cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 14, No 3: June 2019" : 64 Documents clear
A performance study of the suitability of Adaptive boosting in Red Acne detection Satyake Bakshi; Sathya A
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1493-1498

Abstract

AdaBoost along with HaarCascades have been well received for its accuracy and performance in primarily Facial Recognition applications. However, they are known to perform poorly with objects which have a different rotational orientation or for objects whose shapes are largely variant . In this paper, we apply Adaptive Cascading technique to a specific dermatological application of detecting red acne which are largely shaped variant outgrowths on the skin and to identify its suitability in the detection of acne. Based on the outcome it would be declared if Viola-Jones based Adaptive Boosting is well suited for dermatological processing of skin diseases.
Data cryptography based on musical notes on a fingerboard along with a dice Asis Kumar Tripathy; Tapan Kumar Das; Navaneethan C
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1286-1290

Abstract

The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.
Embedded real-time system for detecting leakage of the gas used in iraqi kitchens Husam Kareem
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1171-1176

Abstract

A major issue that happens in kitchens of houses and/or restaurants is the leakage of gas used as a fuel for cooker stove, which is commonly referred to as LPG (liquefied petroleum gas). LPG leakage may lead to a serious fire or even a deadly explosion that might affect the surrounding people. A substantial solution to avoid such disasters is by stopping its main cause. Therefore designing a device capable of monitoring and detecting such gases can minimize the dangerous and unwanted incidents by LPG leakage. This paper introduces a low cost and energy efficient real-time monitoring system that able to sense different dangerous gases, specifically those used for stove cooker. This system considers the pros of the previously introduced systems and fixes the cons available in those systems. In addition, the manufacturing cost has been taken into consideration. If the system senses any type of LPG gas (there is a gas leakage), it will react by making three different actions. It will make an alert sound to notify the people around the leakage place, send an SMS to two cell phones, and show, on an LCD screen, the leakage location.
Improved reliable multilevel inverter for renewable energy systems Sujatha M; A.K. Parvathy
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1141-1147

Abstract

New improved multilevel inverter (MLI) topology for Renewable energy systems is proposed in this paper. Cascaded multilevel inverters (CMLI) produce an output voltage level depending on the number of individual sources connected. The main drawback of CMLI is, as the output voltage level increases in number, the switches used in the device also increases and hence the complexity of the circuit increases. As the number of switches increases, the reliability of the circuit decreases. In this paper a novel MLI topology, which employs lesser number of switches, is proposed. A simulation model of CMLI and the proposed MLI has been built in MATLAB/SIMULINK. The reliability of the CMLI and the new topology MLI is analyzed by using MIL-HDBK-217.  
Cooperative and fresher encounter algorithm for reducing delay in MANET Noor Alleema; D. Siva Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1258-1265

Abstract

In Mobile Ad-hoc Networks (MANET), the route discovery is the chief problem for the nodes. In this paper Cooperative and Fresher Encounter Algorithm (CFEA) for Reducing Delay in MANET is proposed. The route discovery problem has been overcome by FResher Encounter algorithm. It is a simple algorithm for discovery the routes in efficient manner in the MANET. The node has the memory of past route details that communicate with remaining nodes. The node prefers to find the intermediate node instead of finding the destination node, that intermediate node keeps the knowledge of recently encounter the destination node. Then the intermediate node communicates with the node which is encountered the destination node recently, and the process is continued until the destination is attained. The main advantage of the scheme is reducing the process time.
On the performance of coded copper wire systems for G-fast communications Ali Jaber Al-Askery; Ali Mhidi Hammadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1272-1280

Abstract

This paper aims to investigate the performance of different channel coding techniques over copper wire channels. First, Chen model is used to simulate the copper wire channel model, then the performance of LDPC coded system with DVB-S2 standard is compared to the performance of turbo coded, and convolutional coded systems over wired channels. In addition, the performance of the systems under consideration is further investigated in the presence of impulsive noise (IN) with IN cancellation technique. Matlab simulations are utilized to simulate these systems for different quadrature amplitude modulations (QAM). The results have shown that LDPC coded system with large block length have outperforms the performance of the considered coding techniques.
Imbalance class problems in data mining: a review Haseeb Ali; Mohd Najib Mohd Salleh; Rohmat Saedudin; Kashif Hussain; Muhammad Faheem Mushtaq
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1552-1563

Abstract

The imbalanced data problems in data mining are common nowadays, which occur due to skewed nature of data. These problems impact the classification process negatively in machine learning process. In such problems, classes have different ratios of specimens in which a large number of specimens belong to one class and the other class has fewer specimens that is usually an essential class, but unfortunately misclassified by many classifiers. So far, significant research is performed to address the imbalanced data problems by implementing different techniques and approaches. In this research, a comprehensive survey is performed to identify the challenges of handling imbalanced class problems during classification process using machine learning algorithms. We discuss the issues of classifiers which endorse bias for majority class and ignore the minority class. Furthermore, the viable solutions and potential future directions are provided to handle the problems.
Electrical and thermal efficiency of air-based photovoltaic thermal (PVT) systems: an overview Nurul Shahirah Binti Rukman; Ahmad Fudholi; Ivan Taslim; Merita Ayu Indrianti; Intan Noviantari Manyoe; Uce Lestari; Kamaruzzaman Sopian
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1134-1140

Abstract

The development of photovoltaic thermal (PVT) system is a very promising area of research. PVT systems using in various applications, such as solar drying, solar cooling, water heating, desalination, and pool heating. With the recognition of the potentials and contributions of PV system, considerable research has been conducted to attain the most advancement which may produce reliable and sustainable PVT system. The cooling system’s design refers to the absorber design which mostly focuses on water and air-based PVT systems. An air-based system has been developed through different absorber configurations, air flow modes and single- or double-pass design. Hence, a summarization on various research and development of air-based PVT system will be presented.
Systematic literature review on designing trust-based security for WSNs Raja waseem Anwar; Anazida Zainal; Saleem Iqbal
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1395-1404

Abstract

The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development of trust-based security were mainly targeted, and 140 publications were randomly reviewed, from which 24 studies were finalized after excluding irrelevant data and studies that only contained abstracts. The results were analyzed focusing on the designs, applications and protocols and trust factors. Different studies have been evaluated, which have suggested that proper design and development of trust-based security should be the foremost aim to be applied in user environments. The study suggested that designing the trust management models based on the taxonomy of routing applications and relevant algorithms could be a part of future investigations.
Study of multiple-source data collection in wireless sensor networks Radhi Sehen Issa
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1479-1483

Abstract

A detailed survey on the process of data collection from multiple sources in Wireless Sensor Networks (WSNs) is introduced. The topologies that determine the location of the network components with respect to each other are presented. These topologies are often referred to as Mobility topologies. The performance of the overall WSN architecture significantly depends on these topologies. As a consequence, these topologies are elaborately compared and discussed. The most common network components that efficiently collaborate in data collection process are explained. To highlight the data collection process as a subject of our concern, the phases that describe the stages of the data collection are illustrated. These phases consist of three successive stages: discovery, data transfer, and routing. To sum up, the most recent approaches for developing the process of data collection in multiple-source WSNs are also presented.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue