cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Evolution of Learning Environment: A Review of Ubiquitous Learning Paradigm Characteristics Zurainee Mohd Tahir; Haryani Haron; Jasber Kaur Gian Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i1.pp175-181

Abstract

This paper performed literature analysis for evolution of learning environment focusing on a new learning paradigm which is known as ubiquitous learning environment. This paper also intend at providing specific information about ubiquitous learning concepts and the criteria that needed in the future research.  It begins by briefly describing the evolution of learning environment with the comparison for each of the learning paradigms. Finally, the definition of ubiquitous learning and the comparison of characteristics in ubiquitous learning paradigm are also compared and discussed to further enhance the understanding of ubiquitous learning concept. As a conclusion these paper providing a basis foundation for novice researcher that interested in exploring ubiquitous learning environment area.
Quality and texture analysis of biometric images compressed with second-generation wavelet transforms and SPIHT-Z encoder Ahmed Bouida; Mohammed Beladgham; Abdesselam Bassou; Ismahane Benyahia
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1325-1339

Abstract

In biometric systems, compression takes important place especially in order to reduce the size of the information stored or transmitted through the distributed biometric systems. It is also noted that the compression techniques induce loss of information in the compressed images that can affect the effectiveness of biometric systems. The main objective of our contribution is to examine the efficacy of the used method to offer an optimal compression quality in these kind of images without considerable distortion. In order to evaluate the efficacy of the compression process, we use two kinds of evaluation, full-reference image quality assessment and a new proposed textural quality analysis of the compressed images. In this paper, we use a second-generation wavelet transform to improve the compression study in biometric images. The basic idea of this algorithm is the quincunx wavelet transform coupled to a modified progressive encoder called SPIHT-Z encoding.
A comprehensive review of honey encryption scheme Esther Omolara Abiodun; Aman Jantan; Isaac Oludare Abiodun; Howard Eldon Poston
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i2.pp649-656

Abstract

We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not just for implementation purpose but to identify the gaps in the scheme and answer the open questions that remain unanswered by the small set of research carried out since its inception. We identified two major open areas which are the difficulty of creating semantically and contextually plausible-looking and convincing decoy message that is good enough to fool the attacker into believing he has the original message. Secondly, typo problem; where a fake plaintext appears valid to a legitimate user when he mistakenly enters a wrong key. Our findings consolidate the need for further research as state-of-the-art research fails to produce convincing decoys that are good enough to keep the attacker from acquiring the message.
Mobile Ad Hoc Networks in Presence of Black Hole Attack Anshu Prakash Murdan; Anshuman Bhowon
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i2.pp577-582

Abstract

This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Development of Reconfigurable Antenna for Advanced Tracking Technology N. M. Sahar; M. T. Islam; N. Misran; M. R. Zaman
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i2.pp672-679

Abstract

This paper focuses on the design and fabrication of reconfigurable multiband antenna for RFID and GPS as an advance tracking technology for various applications that achieve a physically compact, planar profile and sufficient bandwidth. The antenna can be reconfigured as single band at 1.275 GHz for GPS applications when the switches are OFF state and dual-band frequencies at 0.915 GHz and 2.4 GHz required in RFID applications when the switches are ON state. The performance of the antenna involves changing the switches to ON or OFF mode by controlling RF switches. RF MEMs RMSW101, Single Pole Single Throw (SPST) switches have been chosen due to the satisfactory RF properties includes low insertion loss, good impedance matching and high isolation. The gain for single and dual band is greater than 2dBi. The design methodology and antenna measurement results are both presented and discussed in this letter.
Harmonic Compensation using STATCOM for SEIG Feeding Single-Phase Load Connected between Different Phases Satyanarayan Gorantla; Goli Ravi Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v6.i3.pp489-496

Abstract

The paper presents the analysis of harmonic distortion when non-linear load is connected in different phases of power system with STATCOM for singly excited induction generator system with wind turbine as prime mover. Now-a-days due to the drastically increased in use of non linear loads causes many power quality problems in power system network. Those problems are classified as reactive power problems, harmonics, voltage sags and swells. Out of these problems harmonic problems are major concern. Custom power devices proposed for mitigation of power quality in network. For compensation of harmonic, static compensator (STATCOM) is used. The paper presents the compensation of harmonic power quality issues using STATCOM for the system with singly-excited induction generator feeding non-linear load connected in different phases. STATCOM is controlled using synchronous reference frame theory to produce pulses to switches of STATCOM sensing the input parameters. Proposed concept was developed using MATLAB/SIMULINK software and results are presented for non-linear load connected in different phases of the power system. THD analysis was shown for source current and load current for different cases.
Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique Chandrakala B M; S C Linga Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1143-1150

Abstract

The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation time and ease of use play a significant role in using the algorithm for implementation. Proxy re-encryption plays a significant role in protecting data that are stored in semi-untrusted server. Many existing Proxy re-encryption technique induces high computation overhead due to adoption of public key cryptography such RSA (Rivet Shamir Adleman), ECC (Elliptical Curve Cryptography) etc. and it suffer from quantum attack. To address this lattice based cryptography is adopted by various approaches which is based on Learning With Error which shows resilience against quantum attacks such Chosen Cipher data attack and Chosen Plain Text attack. The drawback with existing lattice cryptography based approach is that they are unidirectional and adopts bilinear pairing which compromise security and induces high computation cost. To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique. Experiment is conducted for computation overhead by varying key and data size which attained significant performance improvement over existing Proxy Re-encryption scheme.
Fine grained medical image fusion using type-2 fuzzy logic Ramya H.R; B K Sujatha
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 2: May 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i2.pp999-1011

Abstract

In recent years, many fast-growing technologies coupled with wide volume of medical data for the digitalization of that data. Thus, researchers have shown their immense interest on Multi-sensor image fusion technologies which convey image information based on data from various sensor modalities into a single image. The image fusion technique is a widespread technique for the diagnosis of medical instrumentation and measurement. Therefore, in this paper we have introduced a novel multimodal sensor medical image fusion method based on type-2 fuzzy logic is proposed using Sugeno model. Moreover, a Gaussian smoothen filter is introduced to extract the detailed information of an image using sharp feature points.Type-2 fuzzy algorithm is used to achieve highly efficient feature points from both the b images to provide high visually classified resultant image. The experimental results demonstrate that the proposed method can achieve better performance than the state-of-the- art methods in terms of visual quality and objective evaluation.
Alternative Methods for Forecasting Variations in Hospital Bed Admission S. Sarifah Radiah Shariff; Mohd Azuan Suhaimi; Siti Meriam Zahari; Zuraidah Derasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp410-416

Abstract

The Malaysian healthcare system is well-being recognized for providing a wide range of access to primary healthcare. The number of hospitals is found to be growing in line with the increase in population. However, over-crowding has become the most common scene that people see in every hospital. The number of  patients being admitted may  somehow  mislead  healthcare planners,  and  thus  causing  them  to  underestimate  the  resources  that  are  required  within  the  hospital. Thus, this study aims to identify better forecasting models for variations in hospital bed admission considering State Space Model (SSM). Data on the admission rate of a state hospital was collected, spanning the period of historical data from 2001 until 2015. The findings indicate that State Space model can outperform common model due to its lower Mean Squared Errors. Female aged between 25 -34 years old are found to be having the highest variation, which could lead to unpredictable in terms of being admitted to hospital.
Neighbor Weighted K-Nearest Neighbor for Sambat Online Classification Annisya Aprilia Prasanti; M. Ali Fauzi; Muhammad Tanzil Furqon
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp155-160

Abstract

Sambat Online is one of the implementation of E-Government for complaints management provided by Malang City Government.  All of the complaints will be classified into its intended department. In this study, automatic complaint classification system using Neighbor Weighted K-Nearest Neighbor (NW-KNN) is poposed because Sambat Online has imbalanced data. The system developed consists of three main stages including preprocessing, N-Gram feature extraction, and classification using NW-KNN. Based on the experiment results, it can be concluded that the NW-KNN algorithm is able to classify the imbalanced data well with the most optimal k-neighbor value is 3 and unigram as the best features by 77.85% precision, 74.18% recall, and 75.25% f-measure value. Compared to the conventional KNN, NW-KNN algorithm also proved to be better for imbalanced data problems with very slightly differences.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue