‡‡›‘–‡•’‡ƒ‡”•ƒ†ƒŽŽ’ƒ”–‹ ‹’ƒ–• ˆ‘” ‘‹‰ǡ•Šƒ”‹‰ƒ†’”‡•‡–‹‰›‘—”‡š’‡”‹‡ ‡•‹–Š‹•‰”‡ƒ– ‘ˆ‡”‡ ‡ǤŠ‡”‡ƒ”‡ ‘”‡–Šƒͳ͵Ͳ’ƒ’‡”••—„‹––‡†–‘  ʹͲͳͺˆ”‘ͺ ‘—–”‹‡• ‘ˆ͸ ‘–‹‡–•ǡ Š‘™‡˜‡”‘Ž›͹Ͷƒ—• ”‹’–•ƒ•Š‹‰ŠǦ“—ƒŽ‹–›•‡Ž‡ –‡†’ƒ’‡”•ƒ”‡”‡ ‘‡†‡†–‘„‡ ƒ ‡’–‡†ƒ†’”‡•‡–‡†‹–Š‹• ‘ˆ‡”‡ ‡ǡ•‘‹–‹•‹Ž‹‡™‹–Š‘—”ƒ‹–‘‹’”‘˜‡–Š‡ “—ƒŽ‹–›‘ˆƒ—• ”‹’–•–‘„‡‡š Ž—•‹˜‡Ž›‹ Ž—†‡†‹–Š‡’”‘ ‡‡†‹‰ƒ†•—‰‰‡•–‡†–‘™‡ŽŽǦ ‘™ ‹–ƒ–‹‘ƒ Š‹‡‹Ǥ‡Ǥ š’Ž‘”‡Ǥ‡ƒ”‡–Šƒˆ—Ž–‘ƒŽŽ–Š‡‹–‡”ƒ–‹‘ƒŽ”‡˜‹‡™‡”• ƒ†•–‡‡”‹‰ ‘‹––‡‡ˆ‘”–Š‡‹”˜ƒŽ—ƒ„Ž‡™‘”Ǥ  ‹–Š‘—– ‘—” ‘—–•–ƒ†‹‰ ‘‹––‡‡ǡ –Š‹• ’”‡•–‹‰‹‘—• ‘ˆ‡”‡ ‡ ™‘—Ž† Šƒ˜‡ „‡‡ ‹’‘••‹„Ž‡ǡ •‘  ™‘—Ž† Ž‹‡ –‘ ‡š–‡† › •‹ ‡”‡ ‰”ƒ–‹–—†‡ –‘ ƒŽŽ ‘‹––‡‡• ƒ† ˜‘Ž—–‡‡”• ˆ”‘ ‡’ƒ”–‡– ‘ˆ Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ƒ† ‡’ƒ”–‡– ‘ˆ ‘’—–‡” ‰‹‡‡”‹‰ǡ‹’‘‡‰‘”‘‹˜‡”•‹–›ˆ‘”’”‘˜‹†‹‰‡™‹–Š— Š‡‡†‡†•—’’‘”–ǡƒ†˜‹ ‡ǡ ƒ† ƒ••‹•–ƒ ‡ ‘ ƒŽŽ ƒ•’‡ –• ‘ˆ –Š‡ ‘ˆ‡”‡ ‡Ǥ  •’‡ ‹ƒŽ –Šƒ• ˆ‘”  †‘‡•‹ƒ ‡ –‹‘ ˆ‘” –Š‡ –‡ Š‹ ƒŽ ‘Ǧ•’‘•‘”•Š‹’ †—”‹‰ –Š‡ ‘ˆ‡”‡ ‡Ǥ ‡ †‘ Š‘’‡ –Šƒ– –Š‹• ‡˜‡–™‹ŽŽ•–”‡‰–Š‡–Š‡ ‘ŽŽƒ„‘”ƒ–‹‘ƒ‘‰—•‘™ƒ†‹–Š‡ˆ—–—”‡Ǥ  ‡ ™‹•Š ›‘— ƒŽŽ ˆ‹† ‘’’‘”–—‹–› –‘ ‰‡– ˆ”—‹–ˆ—Ž ƒ† ”‡™ƒ”†‹‰ †‹• —••‹‘ ƒ† ‡™ ‹–‡ŽŽ‡ –—ƒŽ‹•’‹”ƒ–‹‘–‘™ƒ”†ˆ”‹‡†•Š‹’•ƒ†—–—ƒŽ ‘ŽŽƒ„‘”ƒ–‹˜‡‡–™‘”Ǥ  ‡™‹•Š›‘—ƒŠƒ’’› ‘ˆ‡”‡ ‡ƒ†•— ‡••‹‡ƒ”ƒ‰Ǥ       ‰Š—•‘ˆ™ƒ ‡‡”ƒŽŠƒ‹” ʹͲͳͺ ͷ–Š –‡”ƒ–‹‘ƒŽ ‘ˆ‡”‡ ‡ ‘ ˆ‘”ƒ–‹‘ ‡ Š‘Ž‘‰›ǡ ‘’—–‡”ƒ†Ž‡ –”‹ ƒŽ‰‹‡‡”‹‰ȋ  Ȍ 

v

Foreword From Dean of Faculty of Engineering University, -

–‹•‘—”‰”‡ƒ–’Ž‡ƒ•—”‡–‘Œ‘‹ƒ†–‘™‡Ž ‘‡ƒŽŽ’ƒ”–‹ ‹’ƒ–•‘ˆ–Š‡ͷ–Š –‡”ƒ–‹‘ƒŽ ‘ˆ‡”‡ ‡ ‘ ˆ‘”ƒ–‹‘ ‡ Š‘Ž‘‰›ǡ ‘’—–‡”ǡ ƒ† Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ʹͲͳͺ ȋ  ʹͲͳͺȌ‹‡ƒ”ƒ‰Ȃ †‘‡•‹ƒǤ Š‡ƒ‹•‘ˆ–Š‡ ‘ˆ‡”‡ ‡ƒ”‡–‘‘„–ƒ‹ƒ†–‘‡š–‡†–Š‡‘™Ž‡†‰‡‘ˆ–Š‡”‡ ‡–‹••—‡•ǡ ‘’‹‹‘•ǡ „”‹‰Š– ‹†‡ƒ• ƒ„‘—– –Š‡ †‡˜‡Ž‘’‡– ‘ˆ ƒ ‘’”‡Š‡•‹˜‡ ‰”‡‡ –‡ Š‘Ž‘‰›Ǥ   ʹͲͳͺ ‹˜‹–‡• –Š‡ • Š‘Žƒ”• ƒ† ‡ ‘—”ƒ‰‡• –Š‡ ”‡•‡ƒ” Š‡”• –‘ •—„‹– Š‹‰Š “—ƒŽ‹–› ƒ—• ”‹’–• ƒ† •Šƒ”‡ –Š‡‹” ˆ‹†‹‰• ƒ† ‡š’‡”‹‡ ‡• ‹ –Š‹• ‘ˆ‡”‡ ‡Ǥ ƒ› –Š”‘—‰Š–Š‹•‡˜‡––Š‡”‡™‹ŽŽ„‡‡Ž‹‰Š–‡•ƒ†—–—ƒŽ ‘ŽŽƒ„‘”ƒ–‹˜‡‡–™‘”•–‘˜ƒ”‹‘—• –‘’‹ • •— Š ƒ• ’‘™‡” •›•–‡•ǡ –‡Ž‡ ‘—‹ ƒ–‹‘ǡ ˜‡Š‹ —Žƒ” –‡ Š‘Ž‘‰‹‡•ǡ ‘–”‘Ž•ǡ ‹ˆ‘”ƒ–‹‘ƒ† ‘’—–‡”–‡ Š‘Ž‘‰‹‡•ƒ†ƒ•™‡ŽŽƒ•‘–Š‡”ˆ‹‡Ž†–Šƒ– ‘””‡•’‘†•ǡ•— Š ƒ•‰”‡‡ƒ’’Ž‹ ƒ–‹‘ƒ†‹–‡”†‹• ‹’Ž‹ƒ”›–‘’‹ •ˆ‘”‹’”‘˜‹‰–Š‡“—ƒŽ‹–›ƒ†„‡‡ˆ‹–• ‘ˆ–Š‡”‡•‡ƒ” ŠǤ –‹•ƒ‰”‡ƒ–’Ž‡ƒ•—”‡–‘™‡Ž ‘‡ƒŽŽ–Š‡’ƒ”–‹ ‹’ƒ–•‘ˆ–Š‹• ‘ˆ‡”‡ ‡‹‡ƒ”ƒ‰Ǥ ƒŽ•‘ ™‘—Ž†Ž‹‡–‘™‡Ž ‘‡•‡˜‡”ƒŽ‡„‡”•ˆ”‘‹˜‡”•‹–‹‡‘Ž‘‰‹ƒŽƒ›•‹ƒǡ‹˜‡”•‹–‹ ‡‹ƒŽƒŽƒ›•‹ƒǡ‹˜‡”•‹–‹‡„ƒ‰•ƒƒƒŽƒ›•‹ƒǡ‡”‹ ƒ‹˜‡”•‹–›‘ˆ‹††Ž‡ƒ•–ǡ —‡‡ƒ”›‹˜‡”•‹–›‘ˆ‘†‘ǡƒ–‹‘ƒŽƒ‹™ƒ‹˜‡”•‹–›‘ˆ ‹‡ ‡ƒ†‡ Š‘Ž‘‰›ǡ ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡƒ†—‰ •–‹–—–‡‘ˆ‡ Š‘Ž‘‰›ǡ ƒ†ŒƒŠƒ†ƒ‹˜‡”•‹–›ǡƒ†•‘ ‘Ǥ  †‘ Š‘’‡ –Šƒ– –Š‹• ‘ˆ‡”‡ ‡ –‘ „‡ ƒ ˜ƒŽ—ƒ„Ž‡ ˆ‘”— –‘ ‡ ‘—”ƒ‰‡ ƒ† ‡„”ƒ ‡ ‘‘’‡”ƒ–‹˜‡ ƒ† ‹–‡”†‹• ‹’Ž‹ƒ”› ”‡•‡ƒ” Š ƒ‘‰ –Š‡ ‡‰‹‡‡”• ƒ† • ‹‡–‹•–• ˆ‘” „”‹‰‹‰„‡––‡”Ž‹ˆ‡Ǥ ›Š‡ƒ”–ˆ—Ž‰”ƒ–‹–—†‡‹•†‡†‹ ƒ–‡†–‘”‰ƒ‹œ‹‰‘‹––‡‡‡„‡”•ƒ†–Š‡•–ƒˆˆ‘ˆ ‡’ƒ”–‡– ‘ˆ Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ƒ† ‡’ƒ”–‡– ‘ˆ ‘’—–‡” ‰‹‡‡”‹‰ ‘ˆ ƒ —Ž–›‘ˆ‰‹‡‡”‹‰ǡ‹’‘‡‰‘”‘‹˜‡”•‹–›ˆ‘”–Š‡‹”‰‡‡”‘—•‡ˆˆ‘”–ƒ† ‘–”‹„—–‹‘ –‘™ƒ”†–Š‡•— ‡••‘ˆŠ‡ͷ–Š  ʹͲͳͺ Š‘’‡–Šƒ––Š‡ ‘ˆ‡”‡ ‡™‹ŽŽ„‡•–‹—Žƒ–‹‰ƒ†‡‘”ƒ„Ž‡ˆ‘”›‘—Ǥ‘ǡ‡Œ‘››‘—”–‹‡ ‹‡ƒ”ƒ‰

Ir. M. Agung Wibowo, MM, MSc, PhD Dean of Faculty of Engineering , Semarang-Indonesia

vii

Foreword From Chief of Department of Electrical Engineering Diponegoro University, Semarang-Indonesia

–Š‡ƒ‡‘ˆŽŽƒŠǡ–Š‡‘•– ”ƒ ‹‘—•ǡ‘•–‡” ‹ˆ—ŽǤ ŽŽ–Š‡’”ƒ‹•‡•ƒ†–Šƒ•–‘ŽŽƒŠǤ ‡Ž ‘‡ǡƒŽŽ‘ˆ–Š‡’ƒ”–‹ ‹’ƒ–•ƒ†‡›‘–‡•’‡ƒ‡”•–‘–Š‡ –‡”ƒ–‹‘ƒŽ‘ˆ‡”‡ ‡ ‘ ˆ‘”ƒ–‹‘‡ Š‘Ž‘‰›ǡ‘’—–‡”ǡƒ†Ž‡ –”‹ ƒŽ‰‹‡‡”‹‰ȋ  ʹͲͳͺȌ‹ ‡ƒ”ƒ‰Ǥ Š‹• ‹• –Š‡ ˆ‹ˆ–Š ‹–‡”ƒ–‹‘ƒŽ ‘ˆ‡”‡ ‡ Š‡Ž† –‘‰‡–Š‡” „› Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ‡’ƒ”–‡– ƒ† ‘’—–‡” ‰‹‡‡”‹‰ ‡’ƒ”–‡– ‘ˆ ‰‹‡‡”‹‰ ƒ —Ž–›ǡ‹’‘‡‰‘”‘‹˜‡”•‹–›Ǥ ™‘—Ž†Ž‹‡–‘ƒ’’”‡ ‹ƒ–‡–Š‡‡ƒ•—”‡Ž‡••™‘”‹–Š‹• ‘ˆ‡”‡ ‡ ƒ• ƒ ‘ŽŽƒ„‘”ƒ–‹˜‡ ‡ˆˆ‘”– ƒ‘‰ –Š‡ Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ‡’ƒ”–‡–ǡ ‘’—–‡” ‰‹‡‡”‹‰ ‡’ƒ”–‡–ǡ  –—†‡– ”ƒ Š ‘ˆ ‹’‘‡‰‘”‘ ‹˜‡”•‹–›ǡ ƒ†  †‘‡•‹ƒ‡ –‹‘Ǥ ™‘—Ž†Ž‹‡–‘‡š’”‡••›†‡‡’ƒ’’”‡ ‹ƒ–‹‘–‘‡ Š‹ ƒŽ ”‘‰”ƒ ‘‹––‡‡ǡ ”‰ƒ‹œ‹‰ ‘‹––‡‡ ‡„‡”•ǡ •–ƒˆˆ• ƒ† •–—†‡–• ‘ˆ ‡’ƒ”–‡– ‘ˆ Ž‡ –”‹ ƒŽ ‰‹‡‡”‹‰ ƒ† ‡’ƒ”–‡– ‘ˆ ‘’—–‡” ‰‹‡‡”‹‰ ˆ‘” –Š‡‹”‡ˆˆ‘”–ƒ†•—’’‘”–Ǥ ™‘—Ž†Ž‹‡–‘‡š–‡†‘—”ƒ’’”‡ ‹ƒ–‹‘–‘‡ –‘”‘ˆ‹’‘‡‰‘”‘ ‹˜‡”•‹–›ƒ†‡ƒ‘ˆ‰‹‡‡”‹‰ ƒ —Ž–›Ǥ Š‘’‡–Šƒ––Š‹• ‘ˆ‡”‡ ‡™‹ŽŽ„‡ƒ’”‡•–‹‰‡ˆ‘”—–‘ ‘—‹ ƒ–‡ƒ†•Šƒ”‹‰–Š‡ ˆ‹†‹‰•ǡƒ†’”‡ ‹‘—•”‡•‡ƒ” Š‡•ƒ‘‰‡š’‡”–•‹–Š‡ˆ‹‡Ž†‘ˆ ‘’—–‡”‡‰‹‡‡”‹‰ǡ ‹ˆ‘”ƒ–‹‘–‡ Š‘Ž‘‰›ǡƒ†‡Ž‡ –”‹ ƒŽ‡‰‹‡‡”‹‰Ǥ‡ƒ”‡‡š–”‡‡Ž›Šƒ’’›–Šƒ––Š‹• ‡˜‡–™‹ŽŽ‰‹˜‡–Š‡ ‘–”‹„—–‹‘–‘–Š‡‰Ž‘„ƒŽ†‡˜‡Ž‘’‡–‘ˆ‘’—–‡”‰‹‡‡”‹‰ǡ ˆ‘”ƒ–‹‘‡ Š‘Ž‘‰›ǡƒ†Ž‡ –”‹ ƒŽ‰‹‡‡”‹‰Ǥ    ”ǤƒŠ›—†‹ǡǤǤǡǤǤ Š‹‡ˆ‘ˆ‡’ƒ”–‡–‘ˆŽ‡ –”‹ ƒŽ‰‹‡‡”‹‰ ƒ —Ž–›‘ˆ‰‹‡‡”‹‰ ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ‡ƒ”ƒ‰Ȃ †‘‡•‹ƒǤ

ix

Conference Committee

General Chair : ‰Š—•‘ˆ™ƒȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘Ȍ Co-Chair : —”‹ƒ™ƒ‡‰—Šƒ”–‘‘ȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘Ȍ Secretary :Ǥ”ˆƒ

Organizing Committee: „†—Ž›ƒ—” —ƒ™ƒ”‰—•‹›ƒ†‹ ”‹ƒ•†”‘‡†ƒ ™ƒ‡–‹ƒ™ƒ  Šƒ† ‹†ƒ›ƒ–‘ Œ—„Œ—Ž‹ƒƒŠ”ƒ —ƒ™ƒ”‰—•‹›ƒ†‹ ‘•—ƒŽ˜‹—–”‹•‘ ‘ ƒ†‘›‘ —‹•™‘ —Ž‹Š”‹•–›‘‘

Steering Committee: ‡”ƒ™ƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›Ȍ ƒ—”‹†Š‹ ‡”›—”‘‘ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”Ȍ ‹–”‹—Ž‹—Ž‹ˆŽ‹ȋ‹˜‡”•‹–ƒ• †‘‡•‹ƒȌ ƒœƒŽ‹‰ƒŠȋ‹˜‡”•‹–‹‡‘Ž‘‰‹ƒŽƒ›•‹ƒȌ

Technical Program Committee: ‘ Šƒƒ† ƒ –ƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ•ƒ›—‹—”‘•ƒ‹ȋ›—•Š—‹˜‡”•‹–›ǡ ƒ’ƒȌ ”‹‘†‹‘‘ȋƒ†—‰ •–‹–—–‡‘ˆ‡ Š‘Ž‘‰›ǡ †‘‡•‹ƒȌ Ǥ •ƒ’ƒ–‘•ƒȋ ƒ†ŒƒŠƒ†ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ—”‹†Š‹ ‡”‹—”‘‘ȋ‡’—Ž—Š‘’‡„‡” •–‹–—–‡‘ˆ‡ Š‘Ž‘‰›ǡ †‘‡•‹ƒȌ Š‘‹”—Ž™ƒ”ȋ ƒ’ƒ†˜ƒ ‡† •–‹–—–‡‘ˆ ‹‡ ‡ƒ†‡ Š‘Ž‘‰›ǡ ƒ’ƒȌ

xi

ƒŠ›—†‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒŠ›—Ž‹‡›ƒˆ‡‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ —ƒ™ƒ”‰—•‹›ƒ†‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‹†‹“›ƒ•—Ž ‹†ƒ›ƒ–ȋ‡ƒ”ƒ‰–ƒ–‡‘Ž›–‡ Š‹ •ǡ †‘‡•‹ƒȌ —’ƒ”‹ȋ‡ƒ”ƒ‰‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ Žƒ‡–‹›ƒ†‹ȋ‘‡‰‹Œƒ’”ƒ‘–‘ƒ–Š‘Ž‹ ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ Ǥ ƒ†‹ȋ—Ž–ƒ‰—‰ •Žƒ‹ ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‹Žƒœ”ƒ‡”•ƒ†ƒȋǡ ”ƒ ‡Ȍ ƒ—ˆ‹ȋƒŽ‹ˆ‘”‹ƒ‘Ž›–‡ Š‹ –ƒ–‡‹˜‡”•‹–›ǡȌ ”‹•”‹™‹›ƒ–‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ†—ƒ†‹”ƒ–ƒƒȋ—•ƒƒ–‹‘ƒŽ‹˜‡”•‹–›ǡ‘—–Š‘”‡ƒȌ ›™‹—”Šƒ›ƒ–‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ

Reviewer: ‰Š—•‘ˆ™ƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‘Š† ‡Ž›„†ƒŠƒ„ȋ‹˜‡”•‹–‹— —••‡‹ƒŽƒ›•‹ƒǡƒŽƒ›•‹ƒȌ —Šƒƒ†•Šƒ”‹ȋ‹˜‡”•‹–‹”—‡‹ƒ”—••ƒŽƒǡ”—‡‹ƒ”—••ƒŽƒȌ ‹ƒƒ™‹–”‹ȋ ǡ †‘‡•‹ƒȌ ”‹ƒ•†”‘‡†ƒȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ ™ƒ‡–‹ƒ™ƒȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ Ž‹ƒ‘—†ȋ ‹‡ ‡ǡ—‹•‹ƒȌ ›—”Šƒ›ƒ–‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ Ž‹ƒŠ›ƒ‹‰•‹Šȋ‹˜‡”•‹–›‘ˆ †‘‡•‹ƒǡ †‘‡•‹ƒȌ ‘”•Š‹–ƒƒ–ƒ›ƒȋƒ–‹‘ƒŽ‹˜‡”•‹–›‘ˆƒŽƒ›•‹ƒǡƒŽƒ›•‹ƒȌ ‰—‰”ƒ•‡–‹Œ‘ȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ ƒœ”—ŽƒœŠƒ”ƒŠƒƒȋ‹˜‡”‹•–‹‡‹ƒŽƒŽƒ›•‹ƒ‡ŽƒƒǡƒŽƒ›•‹ƒȌ ‡‰—Š”ƒ‘•‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ •—›‘•Š‹•ƒ‰ƒ™ƒȋ—ƒ‘–‘‹˜‡”•‹–›ǡ ƒ’ƒȌ Ž‘”‡–‹—•‡–‹ƒ™ƒȋ‘‡‰‹Œƒ’”ƒƒ–ƒƒ–Š‘Ž‹ ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ›‘ƒƒŠ›—ƒ–‹ƒ™ƒȋƒ–ƒ”ƒ‹˜‡”•‹–›Ǧ‡•–—•ƒ‡‰‰ƒ”ƒǡ †‘‡•‹ƒȌ —Šƒ”›ƒ–‘ȋ ƒ†ŒƒŠƒ†ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‘‡†‹›‘‘ȋƒ–›ƒ™ƒ ƒƒŠ”‹•–‹ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‘ Šƒƒ† ƒ –ƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ „†—Ž›ƒ—”ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ—”‹†Š‹—”‘‘ȋ •–‹–—–‘ˆ‡ Š‘Ž‘‰›‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ”†›‘‘”‹›ƒ†‹ȋ ǡ †‘‡•‹ƒȌ —Šƒƒ†‹˜ƒ‹ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ƒ—‰†‹—‰”‘Š‘ȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ  Šƒ† ‹†ƒ›ƒ–‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ —Šƒƒ† “„ƒŽȋ‹˜‡”•‹–ƒ•ƒ–ƒ”ƒǡ †‘‡•‹ƒȌ ”ƒ ƒ›ƒȋŽ‡ –”‘‹ •‰‹‡‡”‹‰‘Ž›–‡ Š‹  •–‹–—–‡‘ˆ—”ƒ„ƒ›ƒǡ †‘‡•‹ƒȌ —ƒ™ƒ”‹›ƒ†‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ

xii

ƒƒ–‘•‘ȋ‹˜‡”•‹–›‘ˆ‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ ””‹‡—Ž‹•–‹ƒ™ƒ–‹ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”—”ƒ„ƒ›ƒ †‘‡•‹ƒǡ †‘‡•‹ƒȌ Ǥ—ƒŒƒ›ƒȋ‹˜‡”•‹–ƒ•‡†‹†‹ƒ ƒ‡•Šƒǡ‹‰ƒ”ƒŒƒǡ †‘‡•‹ƒȌ ‘‡–‹Œƒ†‹ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ —ƒ™ƒ‹„‹•‘‘ȋ‹˜‡”•‹–›‘ˆ †‘‡•‹ƒǡ †‘‡•‹ƒȌ ”‹•”‹™‹›ƒ–‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‹œƒŽ •ƒ–‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒŠ”‹› ƒ”‹‘ȋ”ƒ™‹Œƒ›ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ”Ž‹• ‡”——”–‹ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ‹–‹‡†ƒ”‹ȋ‹˜‡”•‹–ƒ•‡‰‡”‹ƒŽƒ‰ǡ †‘‡•‹ƒȌ ‹†›ƒ™ƒ”†ƒƒ†‹’”ƒ™‹–ƒȋ •–‹–—–‡‘Ž‘‰‹ƒ†—‰ǡ †‘‡•‹ƒȌ ”‹™ƒŠŒ— ƒ”†‹ƒ–‘ȋ‹˜‡”•‹–›‘ˆ ‡„‡”ǡ †‘‡•‹ƒȌ ™‹ƒƒ ‡†”ƒ™ƒ–‹ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ƒ”‹•Š Šƒ†”ƒ—„‡›ȋ‹˜‡”•‹–›‘ˆ‡šƒ•ƒ–ƒŽŽƒ•ǡȌ œ‹ƒŽ‡Šȋ ‡„‡”‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒŒƒ” ƒ”†‘›‘‘ȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ ‹–‹‘ Š‹ƒŠȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ‡”ƒ‘ŽŽ‡ȋ‹˜‡”•‹–ƒ•”ƒ™‹Œƒ›ƒǡ †‘‡•‹ƒȌ —Žˆƒ–ƒ ƒ•ȋ‹˜‡”•‹–›‘ˆ—Šƒƒ†‹›ƒŠƒŽƒ‰ǡ †‘‡•‹ƒȌ Šƒ›”‹ˆ‹ƒ–‘ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ —”‹ƒ•—‹ȋ‹˜‡”•‹–›‘ˆ‹ƒ—•™ƒ–‘”‘ǡ †‘‡•‹ƒȌ ƒ‹ˆ—Ž—Š‘”‹ȋ‹˜‡”•‹–ƒ• ‡„‡”ǡ †‘‡•‹ƒȌ ”ƒ’–‘—‰”‘Š‘ȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ ”‹ˆ—–ƒ•ƒȋ”—‘Œ‘›‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‡”ƒ™ƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ  ‡†‡ƒ•‡—–ƒ‹Œƒ›ƒȋƒ–ƒ”ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ †”ƒœ‘‹”ƒ†Œ—††‹ȋ–ƒ–‡‘Ž›–‡ Š‹ ‘ˆƒŽƒ‰ǡ †‘‡•‹ƒȌ Žƒ‡–‹›ƒ†‹ȋ‘‡‰‹Œƒ’”ƒƒ–ƒƒ–Š‘Ž‹ ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ƒ‹œƒƒŠƒ”ȋ‹˜‡”•‹–‹‡‹ƒŽƒŽƒ›•‹ƒǡƒŽƒ›•‹ƒȌ ‹‡ ƒ•ƒȋ†ƒ›ƒƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ”„ƒ‹—•—ˆȋ‹˜‡”•‹–ƒ• †‘‡•‹ƒǡ †‘‡•‹ƒȌ ƒ—Ž—––ƒ‹ȋ ƒ„•†™ƒ”‡ Š‘Ž‘‰›‘Ǥǡ †‘‡•‹ƒȌ ƒ‹ƒŽƒ–”‹ƒȋ‹˜‡”•‹–‹‡‘Ž‘‰‹ƒŽƒ›•‹ƒǡƒŽƒ›•‹ƒȌ —•ƒ–›‘ ƒ†‘‘ȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ —‹–‘—‰”‘Š‘ȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ ”ˆƒȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ”‹ƒ”‹•–ƒŽ‹ƒȋ‘Ž‹–‡‹Ž‡–”‘‹ƒ‡‰‡”‹—”ƒ„ƒ›ƒȋȌǡ †‘‡•‹ƒȌ ƒ—Ž—• •ƒ’ƒ–‘•ƒȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ ‘•ƒ•ƒ”ƒȋ‘Ž‹–‡‹‡‰‡”‹ƒŽƒ‰ǡ †‘‡•‹ƒȌ ‹‰‹–‹„‘™‘ȋ ƒ†ŒƒŠƒ†ƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ”‹‡ˆ‡–›ƒ–‘ȋ‹˜‡”•‹–ƒ• ‘‰›ƒƒ”–ƒǡ †‘‡•‹ƒȌ ƒƒ‰‹Œƒ›ƒȋ ǡ †‘‡•‹ƒȌ ƒ”–‹‘—‰”‘Š‘ȋ‹˜‡”•‹–‹‡‘Ž‘‰‹ƒŽƒ›•‹ƒǡƒŽƒ›•‹ƒȌ ‹œƒŽ—ƒ†‹ȋ›‹ƒŠ—ƒŽƒ‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‹†ƒ”–‘ȋ‹˜‡”•‹–›—Šƒƒ†‹›ƒŠˆ‹†‘ƒ”Œ‘ǡ †‘‡•‹ƒȌ ‘‘”Šƒ†‡–‹ƒ™ƒȋ ǡ †‘‡•‹ƒȌ  Šƒ†ƒ•—‹ȋ‘Ž‹–‡‹Ž‡–”‘‹ƒ‡‰‡”‹—”ƒ„›ƒǡ †‘‡•‹ƒȌ ƒ†Šƒˆ”‹•ƒŽȋ‹˜‡”•‹–ƒ•‹’‘‡‰‘”‘ǡ †‘‡•‹ƒȌ ƒŠ›—Ž›ƒˆ‡‹ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ‡ƒ”ƒ‰ǡ †‘‡•‹ƒȌ

xiii

‘ ƒ†‘›‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ †”ƒ ‘‡Ž‹ƒ–‘ȋ •–‹–—–‡‘Ž‘‰‹ƒ†—‰ǡ †‘‡•‹ƒȌ ‡”‹—”›‘ƒ–‘Œ‘ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ  ‡†‡—Œƒ•–ƒ™ƒȋ‘Ž‹–‡‹Ž‡–”‘‹ƒ‡‰‡”‹—”ƒ„ƒ›ƒǡ †‘‡•‹ƒȌ —Ž‹ƒ–‘‡ƒ–ƒ”ƒȋ •–‹–—–‹•‹•†ƒ ˆ‘”ƒ–‹ƒ–‹‘—”ƒ„ƒ›ƒǡ †‘‡•‹ƒȌ ‘‹ —‹Žƒ‰ȋ‡Ž‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ ‹‘‹”‡‰ƒ”ȋ‡Ž‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ —†‹‡–‹›ƒ–‘ȋ‹˜‡”•‹–ƒ• ƒ†ŒƒŠƒ†ƒǡ †‘‡•‹ƒȌ ƒŠ‹ȋ‹˜‡”•‹–›‘ˆ—ƒ–‡”ƒ–ƒ”ƒǡ †‘‡•‹ƒȌ ‹›ƒƒ”–‘ƒ”‘ȋ •–‹–—–‡‘Ž‘‰‹‡’—Ž—Š‘’‡„‡”ǡ †‘‡•‹ƒȌ ƒ‹ƒŽ”‹ˆȋ‘Ž‹–‡‹Ž‡–”‘‹ƒ‡‰‡”‹—”ƒ„ƒ›ƒǡ †‘‡•‹ƒȌ —”‹ƒ™ƒƒ”–‘‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ  Šƒ† ‹†ƒ›ƒ–‘ȋ‹˜‡”•‹–›‘ˆ †‘‡•‹ƒǡ †‘‡•‹ƒȌ ƒŠ›—†‹ȋ‡’ƒ”–‡‡‡‹Ž‡–”‘ ǡ †‘‡•‹ƒȌ ‘ƒ‡•ƒ†—‰ȋ •–‹–—–‡‘Ž‘‰‹ƒ†—‰ǡ †‘‡•‹ƒȌ —”›‘‘ȋ‹’‘‡‰‘”‘‹˜‡”•‹–›ǡ †‘‡•‹ƒȌ

xiv

#>;3>-9

'4A>?0-D&1<@19.1> 

'4A>?0-D&1<@19.1>     !):B5@10#-<1>

7**3425:9.3,55479:3.9>4+"8.3,7*&)9-.=*)488.51,47.9-2+4759.2.?.3,4<*7 :551> 4:9*.34<*7 1&39 -A>5045#A>:;9;:?@5@A@'17:;8;35&1:0;:1?5- << 

'4A>?0-D&1<@19.1>     81/@>;:5/5>/A5@;:@>;8

&,3*9.(.*1) *1&9.438-.5'*9<**3.89&3(*&3)3):(*)#419&,**3*7&9*)'> 1@-:@D-!A3>;4;-:0E85+-4D-(:5B1>?5@5'17:;8;35 -8-D?5- -8-D?5-.0%-459 5:09-@5/? -8-D?5-'>5-? :0>;910-(:5B1>?5@-?5<;:13;>;:0;:1?5- << 

422:3.(&9.437494(4143 -&33*1#!&9&(6:.8.9.43 >89*2 >.-5+A?A2(:5B1>?5@-?:0;:1?5-'1/4 -.?0C->'1/4:;8;3D:0;:1?5- << 

441.3, >89*2*8.,3&8*)43!-*724*1*(97.("8.3,&34947434++439741 A::57->D-:@5(:5B1>?5@-?5>3-:@->- ->?17-8&A>D-0->9-:0;:1?5- <<  

*8.,34+!-*  :7+&(* (&33.3, >89*2+47:2&3$7.894394:7"8.3,&8*7.3*2&,.3, %57D'>5+A:->05-:0>5;9-:05>5(:5B1>?5@-?5>8-:33-:0;:1?5- << 

!*25*7&9:7*4397411.3,"8.3,4397411*743 .(*7&.31:.).?*)7>*774949>5* >5?'>5C5D-@:;5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

&8*).7*&9*74397411*7251*2*39*)$.9-&91&' .2:1.30&3)7):.34"34 -9.-:3&A<>5D;-05-05&A85?@D;*->6;:;05*5?-7?;:;&>5?@A@5-:0A?:;(@;9;#;85@17:57!131>5&19->-:3 :0;:1?5- << 

*8.,34<489$.3).7*(9.43 *3847$.9-.,-((:7&(> +;3-(@-9-(:5B1>?5@D;2*50D-->@57-:0;:1?5- <<  

:&)7:5*) 4'49<.9- 9&'.1.?&9.431,47.9-243"3*;*31447:8.3, "'&8*)3;*78*.3*2&9.( %;25=#>-D;3;5<;:13;>;(:5B1>?5@D:0;:1?5- << 

*8.,3&3)-&7&(9*7.?&9.434+4<489 4+93*:2&9.(*3).3,(9:&947+47&3) *-&'.1.9&9.43 ;/4-99-0>5D-:@;;3-&1@5-C-:%527D?9-58?9;D;->D-:@;'-:5-1.>5:--:0;:5&-7?;:;5<;:13;>; (:5B1>?5@D:0;:1?5- <<  

xxv  81/@>5/#;C1>&D?@19

*8.,3&3)*7+472&3(*!*894+!-7**-&8*) :8.3,    &D->51285C-:&1@5-C-:-:0&A?-@D;-:0;7;(:5B1>?5@-?5<;:13;>;:0;:1?5- <<  

!-*++*(94+=(.9&9.43&5&(.9478433):(9.43*3*7&9478.34884+7.);*398 ;74-99-0?:-1:5-9.-:3&1@D;:13;>;(:5B1>?5@-?-06-4 -0-:0;:1?5--:-:3*56-D-( :0;:1?5-7- 5>9-:?D-4(:5B1>?5@-?-06-4 -0-:0;:1?5- << 

!7&38.*39 9&'.1.9> 9:)>.37.)39*,7&9*)$.3)&72 &-9A1805A?A9;(:5B1>?5@-?-06-4 -0-:0;:1?5- 1?:-:@; A8@-#A@>-:@;( :0;:1?5-'5D;:;'5D;:; (:5B1>?5@-?-06-4 -0-:0;:1?5- << 

3&1>8.84+3*7,>49*39.&14+.42&881*(97.(.9>+742*&+$&89*'>"8.3,7.6:*99**9-4) 1>85:-*-4-.&>5C56-D-(:5B1>?5@D(:5B1>?5@D;2:0;:1?5-:0;:1?5-%A0D[email protected](:5B1>?5@-?:0;:1?5-( :0;:1?5-7.->-4D-05(:5B1>?5@-?:0;:1?5-:0;:1?5- <<

# 94#419&,* &,.9.,&9.43:*943):(9.434947 9&79.3,&3) -&8*&:19 A4-99-0A:/;>;-:0C-->:5C-(:5B1>?5@D;2:0;:1?5-:0;:1?5- << 

 .3,1*-&8**;*13;*79*7+47-494;419&.(551.(&9.43 *5>-045@-9--:0 1;:->0A?#>-@;9;&;1356-<>-:-@--@4;85/(:5B1>?5@D:0;:1?5- <<

*8.,3&3)251*2*39&9.434+3;*79*7 .3,1*-&8*.3**;*1"8.3,   !-@-:-18!;B-8A@25-:0 1;:->0A?#>-@;9;&;1356-<>-:-@--@4;85/(:5B1>?5@D:0;:1?5- << 

3*7,> &;.3,*&8:7*8&3)49*39.&14+3*7,>++.(.*3(>&9!-*"3.;*78.9>4+ :7&'&>& 5@>5->@57-?->5(:5B1>?5@D;2&A>-.-D-:0;:1?5-851?1>'->53-:(:5B1>?5@D;2&A>-.-D-81/@>5/-8:35:11>5:3 :0;:1?5-+A:A?>-:?5?/A?-:0'A-:5 50D-C-@5(:5B1>?5@D;2&A>-.-D-:0;:1?5- <<

*8.,3&3) .2:1&9.434+&38>22*97.(&1*;*13;*79*7+47-494;419&.(551.(&9.438 4>5?@;<41>'6;7>;-:0 1;:->0A?#>-@;9;&;1356-<>-:-@--@4;85/(:5B1>?5@D:0;:1?5- << 

 :2;>9-@5;:;9'1/4:;8;351?

 2&,* *,2*39&9.43:8.3,475-414,.(&13-&3(*2*39&3)4.8* *24;&1'&8*)43:??>2*&38 %;.1>@&1@D-C-: A?@;2-85?-45089-42A04>5?@D@57-&->51%;?-83:-@5A? ;?1?&1@5-05-:07;->5 %-/49-C-:@;5-:!A?C-:@;>;(:5B1>?5@D:0;:1?5- << 

*&8:7*2*3943 *&1!.2*.&,3489.(4+&897.(!:2474)*1"8.3,$.7*1*883)48(45> >89*2 !;B51@-?->545?:->5-:05:5(:5B1>?5@D;2:0;:1?5-:0;:1?5->51#-:31?@565(:5B1>?5@-?:0;:1?5-:0;:1?5- +A05-:?D-4+A05-:?D-4(:5B1>?5@D;2:0;:1?5-:0;:1?5-#>5@-1C5 ->5D-9-A4->A8A-05+A85-:@; -8;-:0-?->5 -?->5(:5B1>?5@-?:0;:1?5-:0;:1?5- <<   

*1&9.43&1&9&'&8* 97:(9:7*&3)5*7&9.4383,.3**7.3,&8*)43".&,7&2 A79-:-759-:0A:3:?@5@A@1;2'1/4:;8;3D:0;:1?5-&A7>5?:; ->05D-:@;:?@5@A@'17:;8;35-:0A:3:0;:1?5- << 

xxvi *8.,34+ *(:7*4!1&9+47247 2&7942* >89*2 >B-:0D>B-:0D-:0+;-:1?-:0A:3:?@5@A@'17:;8;35-:0A:3:0;:1?5- <<  

&70*72&,*#&7.&'1*8*&8:7*2*394+:,2*39*) *&1.9>.34'.1*551.(&9.43 71*5:0-?->5+A05*5:0->@;-:0%5?9-&1<@5-:-5<;:13;>;(:5B1>?5@D:0;:1?5- << 

*39.2*393&1>8.8&3)!45.(4)*11.3,+47)*39.+.(&9.434+4;*732*39 *7;.(* &9.8+&(9.43 ;4!-?>A8E5E>55>9-:@;49-0 52@-4-6>5:-:0%)->55:->05:?@5@A@'17:;8;35&1 :0;:1?5- <<  

74949>5*4+31.3*=&2.3&9.43434*&73551.(&9.438"8.3,!*=9 .2.1&7.9>94*9*(91&,.&7.82 A85-:@; 19-:@->-:?@5@A@5?:5?0-::2;>9-@57-&@57;9&A>-.-D-:0;:1?5-1C5D-:5&A:->@;:?@5@A@1;2A?5:1??-:0 :2;>9-@5/&@57;9&A>-.-D-:0;:1?5--9.-:3->5-05'>5&-35>-:5-:0'-:9185-:?@5@A@5?:5?0-::2;>9-@57- &@57;9&A>-.-D-:0;:1?5- <<  

*7+472&3(*425&7.843*9<**3  14<+.8-&3)14<+.8-  42'.3&9.43 A4-99-0 A5:(:5B1>?5@-? " +;3D-7->@-&' 5:-#-@>5-:0;:1?5->512&1@D-:@;(:5B1>?5@-? " +;3D-7->@-:0;:1?5-&A0->9-C-:&A0->9-C-: " +;3D-7->@-(:5B1>?5@D:0;:1?5-->@57-&-:@;?;&'  5:-#-@>5-:0;:1?5- << 

&9:7&1-.1)'.79-!7&.3.3, .2:1&9.43.3#.79:&13;.7432*39477485*(9.;*.)<.+* 8B5:!A3>-4-A85--E-*A8-::0-D-:5-:0-::D->D-:@;(:5B1>?5@-?5-:!A?C-:@;>;:0;:1?5-.-?&1@5-C-: 5-:!A?C-:@;>;(:5B1>?5@D:0;:1?5- <<  

 '181/;99A:5/-@5;:?%-05;>1=A1:/D

9:)>43!*72.3&9.43.33)43*8.&:8.3,&97.= 8-5:0-0>5-:-:065.&>525:(:5B1>?5@-?:0;:1?5-:0;:1?5- << 

*7+472&3(*4+  '&8*43! 57494(414;*7$(-&33*18 ;40+-E50.%-E-7!-@5;:-8(:5B1>?5@D;2 -8-D?5- 5:09-@5/?&0:40 -8-D?5-.0%-459 -@&5017  5:09-@5/?&0:40 -8-D?5-!-?4->A005:,-5:-8(:5B1>?5@51.-:3?--: -8-D?5- -8-D?5- <<  

*;*1452*394+ &).4.7*(9.43.3)*7:8.3, 4,*7.4).(.541*77&>39*33&8 ->@57;!A3>;4;E85+-4D--:0!;>5?4-94-95?(:5B1>?5@5'17:;8;35 -8-D?5- -8-D?5-!A>-95>-4 ;40!;>  5:09-@5/?&0:40 -8-D?5-.0%-459 5:09-@5/? -8-D?5- ;4-99-0%-E9-:&4-->5 5:09-@5/?&0:40 -8-D?5- <<  

.7*(9.43&1=.(74897.539*33&*8.,3&3)59.2.?&9.43+47!&3) 551.(&9.43 ';995->5D-05-:0%5E7D 13-:@->-(:5B1>?5@-?#1:05057-::0;:1?5-:0;:1?5- <<   

.,-!-74:,-5:9$.7*1*887.39*7 *7;*7&8*)43 3 *-4DA8951:&D-2155<;:13;>;(:5B1>?5@D&19->-:3DA?4A:?@5@A@1;2'1/4:;8;3D5EA7-:0;:1?5-9-9 &-:@;?;5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

3&1>8.843&9.0$&9*7$&89*43.947.3, >89*2'&8*)434 &422:3.(&9.43 5/4-18&@1<41: ;?1?#-7<-4-:7;5057*505-:@;-:0%5?9-&1<@5-:-5<;:13;>;(:5B1>?5@D:0;:1?5-

xxvii <<   

 '&8*)$&89*$&9*743.947.3, >89*2"8.3,4 &!*(-3414,> +A05*5:0->@;-:03A:3#>-?1@56;5<;:13;>;(:5B1>?5@D:0;:1?5--8-:3-9->-(:5B1>?5@-?5<;:13;>; :0;:1?5- <<  

.19*7.3,+47&9&6:.8.9.4343$.7*1*88 *3847*9<470 34A?&;2C-:&A9->05&A9->05-:0!18D(8C5D-@55<;:13;>;(:5B1>?5@D:0;:1?5- <<  

'4A>?0-D&1<@19.1>       81/@>;:5/5>/A5@;:@>;8

7*).(9.;*439741+47 *1&9.;**7+472&3(*&3&,*2*39 4->9->D-:5&@-@1#;8D@1/4:5/;2(6A:3#-:0-:3:0;:1?5-!A>?D5750-D-@A88-4&@-@1#;8D@1/4:5/;2 -05A: :0;:1?5- <<   

*8.,3&3)*;*1452*394+3/*(9.43:77*3943974133;*79*7&8*)745479.43&1 *843&39*9-4) .0A8->5?A?<>-:;@;-:0C-:&1@5-C-:(:5B1>?5@-?5<;:13;>;:0;:1?5- ;/4-99-0-/@-5<;:13;>; (:5B1>?5@D:0;:1?5- <<   

*;*1452*394+'/*(9!7&(0.3, >89*2"8.3, *249*1>5*7&9*)#*-.(1*&8*)43#.8:&18*3847 >C5:&---:0%;::D ->05D-:@;:?@5@A@'17:;8;35&1:0;:1?5- <<  

7*).(9.;*4397415574&(-+47 *897.(9*)7*&8;4.)&3(*4+:943424:8 >89*2 &A@>5?:;&A@>5?:;*50;C-@5*50;C-@5&A:->?54&A:->?54-:0->@;:;->@;:;5<;:13;>;(:5B1>?5@D:0;:1?5- <<   

:+&724).+.*)1&9+4724+:942&9.431&39.3, >89*2 -9->#>-9A05@D-'187;9A:5B1>?5@D:0;:1?5-3A:3!A3>;4;-@5-:0-5>AEE95'187;9(:5B1>?5@D:0;:1?5- << 

!7&(0.3,'/*(9'&8*)43 &3)" *3847 *-4DA05*-4DA051<->@91:@;281/@>5/-8:35:11>5:35<;:13;>;(:5B1>?5@D <<  

*;*1452*394+&;.,&9.43*9-4)4+:4>&394&9+47&.39&.3.3,48.9.434+!-*4&9&3) # %;::D ->05D-:@;1>5&A>D;-@9;6;-:0-0>A@'-9-9:?@5@A@'17:;8;35&1:0;:1?5- << 

*;*1452*394+&4<489:&)7:5*)&1 9&7+.8- 4+9 4'49 ;/4-99-0>5D-:@; A:-05 -:0;3-&1@5-C-:5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

*7+472&3(*2574;*2*394+ 4'49$&7*-4:8*&8*)43&99*7>5*7&9.43&143).9.438 895>-A05D-:@;>5?&1@5-C-:-:0&1@D-C-:*-4DA#>-@;9;(:5B1>?5@-??8-9:0;:1?5-:0;:1?5- << 

 81/@>5/#;C1>&D?@19

*8.,34+)&59.;*4397411*7+47:*1"9.1.?&9.433 41.)=.)*:*1*11 ->6-@->6-@&A85?@D;&A85?@D;-:0>5?'>5C5D-@:;5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

xxviii 9:)>43-494;419&.(489.3,.3%4,>&0&79&1*(97.(.897.':9.43*9<470 -5?4-8A-0%-49-:&;14->@;(:5B1>?5@-?-06-4 -0-:0;:1?5->5?@5-:@;05*505-@9;7;-:0&->65D-&->65D--06-4 -0-(:5B1>?5@D:0;:1?5- 1?:-:@; A8@-#A@>-:@;( :0;:1?5- << 

3&1>8.84+74:3).3, >89*2.3 0#:):8 :'89&9.43 %5E-#>-@-9-1>9-C-:1>9-C-:-:0 ;/4-99-0-/@-5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

&=.2:24<*7!7&(0.3,4+ 41&7&3*1:8.3,4).+.*)3(7*2*39&143):(9&3(**9-4) '>5-?:0>;910-(:5B1>?5@-?5<;:13;>;:0;:1?5-1@-:@D-!A3>;4;(:5B1>?5@5'17:;8;35 -8-D?5- -8-D?5-&A?-@D; -:0;7;(:5B1>?5@-?5<;:13;>;:0;:1?5-E85+-4D-(:5B1>?5@5'17:;8;35 -8-D?5- -8-D?5-1>9-C-:1>9-C-: -:0 ;/4-99-0-/@-5<;:13;>;(:5B1>?5@D:0;:1?5-C-:&1@5-C-:(:5B1>?5@-?5<;:13;>;:0;:1?5- << 

1*(97.(&14&)47*(&89.3, 9:)>"8.3,79.+.(.&1*:7&1*9<470*9-4)+47.3.2.?.3,1&(04:9 A?15: A.->;7-:0 A74-9-0&-<-:@-(:5B1>?5@-??8-9:0;:1?5-:0;:1?5- <<  

425&7.843 9:)>43*&0&,*:77*394+0# .1.(43 :''*7&3)54=> *8.338:1&947"3)*77>&3)$*943).9.43 '->D;'->D;5<;:13;>;(:5B1>?5@D:0;:1?5-.0A8&D-7A>(:5B1>?5@-?5<;:13;>;:0;:1?5-1>9-C-:1>9-C-: 5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

*&0&,*:77*39-&7&(9*7.89.(84+0#54=> *8.338:1&9478"3)*7#&7.&9.43:2.).9> #1>@5C5(@-95-:01>9-C-:1>9-C-:5<;:13;>;(:5B1>?5@D:0;:1?5-.0A8&D-7A>(:5B1>?5@-?5<;:13;>; :0;:1?5- <<   

*&8:7*2*39 >89*2+47 :7+&(**&0&,*:77*39&954=> *8.338:1&9.3,&9*7.&18 .0A8&D-7A>5<;:13;>;(:5B1>?5@D:0;:1?5-*-4DA05*-4DA051<->@191:'17:57817@>;(!#:0;:1?5- A9>5-:@;A9>5-:@;>5<;:13;>;(:5B1>?5@D!''):0;:1?5- <<  

33;*89.,&9.434+.7*(974:3).3,++*(9434)*1.3,4+.,-93.3,&3)!4<*7.3!7&382.88.43.3* ;/4-99-0-/@-.0A8&D-7A>-:01>9-C-:1>9-C-:5<;:13;>;(:5B1>?5@D:0;:1?5- <<   

 :2;>9-@5;:;9'1/4:;8;351?

&189*&)*97.(+47:&1.9>*&8:7*2*394+#&7.4:8#*78.434+ 9&9(&94 C-:5:-:@;&-:-@-4->9-(:5B1>?5@D:0;:1?5--4@5->&-814..-?-:0!1?@5&5-:5<->5:-!A?-:@->-(:5B1>?5@D :0;:1?5-->/; 1?8511:0>5/&<5@?*->:->?5:-!A?-:@->-(:5B1>?5@D;/@;>;2;9&/51:/1:0;:1?5- <<  

3;.7432*39&1*&19-43.947.3,<.9- 2&795-43*551.(&9.43 ;0>-@9-:&-@;@;7;5057*505-:@;-:0&A9->05&A9->055<;:13;>;(:5B1>?5@D:0;:1?5- <<   

!<4 9*5 &30.3,4(:2*39"8.3,9-*39414,>&8*)&:8&1.9>*9*(9.43 !7-->D-C-@5-:0 %-4:5:3#A@>5(0-D-:-(:5B1>?5@D:0;:1?5- <<  

34<1*),*&3&,*2*394)*1.3 >&7.&-&30.3, !A>05:!A>05::?@5@A@3-9-?8-9!131>5#-8A&-3-2&#1@@-8;:35-:04-1>A005:+A?A2:?@5@A@3-9-?8-9!131>5 #-8A:0;:1?5- <<   

xxix !-* 57*&).3,4+.8.3+472&9.43431.3*  .2:1&9.43 #->05?#;A>34;95-:0 58-:;>01B5/91>5/-:(:5B1>?5@D;2@41 50081-?@AC-5@-05&-251005:1$A11: ->D (:5B1>?5@D;2 ;:0;:(:5@105:30;9>1-@>5@-5: <<  

!&3&,*2*391*=.'.1.9>43(*59+47.,-*7):(&9.43 *-?58-4*-?58-4-6-4 -0-(:5B1>?5@D( :2;>9-@5/?-:05?:5??:?@5@A@1% +-:0-> -9;4;-:0#-A8A?:?-<&-:@;?-(:5B1>?5@-?-06-4 -0-:0;:1?5- <<   

*;.*<43489#&1:*5574&(-+47 *6:.7*2*3987.47.9.?&9.43!*(-3.6:*8 '-:9185-:?@5@A@5?:5?0-::2;>9-@57-&@57;9&A>-.-D-:0;:1?5-%;E85:- ;4-910(:5B1>?5@5 -8-D?5-#-4-:3 -8-D?5- << 

7.9.(&1 :((*88&(9474+3+472&9.43!*(-3414,>251*2*39&9.43.3 :551>-&.3&3&,*2*39 >5/71>:-:0;-:0&A>6-:0D&A>6-:0D5:-!A?-:@->-(:5B1>?5@D:0;:1?5-->/; 1?8511:0>5/&<5@?*->:->?5:- !A?-:@->-(:5B1>?5@D;/@;>;2;9&/51:/1:0;:1?5- 1D85-:- 1D85-:-5:-!A?-:@->-(:5B1>?5@D:0;:1?5- %-D9;:0;?-8--/A8@D;2;9-/49-:5:-!A?-:@->-(:5B1>?5@D:0;:1?5- <<  

!-*;&1:&9.434+-.1)8*&19-43.947.3, >89*2"8.3,9-*"8&'.1.9>!*89.3,5574&(- A>:5-C-: ->@;:;5<;:13;>;(:5B1>?5@D:0;:1?5- << 

 :2;>9-@5;:;9'1/4:;8;351?

!.(0*9.3,-&9'49 *7;.(*:8.3, *7;*71*88!*(-3414,> 7;-:0;D;-:0 >2-:5<;:13;>;(:5B1>?5@D:0;:1?5-+;?A-8B5:05&;1@>5?:;5<;:13;>;(:5B1>?5@D-/A8@D ;2:35:11>5:3:0;:1?5- -9-:&;9-:@>534A?&;2C-:-:0:0-*5?@-&5:A>-D-5<;:13;>;(:5B1>?5@D:0;:1?5- <<  

*8.,34+$&9*7:&1.9>439741+47 -7.2543)"8.3, *384714:)39*,7&9.43 -9-:&;9-:@>534A?&;2C-: >2-:)5B5:0->1>-C-@5-:0-255045:.0A>>-?D5505<;:13;>;(:5B1>?5@D :0;:1?5- << 

425&7&9.;* 9:)>4+2&,*7>594,7&5-.(*9-4) 1%;?-83:-@5A? ;?1?&1@5-057;->5%-/49-C-:@;-:04>5?@D@57-&->55-:!A?C-:@;>;(:5B1>?5@D:0;:1?5- 65.&A?-:@;(:5B1>?5@-?5-:!A?C-:@;>;:0;:1?5- ;4-910;415>(:5B1>?5@5'17:57-8 -8-D?5- 18-7- -8-D?5- << 

&3)<7.9.3,<3*78-.5 *(4,3.9.43:8.3,4397&893-&3(*2*39&3)*&9:7*=97&(9.43'&8*)43 !A>A85D-4DA#->@5:5:3?54%5E75%-9-04-:>-@-9-4>5?@D@57-&->51%;?-83:-@5A? ;?1?&1@5-05-:07;->5 %-/49-C-:@;5-:!A?C-:@;>;(:5B1>?5@D:0;:1?5- <<  

425&7.8434+ #&3)4147 5&(*8+47>)74543.(43.947.3, >89*2 '4;9-?3A:3&-:0&1@D;65%5C5:-:@;#;85@17:57!131>5&19->-:3:0;:1?5-&A41:0>;&#;85@17:57!131>5 &19->-:3:0;:1?5-189D189D-:0>52!A>?D-450#;85@17:57!131>5&19->-:3:0;:1?5->5&>5D-:@;!A3>;4; #;85@17:57!131>5&19->-:3:0;:1?5- << 

:942&9.(4(0.3,&8*)43#.8:&1**)'&(043 *249*1>5*7&9*)#*-.(1* A4-99-0$;9->AEE-9-:-:0%;::D ->05D-:@;:?@5@A@'17:;8;35&1:0;:1?5- <<  

xxx *7+472&3(*2574;*2*394+:2&3(9.;.9> *(4,3.9.43'&8*)4338*2'1*25.7.(&14)**(42548.9.43 :0-*5?@-&5:A>-D-5<;:13;>;(:5B1>?5@D:0;:1?5-+;?A-8B5:05&;1@>5?:;5<;:13;>;(:5B1>?5@D-/A8@D;2 :35:11>5:3:0;:1?5-1:5?1:5?5<;:13;>;(:5B1>?5@D:0;:1?5-95:A005:%5E-8!-@5;:-8'-5C-:(:5B1>?5@D;2 &/51:/1-:0'1/4:;8;3D'-5C-: <<  

&.;*&>*81&88.+.*7477*).(9.43+#41(&3.( 9&9:833)43*8.& 5>9-:'19<;8-(:5B1>?5@-?4-5>A:'1>:-@1:0;:1?5- <<   

&8*&8*) *&843.3,47*9*72.3.3,!-**&8.'.1.9>+ (-41&78-.57&39**8"8.3,&8*)&5&9&9.43 5>9-:'19<;8-(:5B1>?5@-?4-5>A:'1>:-@1:0;:1?5- <<  

*;*1452*394+=*(:9.;*3+472&9.43&8*)43 &9.8+&(9.43*;*14+ 9:)*398 ;/4-99-0-/@-285@-+;4-:-->5:-045>5B--:0C-85:-&-D17@55<;:13;>;(:5B1>?5@D:0;:1?5- <<   

4257*88.;* *38.3,5574&(-<.9-4:'1*&>*7 4+9!-7*8-41)+47#! 9&9.(2&,.3, !A>2:D-@A>:0>D-:5'-:>5.1:3(:5B1>?5@D(:5B1>?5@D;2:0;:1?5-:0;:1?5-;05&A05-:--:0-0-:3A:-C-: (:5B1>?5@-?:0;:1?5-:0;:1?5- <<  

439*=9'&8*)>)7414,>!.2* *7.*8&9&+47144)7*).(9.434)*1"8.3, ! :0>-?@-:@5%-@:-*505-?->5&-@D-*-/-:-4>5?@5-:(:5B1>?5@D(:5B1>?5@-?-06-4 -0-:0;:1?5- <<   

xxxi Proc. of 2018 5th Int. Conf. on Information Tech., Computer, and Electrical Engineering (ICITACEE) Measurement System for Surface Leakage Current at Epoxy Resin Insulating Materials

Wahyudi Abdul Syakur Jumrianto Dept.of Electrical Enginering Dept.of Electrical Enginering Dept.of Electrical Enginering DiponegoroUniversity DiponegoroUniversity DiponegoroUniversity Semarang, Indonesia Semarang, Indonesia Semarang, Indonesia email: [email protected] email : [email protected] email: [email protected]

Abstract—Performance of the insulating material as a new measured voltage can be used to further analyze the insulator needs to be tested. To determine how well such relationship between leakage current and voltage and performance requires testing with data acquisition techniques resistance to the insulating material under test[4]–[7]. These from analog to digital. Currently Testing is still off line by using values can be further analyzed to determine the energy used oscilloscope. To increase the accuracy of Electrical Tracking during the electrical tracking test of insulating material. measurement required on-line measurements by utilizing current Simulation using Proteus can simulate data acquisition on sensors and voltage sensors. To test the accuracy of the voltage electrical tracking test. This paper present research result on sensor and current sensor, it must be tested the sensitivity on the the electrical tracking measurement. voltage sensor. A measuring device that can simulate the voltage and current conditions in the electrical tracking test was made. If no sensitivity test is conducted, then the results obtained may not II. EXPERIMENTAL SET UP match the actual voltage and current in the measurement system. The available current and voltage sensors in the market list the A. Material Composition values and parameters in the datasheet. But the conditions in the Material composition of test sample used is an epoxy field at the time of its application is influenced many things, resin compound with silicone rubber and rice husk. The especially mechanical and electrical influences. In this paper, percentage of the test materials were shown in table I. measurement of current and voltage at sample of resin epoxy were carried out. Measurement result in this research show the average LC of rice husk ash is 46 mA. The average voltage TABLE I. TEST MATERIAL COMPOSITION during insulation failure in rice husk ash sample is 2,829 volts. The first discharge time on the average rice husk ash sample Test Material Massa (gr) occurred at the 114 second. The first discharge current of the Composition (%) Rice husk Silane DGEBA MPDA rice husk ash sample was at 20 mA. The average voltage during 20 10 10 40 40 the first discharge on the ash of rice husk ash is 3,449 volts. The 30 15 15 35 35 time of insulation failure on the average rice husk ash sample 40 20 20 30 30 occurred at 4.661 seconds Dimensions of the test material sample made [4] with the size of 120 x 50 x Keywords — Leakage Current, Epoxy Resin, Data 5 mm can be shown in Figure 1 Acquisition, Sensitivity

I. INTRODUCTION In transmission line and distribution network systems, a conductor with another conductor is insulated by air, while a conductor with a tower or supporting pole is insulated by a solid insulating material called an insulator[1]. The most common and widely used insulation materials in Indonesia are ceramics and glass. The advantages of ceramic and glass insulating materials are good heat capacity and low thermal conductivity, corrosion resistant, hard and strong, but the ceramic and glass insulation materials have a mechanical weakness that is heavy and water-absorbing (hygroscopic) so Fig. 1. Size and dimension of test sampel.[8] that leakage current easily flow on a surface that can cause flashover [1]–[3] To estimate the things that need to be done with the TABLE II. SAMPLES MADE BY EACH VARIATION OF FILLER techniques. Currently experiment test in laboratory is still off Test Material Type of Test Material Total line by using oscilloscope. To increase the accuracy of Composition Amount electrical tracking measurements required online by using Variation Rich Husk Ash sensor sensors and voltage sensors[4]. To test the accuracy of the voltage sensor and current sensor, it must be test 20% 3 pieces 3 pieces sensitivity on the voltage sensor. Insulation value material 30% 3 pieces 3 pieces resistance tested can be determined, initial steps can be 40% 3 pieces 3 pieces simulated on multi-sim program. A leakage current flow occurs when a contaminant causes a leakage current from TOTAL 9 pieces phase to ground. The value of leakage current and the

978-1-5386-5529-0/18/$31.00 ©2018 IEEE 268 B. Leakage Current Measurement 6. Applying a 3.5-kilovolt voltage on the sample, obtained Measurement of leakage current using Incline-Plane from a high-voltage generator through the top electrode, Tracking (IPT) method based on standard IEC 587: 1984[9]. while the bottom electrode is connected to a ground- The measurement circuit is shown in figure 2. On the level measuring device. measurement is used fixed voltage method with wet 7. Measure the LC using the data acquisition software by conditions. Observation of leakage current using oscilloscope pressing the initialization key to enter the comport help to record the current wave. The oscilloscope protection value and the baud rate value used in the test. Then to and protection device to limit the high voltage by installing start measuring press start menu, then data acquisition the intermediate bisector circuit shown in figure 3. will start. To stop the measurement, press the Stop menu. 8. Wait until the insulator test material forms a fire path and finally burns as far as 25 mm. That means it has failed to isolate the voltage.

Fig. 2. Leakage current measuring system .[8]

Fig. 4. Sample has been tracked as far as 25 mm

9. Saving the LC measurement results by pressing the save button on the automated data software will be stored on the laptop with the same folder with the Fig. 3. Voltage divider circuit folder where the data acquisition program is stored. 10. Measurement was complete, then copy paste in Measurements were made by limiting the occurrence of microsoft excel to see the graph. surface tracking as far as 25 mm from the bottom electrode or with a maximum measurement time of 1 hour. This standard uses two test methods to evaluate electrical III. RESULTS AND DISCUSSION insulation test materials for use under several conditions, with power frequencies (48 Hz to 62 Hz) for measurement Data of measurement results were obtained. Data to be of tracking and erosion barriers. This method is done by used for analysis of leakage current above surface insulator. steps : The first discharge rate table and LC then insulation failure 1. Make the circuit in accordance with IEC 587: 1986 and discharge current during insulation failure are shown in standard[10] Table 3. 2. Laying the top and bottom electrodes on the sample. At Table 3 Average first discharge time and isolation failure the top electrode before it is mounted on the sample it is as well as the amount of leaking current occurring in rice given 8-ply filter paper. Then place the sample on a husk ash samples. buffer so that the sample surface portion facing downward with a 45 ° angle to the horizontal axis is TABLE III. TIME TO DISCHARGE shown in Figure 3.36. 3. Set the pollutant flow rate at 0.3 ml / min, then drain Firts Discharge Failure Insulation Second Second Current Voltage Second Second Current Voltage into the sample through the filter paper. The function of (to) (t) (mA) (V) to (t) (mA) (V) using this filter paper is to have a uniform flow of 1 257 128,5 19,93 3451,57 9543 4771,5 49,228 2884.38 contaminants from the top electrode to the bottom electrode before the applied voltage. 2 211 105,5 19,931 3419,93 8107 4053,5 49,228 2842,19 4. Provides the resistance of the series IEC 587: 1984 3 214 107 19,31 3474,61 10318 5159 39,462 2814,85

series resistors for the 3.5 kilovolt test voltage with Av 227,3 114 20 3449 9323 4661 46 2829 Ω series resistor is 22K . 5. Inspect to ensure that the pollutant flows directly on the surface of the test material through the small opening of the top electrode tip toward the bottom electrode.

269 A. Sample 1 The relationship between voltage and current in test sample 1 is shown in Figure 5. 5000

4000

3000

2000 (mA) 1000 Voltage Current 0 VoltageCurrent (V), 0 5000 10000 15000 -1000 Fig. 7. Relatioship between voltage and current in sample 3 Time (s)

From the graph it can be concluded that the first Fig. 5. Relatioship between voltage and current in sample 1 discharge current occurs in the data to 214, 107 seconds with the magnitude of 19.31 mA current, voltage 3474.61 From the graph it can be concluded that the first volts. And this continues to be marked by changing discharge current occurs in the data to 257, seconds to discharge currents. So in the data to 10138, 5159 seconds to 128.5 with the magnitude of 19.93 mA current, the failure of isolation marked by the magnitude of 39.462 3451.57 volt. And this continues to be marked by mA current, voltage 2814.85 volts. changing discharge currents. So in the data to 9,543, seconds to 4771,5 failure occurs in isolation marked by IV. CONCLUSSION the magnitude 49,228 mA current, voltage 2884.38 Measurement system for surface leakage current and volts. voltage can be done in this testing the samples of rice husk ash. Measurement result in this project show the average LC B. Sample 2 of rice husk ash is 46 mA. The average voltage during The relationship between voltage and current in insulation failure in rice husk ash sample is 2,829 volts. The test sample 2 is shown in Figure 6. first discharge time on the average rice husk ash sample occurred at the 114 second. The first discharge current of the rice husk ash sample was at 20 mA. The average voltage during the first discharge on the ash of rice husk ash is 3,449 volts. The time of insulation failure on the average rice husk ash sample occurred at 4.661 seconds.

ACKNOWLEDGMENT The first author would like to thank for Dean of Engineering Faculty who has funded in this research about electrical tracking measurement.

REFERENCES Fig. 6. Relatioship between voltage and current in sample 2 [1] M. S. Naidu and V. Kamaraju, High Voltage Engineering, 3rd ed. New Delhi, 2004. From the graph it can be concluded that the first discharge current occurs in the data to 211, seconds to [2] R. Hackam, “Outdoor High Voltage Polymeric Insulators,” Proc. 1998 105.5 with the magnitude of 19.93 mA current, voltage Intlernational Symp. Electr. Insul. Mater. conjunction with 1998 Asian 3419.93 volts. And this continues to be marked by Int. Conf. Dielectr. Electr. Insul. 30th Symp. Electr. Insul. Mater. changing discharge currents. So in the data to 8.107, ‘byohashi, Japan, no. 1998, p. 1, 1998. seconds to 4053.5 failure occurs in isolation marked by [3] D. Kind, An Introduction to High Voltage Experimental Techniques. the magnitude of 49.228 mA current, voltage 2842.19 New Delhi, 1978. volts. [4] R. J. Chang and L. Mazeika, “Analysis of electrical activity associated with inclined-plane tracking and erosion of insulating materials,” IEEE C. Sample 3 Trans. Dielectr. Electr. Insul., vol. 7, no. 3, pp. 394–400, Jun. 2000. The relationship between the voltage and current [5] M. a. M. Piah, a. Darus, and a. Hassan, “Electrical tracking in the test of sample 3 is shown in Figure 7. performance of LLDPE-natural rubber blends by employing

combination of leakage current level and rate of carbon track propagation,” IEEE Trans. Dielectr. Electr. Insul., vol. 12, no. 6, pp. 1259–1265, Dec. 2005.

270 [6] F. Guastavino, A. S. Thelakkadan, G. Coletti, and A. Ratto, “Electrical Compound with Silicon Rubber,” 高电压技术, vol. 37, no. 11, pp. Tracking in Cycloaliphatic Epoxy Based Nanostructured Composites,” 2780–2785, 2011. pp. 701–704, 2009. [9] British Standard:5604, Methods for Evaluating resistance to tracking [7] L. Schmidt, X. Kornmann, A. Krivda, and H. Hillborg, “Tracking and and erosion of electrical insulating materials used under severe erosion resistance of high temperature vulcanizing ATH-free silicone ambient conditions, 1st revisi. 1986. rubber,” IEEE Trans. Dielectr. Electr. Insul., vol. 17, no. 2, pp. 533– [10] I. 60587, “Evaluating resistance to tracking and erosion of electrical 540, Apr. 2010. insulating materials used under severe ambient conditions,” 1986. [8] Abdul;Syakur, Hamzah;Berahim, Tumiran, and Rochmadi, “Experimental Investigation on Electrical Tracking of Epoxy Resin

271

SEMINAR INTERNASIONAL ICITACEE 2018

NEGARA ASAL PENULIS : 1. Indonesia 2. Malaysia 3. Kuwait 4. UK (United Kingdom) 5. Taiwan

Proc. of 2018 5th Int. Conf. on Information Tech., Computer, and Electrical Engineering (ICITACEE) Magnetic Field Relationship between Distance and Induced Voltage Generated by Electromagnetic Pulse (EMP)

Betantya Nugroho Azli Yahya Abd. Rahim Trias Andromeda School of Electrical Engineering School of Electrical Engineering Mindmatics Sdn Bhd Electrical Engineering Universiti Teknologi Malaysia Universiti Teknologi Malaysia Kajang Selangor 43000, Department Skudai Johor 81310, Malaysia Skudai Johor 81310, Malaysia Malaysia Universitas Diponegoro [email protected] [email protected] [email protected] Semarang 50275, Indonesia [email protected]

Abstract – Electromagnetic pulse (EMP) damage electrical the induced voltage of the magnetic field generated EMP and electronic circuits by inducing voltages and currents. [8][9]. Electromagnetic Pulse could be generated by any type of electrical disturbance. This can be the result of a Rezal, M., et al explain about magnetic field is generated microcontroller changing states, to a bolt of lightning, and by capacitor discharge[6]. Xiandong Pan., et al and Yunwei extremes discharge energy. EMP topology consists of capacitor Li., et al explain about cone angle and transition section and to store the energy and coil loop to generate the magnetic field. the physical parameter of the design EMP[11-15]. Most of The magnetic field induce the target coil to produce induced EMP research focused on the simulation electromagnetic voltage. This paper presents the magnetic field relationship between distance and induced voltage generated by EMP. The radiation pulse source[5][10] and effect of EMP to results show that the distance between the coil loop and the electronics[4]. This paper presents the magnetic field target coil affects the induced voltage on the target coil. The relationship between distance and induced voltage generated induced voltage at target coil decreases when the distance by EMP. Research could be further developed to estimate the between the coil is further a part. EMP effect of longer distance through the mathematic model. Keywords – Electromagnetic Pulse (EMP), magnetic field, II. MATHEMATIC MODEL induced voltage A. Magnetic field generated by the coil

I. INTRODUCTION The magnetic field along the axis a single wire loop is shown in Fig. 1. Electromagnetic pulse (EMP) damage electrical and electronic circuits by inducing voltages and currents. Electromagnetic Pulse could be generated by any type of electrical disturbance. This can be the result of a microcontroller changing states and make the microcontroller error [1-3]. Now the effect of the EMP on electronic equipment will be the result of several functions: the power of the pulse, the dynamics of the pulse being rise time and frequency ranges [4][5]. Fig. 1. Magnetic field density from single coil loop These response are broadly divided into two mode of EMP damage; physical damage and upset [1-3]. The Upset is According to Biot-Savart’s [16][17], the magnetic a temporary alteration of the electrical state of one or more field density produced at point A can be written as shown in nodes, in which the nodes no longer function normally. Equation (1). Physical damage can occur when these induced stresses are at the levels that produce the joule heating to the extent that (1) thermal damage occurs. The vector is perpendicular to p and , then is EMP consists of capacitor to store the energy and coil to , so the equation can be written as, generate the magnetic field [5]. High voltage is required to charge the capacitor, then the energy on the capacitor is (2) discharged through the coil to produce a pulse current. A pulse current flow through the coil resulting in a magnetic pulse inside the coil [6][7]. A target coil is used to measure

978-1-5386-5529-0/18/$31.00 ©2018 IEEE 7 Proc. of 2018 5th Int. Conf. on Information Tech., Computer, and Electrical Engineering (ICITACEE) The Spreading of Misinformation online: 3D

Simulation

Pardis Pourghomi Milan Dordevic Fadi Safieddine College of Engineering and Technology College of Engineering and Technology School of Business and Management American University of the Middle East American University of the Middle East Queen Mary University of London Egaila, Kuwait Egaila, Kuwait London, UK [email protected] [email protected] [email protected]

Abstract— Social media is becoming the de-facto platform for II. LITERATURE REVIEW the dissemination of information as research suggests more Internet users are using social media as their main source of news. Online social networks are becoming one of the key sources of In this model, the spread of unverified information is becoming a information and news especially among younger generations, common place where some could share misinformation as fact. according to the results of the Oxford Internet Survey [3]. News sharing on social media lacks the traditional verification Online applications and social media tools such as Facebook, methods used by professional media. In previous publications, the Twitter, etc. are considered as one of the leading methods of authors presented a model that shows the extent of the problem distributing news and user-generated content, which facilitate thus suggesting the design of a tool that could assist users to the creation and exchange of the most up-to-date information. authenticate information using a conceptual approached called However, sharing inaccurate pieces of information, referred to ‘right-click authenticate’ button. A two-dimensional simulation provided bases for a proof-of-concept and identification of key as misinformation in [4] is widespread in this medium. variables. This paper uses Biolayout three-dimensional modelling Misinformation is also defined as “piece of malicious to expand their simulations of different scenarios. Using the given information intentionally made to cause undesirable effects in variables and values, this paper presents a better understanding the general public, such as panic and misunderstanding; or to of how misinformation travels in the spatial space of social media. supplant valuable information” [5]. Moreover, arrangements The findings further confirmed that the approach of ‘right-click such as rumours, false messages, and illegal propaganda can be authenticate’ button would dramatically cut back the spread of considered a variety of misleading information that the term misinformation online. ‘misinformation’ is referring to [6]. Having misinformation shared on social media on a daily basis breaches the reliability Keywords— Misinformation; Social Media; Cascades; three- dimensional simulation; Biolayout. of those tools and can create misunderstanding among societies on particular cases. Also, the aggregation of people around I. INTRODUCTION common interests, worldviews, and narratives is simplified with the wide availability of user-provided content in social media. Social media nowadays is attracting millions of users to its various platforms, enabling them to spread information and As stated in [7], misinformation propagation occurs when share their interests across the web easily. Due to the huge malicious individuals utilise Social media tools to distribute amount of unverified information presented as facts, most of misinformation. what is seen online cannot and could not be trusted. Malicious In [8] researchers report that the increase in social media users users who have motives to sway other users’ opinions and has resulted in the increase in misinformation distribution. beliefs tend to be the source of spreading misinformation. Social media has become a major tool for the propagation of Misinformation could be in the form of chain emails, spam, fake misinformation since proper filtering techniques similar to news, dotted images, out of context images, out of context reviewing and editing information in traditional publishing is videos, misleading news and many more. The spread of this not in place to fulfil the lack in social media users’ misinformation does not only waste users’ time and efforts, but accountability [9]. Moreover, the majority of social media users could also be dangerous. Therefore, there have been attempts to may not be attentive to the untruth story as a consequence of find means or tools that would limit the spread of sharing huge volumes and diverse forms of information, misinformation on social media, hence improving the users’ misinformation, and propaganda in social media. experience in general and bring some credibility to verifying In [10] Libicki explains that prior beliefs and opinions of people content shared online [1][2]. The approach consists of influence their decision in accepting misleading information. developing a technique that limits the spread of fake news by Moreover, in [11] Kumar and Geethakumari discuss that people allowing users to authenticate it from within their web browsers. believe things which support their past judgments without If this piece of information was deemed to be unauthentic, then questioning them. False information spreads just like accurate the user will likely stop sharing it with others out of social information. However, the role of information context is responsibility, and hence will drastically limit its spread. central. This links with the survey findings by [3] that shows topics on technology, finance, politics and health are the ones

978-1-5386-5529-0/18/$31.00 ©2018 IEEE 299 Proc. of 2018 5th Int. Conf. on Information Tech., Computer, and Electrical Engineering (ICITACEE) Review on Cost-Value Approach for Requirements Prioritization Techniques

Tan Amelia Rozlina Binti Mohamed Faculty of Information System Faculty of Computer Systems & Software Engineering Institut Bisnis dan Informatika Stikom University Malaysia Pahang Faculty of Computer Systems & Software Engineering Pahang, Malaysia University Malaysia Pahang [email protected] Surabaya, Indonesia [email protected]

Abstract— The use of appropriate requirements on absolute importance, for example giving all the prioritization techniques is crucial to the success of a software requirements of a certain priority such as essential, development project. There are many techniques offered with conditional or optional. Whilst, the relative technique shows all the advantages and disadvantages of each. The question all the requirements based on the value itself, or in other that come up frequently when doing requirements words, the more important needs must be self-determined prioritization is "whether the priority list is generated based on [11]. When compared, the relative approach tends to be customer's required value?" and "whether the value is more accurate and informative than absolute [11], as well as generated comparable with the cost incurred for faster, more precise and more reliable [12]. implementation?". This paper aims to conduct an empirical systematic review to identify and review the requirements One of the relative priority techniques is the cost-value prioritization studies based on the cost-value approach. This approach [11]. The cost-value prioritization technique was literature review generates many insights including: reduction introduced by Karlsson et al [13] which has the basic of of pairwise comparisons, factors and aspects of cost-value, Analytical Hierarchy Process (AHP). This technique displays features that support cost value and cost-value constraints. the top requirements in the graph plot to visualize the requirements value compared to the implementation cost. In Keywords— Requirements Prioritization, Prioritization this cost-value approach, value is interpreted as a potential Technique, Cost-Value, AHP contribution of candidate requirement relationship for customer satisfaction on the resulting system. While cost is I. INTRODUCTION the cost incurred in order to successfully apply candidate Software development cycle is the period of time that requirements. starts from the decision to create a software product and ends The value mentioned in the cost-value approach is often when the software has been submitted. Based on IEEE, this called by the business value term. The definition of business cycle consists of requirements, design, implementation, test, value according to Patton [14] i.e. “Business value is and also installation and checkout stages [1]. The first stage something that delivers profit to the organization paying for in software development cycle is to process the requirements the software in the form of an increase in revenue, an management. One important aspect of managing avoidance of costs, or an improvement in service”. In requirements is knowing which to do first, because it is often addition, he also explained that the term "value" is often used unclear which option is better, because many aspects must be subjectively, for example: “I value something if it makes me considered. Essentially, the very important problem in the feel good” or “If I’m representing the business, then I might requirement process is choosing the right requirements view something that makes me feel good as a business [2][3][4]. Defining the requirements prioritization process is value”. one of the elements that must be implemented in the requirements management process. Firesmith [5] says that The purpose of this paper is to understand and summarize requirements prioritization can mean: firstly, priority based the empirical evidence of techniques used in requirements on implementation, which means determining the sequence prioritization based on Cost-Value approach. A systematic of tasks in the incremental development cycle and iterative. review uses a lightweight version of the SLR described by Z. Secondly, priority is based on the importance, which means Stapic and E. López [15], namely: determining the tasks sequence based on the interests of • Developing a protocol stakeholders in one or more dimensions (e.g., personal preference, business value, cost of implementation, and risk). • Defining the research question(s) The importance of requirements prioritization is caused • Specifying what will be done to address the problem by various things, among others are: not all requirements can of a single researcher applying inclusion/exclusion be fulfilled because of the limited time and resources criteria and undertaking all the data extraction available [4][6][7][8], sometimes requirements have to be allocated to different releases [8], the exact requirements are • Defining the search strategy considered as an integral part of software quality [4][9], and • Defining the data to be extracted from each primary are used to gain an understanding of market advantages and study including quality data disadvantages [4]. • Maintaining lists of included and excluded studies Requirements prioritization techniques can be separated into two categories, absolute and relative priority [10]. • Using the data synthesis guidelines Absolute technique gives priority to each requirement based

978-1-5386-5529-0/18/$31.00 ©2018 IEEE 310 Proc. of 2018 5th Int. Conf. on Information Tech., Computer, and Electrical Engineering (ICITACEE) Performance Improvement of Human Activity Recognition based on Ensemble Empirical Mode

Decomposition (EEMD) Enda Wista Sinuraya Aminuddin Rizal Department of Electrical Engineering Electronic and Computer Engineering Department Diponegoro University National Taiwan University of Science and Technology Semarang, Indonesia Taipei, Taiwan [email protected] [email protected]

Yosua Alvin Adi Soetrisno Denis Department of Electrical Engineering Department of Electrical Engineering Diponegoro University Diponegoro University Semarang, Indonesia Semarang, Indonesia [email protected] [email protected]

Abstract— Cell phone and advanced hardware, for example, because cheaper and has a high sample rate which is also fitness trackers, heart observing, and wearable gadgets are more combining depth information. regularly used nowadays to capture human exercises. Inertial Measurement Unit (IMU) sensor can read some parameter from The smartphone is a multifunction device because have human activity. Indicator and position formed from that sensor can sensors that can record human activity easily. IMU sensor is be translated back by machine learning to classify human activities. one kind of smartphone sensor to detect any human motion. Classification of human exercises known by the term Human This research conducted to use Smartphone to gain human Activity Recognition (HAR). Cell phone IMU sensor’s data is not activity recognition by using spatial data. The main purpose linear and stationary. Feature from non-linear signal can be of human activity recognition is to minimize error that extracted better by using non-linear and non-stationary signal decomposition algorithm than by using conventional frequency occurred in the activity classification process. Some methods analysis (Fourier Transform or Wavelet Transform). Ensemble are proposed by some researchers in order to gain state-of-the- Empirical Mode Decomposition (EEMD) method is better than art in human activity recognition using a smartphone. Empirical Mode Decomposition (EMD) because EEMD utilize non- linear signal decomposition based on either time-domain or In the recent decade, machine learning is used to frequency-domain. For further analysis, multi parameter added classifying something by doing prediction. However, it is not from EEMD signal processed with Hilbert-Huang Transform an easy task to “teach” the machine about how they should (HHT) to get instantaneous energy density. Instantaneous energy respond to the input. The key point of the machine learning density is representing the absolute amplitude of signal over time method is a feature extraction process. Features are something and also marginal spectrum. Marginal spectrum shows the need to be unique, differs one with others, and represent some amplitude signal in frequency domain. Instantaneous energy criteria in given information [7]. It becomes rule-of-thumb, density and amplitude of signal becomes selected properties for that more informative the features, the more accurate the classification process. The novel approach of this research is joining prediction results. Since classifier has different characteristic EEMD process as a raw signal modifier and HHT as feature extraction process. Naïve Bayes, Support Vector Machine (SVM), it is needed to be selective to choose the most suitable and random forest used as machine learning classifier. The highest classifier from the extracted feature. accuracy obtained from the Random Forest classifier and overall IMU sensors signal are not-stationary and non-linear, so accuracy of three classifiers is 95% for all four performance indexes: recall, precision, F-measure, and accuracy. instead of using conventional feature extraction such as statistical computation (mean value, median value, a variance Keywords—activity recognition, ensemble empirical mode value, and etc.) and frequency analysis (Fourier Transform decomposition (EEMD), feature extraction, IMU sensor and Wavelet Transform), feature extraction based on ensemble empirical mode decomposition (EEMD) more I. INTRODUCTION preferable. This signal analysis method has been used in the Data about human action acknowledgment and postural different field of applications, especially in the application has progress (HAPT) is extremely valuable for human life in the to deal with high intermittency signal. EEMD proposed by distinctive sort of applications and services [1]. This point Huang in 1990s [8]. The basic concept of EEMD is a drove the advancement of an algorithm or even in system decomposing signal in time-scale characteristic. After the architecture by a researcher. Pervasive and mobile computing, EEMD process, usually, some of the researches doing some surveillance-based security, context-aware computing, and Fast Fourier Transform such as Hilbert-Huang Transform ambient assistive living are the example of human activity (HHT). HHT is used in order to get a better signal description, application [2]. Human activity data is acquired through some in both frequency-domain and time-domain. As a trade-off, different methods [3]. Two major methods and most EEMD is needed more computational effort and time developed nowadays are wearable device sensor [4] and consuming [9]. For model generation stage, classifiers that machine-vision [5]. Each method has some advantages and conducted in this research are Support Vector Machine disadvantages [6]. One disadvantage of machine vision is a (SVM), Naïve Bayes, and Random Forest. limitation of the sensor viewpoint, so human movement Human activity recognition with sensitive transitional cannot flexibly be monitored. The wearable device is chosen activity is already provided on the public dataset. EEMD

978-1-5386-5529-0/18/$31.00 ©2018 IEEE 361