cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 70 Documents
Search results for , issue "Vol 21, No 1: January 2021" : 70 Documents clear
Towards secure smart cities: design and implementation of smart home digital communication system Nael Al-Shareefi; Sura Adil Abbas; Mohanad S. Alkhazraji; Ammar AbdRaba Sakran
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp271-277

Abstract

Home and building security are major concern in our daily life and digital smart door lock (DSDL) have become an essential part of these systems. In this paper, a secure DSDL which can grant access to home with a fingerprint is designed and implemented. An Arduino Nano microcontroller board, finger print sensor and servo motor have been utilized for lock/unlock door based on finger print. The DSDL is an automatic authenticate and validate the user for secure access. The implemented system aims to develop a cost−effective DSDL based on low−cost components compared to the systems already on the domestic market. The−ease of−use and cost−effectiveness makes the DSDL a strong competitor to the digital security system on the domestic market and outperforms it and suitable for security–based home automation systems.
A cloud computing scheduling and its evolutionary approaches Ahmed Subhi Abdalkafor; Alaa Abdalqahar Jihad; Emad Tariq Allawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp489-496

Abstract

Despite the increasing use of cloud computing technology because it offers unique features to serve its customers perfectly, exploiting the full potential is very difficult due to the many problems and challenges. Therefore, scheduling resources are one of these challenges. Researchers are still finding it difficult to determine which of the scheduling algorithms are appropriate and effective and that helps increases the performance of the system to accomplish these tasks. This paper provides a broad and detailed examination of resource scheduling algorithms in the environment of a cloud computing environment and highlights the advantages and disadvantages of some algorithms to help researchers in selecting the best algorithms to schedule a particular workload to get a satisfy a quality of service, guarantee good utilization of the cloud resources also minimizing the make-span.
Enhancing software development cost control by forecasting the cost of rework: preliminary study Tarig Ahmed Khalid; Eng-Thiam Yeoh
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp524-537

Abstract

Industrial reports show massive cost overruns associated with software projects. The cost of software reworks constitutes a large portion of the overall cost, reflecting a substantial challenge in cost control. Earned value management (EVM) is the most recognized model for project cost control. However, it shows many limitations in forecasting the software project cost, leading to a considerable challenge in cost control. Nevertheless, the major EVM limitation found is its inability to forecast the cost of software rework. This research investigated the factors affecting this limitation and suggests an enhanced EVM model. The significant contribution of this research is its incorporation of software-related factors into the EVM model. We introduced the software rework index (SRI), which is incorporated into the traditional EVM model to enhance its predictability of the software project cost at completion, including the rework cost. We defined the SRI in terms of two factors: product functional complexity and the team competency. Finally, we evaluated the proposed model using a dataset drawn from five actual projects. The results showed a significant enhancement in forecasting accuracy.
Smart hand gestures recognition using K-NN based algorithm for video annotation purposes Malek Zakarya Alksasbeh; Ahmad H AL-Omari; Bassam A. Y. Alqaralleh; Tamer Abukhalil; Anas Abukarki; Ibrahim Alkore Alshalabi; Amal Alkaseasbeh
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp242-252

Abstract

Sign languages are the most basic and natural form of languages which were used even before the evolution of spoken languages. These sign languages were developed using various sign "gestures" that are made using hand palm. Such gestures are called "hand gestures". Hand gestures are being widely used as an international assistive communication method for deaf people and many life aspects such as sports, traffic control and religious acts. However, the meanings of hand gestures vary among different civilization cultures. Therefore, because of the importance of understanding the meanings of hand gestures, this study presents a procedure whichcan translate such gestures into an annotated explanation. The proposed system implements image and video processing which are recently conceived as one of the most important technologies. The system initially, analyzes a classroom video as an input, and then extracts the vocabulary of twenty gestures. Various methods have been applied sequentially, namely: motion detection, RGB to HSV conversion, and noise removing using labeling algorithms. The extraction of hand parameters is determined by a K-NN algorithm to eventually determine the hand gesture and, hence showing their meanings. To estimate the performance of the proposed method, an experiment using a hand gesture database is performed. The results showed that the suggested method has an average recognition rate of 97%. 
Blind image watermarking scheme based on lowest energy contourlet transform coefficient and modified arnold cat/ikeda maps Jinan N. Shehab; Hussein A. Abdulkadhim; Yousif Allbadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp196-207

Abstract

The widespread of global internet has led to the need for developing new methods of protecting multimedia information from exploitation, alteration or forgery, illegal distribution, and manipulation. An attacker is quickly and illegally distributing or changing multimedia information by using various means of computer technology. For detecting this manipulation, this paper suggests blind watermark image inside a host image for observing in the receiver. If the watermark image was retrieved, then the host image was not attacked or manipulated. While if not retrieved, in this case, the image was attacked. The proposed method is depending on a decomposition of the host image using lowest energy sub-bands of Contourlet transform (4-levels), with scrambling by Ikeda map of the watermark image, and selecting new positions by modified Arnold Cat map. This will produce more security and safety, as well as provide more difficulty or prevent hacking. The obtained results confirm the robustness against attacks and more effectiveness of the presented scheme compared with the other similar works. Also, using lowest energy sub-bands will expand area of embedding and this part will be considered in the future works with the color images.
Show off the efficiency of dai-liao method in merging technology for monotonous non-linear problems Rana Z. Al-Kawaz; Abbas Y. Al-Bayati
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp505-515

Abstract

In this article, we give a new modification for the Dai-Liao method to solve monotonous nonlinear problems. In our modification, we relied on two important procedures, one of them was the projection method and the second was the method of damping the quasi-Newton condition. The new approach of derivation yields two new parameters for the conjugated gradient direction which, through some conditions, we have demonstrated the sufficient descent property for them. Under some necessary conditions, the new approach achieved global convergence property. Numerical results show how efficient the new approach is when compared with basic similar classic methods.
A review of IoT-based smart waste level monitoring system for smart cities A. A. I. Shah; S. S. M. Fauzi; R. A. J. M. Gining; T. R. Razak; M. N. F. Jamaluddin; R. Maskat
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp450-456

Abstract

Smart cities are covering the population that are seeking the best lifestyle and fulfilling their needs. Through smart cities, necessary modern facilities using ICT emerging technologies such as the internet of things (IoT) had been installed to ensure the sustainability of the city. In the perspective of waste management, several different IoT-based solutions also had been proposed as an alternative to monitor and to ensure the health of communities. This paper reviews existing IoT-based solutions in smart cites’ waste level management system to bring together the state-of-the-art. We performed reviews on 16 research articles from the past 5 years in the literature to provide a comprehensive review of different works on IoT-based solutions related to the smart waste level monitoring system, possible solutions and technologies used. The results obtained shows that existing solutions were similar in the platform used to integrate with the IoT technologies but had some differences in term of the used of sensors and communication technologies. The study also shows that many of the prior studies used Arduino Uno. Results from this study will assist the researcher, focusing on expanding further the used of different technologies or improved the existing system.
Economic challenges of cloud computing in Iraqi educational institutions using exploratory analysis Farah Hussein Mohammed Jawad; Huda Husein M. Jawad
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp566-573

Abstract

Cloud computing (CC) implementation for educational services is confronting several challenges. Prior research focused on the technological related challenges while few examine the economic challenges. The purpose of this study is to examine the economic challenges for using CC in educational institutions in Iraq. Articles pertaining to the topics were extracted from main databases. Based on the review, the critical challenges were identified. To confirm their relatedness to Iraqi context, a questionnaire related to the challenges was developed. A total of 204 respondents working as IT professional has participated in this study. The findings showed that the challenges mainly related to the infrastructure readiness, internet connection, cost of establishing and managing the CC. The challenges were divided into three phases. The pre-implementation phase includes the challenges of selecting service provider and deployment as well as the readiness of stakeholders, training, and infrastructure readiness. The implementation phase includes the challenges of maintaining the bandwidth, compatibility, legacy system, internet connection, reliability, availability, connectivity, and management. The post-implementation phase includes the challenges of security, privacy, quality of education, switching cost, and lock-in. The most critical challenges in all phases are related to infrastructure readiness, internet connection, switching cost and management of CC. The findings were discussed and limitations of the study as well as the direction for future works were given. 
DoS attacks detection in MQTT networks Dmitrii Dikii; Sergey Arustamov; Aleksey Grishentsev
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp601-608

Abstract

The paper considers the problem of protecting the Internet of things infrastructure against denial-of-service (DoS) attacks at the application level. The authors considered parameters that affect the network gateway workload: message frequency, payload size, number of recipients and some others. We proposed a modular structure of the attack detection tool presented by three classifiers that use the following attributes: username, device ID, and IP-address. The following types of classifiers have been the objects for the research: multilayer perceptron, random forest algorithm, and modifications of the support vector machine. Some scenarios for the behavior of network devices have been simulated. It was proved that for the proposed feature vector on simulated training and test data sets, the best results have been shown by a multilayer perceptron and a support vector machine with a radial basis function of the kernel and optimization with SMO algorithm. The authors also determined the conditions under which the selected classifiers have the best quality of recognizing abnormal and legitimate traffic in MQTT networks. 
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks M. Mohanapriya; Nitish Joshi; Mohit Soni
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp582-590

Abstract

Wireless Ad Hoc Network is a dynamically organized network on emergency situations, in which a group of wireless devices send data among themselves without requiring any base stations for forwarding data. Here the nodes itself perform the functions of routing. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different crisis such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers. In this scheme, by analyzing only the control packets used for routing in the network, the compromised nodes launching the attack are identified. From the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue