Articles
52 Documents
Search results for
, issue
"Vol 11, No 3: September 2018"
:
52 Documents
clear
Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks
B. Sugumar;
M. Ramakrishnan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1060-1067
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key escrow scheme is implemented with the light weighted symmetric algorithm, elliptic curve cryptography in the distributed environment. Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme. The implementation of Key Escrow mechanism with Elliptical Curve Cryptography provides wide range of flexibility and confidentiality in the distributed environment. It also eliminates private secret sub key problem and thereby ensuring better security.
Location of Eyes in Images of Human Faces through Analysis Variance Shine Intensity
Hussein Ali Alhamzawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp949-953
Extraction of facial features is an important step in automatic visual interpretation and recognition of human faces. Among the facial features, the eyes play a major role in the recognition process. In this article, we present an approach to detect and locate the eyes in frontal face images. Eye regions are identified using the technique of voucher detection based on mathematical morphology. After this identification is made a comparison between the variances of three different portions of each candidate region to eye (set of pixels belonging to the candidate region as a whole, set of pixels contained in a minimum rectangle circumscribed to the candidate region and set of pixels of the candidate region belonging to a horizontal band that crosses the center of mass of this region). The calculation of these variances also considers the R, G, and B channels, as well as the gray version of the input image.
Kinect-Based Physiotherapy and Assessment: A Comprehensive Review
Fadilla ‘Atyka Nor Rashid;
Nor Surayahani Suriani;
Ain Nazari
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1176-1187
Kinect-based physical rehabilitation grows significantly as a mechanism for clinical assessment and rehabilitation due to its flexibility, low-cost and markerless system for human action capture. It is also an approach to provide convenience for for patients’ exercises continuation at home. In this paper, we discuss a review of the present Kinect-based physiotherapy and assessment for rehabilitation patients to provide an outline of the state of art, limitation and issues of concern as well as suggestion for future work in this approach. The paper is constructed into three main parts. The introduction was discussed on physiotherapy exercises and the limitation of current Kinect-based applications. Next, we also discuss on Kinect Skeleton Joint and Kinect Depth Map features that being used widely nowadays. A concise summary with significant findings of each paper had been tabulate for each feature; Skeleton Joints and Depth Map. Afterwards, we assemble a quite number of classification method that being implemented for activity recognition in past few years.
A Survey of Video Based Action Recognition in Sports
Nur Azmina Rahmad;
Muhammad Amir As'ari;
Nurul Fathiah Ghazali;
Norazman Shahar;
Nur Anis Jasmin Sufri
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp987-993
Sport performance analysis which is crucial in sport practice is used to improve the performance of athletes during the games. Many studies and investigation have been done in detecting different movements of player for notational analysis using either sensor based or video based modality. Recently, vision based modality has become the research interest due to the vast development of video transmission online. There are tremendous experimental studies have been done using vision based modality in sport but only a few review study has been done previously. Hence, we provide a review study on the video based technique to recognize sport action toward establishing the automated notational analysis system. The paper will be organized into four parts. Firstly, we provide an overview of the current existing technologies of the video based sports intelligence systems. Secondly, we review the framework of action recognition in all fields before we further discuss the implementation of deep learning in vision based modality for sport actions. Finally, the paper summarizes the further trend and research direction in action recognition for sports using video approach. We believed that this review study would be very beneficial in providing a complete overview on video based action recognition in sports.
Dynamic Voltage Restorer for Sag and Swell Issues in Power System
Lakshmi Lakshmi Kumari;
Uma Vani Uma Vani
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1243-1250
This paper presents the application of dynamic voltage restorers (DVR) on power distribution Systems for mitigation of voltage sags/swells at critical loads. DVR is one of the compensating types of custom power devices. The power quality is affected mainly due to the sensitive loads which results in voltage sag and voltage swells. It is necessary to investigate the suitable methods for mitigation of voltage sags. Sensitivity is the main cause of the above power quality problems and it cannot be eliminated completely as it has many other operating properties. So the next possible solution is to correct the problems caused by the sensitive equipments connected to the faulty loads. The occurrence of sag and swell varies with equipment, environment, process operations, desired control schemes etc. From the wide range of mitigation methods, the selected one has to be observed for the effect on the characteristics. These problems can be mitigated with voltage injection method using custom power device, Dynamic Voltage Restorer (DVR). In this paper we design a Dynamic Voltage Restorer (DVR) which is utilized for power quality improvement. The main power quality problems like voltage sag and swell are studied in this paper. The device used to phase out voltage sags and a swell in the distribution lines is the Dynamic Voltage Restorer (DVR). The Dynamic Voltage Restorer is a special type of power device used for providing consistent and reliable supply power to the load devices. Dynamic Voltage Restorer uses a vector control strategy for mitigating power quality problems by automatically detecting and injecting the voltage components through an injection transformer. Here comes the importance of soft computing techniques like PI controller. The system will be able to correct repeated occurrences of the power quality problems.
Long Reach and High Capacity Hybrid Passive Optical Network
Subhashini N;
Brintha Therese A
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp891-897
A number of applications are growing day by day and so the traffic. The need for bandwidth is also increasing at a rapid rate. The bandwidth and speed with which data can be transferred was very less when compared to core networks. The access network which was once a bottleneck is no longer so because of use of optic fiber (FTTH networks). A number of variants of Passive Optical Network (PON) have been proposed like the WDM PON and the Hybrid PON. Hybrid PON is a combination of TDM PON and WDM PON and is advantageous over WDMPON. This paper focuses on high capacity networks that can provide high data rate and long reach in the access part of the network. NRZ modulation format is normally used for transmission. We consider the advantages provided by the advanced modulation formats like DPSK. This modulation format is used to here and its benefits are evaluated in Hybrid PON network to increase the capacity and the reach of the network. Parameters like the BER and the Q factors are analysed using Optisystem Software. Distortion and the phenomena of dispersion can limit the performance of such a system. Hence Dispersion compensation mechanisms like the Dispersion Compensation Fiber (DCF) are used in the system to transmit data over large distance.
Discrete Chicken Swarm Optimization for the Quadratic Assignment Problem
Soukaina Cherif Bourki Semlali;
Mohammed Essaid Riffi;
Fayçal Chebihi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp925-935
The main objective of our research is to improve an adaptation of the chicken swarm optimization algorithm (CSO) to solve the quadratic assignment problem, which is a well-known combinatorial optimization problem. The new approach is based on the CSO without using a local search, the CSO-QAP is a stochastic method inspired from the behavior of chickens in swarm while searching for food. The experiments are performed on a set of 56 benchmark QAPLIB instances. To prove the robustness of our algorithm a comparative analysis is done with the known metaheuristic of Genetic algorithm based on SCX. The average percentage of error to get the best Known solution in our proposed work with the results obtained by applying a simple genetic algorithm using sequential constructive crossover for the quadratic assignment problem. The results show the effectiveness of the proposed CSO-QAP to solve the Quadratic assignment problem in term of time and quality of solutions. The proposed adaptation can be further applied by using a local search strategy to solve the same problem or another combinatorial problem.
Contact Lens Classification by Using Segmented Lens Boundary Features
Nur Ariffin Mohd Zin;
Hishammuddin Asmuni;
Haza Nuzly Abdul Hamed;
Razib M. Othman;
Shahreen Kasim;
Rohayanti Hassan;
Zalmiyah Zakaria;
Rosfuzah Roslan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1129-1135
Recent studies have shown that the wearing of soft lens may lead to performance degradation with the increase of false reject rate. However, detecting the presence of soft lens is a non-trivial task as its texture that almost indiscernible. In this work, we proposed a classification method to identify the existence of soft lens in iris image. Our proposed method starts with segmenting the lens boundary on top of the sclera region. Then, the segmented boundary is used as features and extracted by local descriptors. These features are then trained and classified using Support Vector Machines. This method was tested on Notre Dame Cosmetic Contact Lens 2013 database. Experiment showed that the proposed method performed better than state of the art methods.
A Study of Some Iterative Methods for Solving Fuzzy Volterra-Fredholm Integral Equations
Ahmed A. Hamoud;
Ali Dhurgham Azeez;
Kirtiwant P. Ghadle
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1228-1235
This paper mainly focuses on the recent advances in the some approximated methods for solving fuzzy Volterra-Fredholm integral equations, namely, Adomian decomposition method, variational iteration method and homotopy analysis method. We converted fuzzy Volterra-Fredholm integral equation to a system of Volterra-Fredholm integral equation in crisp case. The approximated methods using to find the approximate solutions of this system and hence obtain an approximation for the fuzzy solution of the fuzzy Volterra-Fredholm integral equation. To assess the accuracy of each method, algorithms with Mathematica 6 according is used. Also, some numerical examples are included to demonstrate the validity and applicabilityof the proposed techniques.This paper mainly focuses on the recent advances in the some approximated methods for solvingfuzzy Volterra-Fredholm integral equations, namely, Adomian decomposition method, variational iterationmethod and homotopy analysis method. We converted fuzzy Volterra-Fredholm integral equation to asystem of Volterra-Fredholm integral equation in crisp case. The approximated methods using to find theapproximate solutions of this system and hence obtain an approximation for the fuzzy solution of the fuzzyVolterra-Fredholm integral equation. To assess the accuracy of each method, algorithms with Mathematica 6according is used. Also, some numerical examples are included to demonstrate the validity and applicabilityof the proposed techniques.
A Comparative Study and Analysis on Conventional Solar PV Based DC-DC Converters and MPPT Techniques
Premkumar Manoharan;
Karthick K;
Sowmya R
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp831-838
As electricity demand escalated with supply, though there are lot of thermal power station, nuclear energy and other conventional power sources. Yet, there is exhaustion in the above assets and adding dangerous impacts to the atmospheric conditions. The world searches for sustainable power source that it is normally accessible such as sun and wind. Apart from all the renewable energy resources, solar energy is readily harnessed for domestic application to meet demand. To increase the power conversion efficiency from the solar PV system it is better have a perfect DC to DC converters. The proposed outcome of this paper is to outline the DC to DC converter with MPPT algorithms to concentrate on extreme productivity at roof-top for solar PV application which decreases the cost of energy. In addition to that it also prevents panel miss matching at all environmental conditions for safer DC Voltage with flexible site design especially for domestic applications from the solar photovoltaic module. It is necessary to analyze the converters and MPPT algorithms under closed loop condition for the design and installation of solar PV system to the load or to the grid. This review summarizes few DC to DC converter topologies, maximum power point tracking algorithm and also paid attention on the advantages and disadvantages of these algorithms and topologies.