Articles
9,226 Documents
Comparative Study of Wavelet Image Compression: JPEG2000 Standart
Ansam Ennaciri;
Mohammed Erritali;
Mustapha Mabrouki;
Jamaa Bengourram
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i1.pp83-90
The objective of this paper is to study the main characteristics of wavelets that affect the image compression by using the discrete wavelet transform and lead to an image data compression while preserving the essential quality of the original image. This implies a good compromise between the image compression ratio and the PSNR (Peak Signal Noise Ration).
An Adaptive Blind Watermarking Algorithm for Color Image
Qiming Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: January 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper proposed a novel blind color digital watermarking algorithm based on Integer Discrete Wavelet Transform (IDWT) and Human Visual System (HVS). Firstly, color watermark image was processed into one dimension digital information, and color host image was converted into YIQ color space. Then, according to the features of HVS, encrypted watermark was embedded adaptively into the Y luminance component of the YIQ color space in IDWT domain. The proposed algorithm allowed extracting watermark without the help of original watermark and host image. Experiment results show that the embedded watermark is invisible and robust against common image attacks. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1900
Instruction Pipeline Efficient Mechanism with maximum hit ratio
Shahnawaz Talpur
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To achieve highest performance in rapidly growing advancement in multi-core technology, there is need to minimize the large gap between faster processor speed and memory. It becomes more critical issue when branch occurs with penalty of cache miss. Many researchers proposed different branch prediction, instruction perfecting methods and algorithms but the CPU pipeline performance couldn’t be the maximal. A prototype model has been designed in this paper which has no prediction for branch and no chance of CPU core to be idle. Analysis is carried out on the benchmarks suite and Transactional Slice (TS) has been proposed in contrast with traditional delay slot and dynamic prediction fetch branch. In proposed mechanism hit rate will be maximal. Pin Tool is used to analyze the Transactional Slice with SPEC 2006 benchmark. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3216
A coarse-to-fine copy-move image forgery detection method based on discrete cosine transform
Mas Elyna Azol;
Nur Hidayah Ramli;
Y.S. Lee Lee;
Siti Azura Abuzar
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 2: May 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i2.pp843-851
Copy-move forgery is a type of image forgery where one part of an image is copied and pasted in other regions of the same image, and it is one of the most common image forgeries to conceal some information in the original image. Discrete Cosine Transform (DCT) is one of the detection techniques which the detection rate relies intensely on the size of block used. Small block size is known for its ability to detect fine cloned objects, but the drawback is it produces too many false positive and requires high execution time. In this research, a method to overcome the weaknesses of using small block size by applying the coarse-to-fine approach with the two-tier process is proposed. The proposed method is evaluated on fifteen forged images on the CoMoFoD dataset. The results demonstrated that the proposed method is able to achieve high precision and recall rate of over 90% as well as improves the computation time by reducing the overall duration of forgery detection up to 73% compared to the traditional DCT method using small block size. Therefore, these findings validate that the proposed method offers a trade-off between accuracy and runtime.
Neoteric Hybrid Multilevel Cascade Inverter Based on Low Switch Numbers Along with Low Voltage Stress: Design, Analysis, Verification
Rasool Esmailzadeh;
A. Ajami;
M.R. Banaei
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i1.pp92-100
Abstract: With the purpose of rein in the high voltage of flexible power systems, renovation and amendment of multi-level structures aimed at acquisition of high quality voltage is certainly required. In this regard, robust topology must be occupied that encompass the maximum output voltage levels along with minimum of switch number, of course, with taking into account of Peak Inverse Voltage (PIV). In this paper, a neoteric high-performance multilevel cascaded inverter is suggested up to the problem of repetitive output levels to be unraveled and also number of output voltage levels to be maximized. It has been constructed by series-connected multilevel inverters blocks and three-level inverter. The simulation results along with experimental results extracted by manufactured prototype have transparently approved high efficiency of proposed inverter as well as its feasibility. Apart from above, new mathematical approach has been presented to calculate and define the DC voltage sources magnitudes in asymmetric converter.
PAPR reduction in OFDM system for DVB-S2
Zainab M Abid;
Awatif A Jaffaar;
Suha Q Hadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i1.pp317-323
A special form of multicarrier modulation is Orthogonal Frequency Division Multiplexing (OFDM) which is offer high spectral efficiency for high speed data transmission through multipath fading channels. Many advantages can be achieved by using OFDM in addition to spectral efficiency like its robustness against intersymbol interference and multipath effect. One of a major drawback of OFDM is high Peak-to-Average Power Ratio (PAPR) of the transmitted signal which leads to a distortion in the power amplifier and causes decreasing the efficiency of power amplifier. To reduce PAPR of OFDM signal many of promising solutions have been proposed and implemented. In this paper, a joint Low Density Parity Check code (LDPC), Discrete Cosine Transform (DCT) and μ-law companding is proposed to reduce PAPR of OFDM signal at transmitter. Comparison of these PAPR reduction techniques is done based on CCDF performance of the system.
Pantograph Control Strategy Research Based On Fuzzy Theory
Guan Jinfa;
Zhong Yuan;
Fang Yan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 8: August 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i8.pp6094-6100
Dynamic interaction of pantograph and catenary is one of the most important factors affecting the safe and reliable operation of high-speed trains. In order to improve the quality of contact between pantograph and catenary, it is necessary to study the active control strategy of pantographs. In this dissertation, according to dynamic characteristics of pantograph and catenary, applying fuzzy control principle, the author designed a fuzzy controller of pantograph.Comparing with the situation without fuzzy control circuit, it is the result that standard deviation of contact force with a fuzzy control circuit is smaller than it without control, 39.5% off at 200km/h, 21.2% off at 300km/h, which indicate that using a pantograph with a fuzzy controller can improve the contact quality between pantograph and catenary effectively.
Wavelet Cesptral Coefficients for Isolated Speech Recognition
T. B. Adam;
M. S. Salam;
T. S. Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The study proposes an improved feature extraction method that is called Wavelet Cepstral Coefficients (WCC). In traditional cepstral analysis, the cepstrums are calculated with the use of the Discrete Fourier Transform (DFT). Owing to the fact that the DFT calculation assumes signal stationary between frames which in practice is not quite true, the WCC replaces the DFT block in the traditional cepstrum calculation with the Discrete Wavelet Transform (DWT) hence producing the WCC. To evaluate the proposed WCC, speech recognition task of recognizing the 26 English alphabets were conducted. Comparisons with the traditional Mel-Frequency Cepstral Coefficients (MFCC) are done to further analyze the effectiveness of the WCCs. It is found that the WCCs showed some comparable results when compared to the MFCCs considering the WCCs small vector dimension when compared to the MFCCs. The best recognition was found from WCCs at level 5 of the DWT decomposition with a small difference of 1.19% and 3.21% when compared to the MFCCs for speaker independent and speaker dependent tasks respectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2510
Robust Security for Health Information by ECC with Signature Hash Function in WBAN
G. Sridevi Devasena;
S. Kanmani
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i1.pp256-262
Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.
Solving Method of H-Infinity Model Matching Based on the Theory of the Model Reduction
Li Min Zhi;
Cao Xin Jun
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
People used to solve high-order H model matching based on H control theory, it is too difficult. In this paper, we use model reduction theory to solve high-order H model matching problem, A new method to solve H model matching problem based on the theory of the model reduction is proposed. The simulation results show that the method has better applicability and can get the expected performance. DOI: http://dx.doi.org/10.11591/telkomnika.v13i2.6886