cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 67 Documents
Search results for , issue "Vol 22, No 3: June 2021" : 67 Documents clear
A new approach for extracting and scoring aspect using SentiWordNet Tuan Anh Tran; Jarunee Duangsuwan; Wiphada Wettayaprasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1731-1738

Abstract

Aspect-based online information on social media plays a vital role in influencing people’s opinions when consumers concern with their decisions to make a purchase, or companies intend to pursue opinions on their product or services. Determining aspect-based opinions from the online information is necessary for business intelligence to support users in reaching their objectives. In this study, we propose the new aspect extraction and scoring system which has three procedures. The first procedure is normalizing and tagging part-of-speech for sentences of datasets. The second procedure is extracting aspects with pattern rules. The third procedure is assigning scores for aspects with SentiWordNet. In the experiments, benchmark datasets of customer reviews are used for evaluation. The performance evaluation of our proposed system shows that our proposed system has high accuracy when compared to other systems.
Integrating k-means clustering into automatic programming assessment tool for student performance analysis Rina Harimurti; Ekohariadi Ekohariadi; Munoto Munoto; I. G. P. Asto Buditjahjanto
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1389-1395

Abstract

Computer programming is a subject involving a large number of logic programming activities. A programmer is compulsory to master skills of algorithms, logic, and programming language to conduct programming. An automatic programming assessment tool is an automated tool used to assist instructors in assessing programming tasks. The technology used in this application is open-source based with an evaluation module that will evaluate the sent program code, assessment, and classification. The evaluation results were then processed in the assessment module, where a comparison process with the test case was performed along with the point calculation. The classification module was used to divide students into five groups based on the point of each practicum. This study used k-means clustering classification method. The entities included were lecturers, assistants, students, and compilers. This application had 2 levels of users namely admin and students. Scoring results were then used in the process of determining the classification of student’s performance based on the k-means clustering method. In connection with the classification test results with three iterations, three practicum scores resulted that the classification process was successfully carried out with student’s performance divided into five groups covering very good, good, sufficient, less, and very less. The data used in the clustering process consisted of 41 students with 10 attributes which were then grouped into 3 groups (clusters).
Half-face based recognition using principal component analysis Ahmed M. Alkababji; Sara Raed Abd
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1404-1410

Abstract

Face recognition is a considerable problem in the field of image processing. It is used daily in various applications from personal cameras to forensic investigations. Most of the provides solutions proposed based on full-face images, are slow to compute and need more storage. In this paper, we propose an effective way to reduce the features and size of the database in the face recognition method and thus we get an increase in the speed of discrimination by using half of the face. Taking advantage of face symmetry, the first step is to divide the face image into two halves, then the left half is processed using the principal component analysis (PCA) algorithm, and the results are compared by using Euclidian distance to distinguish the person. The system was trained and tested on ORL database. It was found that the accuracy of the system reached up to 96%, and the database was minimized by 46% and the running time was decreased from 120 msec to 70 msec with a 41.6% reduction.
Improved incentive pricing-based quasi-linear utility function of wireless networks Fitri Maya Puspita; Bella Juwita Rezky; Arden Naser Yustian Simarmata; Evi Yuliza; Yusuf Hartono
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1467-1475

Abstract

The model of the incentive pricing scheme-based quasi-linear utility function in wireless network was designed. Previous research seldom focusses on user’s satisfaction while using network. Therefore, the model is then attempted to be set up that is derived from the modification of bundling and models of reverse charging and maintain the quality of service to users by utilizing quasi-linear utility function. The pricing schemes then are applied to local data server traffic. The model used is known as mathematical programming problem that can be solved by LINGO 13.0 program as optimization tool to get the optimal solution. The optimal results show that the improved incentive pricing can achieve better solution compared to original reverse charging where the models will be obtained in flat fee, usage-based, and two-part tariff strategies for homogeneous consumers.
Methods for secure cloud processing of big data Yerzhan N. Seitkulov; Seilkhan N. Boranbayev; Gulden B. Ulyukova; Banu B. Yergaliyeva; Dina Satybaldina
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1650-1658

Abstract

We study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theory and methods of secure outsourcing for various abstract equations with secret parameters, and then present the results of using these methods in solving applied problems with secret parameters, arising from the modeling of economic processes. Many economic tasks involve processing a large set of economic indicators. Therefore, we are considering a typical economic problem that can only be solved on very powerful computers.
The application of instrumentation system on a contactless robotic triage assistant to detect early transmission on a COVID-19 suspect Niko Azhari Hidayat; Prisma Megantoro; Abdufattah Yurianta; Amila Sofiah; Shofa Aulia Aldhama; Yutika Amelia Effendi
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1334-1344

Abstract

This article discusses the instrumentation system of airlangga robotic triage assistant version 1 (ARTA-1), a robot used as a contact-free triage assistant for Coronavirus disease (COVID-19) suspects. The triage process consists of automatic vital signs check-up as well as the suspect’s anamnesis that in turns will determine whether the suspect will get a specific care or not. Measurements of a suspect’s vital conditions, i.e. temperature, height, and weight, are carried out with sensors integrated with the Arduino boards, while a touch-free, hand gesture questions and answers is carried out to complete anamnesis process. A portable document format (PDF) format of the triage report, which recommends what to do to the suspect, will then be automatically generated and emailed to a designated medical staff.
Improved grey wolf algorithm for optimization problems Hafiz Maaz Asgher; Yana Mazwin Mohmad Hassim; Rozaida Ghazali; Muhammad Aamir
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1573-1579

Abstract

The grey wolf optimization (GWO) is a nature inspired and meta-heuristic algorithm, it has successfully solved many optimization problems and give better solution as compare to other algorithms. However, due to its poor exploration capability, it has imbalance relation between exploration and exploitation. Therefore, in this research work, the poor exploration part of GWO was improved through hybrid with whale optimization algorithm (WOA) exploration. The proposed grey wolf whale optimization algorithm (GWWOA) was evaluated on five unimodal and five multimodal benchmark functions. The results shows that GWWOA offered better exploration ability and able to solve the optimization problem and give better solution in search space. Additionally, GWWOA results were well balanced and gave the most optimal in search space as compare to the standard GWO and WOA algorithms.
Two-versions of descent conjugate gradient methods for large-scale unconstrained optimization Hawraz N. Jabbar; Basim A. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1643-1649

Abstract

The conjugate gradient methods are noted to be exceedingly valuable for solving large-scale unconstrained optimization problems since it needn't the storage of matrices. Mostly the parameter conjugate is the focus for conjugate gradient methods. The current paper proposes new methods of parameter of conjugate gradient type to solve problems of large-scale unconstrained optimization. A Hessian approximation in a diagonal matrix form on the basis of second and third-order Taylor series expansion was employed in this study. The sufficient descent property for the proposed algorithm are proved. The new method was converged globally. This new algorithm is found to be competitive to the algorithm of fletcher-reeves (FR) in a number of numerical experiments.
An improved technique for power transformer protection using fuzzy logic protective relaying Marwa M. Marei; Manal H. Nawir; Ali Abdul Razzaq Altahir
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1754-1760

Abstract

The three-phase power transformer in the transmission or distribution substations represents one of the essential devices on electric power networks. Losing this devise cause a disconnection of the power utility to a large number of electrical loads. The robust protection system must be designed to protect the device during abnormal operations. A complete protection system for a poly-phase power transformer for one of the Karbala transmission networks (East Karbala substation) is modeled and simulated, adopting a fuzzy logic protective relaying using MATLAB/SIMULINK environment. This study discusses fuzzy logic-based relaying for a power transformer safety, as well as internal faults that are clearly identified. Two principles of operation are used to protect the transformer; differential relay and overcurrent relay. The differential relay is proposed as the unit protection, while the overcurrent is backup protection. The proposed fuzzy logic controller (FLC) is used to detect abnormal operation; it is also modeled to organize the operation between unit and backup protection. The numerical results clarify that the proposed model can perform fast, rigorous, and authoritative protection for the transformer. Also, modeling of the protection mode decreases the complexity of designing various subsystem and combining them in one controller.
Securing audio transmission based on encoding and steganography Enas Wahab Abood; Zaid Ameen Abduljabbar; Mustafa A. Al Sibahee; Mohammed Abdulridha Hussain; Zaid Alaa Hussien
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1777-1786

Abstract

One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least significant bit (LSB) method in the spatial and transform domains using discrete wavelet transform. The audio files of the message and the cover are in *.wav format. The experimental results showed the success of the transformation in concealing audio secret messages, as well the remarkability of the stego signal quality in both techniques. A peak signal-to-noise ratio peak signal-to-noise ratio (PSNR) scored (20-26) dB with wavelet and (81-112) dB with LSB for cover file size 4.96 MB and structural similarity index metric structural similarity index metric (SSIM) has been used to measure the signal quality which gave 1 with LSB while wavelet was (0.9-1), which is satisfactory in all experimented signals with low time consumption. This work also used these metrics to compare the implementation of LSB and WAV.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue