cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 28 Documents
Search results for , issue "Vol 5, No 1: January 2017" : 28 Documents clear
Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks Azeem Mohammed Abdul; Syed Umar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp187-195

Abstract

In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.
Monthly Precipitation Trend Analysis by Applying Nonparametric Mann- Kendall (MK) and Spearman’s rho (SR) Tests In Dongting Lake, China: 1961-2012 Muhammad Tayyab; Jianzhong Zhou; Rana Adnan; Aqeela Zahra
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp41-47

Abstract

This research highlights the precipitation trends and presents the results of the study in temporal and spatial scales. Precise predictions of precipitation trends can play imperative part in economic growth of a state. This study examined precipitation inconsistency for 23 stations at the Dongting Lake, China, over a 52-years study phase (1961–2012). Statistical, nonparametric Mann- Kendall (MK) and Spearman’s rho (SR) tests were applied to identify trends within monthly, seasonal, and annual precipitation. The trend-free prewhitening method used to exclude sequential correlation in the precipitation time series. The performance of the Mann- Kendall (MK) and Spearman’s rho (SR) tests was steady at the tested significance level. The results showed fusion of increasing (positive) and decreasing (negative) trends at different stations within monthly and seasonal time scale. In case of whole Dongting basin on monthly time scale, significant positive trend is found, while at Yuanjiang River and Xianjiag River both positive and negative significant trends are identified.
BCG Artifact Removal Using Improved Independent Component Analysis Approach Manjula B.M.; Chirag Sharma
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp130-138

Abstract

Recent advancement in bio-medical field has attracted researchers toward BCG signal processing for monitoring the health activities. There have been various techniques for monitoring physical activities such as (SCG) Seismocardiography, Electrocardiography (ECG) etc. BCG signal is a measurement of reaction force applied for cardiac ejection of blood. Various measurement schemes and systems have been developed for BCG detection and measurement such as tables, beds, weighing scale and chairs. Weighing scales have been promising method for measurement of BCG signal because of less cost of implementation, smaller size etc. but these devices still suffer from the artifact which are induced due to subject movement or motion during signal acquisition or it can be caused due to floor vibrations. Artifact removal is necessary for efficient analysis and health monitoring. In this work we address the issue of artifact removal in BCG signal by proposing a novel method of signal processing. According to proposed approach raw signal is pre-processed and parsed to independent component analysis which provides the decomposed components and later k-means is applied to detect the components which are responsible for artifact and removed. Proposed approach is compared with existing method and shows better performance in terms of artifact removal.
Physicians’ and Users’ Perceptions towards Wearable Health Devices Narassima M Seshadri; Anbuudayasankar S P; Shriram Kris Vasudevan; Abhinavaram J
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp234-242

Abstract

Healthcare plays a vital role in economic development of a country, and has a major impact on the entire wellness of humankind. One of the biggest issues of all times, Blood Pressure is prevailing in patients of all countries.  In developing countries like India, it is prevalent among people of diverse age groups, which somehow permeates into their wellness, reflecting and slowing down the growth of the country as well as that of an individual. As Blood Pressure is identified as one of the major contributors to Cardio Vascular Diseases, there is an urge to educate people about the consequences. The research focuses on various factors and their levels of impact on acceptance of Mobile Health Management Services. Appropriate tests have been carried out for validating this hypothesis. All the details are presented in the results’ section with clear discussion and description.
An Embedded Iris Image Acquisition Research Dangui Chen; Guojun Qin
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp90-98

Abstract

In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password. Here, an embedded application system was designed based on the iris identification technology, the functions of gathering, inputing, and registering the iris information and identification can be realized. The system architecture was designed by using the embedded microprocessor of advanced RISC machines (ARM), which is used as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.
Ontology Matching using BabelNet Dictionary and Word Sense Disambiguation Algorithms Mohamed Biniz; Rachid el Ayachi; Mohamed Fakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp196-205

Abstract

Ontology matching is a discipline that means two things: first, the process of discovering correspondences between two different ontologies, and second is the result of this process, that is to say the expression of correspondences. This discipline is a crucial task to solve problems merging and evolving of heterogeneous ontologies in applications of the Semantic Web. This domain imposes several challenges, among them, the selection of appropriate similarity measures to discover the correspondences. In this article, we are interested to study algorithms that calculate the semantic similarity by using Adapted Lesk algorithm, Wu & Palmer Algorithm, Resnik Algorithm, Leacock and Chodorow Algorithm, and similarity flooding between two ontologies and BabelNet as reference ontology, we implement them, and compared experimentally. Overall, the most effective methods are Wu & Palmer and Adapted Lesk, which is widely used for Word Sense Disambiguation (WSD) in the field of Automatic Natural Language Processing (NLP).
Non-convex Economic Load Dispatch using Cuckoo Search Algorithm N. Karthik; A.K. Parvathy; R. Arul
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp48-57

Abstract

This paper presents cuckoo search algorithm (CSA) for solving non-convex economic load dispatch (ELD) problems of fossil fuel fired generators considering transmission losses and valve point loading effect. CSA is a new meta-heuristic optimisation technique inspired from the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds of other species. The strength of the proposed meta-heuristic optimization technique CSA has been tested and validated on the standard IEEE 14-bus, 26-bus and 30-bus system with several heuristic load patterns. The results have indicated that the proposed approach is able to obtain significant economic load dispatch solutions than those of Firefly Algorithm (FFA) and other soft computing techniques reported in the literature.
Attacks and Secure Geographic Routing In Wireless Sensor Networks Sabri Yassine; Najib El Kamoun
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp147-158

Abstract

Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. GRPW, a geographical routing protocol for wireless sensor networks, is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. The wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW is provided called GRPW-MuS-s. Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
Design of Automatic Number Plate Recognition on Android Smartphone Platform Teddy Surya Gunawan; Abdul Mutholib; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp99-108

Abstract

Automatic Number Plate Recognition (ANPR) is an intelligent system which has the capability to recognize the character on vehicle number plate. It is a combination of hardware and software designed to offer the optimum reliability. Since the past decades, many researchers have been proposed to recognize the vehicle number plate and implemented it in various access control, law enforcement and security, including parking management system, toll gate access, border access, tracking of stolen vehicles and traffic violations (speed trap, illegal parking, etc). However, previous researches implemented ANPR system on personal computer (PC) with high resolution camera and high computational capability. On the other hand, not many researches have been conducted on the design of ANPR in Android smartphone platform which has limited camera resolution and limited computational power. The main challenges of implementation ANPR algorithm on smartphone are higher coding efficiency, lower computational complexity, and higher the scalability. The objectives of this research is to design ANPR on Android smartphone, including graphical user interface (GUI) design, process design, and database design. First, a comprehensive survey on the pre-processing, segmentation, and optical character recognition is conducted. Secondly, proposed system development and algorithm implementation is explained in more details. Results show that our proposed design can be implemented effectively in Android smartphone platform.
Spatial Modeling in Landslide Susceptibility Dwi Shanty Apriliani Gunadi; I Nengah Surati Jaya; Boedi Tjahjono
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp139-146

Abstract

Landslide Susceptibility Mapping is one of the mitigation effort to detect vulnerable areas for minimizing the risk of landslide disasters. This paper describes spatial model development for assessing landslide susceptibility by considering human and biophysical factors. The main objective of this research is to develop a spatial modeling of landslide susceptibility, particularly in several regencies of West Java Province. The data analysis include data pre-processing, regression analysis, correlation analysis, score development, and weight determination using Principal Component Analysis (PCA).  The study found that  the most important factors that contributed to landslide susceptibility within the research area is the Landuse/Landcover, then  followed by Slope, Distance to River, Soil Type, Annual Rainfall, Population Density, Geology Age, Climate Type, and Geomorphology. The first three highest factors occupied almost 53% of the total weight. The model successfully estimated the spatial distribution and degree of landslide susceptibility into 3 classes having overall accuracy of about 68%.

Page 1 of 3 | Total Record : 28


Filter by Year

2017 2017


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue