Articles
65 Documents
Search results for
, issue
"Vol 18, No 1: April 2020"
:
65 Documents
clear
RFID-GPS based mechanism using aodvrp for stolen vehicle detection in vanet
Varun Chand;
Karthikeyan J
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp396-404
The traffic on the road was in the rise for the past few years, with more and more vehicles enter the road there was less scope of having better traffic. However, it could be maintained with the implementation of the proper system. The other major concern was on the theft of the vehicles and the accidents the drivers succumb to while in the road. This paper recommends the novel RFID-GPS mechanism based on AODV Routing Protocol algorithm in the hybrid VANET configuration that was working as a decentralized Ad hoc. The algorithm was framed in such a manner that it could be effective in maintaining traffic through communication among Vehicles and vehicles (OBUs) to the Roadside Unit (RSU). The RSUs would generate the possible route by Ad hoc On-demand Distance vector routing protocol and control the signals within the accessible limit if there were an emergency. The information about the stolen vehicles and the driver would be sent to the police station and hospital respectively that aid to track the vehicle by the Radio Frequency Identification-Global Positioning System (GPS) information and save the driver in case of an accident. The performance of the RFID-GPS mechanism based on AODV algorithm based on VANET was analyzed in NS2 and is related to the existing Zigbee. The outcomes exhibited that the proposed method was better in all performance metrics especially in throughput.
The effect of environmental changes on the efficiency of the PV system
Adeel Saleem;
Atif Iqbal;
Kashif Mehmood;
Manoj Kumar Panjwani;
Fareed Hussain Mangi;
Raja Masood Larik
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp558-564
Advancements in the field of energy are among priorities of modern-day research. Most of the modern studies concern particularly on renewable energy resources especially that of Solar Energy to meet the energy demand of the future energy markets. Solar energy is one of the richest sources of nature, but involvement of environmental effects readily affects the overall performance of the Photovoltaic Panel. This paper highlights the importance of the solar energy, techniques and comparison of mono-crystalline and poly-crystalline and their particular energy profile. A Matlab/Simulink model is constructed to analyze the behavior of solar cell on effect of irradiance and temperature. Experimental results show the adverse effect of humidity, shading, direction and climate changes on the performance of the solar cell.
Radial basis function neural network for 2 satisfiability programming
Shehab Alzaeemi;
Mohd. Asyraf Mansor;
Mohd Shareduwan Mohd Kasihmuddin;
Saratha Sathasivam;
Mustafa Mamat
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp459-469
Radial Basis Function Neural Network (RBFNN) is very prominent in data processing. However, improving this technique is vital for the NN training process. This paper presents an integrated 2 Satisfiability in radial basis function neural network (RBFNN-2SAT). There are two different types of training in RBFNN, namely no-training technique and half-training technique. The performance of the solutions via Genetic Algorithm (GA) training was investigated by comparing the Radial Basis Function Neural Network No-Training Technique (RBFNN- 2SATNT) and Radial Basis Function Neural Network Half-Training Technique (RBFNN- 2SATHT). The comparison of both techniques was examined on 2 Satisfiability problem by using a C# software that was developed for this experiment. The performance of the RBFNN-2SATNT and RBFNN-2SATHT in performing 2SAT is discussed in terms of root mean squared error (RMSE), sum squared error (SSE), mean absolute percentage error (MAPE), mean absolute error (MAE), number of the hidden neurons and CPU time. Results obtained from a computer simulation showed that RBFNN-2SATHT outperformed RBFNN-2SATNT.
Influence of annealing temperature on the sensitivity of nickel oxide nanosheet films in humidity sensing applications
N. Parimon;
M. H. Mamat;
A. S. Ismail;
I. B. Shameem Banu;
M. K. Ahmad;
A. B. Suriani;
M. Rusop
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp284-292
Nickel oxide (NiO) nanosheet films were successfully grown onto NiO seed-coated glass substrates at different annealing temperatures for humidity sensing applications. NiO seed layers and NiO nanosheet films were prepared using a sol-gel spin coating and sonicated sol-gel immersion techniques, respectively. The properties of NiO nanosheet films at as-deposited, 300 ℃, and 500 ℃-annealed were examined by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), ultraviolet-visible (UV-vis) spectroscopy, and humidity sensor measurement system. The XRD patterns demonstrate that the grown NiO films have crystalline cubic structures at temperature of 300 ℃ and 500 ℃. The FESEM images show that the large porous nanosheet network spread over the layers as the annealing temperature increased. The UV-vis spectra revealed that all the nanosheet films have the average transmittance below than 50% in the visible region, with absorption edges ~ 350 nm. The optical band gap energy was evaluated in ranges of 3.39 to 3.61 eV. From the obtained humidity sensing results, it shows that 500 ℃-annealed film exhibited the best sensitivity of 257, as well as the slowest response time, and the fastest recovery time compared with others.
Achieving robust global bandwidth along with bypassing geo-restriction for internet users
Gazi Zahirul Islam;
Aman Ullah Juman;
Al- Nahian Bin Emran;
Md. Abbas Ali Khan;
Md. Fokhray Hossain;
Md. Tarek Habib
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp112-123
Not all Internet Service Providers provide a sufficient amount of bandwidth to their users. Although the amount of local bandwidth is reasonable, global bandwidth is not satisfactory at all. Based on bandwidth allocation, location and price; service providers capped their users’ global bandwidth i.e., reducing global internet speed. As a consequence, we observe severe global bandwidth limitation among Internet users. In this article, we implement a flexible and pragmatic solution for Internet users to bypass global bandwidth restriction. To achieve robust global bandwidth, we utilize a combination of communication technologies and devices namely, Internet Exchange Point, Virtual Private Network, chain VPN technology etc. In this project, we show that internet speed of international route i.e., global bandwidth can enhance significantly if there are multiple ISPs use a common IXP and at least one of those ISPs provides pleasant global bandwidth. Usually, regional ISPs use a common IXP to route their local traffic using local bandwidth within the region without wasting global bandwidth. We show that using our proposed method global internet speed of a user can raise several times effectively utilizing assigned local bandwidth. In addition, we also implement a geo-restriction bypassing technique integrating an offshore ISP with local ISP using VPN. Thus, we enjoy tremendous Internet speed along with unrestricted access to the websites.
Data mining, fuzzy AHP and TOPSIS for optimizing taxpayer supervision
M. Jupri;
Riyanarto Sarno
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp75-87
The achievement of accepting optimal tax need effective and efficient tax supervision can be achieved by classifying taxpayer compliance to tax regulations. Considering this issue, this paper proposes the classification of taxpayer compliance using data mining algorithms; i.e. C4.5, Support Vector Machine, K-Nearest Neighbor, Naive Bayes, and Multilayer Perceptron based on the compliance of taxpayer data. The taxpayer compliance can be classified into four classes, which are (1) formal and material compliant taxpayers, (2) formal compliant taxpayers, (3) material compliant taxpayers, and (4) formal and material non-compliant taxpayers. Furthermore, the results of data mining algorithms are compared by using Fuzzy AHP and TOPSIS to determine the best performance classification based on the criteria of Accuracy, F-Score, and Time required. Selection of the taxpayer's priority for more detailed supervision at each level of taxpayer compliance is ranked using Fuzzy AHP and TOPSIS based on criteria of dataset variables. The results show that C4.5 is the best performance classification and achieves preference value of 0.998; whereas the MLP algorithm results from the lowest preference value of 0.131. Alternative taxpayer A233 is the top priority taxpayer with a preference value of 0.433; whereas alternative taxpayer A051 is the lowest priority taxpayer with a preference value of 0.036.
Multiple watermarking technique using optimal threshold
Noruhida Alias;
Ferda Ernawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp368-376
The multiple watermarking technique has drawn more attention due to high demand for embedding more than one copyright. This paper proposes a multiple watermarking scheme using DWT-SVD by utilizing HVS characteristics. Our scheme embeds multiple watermarks in red and blue colors. The proposed scheme examines the coefficients of U orthogonal matrix for embedding and extracting watermarks. Watermarks are scrambled by Arnold transform before embedded in the host image in order provide additional security. The optimal thresholds for red and blue colors are revealed by finding a trade-off between normalized-cross correlation and imperceptibility from quantization steps. The experimental results demonstrate that our scheme achieves high resistant under JPEG and JPEG2000 compression for both inserted watermarks.
Parallelizable cipher of color image based on two-dimensional chaotic system
Sawsen Abdulhadi Mahmood;
Khalid Ali Hussein;
Yaseen Naser Jurn;
Ekhlas Abbas Albahrani
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp101-111
This paper aims to present a parallel implementation based color image encryption using non -linear chaotic system. The adopted chaotic system was suggested and approved in our previous work [1] which generates key streams with chaotic behavior. In this paper, pixel level permutation algorithm based on chaotic map generation is investigated and analyzed. The encryption–decryption schemes are achieved in parallel and composed of three main phases: chaotic keys generation, pixel-level permutation and bit-level diffusion phase. Both permutation and diffusion processes are achieved according to the chaotic keys. The parallel implementation of the proposed image encryption system is realized and inspired with parallel computing library offered by Matlab 2018, which equips highly performance than the pipeline ones and would be helpful to utilize in image encryption/decryption for real time application. Security and statistical analysis in addition to the main differential attacks analysis are specified to evaluate the performance of the proposed image encryption algorithm with parallel implementation. From the experimental results, the output image of the encryption task shows a higher randomness of the encrypted image which can be effectively resistant to attacker. Furthermore, the run time of encryption process is faster than other research works.
Providing enhanced security in IoT based smart weather system
Y Narasimha Rao;
P. Surya Chandra;
V. Revathi;
N. Suresh Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp9-15
Weather reporting system consist multiple devices which are playing dynamic role in producing dynamic environmental parameters such as temperature, humidity, and air pollution. It was a tedious task to bring all the devices together and make them interleaving to produce relevant measurement. Recent trends have proven that the IoT has brought all the devices and peripherals in one place to make more flexible and smart measurement. In the traditional weather monitoring system measurement method is not real time, not continuous and also tedious job to take continuous measurement. But, the IoT has completely changed the measurement scenario and improved the consistency of the measurement. In the present work the environmental parameters such rainfall, temperature, humidity, and density of carbon dioxide in the air are measured with sensors. The Arduino Uno card gathers all information from the devices which are associated with its port pins. The information is sent to cloud server for record and future retrieving. At the same time the data security in cloud been assured with encryption and decryption data while retrieving the information from cloud. This enhances the security, ease of accessing the cloud data from mobile applications, provides wise predictions and minimizes the communication overhead.
Implementation of digital and analog modulation systems using FPGA
Raya Kahtan Mohammed;
Hamsa Abdulkareem Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i1.pp485-493
FPGA (Field Programmable Gate Array) based implementations of digital and analog modulation techniques play a vital rule in the design of signal processing system. The performance and flexibility provided by reconfigurable computing speeds up the development process in signal processing implementations using FPGA. Different methods for digital and analog modulation are designed in this paper by usinSg System Generator tools & Vivado. Then all designed systems are implemented successfully in an FPGA hardware via the NEXYS 4 DDR with ARTIX 7 XC7A100T. A comparison between five types of digital modulation techniques is discussed in terms of resources utilization in FPGA hardware. And also, the implementation of analog modulations in FPGA is contributed in this work. The hardware implementation shows that the number of slice LUTs in ASK modulation is 0.07% while in FSK modulation is 0.13% of the total number of slice LUTs. And also, the number of bounded IO that used for PSK modulation is 4.8% while in PM modulation is 61.4% of the total number bounded IO.