Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Distance Estimation based on Color-Block: A Simple Big-O Analysis Budi Rahmani; Hugo Aprilianto; Heru Ismanto; Hamdani Hamdani
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 4: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.468 KB) | DOI: 10.11591/ijece.v7i4.pp2169-2175

Abstract

This paper explains how the process of reading the data object detection results with a certain color. In this case the object is an orange tennis ball. We use a Pixy CMUcam5 connecting to the Arduino Nano with microcontroler ATmega328-based. Then through the USB port, data from Arduino nano re-read and displayed. It’s to ensure weather an orange object is detected or not. By this process it will be exactly known how many blocks object detected, including the X and Y coordinates of the object. Finally, it will be explained the complexity of the algorithms used in the process of reading the results of the detection orange object.
The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat Hamdani Hamdani; Heru Ismanto; Agus Qomaruddin Munir; Budi Rahmani; Andri Syafrianto; Didit Suprihanto; Anindita Septiarini
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8688.548 KB) | DOI: 10.11591/ijece.v8i5.pp3843-3851

Abstract

Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
The Contour Extraction of Cup in Fundus Images for Glaucoma Detection Anindita Septiarini; Hamdani Hamdani; Dyna Marisa Khairina
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (880.959 KB) | DOI: 10.11591/ijece.v6i6.pp2797-2804

Abstract

Glaucoma is the second leading cause of blindness in the world; therefore the detection of glaucoma is required. The detection of glaucoma is used to distinguish whether a patient's eye is normal or glaucoma. An expert observed the structure of the retina using fundus image to detect glaucoma. In this research, we propose feature extraction method based on cup area contour using fundus images to detect glaucoma. Our proposed method has been evaluated on 44 fundus images consisting of 23 normal and 21 glaucoma. The data is divided into two parts: firstly, used to the learning phase and secondly, used to the testing phase. In order to identify the fundus images including the class of normal or glaucoma, we applied Support Vector Machines (SVM) method. The performance of our method achieves the accuracy of 94.44%.