Articles
64 Documents
Search results for
, issue
"Vol 14, No 3: June 2019"
:
64 Documents
clear
A performance study of the suitability of Adaptive boosting in Red Acne detection
Satyake Bakshi;
Sathya A
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1493-1498
AdaBoost along with HaarCascades have been well received for its accuracy and performance in primarily Facial Recognition applications. However, they are known to perform poorly with objects which have a different rotational orientation or for objects whose shapes are largely variant . In this paper, we apply Adaptive Cascading technique to a specific dermatological application of detecting red acne which are largely shaped variant outgrowths on the skin and to identify its suitability in the detection of acne. Based on the outcome it would be declared if Viola-Jones based Adaptive Boosting is well suited for dermatological processing of skin diseases.
Data cryptography based on musical notes on a fingerboard along with a dice
Asis Kumar Tripathy;
Tapan Kumar Das;
Navaneethan C
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1286-1290
The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.
Embedded real-time system for detecting leakage of the gas used in iraqi kitchens
Husam Kareem
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1171-1176
A major issue that happens in kitchens of houses and/or restaurants is the leakage of gas used as a fuel for cooker stove, which is commonly referred to as LPG (liquefied petroleum gas). LPG leakage may lead to a serious fire or even a deadly explosion that might affect the surrounding people. A substantial solution to avoid such disasters is by stopping its main cause. Therefore designing a device capable of monitoring and detecting such gases can minimize the dangerous and unwanted incidents by LPG leakage. This paper introduces a low cost and energy efficient real-time monitoring system that able to sense different dangerous gases, specifically those used for stove cooker. This system considers the pros of the previously introduced systems and fixes the cons available in those systems. In addition, the manufacturing cost has been taken into consideration. If the system senses any type of LPG gas (there is a gas leakage), it will react by making three different actions. It will make an alert sound to notify the people around the leakage place, send an SMS to two cell phones, and show, on an LCD screen, the leakage location.
Improved reliable multilevel inverter for renewable energy systems
Sujatha M;
A.K. Parvathy
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1141-1147
New improved multilevel inverter (MLI) topology for Renewable energy systems is proposed in this paper. Cascaded multilevel inverters (CMLI) produce an output voltage level depending on the number of individual sources connected. The main drawback of CMLI is, as the output voltage level increases in number, the switches used in the device also increases and hence the complexity of the circuit increases. As the number of switches increases, the reliability of the circuit decreases. In this paper a novel MLI topology, which employs lesser number of switches, is proposed. A simulation model of CMLI and the proposed MLI has been built in MATLAB/SIMULINK. The reliability of the CMLI and the new topology MLI is analyzed by using MIL-HDBK-217.
Cooperative and fresher encounter algorithm for reducing delay in MANET
Noor Alleema;
D. Siva Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1258-1265
In Mobile Ad-hoc Networks (MANET), the route discovery is the chief problem for the nodes. In this paper Cooperative and Fresher Encounter Algorithm (CFEA) for Reducing Delay in MANET is proposed. The route discovery problem has been overcome by FResher Encounter algorithm. It is a simple algorithm for discovery the routes in efficient manner in the MANET. The node has the memory of past route details that communicate with remaining nodes. The node prefers to find the intermediate node instead of finding the destination node, that intermediate node keeps the knowledge of recently encounter the destination node. Then the intermediate node communicates with the node which is encountered the destination node recently, and the process is continued until the destination is attained. The main advantage of the scheme is reducing the process time.
On the performance of coded copper wire systems for G-fast communications
Ali Jaber Al-Askery;
Ali Mhidi Hammadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1272-1280
This paper aims to investigate the performance of different channel coding techniques over copper wire channels. First, Chen model is used to simulate the copper wire channel model, then the performance of LDPC coded system with DVB-S2 standard is compared to the performance of turbo coded, and convolutional coded systems over wired channels. In addition, the performance of the systems under consideration is further investigated in the presence of impulsive noise (IN) with IN cancellation technique. Matlab simulations are utilized to simulate these systems for different quadrature amplitude modulations (QAM). The results have shown that LDPC coded system with large block length have outperforms the performance of the considered coding techniques.
Imbalance class problems in data mining: a review
Haseeb Ali;
Mohd Najib Mohd Salleh;
Rohmat Saedudin;
Kashif Hussain;
Muhammad Faheem Mushtaq
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1552-1563
The imbalanced data problems in data mining are common nowadays, which occur due to skewed nature of data. These problems impact the classification process negatively in machine learning process. In such problems, classes have different ratios of specimens in which a large number of specimens belong to one class and the other class has fewer specimens that is usually an essential class, but unfortunately misclassified by many classifiers. So far, significant research is performed to address the imbalanced data problems by implementing different techniques and approaches. In this research, a comprehensive survey is performed to identify the challenges of handling imbalanced class problems during classification process using machine learning algorithms. We discuss the issues of classifiers which endorse bias for majority class and ignore the minority class. Furthermore, the viable solutions and potential future directions are provided to handle the problems.
Electrical and thermal efficiency of air-based photovoltaic thermal (PVT) systems: an overview
Nurul Shahirah Binti Rukman;
Ahmad Fudholi;
Ivan Taslim;
Merita Ayu Indrianti;
Intan Noviantari Manyoe;
Uce Lestari;
Kamaruzzaman Sopian
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1134-1140
The development of photovoltaic thermal (PVT) system is a very promising area of research. PVT systems using in various applications, such as solar drying, solar cooling, water heating, desalination, and pool heating. With the recognition of the potentials and contributions of PV system, considerable research has been conducted to attain the most advancement which may produce reliable and sustainable PVT system. The cooling system’s design refers to the absorber design which mostly focuses on water and air-based PVT systems. An air-based system has been developed through different absorber configurations, air flow modes and single- or double-pass design. Hence, a summarization on various research and development of air-based PVT system will be presented.
Systematic literature review on designing trust-based security for WSNs
Raja waseem Anwar;
Anazida Zainal;
Saleem Iqbal
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1395-1404
The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development of trust-based security were mainly targeted, and 140 publications were randomly reviewed, from which 24 studies were finalized after excluding irrelevant data and studies that only contained abstracts. The results were analyzed focusing on the designs, applications and protocols and trust factors. Different studies have been evaluated, which have suggested that proper design and development of trust-based security should be the foremost aim to be applied in user environments. The study suggested that designing the trust management models based on the taxonomy of routing applications and relevant algorithms could be a part of future investigations.
Study of multiple-source data collection in wireless sensor networks
Radhi Sehen Issa
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1479-1483
A detailed survey on the process of data collection from multiple sources in Wireless Sensor Networks (WSNs) is introduced. The topologies that determine the location of the network components with respect to each other are presented. These topologies are often referred to as Mobility topologies. The performance of the overall WSN architecture significantly depends on these topologies. As a consequence, these topologies are elaborately compared and discussed. The most common network components that efficiently collaborate in data collection process are explained. To highlight the data collection process as a subject of our concern, the phases that describe the stages of the data collection are illustrated. These phases consist of three successive stages: discovery, data transfer, and routing. To sum up, the most recent approaches for developing the process of data collection in multiple-source WSNs are also presented.