cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Hardware implementation of Sobel edge detection system for blood cells images-based field programmable gate array Ahmed Khazal Younis; Basma MohammedKamal Younis; Mohammed Sabah Jarjees
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp86-95

Abstract

The microscopic-blood image has been used to diagnose various diseases according to the morphological specifications of red and white blood cells. However, the manual analysis and procedures are not accurate due to the human error. Therefore, several studies conducted to find new techniques to perform this analysis using computer algorithms. The complexity of these algorithms led to thinking in simpler ways or to the hardware solutions. On the other hand, edge detection is a mathematical procedure that play an essential role in the field of medical image processing. It is considered as one of the foundations' processes for other procedures, such as the segmentation and the classification of the image. The Sobel filter is one of the conventional methods that is used to perform the edge detection process. It is based on finding the local contrast for the level of intensity of the image. This paper presents a proposed and a new method for detecting the edges of cells in the microscopic blood images using Sobel filter and its hardware implementation on the field programmable gate array (FPGA) chip. Three different techniques are proposed: MATLAB, OpenCV standard code, and FPGA customize code which give the best visual results, minimum timing results than the others.
Predictive and probabilistic modelling using machine learning for building indoor climate control Shokhjakhon Abdufattokhov; Nurilla Mahamatov; Kamila Ibragimova; Dilfuza Gulyamova
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i3.pp1306-1314

Abstract

For the last few decades, thermal comfort has been considered an aspect of sustainable building evaluation methods and tools. However, estimating the indoor air temperature of buildings is a complicated task due to the nonlinear behaviour of heating, ventilation and air conditioning systems combined with complex dynamics characterized by the time-varying environment with disturbances. This issue can be alleviated by modelling the building dynamics using Gaussian processes since it also measures the uncertainty bounds. The main focus of this paper is designing a predictive and probabilistic room temperature model of buildings using Gaussian processes and incorporating it into model predictive control to minimize energy consumption and provide thermal comfort satisfaction. We exploited the Gaussian processes’ full probabilistic capabilities as the mean prediction for the room temperature model and used the model uncertainty in the objective function not to lose the desired performance and to design a robust control scheme. We illustrated the potentials of the proposed method in a numerical example with simulation results.
Perspectives on adherence to ethics standards and behaviour in software development Senyeki Milton Marebane; Robert Toyo Hans; Jacqui Coosner
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i3.pp1573-1580

Abstract

Considering the powerful position assumed in creating software that changes human lives and society; it is compelling that in addition to technical standards, ethical standards, especially those captured in codes of ethics and practice be adhered to by software engineers. Despite efforts by professional bodies on ethical standards awareness, it is alleged that software engineers are not able to uphold ethical standards in software development projects. This research study probed lecturers concerned with the teaching of software development courses to determine their perceived levels of ethical standards and behavior. The findings show that the importance of ethical standards is recognized. The respondents reported high levels of ethical standards of their own work, colleagues’ work and their students’ work. Although in general the respondents reported high ethical standards, elements of lesser perceived ethical standards on students indicate the need for improvements. The findings of the study are important to educators and industry to recognize the significance of levels of ethics standards and the role educators have in terms of inculcating such ethical standards early in the making of future software engineers.
Protection coordination of directional over current relay with distributed generation Jayant Mani Tripathi; Santosh Kumar Gupta; Mrinal Ranjan; Vikash Kumar; Shivam Yadav; Aseem Chandel; Smriti Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp20-27

Abstract

The present study is focussed on a comparative analysis of different meta-heuristic optimization approaches for directional overcurrent relay (DOCRs) coordination which has been discussed and presented in the literature. Further, to have a comparative analysis of the performance of the optimization methods discussed they have been tested on power system network of different sizes. To overcome such issues, this work proposed a simplex linear programming technique-based overcurrent relay method using general algebraic modelling system (GAMS). The execution of this work is done on the MATLAB 2018 a platform. Based on the obtained result the best meta-heuristic optimization method for mitigating the problem of relay coordination has been identified. Nevertheless, the operating time of the relay is high, so the fault is not corrected at a time. The developed model has been tested on test system of different sizes namely IEEE 9 bus and IEEE 14 bus system. The obtained values through series of simulation are compared with different methods for proving the proposed protection coordination scheme is more effective and efficient than others in terms of operating time and coordination time.
Enhancement in privacy preservation in cloud computing using apriori algorithm Raniah Ali Mustafa; Haitham Salman Chyad; Jinan Redha Mutar
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i3.pp1747-1757

Abstract

Cloud computing provides advantages, like flexibly of space, security, cost optimization, accessibility from any remote location. Because of this factor cloud computing is emerging as in primary data storage for individuals as well as organisations. At the same time, privacy preservation is an also a significant aspect of cloud computing. In regrades to privacy preservation, association rule mining was proposed by previous researches to protect the privacy of users. However, the algorithm involves creation of fake transaction and this algorithm also fails to maintain the privacy of data frequency. In this research an apriori algorithm is proposed to enhance the privacy of encrypted data. The proposed algorithm is integrated with elagmal cryptography and it does not require fake transactions. In this way, the proposed algorithm improves the data protection as well as query privacy and it hides data frequency. Result analysis shows that the proposed algorithm improves the privacy as compared to previously proposed association rule mining and the algorithm also shows 3% to 5% improvement in performance when compared to other existing algorithms. This performance analysis with varying number of the data and fake transactions shows that the proposed algorithm doesn’t require fake transactions, like data privacy association rule mining.
Novel approach for semantic similarity cross ontology Leila Benaissa Kaddar; Farah Ben-Naoum
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp493-504

Abstract

Measuring semantic similarity between terms is a crucial step in information retrieval and integration since it necessitates semantic content matching. Even though several models have been proposed to measure semantic similarity, these models are not able to effectively quantify the weight of relevant items that affect the semantic similarity judgment process. In this study, we present a new method for measuring semantic similarity between cross-ontologies, that consists of hybridizing node-based approaches such as WuP and Reda with the weight of similarity computed using WordNet. The proposed approach has been experimented to show its efficiency with two ontologies, configuration management tool (CMT) and ConfOf, from the conference domaine in the web ontology language (OWL) ontologies benchmark OAEI 2015 and evaluated using two metrics: density and cohesion.
Performance comparison of some weak signal detection techniques Sarah Sabah Mohammed; Maher K. Mahmood Al-Azawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp732-742

Abstract

Performance comparison of some weak signal detection techniques is introduced. This comparison is very necessary since different applications require different operating conditions such as signal to noise ratio SNR, bandwidth, coherency, processing time and complexity. Three methods for detecting weak signals are considered. These are based on chaos theory, wavelet transform, and stocastic resonance. A detection algorithm based on a rectangular region in phase space plane is suggested in chaos method. The stocastic resonance method is considered in this research, as it is used for signal detection in underwater at a certain frequency. Simulation results obtained from MATLAB programs verify the studied methods giving an estimation of probability of detection and probability of false alarm versus SNR.
A hybrid big data movies recommendation model based k-nearest neighbors and matrix factorization Abderrahmane Ez-zahout; Hicham Gueddah; Abir Nasry; Rabie Madani; Fouzia Omary
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp434-441

Abstract

On the subject of broadcasting the information, finding someone’s favorite book or movie in a sea of data containing books and movies has become a crucial issue. In an era when there are so many genres and types of movies and books, the customer may find it difficult to choose which to discover in the first place. Thus, personalized recommendation systems play an important role because of the value that is attributed to movies and books nowadays, and considering that there are so many to choose from that the user may not be able to have a specific target. In this context, our proposed work, design and implement a prototype of movie recommendation system while taking into consideration the real requirement for the search of movies and books. The research of movie recommendation system by using the k-nearest neighbors approach and collaborative filtering algorithm are adopted to extract the criteria for a good use case on recommender systems. At last, the results are as what was expected as they showed that the system has a good recommendation effect.
Blockchain integrated multi-agent system for breast cancer diagnosis Thirumalaimuthu Thirumalaiappan Ramanath; Md. Jakir Hossen; Md. Shohel Sayeed
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp998-1008

Abstract

The integration of multi-agent system and blockchain technology can be beneficial to healthcare applications by providing intelligent data analysis with security. This paper presents an architecture that integrates multi-agent learning system and blockchain technology to support breast cancer diagnosis in a secured manner. The proposed system is based on a parallel hybrid fuzzy logic approach for supporting the prediction of breast cancer disease. The proposed system showed a classification accuracy of 96.49% in breast cancer diagnosis when testing with the Wisconsin Diagnostic Breast Cancer dataset. The blockchain is used to provide agent security in the proposed system to ensure that the only trusted and reputed agents are participated in the decision-making process.
A novel design of a reconfigurable power divider with stubs for mobile applications Messaoud Garah; Elhadi Kenane; Farid Djahli
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp846-853

Abstract

Nowadays, the world knows a huge revolution in telecommunications, which has led to the need to integrate many services, such as long-term evolution (LTE), 5G, wireless local area network (WLAN), and Bluetooth, in one receiving and transmitting device. In the same way, all active and passive microwave circuits must be compatible with the integration of services, including the power divider, which is the subject of our work. This passive component is used in several fields such as medicine, surveillance, radar systems and others applications. Wilkinson divider is one of the most prominent power dividers, it is classified as narrow-band power divider and it is a very useful component in mobile applications (2.4 and 5.8 GHz). In this work, a reconfigurable 4-ports Wilkinson divider is designed using PIN diodes and simulated using connected speech test (CST) simulator software. This designed divider can easily modify the operation mode by activating or disabling the PIN diodes.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue