Articles
63 Documents
Search results for
, issue
"Vol 12, No 3: December 2018"
:
63 Documents
clear
A Conceptual Framework for Gamified Learning Management System for LINUS Students
Syadiah Nor Wan Shamsuddin;
Muhammad Faisal Selman;
Ismahafezi Ismail;
Maizan Mat Amin;
Norkhairani Abdul Rawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1380-1385
Gamification is a term that refers to the use of game elements in non-game contexts. Gamification in education is emerging as an effective tool to motivate and engage learners in a variety of tasks. LINUS program is intended to ensure that all students from standard one are able to master the basics of reading, writing and counting at the end of standard three. Gamification will help as a learning tool to assist with the learning process for those who have difficulty in learning, unlike normal students. Therefore, the aim of this paper is to propose a framework of Gamified Learning Management System for Linus students. This framework consists of mechanisms of gamification elements, multimedia elements and learning theory that construct gamified learning management system.
Empowering E-governance with E-voting
Amarjeet Singh;
Ramakanth Kumar P;
Nagaraj G Cholli
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1081-1086
Advances in Information and Communications Technology (ICT) have impacted the society in many ways. Be it education, healthcare, media or governance, the transformation is visible. As individual entities like education or healthcare systems have already implemented ICT to certain extent, e-governance is yet to make a significant progress even though several initiatives are undertaken. E-governance means activities like voting, administration, financial transaction etc., are enabled using automation systems. This paper discusses one part of the e-governance; e-voting. As e-voting empowers government, there are lot of challenges in implementing the e-voting system considering security threats and confidentiality involved in it. Online voting (e-voting) needs to be deployed as more convenient, relatively secure and less resource consuming system. E-voting system should ensure convenience for people to be able to access the system from personal or public computer with security and confidentiality. The presence of e-voting system with all the necessary security measures and convenience can be a potential solution for low voter turnout at the polls. The presented work demonstrates an online e-voting prototype system called SecureV. The proposed model achieves specific tasks namely, maintaining the anonymity of the voter, encryption of the vote, integrity check and avoids second time voting.
A Review on Registration of Medical Images Using Graph Theoretic Approaches
Akshaya R;
Hema P Menon
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp974-983
Image registration is very essential for image analysis especially in the medical field. The registered image helps us to find a lot of things like the presence of a tumor, aneurysm, and many more. Image registration is a process of aligning two images that were captured during different conditions that makes analyzing of images possible. There are various methods in which images can be registered. This paper mainly discusses the methods that use the graph approach to register the medical images. The main focus is on rigid and non-rigid registration techniques and gives a brief description of the methods present.
Design of Quasi-Elliptic Bandpass Filter for Substrate Integrated Waveguide (SIW) Using Cross Coupling Technique
Muhajir Mustapa;
ZahrilAdha Zakaria;
Noor Azwan Shairi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1366-1372
This paper proposes a quasi-elliptic band pass filter in substrate integrated waveguide (SIW) by using cross coupling technique to produce transmission zeros (TZs) at both side. Finally, a fourth pole SIW quasi-elliptic filter at 5.75 GHz is designed in single layer substrate. Simulation results show that the filter has a center frequency of 5.75 GHz with the bandwidth of 100 MHz. The minimum insertion loss in the passband is 0.3 dB, and the return loss is better than 20 dB. Due to the TZs, the SIW filter has rapid transition performance at both lower and upper sidebands, good selectivity is achieved, while the SIW filter presents a very compact implementation and goodspurious rejection.
Cardiac Motions Classification on Sequential PSAX Echocardiogram
Adam Shidqul Aziz;
Riyanto Sigit;
Achmad Basuki;
Taufik Hidayat
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1289-1296
Cardiac wall motions classification on 2-dimensional (2D) echocardiographic images is an important issue for quantitative diagnosiing of heart disease. Unfortunately, the bad quality of echocardiogram cause computationally classification on cardiac wall motions is still become a big homework for many researchers to provide the best result. Echocardiogram is produced by soundwaves which absolutely make its images have speckle noise in different intensity. Therefore, this research improves a set of methodology to classify cardiac wall motion semi-automatically. Raw echocardiogram will be enhanced and segmented to take the boundary of endocardium of left ventricular in PSAX cardiac images. New improvement of Semi-automatically methodology is approach on detecting the contour of endocardium and will be inputed as good features in Lucas-Kanade Optical Flow in all sequential echocargraphic images. On classifying cardiac wall motions, this research proposes two important features including length of displacement and flow direction. New proprosed flow determination algorithm and Euclidean distance is used to calculate those features. All the features will be trained by Neural Network (NN) and validated by Leave One Out (LOO) to get accurate result. NN method, which is validated by LOO, has the best result of 81.82% correctness than the other compared methods.
QoS Management in WSN-MCN Convergence Network Using Priority Based Traffic Models
Anita Swain;
Arun Kumar Ray
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1159-1170
Technological advancements and increased developments leads to increase the development of hand-held devices which encourage the growth of Machine-to-Machine (M2M) communication. In this context devices belongs to heterogeneous network require a common platform to meet the challenges of data centric wireless services and applications. To satisfy the needs of M2M communication, Mobile Cellular Network (MCN) and Wireless Sensor Network (WSN) converged to a single platform. In this paper two priority models has been proposed with non preemptive priority and preemptive priority to analyze the data traffic at MAC layer of the converged network. The performance matrices are determined to maintain QoS in terms of reduced dropping and blocking probability, waiting time in the queue etc. Finally, the proposed models are compared in terms of QoS factors.
Developing an Userfriendly Online Shopping Web-Site
G saibaba;
prasanth vaidya
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1126-1131
In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use ecommerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the underdeveloped world is not that great and there is a lot to desire for It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity.
Event-Concept Pair Series Extraction to Represent Medical Complications from Texts
Chaveevan Pechsiri;
Sumran Phainoun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1320-1333
This research aims to determine an event-concept pair series as consequent events, particularly a Cause-Effect-concept pair (called ‘CEpair’) series on disease documents downloaded from hospital-web-boards. CEpair series are used for representing medical/disease complications which benefit for Solving system. Each causative/effect event concept is expressed by a verb phrase of an elementary discourse unit (EDU) which is a simple sentence. The research has three problems; how to determine each adjacent-EDU pair having the cause-effect relation, how to determine a CEpair series mingled with non-causeeffect-relation EDUs, and how to identify the complication of several extracted CEpair series from the documents. Therefore, we extract NWordCo-concept set having the causative/effect concepts from EDUs’ verb phrases including a support vector machine to solve each NWordCo size. We apply the Naïve Bayes classifier to learn and extract an NWordCoconcept pair set as a knowledge template having the cause-effect relation from the documents. We then propose using the knowledge template to extract several CEpair series. We also apply the intersection of the NWordCo-concept sets to identify the commoncause/effect for representing the complication-development parts of the extracted-CEpair series. The research results provide the high percent correctness of the CEpair-series determination from the documents.
Decision Making in the Tea Leaves Diseases Detection Using Mamdani Fuzzy Inference Method
Arif Ridho Lubis;
Santi Prayudani;
Muharman Lubis;
Al Khowarizmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1273-1281
The tea plants (Camellia Sinensis) are small tree species that use leaves and leaf buds to produce tea harvested through a monoculture system. It is an agriculture practice to cultivate one types of crop or livestock, variety or breed on a farm annually. Moreover, the emergence of pests, pathogens and diseases cause serious damages to tea plants significantly to its productivity and quality to optimum worst. All parts of the tea plant such as leaves, stems, roots, flowers and fruits are exposed to these harm lead to loss of yield 7 until 10% per year. The intensity of these attacks vary greatly on particular climate, the degree slope and the plant material used. Therefore, this study analyzes tea leaves as a common part used in recipes to create unique taste and flavor in tea production, especially in agro-industry. The decision making method used is Fuzzy Mamdani Inference as one of model with functional hierarchy with initial input based on established criteria. Fuzzy logic will provide tolerance to the set of value, so that small changes will not result in significant category differences, only affect the membership level on the variable value. Previous method using probabilities have shown 78% tea leaves have been attacked by category C (Gray Blight) while using Mamdani indicated 86% of tea leaves have been infected. In this case, this result pointed out that Fuzzy Mamdani Inferences have more optimal result compare to the previous method.
Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique
Chandrakala B M;
S C Linga Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1143-1150
The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation time and ease of use play a significant role in using the algorithm for implementation. Proxy re-encryption plays a significant role in protecting data that are stored in semi-untrusted server. Many existing Proxy re-encryption technique induces high computation overhead due to adoption of public key cryptography such RSA (Rivet Shamir Adleman), ECC (Elliptical Curve Cryptography) etc. and it suffer from quantum attack. To address this lattice based cryptography is adopted by various approaches which is based on Learning With Error which shows resilience against quantum attacks such Chosen Cipher data attack and Chosen Plain Text attack. The drawback with existing lattice cryptography based approach is that they are unidirectional and adopts bilinear pairing which compromise security and induces high computation cost. To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. Experiment is conducted for computation overhead by varying key and data size which attained significant performance improvement over existing Proxy Re-encryption scheme.