Articles
64 Documents
Search results for
, issue
"Vol 30, No 1: April 2023"
:
64 Documents
clear
Approach by modeling to generate an e-commerce web code from laravel model
M'hamed Rahmouni;
Mouad Bouzaidi;
Samir Mbarki
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp257-266
The world of web is constantly evolving. Today, we no longer speak of a website but of a web application. The growing difficulty of designing web applications has given rise to solutions and tools. The framework is one of them. Providing a serious framework for development by offering strict development rules, as well as generic and out-of-the-box components, PHP laravel framework is one of them. This paper aims to present the different stages of modeling and development of an enterprise resource planning (ERP) system that will be implemented by PHP laravel by defining the main concepts involved in this information system modeling and development process. To lead and implement the end-to-end development of the said system, we apply the model-driven architecture (MDA) approach. This approach is based on atlas transformation language (ATL). The result of this paper is an Ecore file, a reliable MVC2 web model of e-commerce ERP, which will be the input file to generate the aforementioned system code. To validate this approach, we implemented a case study. The result of this work is very satisfying. Thus, we arrived to generate all necessary elements for this ERP code generation by respecting the MVC2 model and the PHP coding.
Cost-effective anonymous data sharing with forward security using improved authentication
Shubhangi Handore;
Pallavi Kolapkar;
Pratibha Chavan;
Pramod Chavan
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp129-136
Cloud computing gives customers instant access to a network of remote servers, networks, and data centres. Cloud computing makes data analysis helpful to society and individuals. Sharing data with many people causes efficiency, integrity, and privacy issues. Ring signatures may enable secure and anonymous data transfer. It anonymizes data verification for cloud-based analytics. Identity-based (ID) ring signatures are becoming popular alternatives to public key infrastructure (PKI)-based public-key encryption. PKI bottlenecks are certificate verification time and cost. ID-based ring signatures speed up certificate verification. We observed that encrypting ID-based ring signatures with a variation of SHA-384 and adding forward security considerably improves their security. Padding divides the input text into 512-byte blocks and adds the length as a 48-bit value to the hash in newer SHA versions. Signatures made before a user's secret key was compromised are legitimate. If a user's secret key is compromised, it's impossible to compel all data owners to re-verify their data, hence a large-scale data sharing system must contain this feature. We implement, secure, and prove our method's use. SHA-384 is safer for cloud-based anonymous data sharing.
Design of a RoF fronthaul link based on optical generation of mm-waves for 5G C-RANs
Faris Keti;
Salih M. Atroshey;
Jalil A. Hamadamin
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp157-166
In this paper, a cloud-radio access networks based (C-RANs) radio-over-fiber (RoF) system have been reported with the optical generation of 28 GHz and 57 GHz millimeter-wave using phase modulation and stimulated Brillouin scattering effect in optical fibers. As a result, a cost-effective system with improved performance is achieved by the proposed method. Based on the proposed scheme, a 28 GHz (licensed band) and 57 GHz (Un-licensed band) optical millimeter-waves are generated by simulation only using 14 GHz and 16 GHz radio frequency (RF) respectively. Because the performance of any optical transmission system is limited by the Q factor and the bit error rate (BER) and any input power of the laser into the fiber needs to be less than the Brillouin threshold in order to avoid the sharp degradation of the Q factor. Also, the Brillouin threshold for this study setup is determined which is around 6 dBm in the case of licensed band and 2 dBm in the case of unlicensed band. The simulation results show that the proposed scheme can provide 100 km single-mode fiber for 28 GHz and 25 km for 57 GHz with transmission rates of 10 Gbps for both of them. In addition, a stable millimeter-wave RoF link, high quality carriers, and a reduction in nonlinearity effects are achieved with the proposed scheme.
Survey on attribute and concept reduction methods in formal concept analysis
Mohammed Alwersh;
László Kovács
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp366-387
Formal concept analysis (FCA) is now widely recognized as a useful approach for extracting, representing, and analyzing knowledge in various domains. The high computational cost of knowledge processing and the difficulty of visualizing the lattice are two key challenges in practical FCA implementations. Moreover, assessing the finalized built-up lattice may be problematic due to the enormous number of formal concepts and the complexity of their connections. The challenge of constructing concept lattices of adequate size and structure to convey high-importance context features remains a significant FCA aim. In the literature, various strategies for concept lattice reduction have been presented. In this work, we suggest a categorization of reduction methods for concept lattice based on three main categories: context pre-processing, non-essential distinctions elimination, and concept filtration, whereby using FCA-based analysis, the most important methods in the literature are analyzed and compared based on six pillars: the preliminary step of the reduction process, domain expert, changing the original data structure, final concept lattice, quality of reduction, and category of reduction method.
Consensus-based secure and efficient compressive sensing in a wireless network sensors environment
Nandini S. Patil;
Asma Parveen
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp200-207
Compressive sensing provides the optimal paradigm for data aggregation approach in wireless sensor networks as it holds the characteristics of low traffic cost and avoids the large communication overhead through a traditional approach. However, security is still considered one of the important, in recent years consensus-based approach has been one of the security highlights in compressive sensing. Moreover, a consensus is developed only with the help of genuine nodes. In this research work, a novel integrated-consensus-based secure compressive sensing (CSCS) is proposed which aims to develop a secure consensus environment to secure the network. Integrated-CSCS comprises several modules; at first certain variables are assigned to each node participating in the network. Later an algorithm is developed where each node evaluates the assigned neighbor variable and updates its states. Moreover, this phenomenon leads to the identification of genuine and compromised nodes. The proposed model is evaluated by considering the efficiency and security parameters; efficiency evaluation is carried out through energy consumption, and several node failures where as security is evaluated by considering the ability to identify the genuine node and malicious or corrupt node.
A smart system combining real and predicted data to recommend an optimal electric vehicle charging station
Ibrahim EL-Fedany;
Driss Kiouach;
Rachid Alaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp394-405
The electric vehicle (EV) is considered an attractive alternative to a conventional vehicle, due to its potential beneficiation in decreasing carbon emission. But the battery range anxiety is a key challenge to its wide adoption and also the EV drivers spend so much time in public charging stations (CS) to charge especially during peak times. In this paper, we propose a charging station selected system (C3S) to control and manage EVs charging plans. Moreover, the C3S system proposed consists of a set of algorithms that are proposed to recommend a suitable CS for EV charging requests. The CS selection is based on minimizing travel time and takes into account in real-time the queuing time at CS, EVs' charging reservations, and the predicted time of EVs' future charging requests. Besides, we proposed three different strategies for predicting the EVs incoming and controlling the uncertainty matter of the dynamic arrival of EV charging requests. As part of the Helsinki City scenario, the evaluation results demonstrate the performance, especially at peak times, of our proposed C3S with regard to the CS recommendation which has the minimum total trip duration.
An improved hybrid semi-stacked autoencoder for item-features of recommendation system (iHSARS)
Ahed Mleih Al-Sbou;
Noor Hafhizah Abd Rahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp481-490
In recent years, information overload has become a phenomenon where it makes people difficult to filter relevant information. To address issues such as high-dimensional data, cold start, and data sparsity, semi-autoencoder is one of the unsupervised deep learning methods used in the recommendation systems. It is particularly useful for reducing data dimensions, capturing latent representations, and flexibly reconstructing various parts of input data. In this article, we propose an improved hybrid semi-stacked autoencoder for item-features of recommendation system (iHSARS) framework. This method aims to show better performance of the hybrid collaborative recommendation via semi-autoencoder (HRSA) technique. Two novel elements for iHSARS’s architecture have been introduced. The first element is an increase sources of side information of the input layer, while the second element is the number of hidden layers has been expanded. To verify the improvement of the model, MovieLens-100K and MovieLens-1M datasets have been applied to the model. The comparison between the proposed model and different state-of-the-art methods has been carried using mean absolute error (MAE) and root mean square error (RMSE) metrics. The experiments demonstrate that our framework improved the efficiency of the recommendation system better than others.
Enhancing the security of quality of service-oriented distributed routing protocol for hybrid wireless network
Miaad Husam Mahdi;
Ibrahim Adel Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp121-128
Merging the wireless infrastructure network with the wireless mobile ad-hoc networks constitutes hybrid wireless networks (HWNs). Quality of service (QoS) demands are available with the help of HWNs. However, these networks are subjected to many types of attacks because of their open wireless medium. To enhance the security of HWNs, it is necessary to provide secure routing protocols. Several routing protocols have been proposed for HWNs, one of them is the quality of service-oriented distributed (QOD) routing protocol. In this paper, two security mechanisms have been proposed for the QOD protocol. The first mechanism is used to protect transmitted data in the network using asymmetric and symmetric cryptography. The second mechanism has been proposed to enhance the security of the QOD routing protocol using keyed hash message authentication code (HMAC). The second security mechanism assumed that there is a secret key shared between each pair of neighbor nodes. Also, asymmetric cryptography is used to exchange the secret key. The secret key is used to include the message authentication code (MAC) for each message exchanged between the neighbor nodes. A network simulator NS2 is used to simulate our proposed schemes.
Faster region-based convolutional neural network for plant-parasitic and non-parasitic nematode detection
Natalia Angeline;
Nabila Husna Shabrina;
Siwi Indarti
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp316-324
Nematodes represent very abundant and the largest species diversity in the world. Nematodes, which live in a soil environment, possess several functions in agricultural systems. There are two huge groups of soil nematodes, a non-parasitic nematode, which contributes positively to ecological processes, and a plant-parasitic nematode, which cause various disease and reduces yield losses in the agricultural system. Early detection and classification in the agricultural area infected with plant-parasitic nematode and interpreting the soil level condition in this area required a fast and reliable detection system. However, nematode identification is challenging and time-consuming due to their similar morphology. This study applied a pre-trained faster region-based convolutional neural network (RCNN) for plant-parasitic and non-parasitic nematodes detection. These deep learning-based object detection models gave satisfactory results as the accuracy reached 87.5%.
Sophisticated CPBIS methods applied for FBISODATA clustering algorithm using with real time image database
Muniappan Ramaraj;
Dhandapani Sabareeswaran;
V. Vijayalaksmi;
Chembath Jothish;
N. Thangarasu;
Govindaraj Manivasagam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v30.i1.pp614-624
Data mining is a process of mining hidden information to the previously unknown data and theoretically useful unknown information from a large amount of genuine data to be stored in a database. Image mining is a part of data mining with used as a predictive measure to identify with the age of the tiger. This research work is mainly focused on, to identify with the age of the Tiger using data mining techniques. This research work incorporates with which those domains of image processing and data mining to predict the age of the tiger using different kinds of color images are used. The fuzzy iterative self-organizing data analysis (FISODATA) clustering method requires more predefined parameters tofind the maximum number of iterations, the minimum number of points in the cluster, and smallest amount of distance with the centers of the clusters. The key undertaking of the studies of diverse colors mechanism is to decide the age of the tiger; the usage of shade action pixel primarily based on image segmentation; the usage of facts that are used in the mining techniques. However, the more matrix components to be measuring the processing time, retrieval time, accuracy, and blunders fee with the aid of using producing better performance.