Articles
67 Documents
Search results for
, issue
"Vol 22, No 3: June 2021"
:
67 Documents
clear
A new approach for extracting and scoring aspect using SentiWordNet
Tuan Anh Tran;
Jarunee Duangsuwan;
Wiphada Wettayaprasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1731-1738
Aspect-based online information on social media plays a vital role in influencing people’s opinions when consumers concern with their decisions to make a purchase, or companies intend to pursue opinions on their product or services. Determining aspect-based opinions from the online information is necessary for business intelligence to support users in reaching their objectives. In this study, we propose the new aspect extraction and scoring system which has three procedures. The first procedure is normalizing and tagging part-of-speech for sentences of datasets. The second procedure is extracting aspects with pattern rules. The third procedure is assigning scores for aspects with SentiWordNet. In the experiments, benchmark datasets of customer reviews are used for evaluation. The performance evaluation of our proposed system shows that our proposed system has high accuracy when compared to other systems.
Integrating k-means clustering into automatic programming assessment tool for student performance analysis
Rina Harimurti;
Ekohariadi Ekohariadi;
Munoto Munoto;
I. G. P. Asto Buditjahjanto
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1389-1395
Computer programming is a subject involving a large number of logic programming activities. A programmer is compulsory to master skills of algorithms, logic, and programming language to conduct programming. An automatic programming assessment tool is an automated tool used to assist instructors in assessing programming tasks. The technology used in this application is open-source based with an evaluation module that will evaluate the sent program code, assessment, and classification. The evaluation results were then processed in the assessment module, where a comparison process with the test case was performed along with the point calculation. The classification module was used to divide students into five groups based on the point of each practicum. This study used k-means clustering classification method. The entities included were lecturers, assistants, students, and compilers. This application had 2 levels of users namely admin and students. Scoring results were then used in the process of determining the classification of student’s performance based on the k-means clustering method. In connection with the classification test results with three iterations, three practicum scores resulted that the classification process was successfully carried out with student’s performance divided into five groups covering very good, good, sufficient, less, and very less. The data used in the clustering process consisted of 41 students with 10 attributes which were then grouped into 3 groups (clusters).
Half-face based recognition using principal component analysis
Ahmed M. Alkababji;
Sara Raed Abd
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1404-1410
Face recognition is a considerable problem in the field of image processing. It is used daily in various applications from personal cameras to forensic investigations. Most of the provides solutions proposed based on full-face images, are slow to compute and need more storage. In this paper, we propose an effective way to reduce the features and size of the database in the face recognition method and thus we get an increase in the speed of discrimination by using half of the face. Taking advantage of face symmetry, the first step is to divide the face image into two halves, then the left half is processed using the principal component analysis (PCA) algorithm, and the results are compared by using Euclidian distance to distinguish the person. The system was trained and tested on ORL database. It was found that the accuracy of the system reached up to 96%, and the database was minimized by 46% and the running time was decreased from 120 msec to 70 msec with a 41.6% reduction.
Improved incentive pricing-based quasi-linear utility function of wireless networks
Fitri Maya Puspita;
Bella Juwita Rezky;
Arden Naser Yustian Simarmata;
Evi Yuliza;
Yusuf Hartono
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1467-1475
The model of the incentive pricing scheme-based quasi-linear utility function in wireless network was designed. Previous research seldom focusses on user’s satisfaction while using network. Therefore, the model is then attempted to be set up that is derived from the modification of bundling and models of reverse charging and maintain the quality of service to users by utilizing quasi-linear utility function. The pricing schemes then are applied to local data server traffic. The model used is known as mathematical programming problem that can be solved by LINGO 13.0 program as optimization tool to get the optimal solution. The optimal results show that the improved incentive pricing can achieve better solution compared to original reverse charging where the models will be obtained in flat fee, usage-based, and two-part tariff strategies for homogeneous consumers.
Methods for secure cloud processing of big data
Yerzhan N. Seitkulov;
Seilkhan N. Boranbayev;
Gulden B. Ulyukova;
Banu B. Yergaliyeva;
Dina Satybaldina
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1650-1658
We study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theory and methods of secure outsourcing for various abstract equations with secret parameters, and then present the results of using these methods in solving applied problems with secret parameters, arising from the modeling of economic processes. Many economic tasks involve processing a large set of economic indicators. Therefore, we are considering a typical economic problem that can only be solved on very powerful computers.
The application of instrumentation system on a contactless robotic triage assistant to detect early transmission on a COVID-19 suspect
Niko Azhari Hidayat;
Prisma Megantoro;
Abdufattah Yurianta;
Amila Sofiah;
Shofa Aulia Aldhama;
Yutika Amelia Effendi
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1334-1344
This article discusses the instrumentation system of airlangga robotic triage assistant version 1 (ARTA-1), a robot used as a contact-free triage assistant for Coronavirus disease (COVID-19) suspects. The triage process consists of automatic vital signs check-up as well as the suspect’s anamnesis that in turns will determine whether the suspect will get a specific care or not. Measurements of a suspect’s vital conditions, i.e. temperature, height, and weight, are carried out with sensors integrated with the Arduino boards, while a touch-free, hand gesture questions and answers is carried out to complete anamnesis process. A portable document format (PDF) format of the triage report, which recommends what to do to the suspect, will then be automatically generated and emailed to a designated medical staff.
Improved grey wolf algorithm for optimization problems
Hafiz Maaz Asgher;
Yana Mazwin Mohmad Hassim;
Rozaida Ghazali;
Muhammad Aamir
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1573-1579
The grey wolf optimization (GWO) is a nature inspired and meta-heuristic algorithm, it has successfully solved many optimization problems and give better solution as compare to other algorithms. However, due to its poor exploration capability, it has imbalance relation between exploration and exploitation. Therefore, in this research work, the poor exploration part of GWO was improved through hybrid with whale optimization algorithm (WOA) exploration. The proposed grey wolf whale optimization algorithm (GWWOA) was evaluated on five unimodal and five multimodal benchmark functions. The results shows that GWWOA offered better exploration ability and able to solve the optimization problem and give better solution in search space. Additionally, GWWOA results were well balanced and gave the most optimal in search space as compare to the standard GWO and WOA algorithms.
Two-versions of descent conjugate gradient methods for large-scale unconstrained optimization
Hawraz N. Jabbar;
Basim A. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1643-1649
The conjugate gradient methods are noted to be exceedingly valuable for solving large-scale unconstrained optimization problems since it needn't the storage of matrices. Mostly the parameter conjugate is the focus for conjugate gradient methods. The current paper proposes new methods of parameter of conjugate gradient type to solve problems of large-scale unconstrained optimization. A Hessian approximation in a diagonal matrix form on the basis of second and third-order Taylor series expansion was employed in this study. The sufficient descent property for the proposed algorithm are proved. The new method was converged globally. This new algorithm is found to be competitive to the algorithm of fletcher-reeves (FR) in a number of numerical experiments.
An improved technique for power transformer protection using fuzzy logic protective relaying
Marwa M. Marei;
Manal H. Nawir;
Ali Abdul Razzaq Altahir
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1754-1760
The three-phase power transformer in the transmission or distribution substations represents one of the essential devices on electric power networks. Losing this devise cause a disconnection of the power utility to a large number of electrical loads. The robust protection system must be designed to protect the device during abnormal operations. A complete protection system for a poly-phase power transformer for one of the Karbala transmission networks (East Karbala substation) is modeled and simulated, adopting a fuzzy logic protective relaying using MATLAB/SIMULINK environment. This study discusses fuzzy logic-based relaying for a power transformer safety, as well as internal faults that are clearly identified. Two principles of operation are used to protect the transformer; differential relay and overcurrent relay. The differential relay is proposed as the unit protection, while the overcurrent is backup protection. The proposed fuzzy logic controller (FLC) is used to detect abnormal operation; it is also modeled to organize the operation between unit and backup protection. The numerical results clarify that the proposed model can perform fast, rigorous, and authoritative protection for the transformer. Also, modeling of the protection mode decreases the complexity of designing various subsystem and combining them in one controller.
Securing audio transmission based on encoding and steganography
Enas Wahab Abood;
Zaid Ameen Abduljabbar;
Mustafa A. Al Sibahee;
Mohammed Abdulridha Hussain;
Zaid Alaa Hussien
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1777-1786
One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least significant bit (LSB) method in the spatial and transform domains using discrete wavelet transform. The audio files of the message and the cover are in *.wav format. The experimental results showed the success of the transformation in concealing audio secret messages, as well the remarkability of the stego signal quality in both techniques. A peak signal-to-noise ratio peak signal-to-noise ratio (PSNR) scored (20-26) dB with wavelet and (81-112) dB with LSB for cover file size 4.96 MB and structural similarity index metric structural similarity index metric (SSIM) has been used to measure the signal quality which gave 1 with LSB while wavelet was (0.9-1), which is satisfactory in all experimented signals with low time consumption. This work also used these metrics to compare the implementation of LSB and WAV.