Articles
50 Documents
Search results for
, issue
"Vol 10, No 2: May 2018"
:
50 Documents
clear
An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm
Kumaran Umapathy;
Neelu Khare
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp807-816
Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore it is not possible to prevent undesired messages. Providing the service is not only a matter of using previously defined web content mining and security techniques. To overcome the issues, Level-level Security Optimization & Content Visualization Algorithm is proposed to avoid the privacy issues during content sharing and data visualization. It adopts level by level privacy based on user requirement in the social network. It evaluates the privacy compatibility in the online social network environment to avoid security complexities. The mechanism divided into three parts namely like online social network platform creation, social network privacy, social network within organizational privacy and network controlling and authentication. Based on the experimental evaluation, a proposed method improves the privacy retrieval accuracy (PRA) 9.13% and reduces content retrieval time (CRT) 7 milliseconds and information loss (IL) 5.33%.
Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review
Farah H. A. Jabar;
Janatul Islah Mohammad;
Ahmad Faizal Mohd Zain;
Abu Bakar Hasan
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp490-497
It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.
Securing Data Communication for Data Driven Applications Using End to End Encryption
Subhi Almohtasib;
Alaa H Al-Hamami
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp756-762
Many users of smartphones have secret data they want to save it on their devices. The probability of a device damage or stolen prevents them from saving data. Therefore, data driven applications used to save user’s data on a remote server. Protection of the data during its transmission considered as one of the success aspect for these applications. In this paper, an enhanced method for data encryption proposed which guarantees data secrecy during its transmission over network. User’s data encrypted before transmission using Base64 class. Data encryption and decryption implemented to halt reverse encryption process. In this way, data is transmitting in a secure and efficient manner accomplishing the main goal of Cryptography.
SEC-TAED based Error Detection and Correction Technique for Data Transmission Systems
Mr. G. Manikandan;
Dr. M. Anand
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp696-703
In the OFDM communication system channel encoder and decoder is the part of the architecture. OFDM channel is mostly affected by Additive White Gaussian Noise (AWGN) in which bit flipping of original information leads to fault transmission in the channel. To overcome this problem by using hamming code for error detection and correction. Hamming codes are more attractive and it easy to process the encoding and decoding with low latency. In general the hamming is perfectly detected and corrects the single bit error. In this paper, design of single Error Correction-Triple Adjacent Error Detection (SEC-TAED) codes with bit placement algorithm is presented with less number of parity bits. In the conventional Double Adjacent Error Detection (DAED) and Hamming (13, 8) SEC-TAED are process the codes and detects the error, but it require more parity bits for performing the operation. The higher number of parity bits causes processing delay. To avoid this problem by proposed the Hamming (12, 8) SEC-TAED code, it require only four parity bits to perform the detection process. Bit-reordered format used in the method increases the probability detection of triple adjacent error. It is more suitable for efficient and high speed communication.
Reducing Total Power Consumption and Total Area Techniques for Network-on-Chip Through Disable Cores and Routers Based on Clustering Method
Ng Yen Phing;
M.N. Mohd Warip;
Phaklen Ehkan;
S.Y. Teo
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp514-520
Network-on-Chip (NoC) is a promising solution to overcome the communication problem of System-on-Chip (SoC) architecture. The execution of topology, routing algorithm and switching technique is significant because it powerfully affects the overall performance of NoC. In the Network-on-Chip, the total power consumption increasing due to the large scale of network. In order to solve it, a clustering method and disable cores and routers based on clustering method is apply onto mesh based NoC architecture. In the proposed approach, the optimization of total area and total power consumption are the major concern. Experiment results show that the proposed method outperformas the existing work. The clustering-mesh based method reduced the total area by 22% to 40 % and total power consumption by 22% to 56% compare to mesh topology. In addition, the proposed method by disable cores and routers based on clustering-mesh based method has decrease the total area by 45% to 87% and total power consumption by 33% to 75% compare to mesh topology.
IoT: Electrocardiogram (ECG) Monitoring System
Kristine Joyce P. Ortiz;
John Peter O. Davalos;
Elora S. Eusebio;
Dominic M. Tucay
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp480-489
Internet of Things (IoT) has many applications in the medical field. With remote-information gathering, healthcare professionals can evaluate, diagnose and treat patients in remote locations using telecommunications technology. This study aimed to develop a small-scale electrocardiogram (ECG) monitoring device that will measure heart rates and waveforms and send the data in a database and a web server. An ECG acquisition device was developed using a single-lead heart rate monitor sensor and an Arduino microcontroller. A program, which will process, analyze and upload the ECG data is coded using MATLAB and C# programs. The collected information is viewed in a Graphical User Interface (GUI) display, coded using C# and in a webpage. Rapid Application Technology (RAD) was used in the methodology, which began with a quick design of the system. The hardware and software systems underwent a prototyping cycle for development. Once finished, the integration of the system is conducted to construct a complete IoT-based ECG monitoring system. For testing using t-test, a sample size of 18 and a a= 0.05 is used. Testing resulted into t-test values that lie in the non-critical zone for all ECG parameters, denoting that there is no significant difference between the gathered data. The device’s percent reliability in detecting ECG conditions such as normal sinus rhythm, sinus tachycardia, sinus bradycardia and flatline, is 83.33%. The percent difference for the heart rate is 0.35 %, which falls within the acceptable medical standard of 99% accuracy. The device was deemed functional and reliable.
Intelligent Packet Delivery in Router Using Structure Optimized Neural Network
R. Deebalakshmi;
V. L. Jyothi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp545-553
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.
Development of English Handwritten Recognition Using Deep Neural Network
Teddy Surya Gunawan;
Ahmad Fakhrur Razi Mohd Noor;
Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp562-568
Due to the advanced in GPU and CPU, in recent years, Deep Neural Network (DNN) becomes popular to be utilized both as feature extraction and classifier. This paper aims to develop offline handwritten recognition system using DNN. First, two popular English digits and letters database, i.e. MNIST and EMNIST, were selected to provide dataset for training and testing phase of DNN. Altogether, there are 10 digits [0-9] and 52 letters [a-z, A-Z]. The proposed DNN used stacked two autoencoder layers and one softmax layer. Recognition accuracy for English digits and letters is 97.7% and 88.8%, respectively. Performance comparison with other structure of neural networks revealed that the weighted average recognition rate for patternnet, feedforwardnet, and proposed DNN were 80.3%, 68.3%, and 90.4%, respectively. It shows that our proposed system is able to recognize handwritten English digits and letters with high accuracy.
Data-Driven Impedance Matching in Multilateral Teleoperation Systems
Mohd Syakirin Ramli;
Hamzah Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp713-724
This paper addresses a tuning approach to improve transparency between master and slave manipulators in a multilateral teleoperation system. The slave manipulators comprised of multi-agents of simple mass are converted into a bilateral system through the passive decomposition technique. There are two main operations being considered, namely; grasping and handling. The object grasping is achieved through consensus control. For handling, an equalizer constructed by a Laguerre function connected in-feedback-loop to the master manipulator is chosen and tuned to achieve impedance matching between both sides of teleoperation. Fictitious Reference Iterative Tuning (FRIT) is adopted to properly tune the selected equalizer. The result shows that by introducing an optimally tuned equalizer, the overall impedance matching and transparency between the single master and multi-slave manipulators are improved. Finally, the effectiveness of the proposed tuning algorithm is presented through a numerical example.
Q-switched Erbium Doped Fiber Laser Incorporating Antimony (III) Telluride in Polyvinyl Alcohol as Saturable Absorber
Ezzatul Irradah Ismail;
S Muhammad Ashraf Zolkopli;
Muhammad Quisar Lokman;
Hafizal Yahaya;
Sulaiman Wadi Harun;
Fauzan Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp409-415
In this paper, we demonstrated a Q-switched erbium doped fiber laser (EDFL) incorporating Antimony (III) Telluride (Sb2Te3) in polyvinyl alchohol (PVA) as passive saturable absorber. The saturable absorber were fabricated by dissolving Antimony (III) Telluride powder into PVA solution and dry in the ambient temperature for 48 hours. Then, 1 mm2 x 1 mm2 Sb2Te3-PVA film based saturable absorber were sandwiched in between FC/PC ferrule for Q-switched laser generation. The stable and self-started Q-switched laser operates at center wavelength 1560 nm with 3 dB bandwidth of 0.23 nm. The laser operates at pump power of 29.3 mW until 84.9 mW with repetition rate of 20.99 kHz to 89.29 kHz and pulse width of 13.95 µs to 5.10 µs. At maximum pump power, the laser able to achieve pulse energy of 62.72 nJ and high signal to noise ratio of 71.4