Articles
9,174 Documents
E-learning virtual meeting applications: A comparative study from a cybersecurity perspective
Nader Abdel Karim;
Ahmed Hussain Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp1121-1129
During the coronavirus disease 2019 (COVID-19) pandemic outbreak, the lockdown of all activities including schools and universities became a normal habit, forcing educational institutes to find new ways to ensure the continuity of the learning process. E-learning is considered the best choice at this stage whereas using video conferencing or virtual meeting applications (VM) apps is the most common solution. In this research, security issues and possible cyber-attacks that may occur due to the use of the most popular VM apps used by educational institutes (i.e., Zoom, Microsoft Teams, and Google meet) are discussed. Moreover, the security features of these applications are briefly explained. Furthermore, a comprehensive comparison from a cybersecurity perspective between VM apps was made. The results show that Google Meet was the most secure against cyber-attacks, followed by the Microsoft Teams and finally the Zoom app.
Intruder detection and recognition using different image processing techniques for a proactive surveillance
Nelson C. Rodelas;
Melvin A. Ballera
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp843-852
To innovate a proactive surveillance camera, there is a need for efficient face detection and recognition algorithm. The researchers used one of the ViolaJones algorithm and used different image processing techniques to recognize intruders or not. The goal of the research is to recognize the fastest way on how the homeowners will be informed if an intruder or burglar enters their home using a proactive surveillance device. This device was programmed based on the different recognition algorithms and a criteria evaluation framework that could recognize intruders and burglars and the design used was developmental research to satisfy the research problem. The researchers used the Viola-Jones algorithm for face detection and five algorithms for face recognition. The criteria evaluation was used to identify the best face recognition algorithm and was tested in a real-world situation and captured a series of images camera and processed by proactive face detection and recognition. The result shows that the system can detect and recognize intruders and proactively send a notification to the homeowners via mobile application. It is concluded that the system can recognize the intruders and proactively notify the household members using the mobile applications and activate the alarm system of the house.
Framework of diacritic segmentation for Arabic handwritten document
Ahmed Abdalla Shiekh;
Mohd Sanusi Azmi;
Maslita Abd Aziz;
Mohammed Nasser Al-Mhiqani;
Salem Saleh Bafjaish
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp1001-1008
In recent Arabic standard language and Arabic dialectal texts, diacritics and short vowels are absent. There are some exceptions have been made for the Arabic beginner learner scripts, religious texts and as well as a significant political text. In addition, the text without diacritics is considered ambiguous due to numerous words with different diacritic marks seem identical. However, this paper we present a framework for segmenting diacritics from Arabic handwritten document by using region-based segmentation technique. Since Arabic handwritten and Mushaf Al-Quran contain many diacritical marks. Hence, the diacritics must be properly extracted from Arabic handwritten document to avoid losing some good features. Furthermore, the proposed framework is devised specifically to segment diacritics from Arabic handwritten image, thus there will be no feature extraction, feature selection, and classification processes included. Besides, we will present the methodology that is used to fulfil the objectives of this paper. The pre-processing phases will be explained and more specifically segmentation phase for segmenting diacritics which is the phase we concentrate more in this article. Lastly, we will identify the proposed technique region-based segmentation to facilitate our development throughout the experimental process.
Artificial neural network vector controlled common high-side switch asymmetric converter fed switched reluctance motor drive
Ashok Kumar Kolluru;
Malligunta Kiran Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp697-703
The best alternative machine for synchronous and induction machine is switched reluctance machine for various applications. An artificial neural network (ANN) based vector controller is implemented for novel converter to drive switched reluctance motor (SRM) in this paper. To reduce the cost and simplified the controller an effective configuration of converter is proposed with only 4 pulse-withmodulation (PWM) based switches. The 6 pole stator and 4 pole rotor machine is considered in this paper to present results based on MATLAB. The ripples in torque are reduced by proposing vector controller by using novel configuration of converter. Generally SRM machines are having high ripples in torque, hence less number of switches will be feasible solution to drive the machine in order to reduce ripples. The proposed controller can also help to operate system with less ripples in torque since the controller having both torque and flux hysteresis controllers. The extensive results are presented on Simulink platform to validate the proposed method under both steady state as well as transient conditions.
Self embedding digital watermark using hybrid method against compression attack
Nasr Eddine Touati;
Abdelmounaim Moulay Lakhdar
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp864-870
In the modern time interacting with digital world become standard life activity, human need a way to protect properties as individuals or corporals, and we do that by embedding a digital mark to the target, and this technique call digital watermarking. But there still is a chance to manipulate or even remove this marks we embed for protection with various attacks like adding noises, compression-decompression or bits manipulations, and that why companions, individuals, laboratories are still developing new methods to embed this marks and make them more robust and more hard to detect for others. There are so many methods for digital watermarking, so we chose the least significant bits watermarking (LSB-watermarking) to provide an invisible digital watermarking, and on top of that we proceed with the blind LSB-watermarking method so that we don't get bind to the original image, and for our attack we chose compression joint photographic experts group (JPEG) compression because it’s the most used method for image and videos compression along with singular value decomposition (SVD) to make our mark as robust as possible. And the results we gain from our method are promising and it did give as high quality digital watermarking.
The adoption of social media by small and medium enterprise: a systematic literature review
Ahmed Abdullah Alhamami;
Noor Azuan Hashim;
Roshayati Abdul Hamid;
Siti Ngayesah Ab. Hamid
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp1220-1227
Social media (SM) has become a necessity and a method to confront challenges and fierce competition. More than half of the population are using SM. However, its implication for small and medium enterprises (SMEs) is not well documented and researched. Therefore, the purpose of this study is to review the literature pertaining to the adoption of SM by SMEs. A systematic literature review was conducted using specific keywords and database. This has resulted in reviewing 28 related articles. The findings was presented using frequency analysis. Number of articles are increasing steadily especially in emerging markets with large number of studies deploying the exploratory nature. The most widely used theory is the technological-organizational-environmental framework (TOE) and the sample size of the reviewed studies is adequate. Increasingly the structural equation modelling are being used. However, the use of intervening variable is minimal. The finding also showed that organizational and environmental context variables are the most important predictors of SM adoption by SMEs while the consequence of this adoption on business performance is mixed. There is a need for more studies to discover the consequence of adopting SM by SMEs using a combination of theories.
A novel hybrid face recognition framework based on a low-resolution camera for biometric applications
Vijaya Kumar H. R.;
M. Mathivanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp853-863
In research work, human face recognition is an essential biometric symbol persistently continued so far due to its different levels of applications in society. Since the appearance of the human faces can have many variations due to issues like the effect of illumination, expression and face pose. These differences are correlated with one another, which results in a helpless ability to recognize a particular person's face. The motivation behind our work in this paper is to give a new framework for face recognition based on frequency analysis that contributes to solving the distinguishing proof issues with enormous varieties of boundaries like the effect of illumination, expression, and face pose. Here three algorithms combined for provable results: i) Difference of Gaussian filtered discrete wavelet transform (DDWT) for feature extraction; ii) Log Gabor (LG) filter for feature extraction; and iv) Multiclass support vector machine classifier, where feature coefficients of DDWT and LG filter are fused for classification and parameters evaluation. The evaluation of our experiment is carried out on a large database consisting of 15 persons of each 200-face image which are captured using a 5-megapixel low-resolution web camera and yielding satisfactory results on various parameters compared to existing methods.
High gain multiphase boost converter based-on capacitor clamping structure
Oday Saad Fares;
Jasim Farhood Hussen
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp689-696
In the last few years, the non-isolated dc converters involving high voltage gain with adequate performance are becoming quite popular in industrial applications. This is resulting in high voltage and current stress on the power device (switches and diodes), as well as a limited output voltage with a high duty cycle. This paper proposes a multi-phase non-isolated boost converter that uses capacitor clamping to increase output voltage while reducing stress across the power device. There are two stages in the proposed converter (first stage is three inductors and three switches and the second stage is clamper circuit of three capacitors and three diodes). The proposed converter is high voltage gain, with low voltage stress through switches transistors. To justify the theoretical analysis, the concept was validated through mathematical analysis and by simulation using MATLAB/SIMULINK. The results carried out the results permit the converter behavior and performance to be accurately.
High impedance fault detection in 11 kV overhead line with discrete wavelet transform and independent component analysis
Md Ferdouse Hossain Bhuiya;
Rohaiza Hamdan;
Dur Mohammad Soomro;
Abdelrehman Omer Idris;
Hussain Sharif
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp661-672
This paper proposes an analysis of high-impedance fault detection algorithms for medium voltage distribution lines based on the discrete wavelet transform (DWT) technique and a more advanced technique named independent component analysis (ICA) independently. Three-phase distribution line model and two diodes high impedance fault model, which represents the unsymmetrical fault current of electric arc, simulated using MATLAB/Simulink. High impedance fault (HIF) detection algorithm initially analyzes the sampled current waveforms through DWT and the resultant third level high-frequency components “d3” coefficients are analyzed through one cycle moving window approach. The proposed algorithm successfully detects any HIF in the distribution current even if there is a slight or no difference in the amplitude of the HIF and the waveform of the phase current. On the other hand, the ICA more developed algorithm than DWT successfully separated the noise signals from the obtained current waveforms and HIF noise signals can be differentiated with non-HIF noise signals. Because of this reason ICA is chosen in this research. The detected HIF current can be from 50 ma and up.
Power factor improvement for a three-phase system using reactive power compensation
Majid Ali;
Faizan Rashid;
Saim Rasheed
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 2: November 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i2.pp715-727
For all industrial and distribution sites, the lagging power factor of electrical loads is a common problem. In the early days, it was corrected manually by adding the capacitor banks of certain values in parallel. Automatic power factor correction (APFC) using a capacitor bank helps to make a power factor that is close to unity. It consists of a microcontroller that processes the value of the power factor to enable the system and monitor the power factor if it falls below (0.77) from the specified level. This paper presents the automatic correction of the power factor by adding the capacitors banks automatically of the desired value in a three-phase system in the form of binary coding (0-7). The main purpose of this system is to maintain the power factor as close as to unity, for the experimental case, it is set to (0.93) which helps to decreases the losses and ultimately increase the efficiency of the system.