Articles
50 Documents
Search results for
, issue
"Vol 9, No 3: March 2018"
:
50 Documents
clear
Assessing the Crown Closure of Nypa on UAV Images using Mean-Shift Segmentation Algorithm
Robert Parulian Silalahi;
I Nengah Surati Jaya;
Tatang Tiryana;
Fairus Mulia
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp722-730
Utilization of very high-resolution images becomes a new trend in forest management, particularly in the detection and identification of forest stand variables. This paper describes the use of mean-shift segmentation algorithm on unmanned aerial vehicles (UAV) images to measure crown closure of nypa (Nypa fructicans) and gap. The 27 combinations of the parameter values such as spatial radius (hs), range radius (hr), and minimum region size (M). Gap detection and nypa crown closure measurements were performed using a hybrid between pixel-based (maximum likelihood classifier) and object-based approaches (segmentation). For evaluation of the approach performance, the accuracy assessment was done by comparing object-based classification results (segmentation) and visual interpretation (ground check). The study found that the best combination of segmentation parameter was the combination of hs 10, hr 10 and M 50, with the overall accuracy of 76,6% and kappa accuracy of 55.7%.
Remote Sensing with Internet Based Patient Condition Observing System
Pratibhahanmantrao Gaikwad;
Dhiren Pranshankar Dave
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp629-632
This Paper aims to design and demonstrate an innovative web-based remote healthcare diagnostic system that provides vital medical data and live video images of a patient situated in the rural area accessible to a health professional available elsewhere in urban centres resulting in better diagnosis and treatment of that patient.
Using Encryption Square Keywith One-Dimensional Matrix for Enhancing RGB Color Image Encryption-Decryption
Mohammad Rasmi AL-Mousa;
Fadi Al-salameen;
Khaled Eisa Alqawasmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp771-777
Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia application. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. However, those algorithms are usually suffering from the problem of time-consuming. Encryption algorithms have been growth quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access. This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image. The evaluations of the proposed technique were done using many images with different sizes, while the ex perimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method. The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.
Architecting Virality: Information Sharing from Government FB Page to Netizens
Afdallyna Fathiyah Harun;
Siti Nuradzarul Aqmaar Adzman;
Fauzi Mohd Saman;
Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp660-666
In accordance with e-government initiatives, many ministries in Malaysia have engaged content to public using social media for better two-way communications. However, creating an online presence is not necessarily easy as digital content consumers are often bombarded with information and those that fail to capture information will be rendered uninteresting and irrelevant. This is imperative as for most part, users are in control of where they allocate attention and what they share. Using virality as a context, it is opined that information content that are well-designed will trigger specific information and propel the sharing of that information over the Internet. A study employing FB post categorization and sharing motivations survey was carried out in the context of Ministry of Health Malaysia Facebook page. The findings show that users are inclined towards Infographics with various sharing motivations. The results can be used by Malaysian ministries on how best to design and disseminate information for the benefit of the netizens on social media sites.
Modeling Portable Manager Aiding in the MANET Communication
Ganesh Kumar;
A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp572-576
The aim of this paper is to model the Portable Manager and allow it to aid in communication among Mobile Ad-hoc Networks (MANETs) carrying information across the mobile nodes in the network. In this article, Modeling Portable Manager aiding in the MANET Communication (MMAC) is proposed. The novelty is present in the use of node performance parameter called as α defined as the ratio of the packet received, packet loss and delay of the node which could be used for the next hop selection in the mobile ad hoc network. The Portable Manager (PM) is used to find out the relay node in the network. The working of the PM with a minimal number of nodes is analyzed and presented through the simulations in the network simulator.
Prospect Convenient Steadfast Procedure in Wireless Sensor Network
Jewan Singh;
Vibhakar Mansotra
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp613-615
This article objective is to improve the steadfast routing in Wireless Sensor Networks with little interfering and avoid packet collision. In the scheme, the entire node has the option of electing next Data Communication Node (DCN). The next data communication node is chosen depend on the intensity of link, remaining energy, and the node with distance towards the Base Station. Thus, the sender node transmits the information to the best DCN. Instantly, the DCN sends the acknowledgement (ACK) along with the number of packets received back to the node from which it obtains the data. The sender node assures the delivery of the transmitted packets by comparing the value of number of packets sent with the value obtained with the acknowledgement. If they are equivalent, it will send the verification identity to the DCN. If it is not equivalent, it will decide another node with highest link intensity. After that, the data chooses the DCN and repeat the process until the data reaches the Base Station.
Modified Pixels Based Fast Median Filter in Impulse Noise Environments
Man Hee Lee;
Soo Young Shin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp731-741
This paper proposes a modified pixel-based fast median filter (MP-FMF) for impulse noise environments. The key idea behind MP-FMF is the reduction in the processing time by using modified pixels. It consists of three steps, namely, error detection, threshold decision, and noise mitigation. The presence of noise is detected by using modified pixels that include a cyclic redundancy check (CRC) function. Subsequently, the threshold values are decided by estimating the noise density. For noise mitigation, corrupted pixels are corrected with the neighboring pixels based on the principle of the median filter. The MP-FMF has a fast processing time and provides image quality correction and introduces features when the noise density is high. In addition, we introduce a new evaluation metric and investigate the performance of the proposed algorithm in terms of the quality, features, and computation time.
Query Processing for Time Efficient Data Retrieval
Muhammad Qasim Memon;
Jingsha He;
Aasma Memon;
Khurram Gulzar Rana;
Muhammad Salman Pathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp784-788
In database management system (DBMS) retrieving data through structure query language is an essential aspect to find better execution plan for performance. In this paper, we incorporated database objects to optimize query execution time and its cost by vanishing poorly SQL statements. We proposed a method of evolving and inserting database constraints as database objects embedded with queries either to add them for the sake of transactions required by user to detect those queries for the betterment of performance. We took analysis on several databases while processing queries itself and assimilate real time database workload with the bunch of transactions are invoked in comparison with tuning approaches. These database objects are coded in procedural language environment pertaining rules to make it worth and are merged into queries offering improved execution plan.
License Plate Recognition Using Undecimated Wavelet Transform
G. Kannan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp558-560
License Plate Recognition (LPR) is the mission of identifying the vehicle using number plate extraction. An efficient method for recognizing plate based on Undecimated Wavelet Transform (UWT) is proposed. Plates are recognized using features from undecimated coefficients in this system. Morphological edge detection technique is used to get accurate results after feature extraction. Finally detected images are used for classification purpose using the feature coefficients. This technique is applied to all the unidentified and training images, extracted features are used as input to Back Propagation Neural Network (BPNN). The evaluation of the system is based on public database.
Harmonic Load Diagnostic Techniques and Methodologies: A Review
A.S. Hussin;
A.R. Abdullah;
M.H. Jopri;
T Sutikno;
N.M. Saad;
Weihown Tee
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp690-695
This paper will review on the existing techniques and methodologies of harmonic load diagnostic system. The increasingly amount of harmonic producing load used in power system are the main contribution in quantifying each harmonic disturbance effects of the multiple harmonic producing loads and it became very important. Literature proposes two different techniques and methods on the harmonic source identification under the soft computing technique classification. The advantages and disadvantages of harmonic load identification techniques and methods are discussed in this paper. In the proposed method, the issue on the harmonic contribution is determine and transformed to a data correlation analysis. Several techniques to identify the sources of harmonic signals in electric power systems are described and reviewed based on previous paper. Comparative studies of the methods are also done to evaluate the performance of each techniques. However, without sufficient information in this inconsistent environment on the property of the power system, accurate harmonic producing load diagnosis methods are important and further investigations in this regard assumes great implication.