Claim Missing Document
Check
Articles

Found 6 Documents
Search

Pineapple maturity classifier using image processing and fuzzy logic Edwin R. Arboleda; Christian Louis T. de Jesus; Leahlyne Mae S. Tia
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 10, No 4: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v10.i4.pp830-838

Abstract

This paper describes the development of a prototype using an image processing system for extracting features and fuzzy logic for classifying the maturity of pineapple fruits depending on the colors of its scales. The standards that the system used are from Philippine National Standards for fresh fruits-pineapple for the 'queen' variant. The prototype automatically classified the maturity of queen pineapple variant grown in Munting Ilog, Silang, Cavite, Philippines. Data gathered are from the images loaded into the system using a camera unit under a controlled environment. The images loaded consist of the three faces of the pineapple sample, each with 120-degree coverage to capture the whole 360-degree view of the scale. The images then are sent to the system of the prototype where the features of the images are segmented based on the RGB color reduction. By using the fuzzy logic classifier, the obtained experimental results showed 100% accuracy for both the unripe and overripe maturity and 90% accuracy for the under-ripe and ripe maturity classification. The results obtained show that the developed image processing algorithm and the fuzzy-logic-based classifier could be used as an accurate and effective tool in classifying the maturity of pineapples.
Green coffee beans feature extractor using image processing Edwin R. Arboleda; Arnel C. Fajardo; Ruji P. Medina
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.13968

Abstract

This study offers a novel solution to deal with the low signal-to-noise ratio and slow execution rate of the first derivative edge detection algorithms namely, Roberts, Prewitt and Sobel algorithms. Since the two problems are brought about by the complex mathematical operations being used by the algorithms, these were replaced by a discriminant. The developed discriminant, equivalent to the product of total difference and intensity divided by the normalization values, is based on the “pixel pair formation” that produces optimal peak signal to noise ratio. Results of the study applying the discriminant for the edge detection of green coffee beans shows improvement in terms of peak signal to noise ratio (PSNR), mean square error (MSE), and execution time. It was determined that accuracy level varied according to the total difference of pixel values, intensity, and normalization values. Using the developed edge detection technique led to improvements in the PSNR of 2.091%, 1.16 %, and 2.47% over Sobel, Prewitt, and Roberts respectively. Meanwhile, improvement in the MSE was measured to be 13.06%, 7.48 %, and 15.31% over the three algorithms. Likewise, improvement in execution time was also achieved at values of 69.02%, 67.40 %, and 65.46% over Sobel, Prewitt, and Roberts respectively.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling Edwin R. Arboleda; Joel L. Balaba; John Carlo L. Espineli
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.735 KB) | DOI: 10.11591/eei.v6i3.627

Abstract

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
Smart Wheelchair with Dual Control using Touchpad and Android Mobile Device Edwin R. Arboleda; Yna Victoria P. Paulite; Neil Jerome C. Carandang
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 6, No 1: March 2018
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v6i1.342

Abstract

The general objective of the design was to develop a touchpad controlled Android-based electronic wheelchair. It aimed to construct the Android-based circuitry and program for the path finding mechanism of the drive system and interface the Arduino-based circuit to the electronic wheelchair setup. It was designed to evaluate the system in terms of the speed of the electronic wheelchair, reliability of the sensors to avoid obstacle, and ease of use of the wheelchair. C Programming Language was used by the system to control and manipulate the microcontroller, Gizduino AtMega644. The Android application was programmed using the Java Language and Eclipse as the IDE. Its ports were used to interface input and output devices such as the ultrasonic sensors, infrared proximity sensor, touchpad, Bluetooth module, motor and motor driver. There was a satisfactory rating for the evaluation of the system while the Android software was rated excellent as a navigational controller.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling Edwin R. Arboleda; Joel L. Balaba; John Carlo L. Espineli
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.735 KB) | DOI: 10.11591/eei.v6i3.627

Abstract

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling Edwin R. Arboleda; Joel L. Balaba; John Carlo L. Espineli
Bulletin of Electrical Engineering and Informatics Vol 6, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.735 KB) | DOI: 10.11591/eei.v6i3.627

Abstract

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.