Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Improvement of binarization performance using local otsu thresholding Khairun Saddami; Khairul Munadi; Yuwaldi Away; Fitri Arnia
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1775.514 KB) | DOI: 10.11591/ijece.v9i1.pp264-272

Abstract

Ancient document usually contains multiple noises such as uneven-background, show-through, water-spilling, spots, and blur text. The noise will affect the binarization process. Binarization is an extremely important process in image processing, especially for character recognition. This paper presents an improvement to Nina binarization technique. Improvements were achieved by reducing processing steps and replacing median filtering by Wiener filtering. First, the document background was approximated by using Wiener filter, and then image subtraction was applied. Furthermore, the manuscript contrast was adjusted by mapping intensity of image value using intensity transformation method. Next, the local Otsu thresholding was applied. For removing spotting noise, we applied labeled connected component. The proposed method had been testing on H-DIBCO 2014 and degraded Jawi handwritten ancient documents. It performed better regarding recall and precision values, as compared to Otsu, Niblack, Sauvola, Lu, Su, and Nina, especially in the documents with show-through, water-spilling and combination noises.
Ordinal Measure of Discrete Cosine Transform Coefficients and its Application to Fingerprint Matching Fitri Arnia; Hendra Hidayat; Roslidar Roslidar; Khairul Munadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 6: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (885.306 KB)

Abstract

Recently, the identification system is not limited in using an ID and personal identification number (PIN) but also in using biometriccharacteristics.One of biometric characteristics that has been widely used is fingerprint.This paper proposes a fingerprint matching algorithms using ordinal measure of DCT coefficient. The ordinal measure of DCT coefficient is generated from DCT blocks with size 8x8 pixels. Matching level was determined by computing the Minkowski distance between features of input fingerprint image and fingerprint images in the database. The simulations were accomplished using 128 fingerprints that have been normalized, from which as many as 1024 genuine attempts and 15360 impostor attempts were generated. The proposed algorithms achievedan Equal Error Rate (EER) at threshold 0.3. At the EER, it resulted in FAR value of 0.82%, and FRR value of 78.41% respectively.The low value of FAR showed that the system wasconsiderably secure.DOI:http://dx.doi.org/10.11591/ijece.v3i6.4373
Moment invariant-based features for Jawi character recognition Fitri Arnia; Khairun Saddami; Khairul Munadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (953.432 KB) | DOI: 10.11591/ijece.v9i3.pp1711-1719

Abstract

Ancient manuscripts written in Malay-Arabic characters, which are known as "Jawi" characters, are mostly found in Malay world. Nowadays, many of the manuscripts have been digitalized. Unlike Roman letters, there is no optical character recognition (OCR) software for Jawi characters. This article proposes a new algorithm for Jawi character recognition based on Hu’s moment as an invariant feature that we call the tree root (TR) algorithm. The TR algorithm allows every Jawi character to have a unique combination of moment. Seven values of the Hu’s moment are calculated from all Jawi characters, which consist of 36 isolated, 27 initial, 27 middle, and 35 end characters; this makes a total of 125 characters. The TR algorithm was then applied to recognize these characters. To assess the TR algorithm, five characters that had been rotated to 90o and 180o and scaled with factors of 0.5 and 2 were used. Overall, the recognition rate of the TR algorithm was 90.4%; 113 out of 125 characters have a unique combination of moment values, while testing on rotated and scaled characters achieved 82.14% recognition rate. The proposed method showed a superior performance compared with the Support Vector Machine and Euclidian Distance as classifier.
Improved Model of the Selection with Soft- and Hard-Combining Decoding Strategies for Multi-User Multi-Relay Cooperative Networks Nasaruddin Nasaruddin; Yunida Yunida; Khairul Munadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (367.895 KB) | DOI: 10.11591/ijece.v6i4.pp1766-1778

Abstract

In a wireless cooperative network, system reliability can be improved by introducing network coding (NC) for transmitting data packets from user to destination through relay nodes. At the destination, a decoding strategy is required to recover the original data packets. The use of NC in cooperative networks has been intensively studied in previous works in terms of the conventional model for two users and a single relay in a network. However, the network model cannot act as a virtual multiple-input multiple-output system, and a multi-user multi-relay network model could be used in a real system. Therefore, this paper proposes an improved model of two network decoding strategies, selection with soft combining (SSC) and selection with hard combining (SHC), for multi-user multi-relay cooperative networks. Users are classified based on their channel conditions, with better signal-to-noise (SNR) ratio sources being viewed as strong users, and others as weak or moderate users in the decoding strategies. To evaluate the performance of the proposed model, we first derive the bit error probability expressions for each strategy as a function of SNR and then evaluate the performance using numerical simulation for a Rayleigh fading channel. Simulation results show that SSC outperforms SHC. Furthermore, the improvement in network performance is achieved either by having a higher modulation level or using incremental relaying as the signal reception method at the destination.