cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 50 Documents
Search results for , issue "Vol 9, No 3: March 2018" : 50 Documents clear
Assessing the Crown Closure of Nypa on UAV Images using Mean-Shift Segmentation Algorithm Robert Parulian Silalahi; I Nengah Surati Jaya; Tatang Tiryana; Fairus Mulia
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp722-730

Abstract

Utilization of very high-resolution images becomes a new trend in forest management, particularly in the detection and identification of forest stand variables. This paper describes the use of mean-shift segmentation algorithm on unmanned aerial vehicles (UAV) images to measure crown closure of nypa (Nypa fructicans) and gap. The 27 combinations of the parameter values such as spatial radius (hs), range radius (hr), and minimum region size (M). Gap detection and nypa crown closure measurements were performed using a hybrid between pixel-based (maximum likelihood classifier) and object-based approaches (segmentation).  For evaluation of the approach performance, the accuracy assessment was done by comparing object-based classification results (segmentation) and visual interpretation (ground check). The study found that the best combination of segmentation parameter was the combination of hs 10, hr 10 and M 50, with the overall accuracy of 76,6% and kappa accuracy of 55.7%.
Remote Sensing with Internet Based Patient Condition Observing System Pratibhahanmantrao Gaikwad; Dhiren Pranshankar Dave
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp629-632

Abstract

This Paper aims to design and demonstrate an innovative web-based remote healthcare diagnostic system that provides vital medical data and live video images of a patient situated in the rural area accessible to a health professional available elsewhere in urban centres resulting in better diagnosis and treatment of that patient.
Using Encryption Square Keywith One-Dimensional Matrix for Enhancing RGB Color Image Encryption-Decryption Mohammad Rasmi AL-Mousa; Fadi Al-salameen; Khaled Eisa Alqawasmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp771-777

Abstract

Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia application. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. However, those algorithms are usually suffering from the problem of time-consuming. Encryption algorithms have been growth quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access. This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image.  The evaluations of the proposed technique were done using many images with different sizes, while the ex perimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method.  The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.
Architecting Virality: Information Sharing from Government FB Page to Netizens Afdallyna Fathiyah Harun; Siti Nuradzarul Aqmaar Adzman; Fauzi Mohd Saman; Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp660-666

Abstract

In accordance with e-government initiatives, many ministries in Malaysia have engaged content to public using social media for better two-way communications. However, creating an online presence is not necessarily easy as digital content consumers are often bombarded with information and those that fail to capture information will be rendered uninteresting and irrelevant. This is imperative as for most part, users are in control of where they allocate attention and what they share. Using virality as a context, it is opined that information content that are well-designed will trigger specific information and propel the sharing of that information over the Internet. A study employing FB post categorization and sharing motivations survey was carried out in the context of Ministry of Health Malaysia Facebook page. The findings show that users are inclined towards Infographics with various sharing motivations. The results can be used by Malaysian ministries on how best to design and disseminate information for the benefit of the netizens on social media sites.
Modeling Portable Manager Aiding in the MANET Communication Ganesh Kumar; A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp572-576

Abstract

The aim of this paper is to model the Portable Manager and allow it to aid in communication among Mobile Ad-hoc Networks (MANETs) carrying information across the mobile nodes in the network. In this article, Modeling Portable Manager aiding in the MANET Communication (MMAC) is proposed. The novelty is present in the use of node performance parameter called as α defined as the ratio of the packet received, packet loss and delay of the node which could be used for the next hop selection in the mobile ad hoc network. The Portable Manager (PM) is used to find out the relay node in the network. The working of the PM with a minimal number of nodes is analyzed and presented through the simulations in the network simulator.
Prospect Convenient Steadfast Procedure in Wireless Sensor Network Jewan Singh; Vibhakar Mansotra
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp613-615

Abstract

This article objective is to improve the steadfast routing in Wireless Sensor Networks with little interfering and avoid packet collision. In the scheme, the entire node has the option of electing next Data Communication Node (DCN). The next data communication node is chosen depend on the intensity of link, remaining energy, and the node with distance towards the Base Station. Thus, the sender node transmits the information to the best DCN. Instantly, the DCN sends the acknowledgement (ACK) along with the number of packets received back to the node from which it obtains the data. The sender node assures the delivery of the transmitted packets by comparing the value of number of packets sent with the value obtained with the acknowledgement. If they are equivalent, it will send the verification identity to the DCN. If it is not equivalent, it will decide another node with highest link intensity. After that, the data chooses the DCN and repeat the process until the data reaches the Base Station.
Modified Pixels Based Fast Median Filter in Impulse Noise Environments Man Hee Lee; Soo Young Shin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp731-741

Abstract

This paper proposes a modified pixel-based fast median filter (MP-FMF) for impulse noise environments. The key idea behind MP-FMF is the reduction in the processing time by using modified pixels. It consists of three steps, namely, error detection, threshold decision, and noise mitigation. The presence of noise is detected by using modified pixels that include a cyclic redundancy check (CRC) function. Subsequently, the threshold values are decided by estimating the noise density. For noise mitigation, corrupted pixels are corrected with the neighboring pixels based on the principle of the median filter. The MP-FMF has a fast processing time and provides image quality correction and introduces features when the noise density is high. In addition, we introduce a new evaluation metric and investigate the performance of the proposed algorithm in terms of the quality, features, and computation time.
Query Processing for Time Efficient Data Retrieval Muhammad Qasim Memon; Jingsha He; Aasma Memon; Khurram Gulzar Rana; Muhammad Salman Pathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp784-788

Abstract

In database management system (DBMS) retrieving data through structure query language is an essential aspect to find better execution plan for performance. In this paper, we incorporated database objects to optimize query execution time and its cost by vanishing poorly SQL statements. We proposed a method of evolving and inserting database constraints as database objects embedded with queries either to add them for the sake of transactions required by user to detect those queries for the betterment of performance. We took analysis on several databases while processing queries itself and assimilate real time database workload with the bunch of transactions are invoked in comparison with tuning approaches. These database objects are coded in procedural language environment pertaining rules to make it worth and are merged into queries offering improved execution plan.
License Plate Recognition Using Undecimated Wavelet Transform G. Kannan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp558-560

Abstract

License Plate Recognition (LPR) is the mission of identifying the vehicle using number plate extraction. An efficient method for recognizing plate based on Undecimated Wavelet Transform (UWT) is proposed. Plates are recognized using features from undecimated coefficients in this system. Morphological edge detection technique is used to get accurate results after feature extraction. Finally detected images are used for classification purpose using the feature coefficients. This technique is applied to all the unidentified and training images, extracted features are used as input to Back Propagation Neural Network (BPNN). The evaluation of the system is based on public database.
Harmonic Load Diagnostic Techniques and Methodologies: A Review A.S. Hussin; A.R. Abdullah; M.H. Jopri; T Sutikno; N.M. Saad; Weihown Tee
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp690-695

Abstract

This paper will review on the existing techniques and methodologies of harmonic load diagnostic system. The increasingly amount of harmonic producing load used in power system are the main contribution in quantifying each harmonic disturbance effects of the multiple harmonic producing loads and it became very important. Literature proposes two different techniques and methods on the harmonic source identification under the soft computing technique classification. The advantages and disadvantages of harmonic load identification techniques and methods are discussed in this paper. In the proposed method, the issue on the harmonic contribution is determine and transformed to a data correlation analysis. Several techniques to identify the sources of harmonic signals in electric power systems are described and reviewed based on previous paper. Comparative studies of the methods are also done to evaluate the performance of each techniques. However, without sufficient information in this inconsistent environment on the property of the power system, accurate harmonic producing load diagnosis methods are important and further investigations in this regard assumes great implication.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue