Articles
64 Documents
Search results for
, issue
"Vol 28, No 2: November 2022"
:
64 Documents
clear
Computer modeling and simulation to predict COVID-19 propagation patterns via factual cellular automata
Shahinaz M. Al-Tabbakh;
Marwa A. Karim
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp898-908
Computer modelling and simulation methods are very important and play a critical role in the mitigation and response to the ongoing COVID-19 pandemic. In this study, we propose a computational modeling technique based on Cellular Automata (CA) with realistic proposed rules. The rules are designed to simulate the propagation of COVID-19 disease through a bounded area. Our proposed CA rules are novel in many respects. For on, the classification of neighbors to nearest neighbors and range of neighbors based on cellular layers is explained. Moreover, the concepts of time generation and access time are deployed for the first time to model the propagation of the disease over time in this work. Further details of the proposed model including the topology of the defined area, the initial states of the cells and four-layer transfer mechanism are explained as well. This work may be considered a criterion of spreading for COVID-19 from point source in a defined population area. The results of the proposed algorithm represent the percentage of the population whose infectious status is described by different cellular state objects after a defined generation time. The results are compared under different circumstances and analyzed equanimity.
Firefly optimized robust, imperceptible, secure watermarking scheme
Sushama Agrawal;
Anjali Bhalchandra
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp1155-1163
A multi-objective optimized hybrid image watermarking technique is being proposed considering robustness, imperceptibility and security aspects using two different scaling factors. In this technique, original image is subjected to third level lifting wavelet transform (LWT) followed by singular value decomposition (SVD). Watermark is split into two parts to embed each of them into a different subband. In the suggested scheme, firefly algorithm is employed to get optimum solutions for two scaling factors to balance trade-off amid invisibility and robustness. Security in digitized data is an important aspect of image processing. It is improved with a key, an input to Arnold transform for scrambling watermark, to watermark embedding and extraction procedures. All the performance parameters like peak signal to noise ratio (PSNR), structural similarity index measure (SSIM), normalized correlation coefficient (NCC) and bit error rate (BER) are used in formulating maximization objective function. Evaluation of the proposed algorithm indicates that it is characterized by fairly good robustness, invisibility and security.
Recognition of crowd abnormal activities using fusion of handcrafted and deep features
Manasi Pathade;
Madhuri Khambete
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp1076-1087
Constant vigilance is extremely important at crowded public places where some unusual activities such as sudden dispersion or continuous gathering of people may lead to chaotic and disastrous situations. Automatic recognition of such collective activities of people is indeed an important task to ensure people safety. In this view, we propose a novel approach for automatic recognition of crowd merging and sudden dispersion events. The proposed method detects dispersion and merging using fusion of features extracted by deep networks with a novel set of optical flow based and density based handcrafted features. These proposed features are not affected by occlusion and illumination. These features complement the features extracted by deep network and their fusion improves the performance of event recognition by significant amount. The method is tested profoundly on benchmark public datasets as well as private datasets. Abnormal activity recognition data often suffers from high class imbalance. However, the proposed method could successfully recognize sudden dispersion and merging activities on such very small datasets having class imbalance. This proves the effectiveness and robustness of the proposed features. The proposed method also shows better performance than other state of the art methods based on deep networks.
Instantaneous channel characteristics and progression factor based collaborative routing
Bhairavi Ramasamy;
Gnanou Florence Sudha
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp918-925
Underwater acoustic sensor networks (UWASN) have enormous applications like investigating oceanographic environment, data gathering, scrutiny, calamity avoidance etc. Cooperative communication becomes mandatory when nodes are distributed far apart especially in the ocean environment. The existing relay selection techniques do not consider the instantaneous channel characteristics while selecting the relay nodes. The relays selected based on the outdated channel state information aggravates or worsens the performance of the rapidly changing or dynamic UWASN. Hence, this paper proposes an instantaneous channel characteristics and progression factor (ICPF) based collaborative routing for underwater acoustic sensor networks. It considers numerous indexes such as propagation delay, residual energy, progression factor, spreading, transmission and absorption loss in the forwarding relay node selection. These indexes are averaged and updated periodically to overcome the difficulties caused by the inconsistency and aggressive nature of underwater channel. The progression factor proposed in this work is a prime metric that facilitates efficient data forwarding. Simulation results show that the proposed technique outperforms the existing schemes in terms of packet delivery ratio (PDR), average end to end delay and energy consumption and is capable of achieving PDR of 90.1% for network comprising of 100 acoustic nodes.
Classification of lower limb rehabilitation exercises with multiple and individual inertial measurement units
Rashmin S. Tanna;
Chandulal H. Vithalani
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp840-849
Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb injuries play a critical role in terms of stress on joints after the injury. The primary objective of the paper is to find how accurately and efficiently a single and a two IMU sensor-based system could classify SSLR (Seated straight leg raise) and LSLR (Lying straight leg raise) exercises using machine learning. Inertial Measurement Units (IMUs) that include accelerometer and gyroscope were calibrated and tested, individual and combined, for classified seating as well as lying exercise and for different demanded personalities. Individual IMUs achieved about 96 % accuracy in binary classification. However, the combined (two) IMUs achieved about 96.8 % accuracy. The merits of the proposed IMU based sensor system are that it is easy to install, cost effective and very useful for telemedical operations in pandemic situations like COVID19. On the basis of these results, it could be concluded that the accuracy of a single IMU sensor system and a two IMU sensor-based system is approximately 96% and both were efficiently able to classify SSLR and LSLR exercises as well as identify the individual performing the exercise.
Threat modeling in application security planning citizen service complaints
Agus Tedyyana;
Fajar Ratnawati;
Elgamar Syam;
Fajri Profesio Putra
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp1020-1027
The mobile-based service complaint application is one way to implement good governance today. Public facilitated to make complaints without going through a complicated process. Security aspects must be considered to protect user privacy. The security design must be considered so that no one is harmed by the application's users damaged in the application's use. This study used threat modeling during the planning stage of developing a citizen service complaint application to obtain information about vulnerabilities. The researcher uses the threat modeling process that the open web application security project (OWASP) organization has formulated as a framework. The researchers took steps to describe application information, determine and rank threats, countermeasures, and mitigation. In the final stage, the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) threat modeling methodology is used to analyze and assess mitigation actions against threats in the application. The researcher gets a defense strategy to reduce the danger based on the threat analysis results. Threat modeling in the early phase software development life cycle process is constructive in ensuring that software is developed with adequate security based on threat mitigation from the beginning.
Graphical-based password for user authentication in internet of things
Fatimah Saif Alshahrani;
Manal Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp1139-1146
Internet of Things has become a significant and evolving technology that cannot be avoidable in most of the sectors. However, the Internet of Things security became a concern due to the huge amount of the sensitive data that transferring through IoT resources. Secure the users' authentication process of the IoT is the first line of defense to protect the users' data from violation. Typically, the alphanumeric-based password is the popular method to authenticate the users of the IoT. But it is a vulnerable mechanism that can be violated easily. For that, this research aims to develop a graphical-based password scheme to support the traditional text password in the IoT technology. The proposed scheme is a hybrid (Two-factor) approach, based on two types of Knowledge-based Authentication method (alphanumeric-based password and graphical-based password) naming as IoT-GP. IoT-GP aims to improve the users' authentication security considering the usability enhancement. The results obtain from the conducted field study indicated that IoT-GP significantly improved the security and the usability. The results of the password entropy and password space indicated that IoT-GP obtained a high rate comparing to another schemes, which reflected on the IoT-GP ability to resist the guessing and brute force attacks.
Optimum energy management strategy with enhanced time of use tariff for campus building using particle swarm optimization
Nurul Aqilah Mahmud;
Nofri Yenita Dahlan
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp644-653
Enhanced time of use (ETOU) tariff was introduced by Tenaga Nasional Berhad (TNB) in 2016 to promote demand response for commercial and industrial consumers. The ETOU tariff scheme offers different tariff rates at different times of the day. However, increment of electricity expenses might occur if consumers fail to optimally shift their consumption to lower rate hours and causing higher usage during peak hours. Furthermore, the time-based pricing tariff is still new to Malaysian consumers, thus consumers have lack of knowledge to perform demand response. Therefore, this research proposes an optimum load management strategy under the ETOU tariff for a commercial building using particle swarm optimization (PSO). The model was applied for Universiti Teknologi MARA (UiTM) Complex Engineering Shah Alam. Load profile of five different buildings in the complex were used as inputs for the study. The analyses were carried out at different controlled loads weightage factors ranged from 10-40% for load shifting strategy to determine the optimal solution. Results show the electricity cost decreases in all the controlled load weightage factors tested on the buildings after applying the load management strategy. The weightage factor of 40% provides the best solution for all buildings, saving 1-4% on the monthly bills.
Auto electronic recognition of the Arabic letters sound
Omar Ibrahim Alsaif;
Kifaa Hadi Thanoon;
Asmaa Hadi Al_bayati
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp769-776
In this research Arabic speech sounds have been studied and investigated, so as to find the distinctive features of each articulated sound. Therefore, certain Arabic sound which share certain approximate distinctive significant features have been chosen for study the ability of distinguishing among them through abstracting characteristic features for them. The signals of speech for the sounds have been recorded through the microphone which represented in a binary matrix. This procedure was implemented so as prepare these signals for processing operation through which two features for the co-occurrence matrix (contrast, energy) have been counted. The values of these features were studied and compared from one person to another to discover the certain speech sounds properties sharing certain common distinguishing features approximate in their articulation one another. The results analysis for this study gave the ability of the dependence to these features for distinguish the sound of speaker, in addition to the high ability which provided to distinguish among the arabic letters, where no connect between both co-occurrence matrix elements and the features of signaling of any arabic letters.
Cadmium sulfide doped with silver as CO2 gas sensor using pyrolysis technique
Uday Ali Sabeeh Al-Jarah;
Haidar Jawad Mohamad;
Yahya Mustafa Abdul-Hussein
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v28.i2.pp686-692
The monitoring of CO2 in our life safety, industrial, and chemical laboratoryapplications make it an inspiring task. The chemical spray pyrolysis techniquewas used to prepare CdS/Ag thin films. The nanocrystalline cadmium sulfidethin films were doped with Silver at different doping concentrations (0%, 2%,and 4%). The morphologies, structures, and gas sensing properties of CdS/Agfilms are presented. The samples were characterized using X-ray diffraction(XRD) and atomic force microscope (AFM). The XRD results show that thefilms are a polycrystalline composition and hexagonal type with a favouredorientation along (111) direction. The average grain size (nm) of AFM isbetween 75 and 55 nm. As a result, Ag doping changes the sensitivity of thesamples respectively with the percentage of doping with time. The synthesissamples show controlling sensitivity and the small response of sensitivity arethe key point in this study.