cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 63 Documents
Search results for , issue "Vol 12, No 3: December 2018" : 63 Documents clear
A Conceptual Framework for Gamified Learning Management System for LINUS Students Syadiah Nor Wan Shamsuddin; Muhammad Faisal Selman; Ismahafezi Ismail; Maizan Mat Amin; Norkhairani Abdul Rawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1380-1385

Abstract

Gamification is a term that refers to the use of game elements in non-game contexts. Gamification in education is emerging as an effective tool to motivate and engage learners in a variety of tasks. LINUS program is intended to ensure that all students from standard one are able to master the basics of reading, writing and counting at the end of standard three. Gamification will help as a learning tool to assist with the learning process for those who have difficulty in learning, unlike normal students. Therefore, the aim of this paper is to propose a framework of Gamified Learning Management System for Linus students. This framework consists of mechanisms of gamification elements, multimedia elements and learning theory that construct gamified learning management system.
Empowering E-governance with E-voting Amarjeet Singh; Ramakanth Kumar P; Nagaraj G Cholli
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1081-1086

Abstract

Advances in Information and Communications Technology (ICT) have impacted the society in many ways. Be it education, healthcare, media or governance, the transformation is visible. As individual entities like education or healthcare systems have already implemented ICT to certain extent, e-governance is yet to make a significant progress even though several initiatives are undertaken. E-governance means activities like voting, administration, financial transaction etc., are enabled using automation systems.  This paper discusses one part of the e-governance; e-voting. As e-voting empowers government, there are lot of challenges in implementing the e-voting system considering security threats and confidentiality involved in it. Online voting (e-voting) needs to be deployed as more convenient, relatively secure and less resource consuming system.   E-voting system should ensure convenience for people to be able to access the system from personal or public computer with security and confidentiality. The presence of e-voting system with all the necessary security measures and convenience can be a potential solution for low voter turnout at the polls.  The presented work demonstrates an online e-voting prototype system called SecureV. The proposed model achieves specific tasks namely, maintaining the anonymity of the voter, encryption of the vote, integrity check and avoids second time voting.
A Review on Registration of Medical Images Using Graph Theoretic Approaches Akshaya R; Hema P Menon
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp974-983

Abstract

Image registration is very essential for image analysis especially in the medical field. The registered image helps us to find a lot of things like the presence of a tumor, aneurysm, and many more. Image registration is a process of aligning two images that were captured during different conditions that makes analyzing of images possible. There are various methods in which images can be registered. This paper mainly discusses the methods that use the graph approach to register the medical images. The main focus is on rigid and non-rigid registration techniques and gives a brief description of the methods present.
Design of Quasi-Elliptic Bandpass Filter for Substrate Integrated Waveguide (SIW) Using Cross Coupling Technique Muhajir Mustapa; ZahrilAdha Zakaria; Noor Azwan Shairi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1366-1372

Abstract

This paper proposes a quasi-elliptic band pass filter in substrate integrated waveguide (SIW) by using cross coupling technique to produce transmission zeros (TZs) at both side. Finally, a fourth pole SIW quasi-elliptic filter at 5.75 GHz is designed in single layer substrate. Simulation results show that the filter has a center frequency of 5.75 GHz with the bandwidth of 100 MHz. The minimum insertion loss in the passband is 0.3 dB, and the return loss is better than 20 dB. Due to the TZs, the SIW filter has rapid transition performance at both lower and upper sidebands, good selectivity is achieved, while the SIW filter presents a very compact implementation and goodspurious rejection.
Cardiac Motions Classification on Sequential PSAX Echocardiogram Adam Shidqul Aziz; Riyanto Sigit; Achmad Basuki; Taufik Hidayat
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1289-1296

Abstract

Cardiac wall motions classification on 2-dimensional (2D) echocardiographic images is an important issue for quantitative diagnosiing of heart disease. Unfortunately, the bad quality of echocardiogram cause computationally classification on cardiac wall motions is still become a big homework for many researchers to provide the best result. Echocardiogram is produced by soundwaves which absolutely make its images have speckle noise in different intensity. Therefore, this research improves a set of methodology to classify cardiac wall motion semi-automatically. Raw echocardiogram will be enhanced and segmented to take the boundary of endocardium of left ventricular in PSAX cardiac images. New improvement of Semi-automatically methodology is approach on detecting the contour of endocardium and will be inputed as good features in Lucas-Kanade Optical Flow in all sequential echocargraphic images. On classifying cardiac wall motions, this research proposes two important features including length of displacement and flow direction. New proprosed flow determination algorithm and Euclidean distance is used to calculate those features. All the features will be trained by Neural Network (NN) and validated by Leave One Out (LOO) to get accurate result. NN method, which is validated by LOO, has the best result of 81.82% correctness than the other compared methods.
QoS Management in WSN-MCN Convergence Network Using Priority Based Traffic Models Anita Swain; Arun Kumar Ray
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1159-1170

Abstract

Technological advancements and increased developments leads to increase the development of hand-held devices which encourage the growth of Machine-to-Machine (M2M) communication. In this context devices belongs to heterogeneous network require a common platform to meet the challenges of data centric wireless services and applications. To satisfy the needs of M2M communication, Mobile Cellular Network (MCN) and Wireless Sensor Network (WSN) converged to a single platform. In this paper two priority models has been proposed with non preemptive priority and preemptive priority to analyze the data traffic at MAC layer of the converged network. The performance matrices are determined to maintain QoS in terms of reduced dropping and blocking probability, waiting time in the queue etc. Finally, the proposed models are compared in terms of QoS factors.
Developing an Userfriendly Online Shopping Web-Site G saibaba; prasanth vaidya
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1126-1131

Abstract

In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use ecommerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the underdeveloped world is not that great and there is a lot to desire for It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity.
Event-Concept Pair Series Extraction to Represent Medical Complications from Texts Chaveevan Pechsiri; Sumran Phainoun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1320-1333

Abstract

This research aims to determine an event-concept pair series as consequent events, particularly a Cause-Effect-concept pair (called ‘CEpair’) series on disease documents downloaded from hospital-web-boards. CEpair series are used for representing medical/disease complications which benefit for Solving system. Each causative/effect event concept is expressed by a verb phrase of an elementary discourse unit (EDU) which is a simple sentence. The research has three problems; how to determine each adjacent-EDU pair having the cause-effect relation, how to determine a CEpair series mingled with non-causeeffect-relation EDUs, and how to identify the complication of several extracted CEpair series from the documents. Therefore, we extract NWordCo-concept set having the causative/effect concepts from EDUs’ verb phrases including a support vector machine to solve each NWordCo size. We apply the Naïve Bayes classifier to learn and extract an NWordCoconcept pair set as a knowledge template having the cause-effect relation from the documents. We then propose using the knowledge template to extract several CEpair series. We also apply the intersection of the NWordCo-concept sets to identify the commoncause/effect for representing the complication-development parts of the extracted-CEpair series. The research results provide the high percent correctness of the CEpair-series determination from the documents.
Decision Making in the Tea Leaves Diseases Detection Using Mamdani Fuzzy Inference Method Arif Ridho Lubis; Santi Prayudani; Muharman Lubis; Al Khowarizmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1273-1281

Abstract

The tea plants (Camellia Sinensis) are small tree species that use leaves and leaf buds to produce tea harvested through a monoculture system. It is an agriculture practice to cultivate one types of crop or livestock, variety or breed on a farm annually. Moreover, the emergence of pests, pathogens and diseases cause serious damages to tea plants significantly to its productivity and quality to optimum worst. All parts of the tea plant such as leaves, stems, roots, flowers and fruits are exposed to these harm lead to loss of yield 7 until 10% per year. The intensity of these attacks vary greatly on particular climate, the degree slope and the plant material used. Therefore, this study analyzes tea leaves as a common part used in recipes to create unique taste and flavor in tea production, especially in agro-industry. The decision making method used is Fuzzy Mamdani Inference as one of model with functional hierarchy with initial input based on established criteria. Fuzzy logic will provide tolerance to the set of value, so that small changes will not result in significant category differences, only affect the membership level on the variable value. Previous method using probabilities have shown 78% tea leaves have been attacked by category C (Gray Blight) while using Mamdani indicated 86% of tea leaves have been infected. In this case, this result pointed out that Fuzzy Mamdani Inferences have more optimal result compare to the previous method.
Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique Chandrakala B M; S C Linga Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1143-1150

Abstract

The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation time and ease of use play a significant role in using the algorithm for implementation. Proxy re-encryption plays a significant role in protecting data that are stored in semi-untrusted server. Many existing Proxy re-encryption technique induces high computation overhead due to adoption of public key cryptography such RSA (Rivet Shamir Adleman), ECC (Elliptical Curve Cryptography) etc. and it suffer from quantum attack. To address this lattice based cryptography is adopted by various approaches which is based on Learning With Error which shows resilience against quantum attacks such Chosen Cipher data attack and Chosen Plain Text attack. The drawback with existing lattice cryptography based approach is that they are unidirectional and adopts bilinear pairing which compromise security and induces high computation cost. To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. Experiment is conducted for computation overhead by varying key and data size which attained significant performance improvement over existing Proxy Re-encryption scheme.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue