Articles
9,174 Documents
Evolution of Learning Environment: A Review of Ubiquitous Learning Paradigm Characteristics
Zurainee Mohd Tahir;
Haryani Haron;
Jasber Kaur Gian Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i1.pp175-181
This paper performed literature analysis for evolution of learning environment focusing on a new learning paradigm which is known as ubiquitous learning environment. This paper also intend at providing specific information about ubiquitous learning concepts and the criteria that needed in the future research. It begins by briefly describing the evolution of learning environment with the comparison for each of the learning paradigms. Finally, the definition of ubiquitous learning and the comparison of characteristics in ubiquitous learning paradigm are also compared and discussed to further enhance the understanding of ubiquitous learning concept. As a conclusion these paper providing a basis foundation for novice researcher that interested in exploring ubiquitous learning environment area.
Quality and texture analysis of biometric images compressed with second-generation wavelet transforms and SPIHT-Z encoder
Ahmed Bouida;
Mohammed Beladgham;
Abdesselam Bassou;
Ismahane Benyahia
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i3.pp1325-1339
In biometric systems, compression takes important place especially in order to reduce the size of the information stored or transmitted through the distributed biometric systems. It is also noted that the compression techniques induce loss of information in the compressed images that can affect the effectiveness of biometric systems. The main objective of our contribution is to examine the efficacy of the used method to offer an optimal compression quality in these kind of images without considerable distortion. In order to evaluate the efficacy of the compression process, we use two kinds of evaluation, full-reference image quality assessment and a new proposed textural quality analysis of the compressed images. In this paper, we use a second-generation wavelet transform to improve the compression study in biometric images. The basic idea of this algorithm is the quincunx wavelet transform coupled to a modified progressive encoder called SPIHT-Z encoding.
A comprehensive review of honey encryption scheme
Esther Omolara Abiodun;
Aman Jantan;
Isaac Oludare Abiodun;
Howard Eldon Poston
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i2.pp649-656
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not just for implementation purpose but to identify the gaps in the scheme and answer the open questions that remain unanswered by the small set of research carried out since its inception. We identified two major open areas which are the difficulty of creating semantically and contextually plausible-looking and convincing decoy message that is good enough to fool the attacker into believing he has the original message. Secondly, typo problem; where a fake plaintext appears valid to a legitimate user when he mistakenly enters a wrong key. Our findings consolidate the need for further research as state-of-the-art research fails to produce convincing decoys that are good enough to keep the attacker from acquiring the message.
Mobile Ad Hoc Networks in Presence of Black Hole Attack
Anshu Prakash Murdan;
Anshuman Bhowon
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v7.i2.pp577-582
This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Development of Reconfigurable Antenna for Advanced Tracking Technology
N. M. Sahar;
M. T. Islam;
N. Misran;
M. R. Zaman
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp672-679
This paper focuses on the design and fabrication of reconfigurable multiband antenna for RFID and GPS as an advance tracking technology for various applications that achieve a physically compact, planar profile and sufficient bandwidth. The antenna can be reconfigured as single band at 1.275 GHz for GPS applications when the switches are OFF state and dual-band frequencies at 0.915 GHz and 2.4 GHz required in RFID applications when the switches are ON state. The performance of the antenna involves changing the switches to ON or OFF mode by controlling RF switches. RF MEMs RMSW101, Single Pole Single Throw (SPST) switches have been chosen due to the satisfactory RF properties includes low insertion loss, good impedance matching and high isolation. The gain for single and dual band is greater than 2dBi. The design methodology and antenna measurement results are both presented and discussed in this letter.
Harmonic Compensation using STATCOM for SEIG Feeding Single-Phase Load Connected between Different Phases
Satyanarayan Gorantla;
Goli Ravi Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v6.i3.pp489-496
The paper presents the analysis of harmonic distortion when non-linear load is connected in different phases of power system with STATCOM for singly excited induction generator system with wind turbine as prime mover. Now-a-days due to the drastically increased in use of non linear loads causes many power quality problems in power system network. Those problems are classified as reactive power problems, harmonics, voltage sags and swells. Out of these problems harmonic problems are major concern. Custom power devices proposed for mitigation of power quality in network. For compensation of harmonic, static compensator (STATCOM) is used. The paper presents the compensation of harmonic power quality issues using STATCOM for the system with singly-excited induction generator feeding non-linear load connected in different phases. STATCOM is controlled using synchronous reference frame theory to produce pulses to switches of STATCOM sensing the input parameters. Proposed concept was developed using MATLAB/SIMULINK software and results are presented for non-linear load connected in different phases of the power system. THD analysis was shown for source current and load current for different cases.
Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique
Chandrakala B M;
S C Linga Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1143-1150
The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation time and ease of use play a significant role in using the algorithm for implementation. Proxy re-encryption plays a significant role in protecting data that are stored in semi-untrusted server. Many existing Proxy re-encryption technique induces high computation overhead due to adoption of public key cryptography such RSA (Rivet Shamir Adleman), ECC (Elliptical Curve Cryptography) etc. and it suffer from quantum attack. To address this lattice based cryptography is adopted by various approaches which is based on Learning With Error which shows resilience against quantum attacks such Chosen Cipher data attack and Chosen Plain Text attack. The drawback with existing lattice cryptography based approach is that they are unidirectional and adopts bilinear pairing which compromise security and induces high computation cost. To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. Experiment is conducted for computation overhead by varying key and data size which attained significant performance improvement over existing Proxy Re-encryption scheme.
Fine grained medical image fusion using type-2 fuzzy logic
Ramya H.R;
B K Sujatha
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 2: May 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i2.pp999-1011
In recent years, many fast-growing technologies coupled with wide volume of medical data for the digitalization of that data. Thus, researchers have shown their immense interest on Multi-sensor image fusion technologies which convey image information based on data from various sensor modalities into a single image. The image fusion technique is a widespread technique for the diagnosis of medical instrumentation and measurement. Therefore, in this paper we have introduced a novel multimodal sensor medical image fusion method based on type-2 fuzzy logic is proposed using Sugeno model. Moreover, a Gaussian smoothen filter is introduced to extract the detailed information of an image using sharp feature points.Type-2 fuzzy algorithm is used to achieve highly efficient feature points from both the b images to provide high visually classified resultant image. The experimental results demonstrate that the proposed method can achieve better performance than the state-of-the- art methods in terms of visual quality and objective evaluation.
Alternative Methods for Forecasting Variations in Hospital Bed Admission
S. Sarifah Radiah Shariff;
Mohd Azuan Suhaimi;
Siti Meriam Zahari;
Zuraidah Derasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i2.pp410-416
The Malaysian healthcare system is well-being recognized for providing a wide range of access to primary healthcare. The number of hospitals is found to be growing in line with the increase in population. However, over-crowding has become the most common scene that people see in every hospital. The number of patients being admitted may somehow mislead healthcare planners, and thus causing them to underestimate the resources that are required within the hospital. Thus, this study aims to identify better forecasting models for variations in hospital bed admission considering State Space Model (SSM). Data on the admission rate of a state hospital was collected, spanning the period of historical data from 2001 until 2015. The findings indicate that State Space model can outperform common model due to its lower Mean Squared Errors. Female aged between 25 -34 years old are found to be having the highest variation, which could lead to unpredictable in terms of being admitted to hospital.
Neighbor Weighted K-Nearest Neighbor for Sambat Online Classification
Annisya Aprilia Prasanti;
M. Ali Fauzi;
Muhammad Tanzil Furqon
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i1.pp155-160
Sambat Online is one of the implementation of E-Government for complaints management provided by Malang City Government. All of the complaints will be classified into its intended department. In this study, automatic complaint classification system using Neighbor Weighted K-Nearest Neighbor (NW-KNN) is poposed because Sambat Online has imbalanced data. The system developed consists of three main stages including preprocessing, N-Gram feature extraction, and classification using NW-KNN. Based on the experiment results, it can be concluded that the NW-KNN algorithm is able to classify the imbalanced data well with the most optimal k-neighbor value is 3 and unigram as the best features by 77.85% precision, 74.18% recall, and 75.25% f-measure value. Compared to the conventional KNN, NW-KNN algorithm also proved to be better for imbalanced data problems with very slightly differences.