Articles
9,174 Documents
An arrangement of the number of K-grams in the performance of Rabin Karp algorithm in text adjustment
Yuli Astuti;
Irma Rofni Wulandari
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i3.pp1388-1394
Rabin Karp algorithm is frequently used to determine the similarity between texts, using the hash function to compare the string identified and the substring in the text. The choice of the k value in the K-gram is often unrestricted. The number of k values used when cutting some terms will take longer if tried one by one. This research will perform a word cutting test on a script using K-gram 0 to 8. The results will cover the effect of the value of each K used on the similarity percentage produced. This research aims to determine the effect of the number of K-grams on the performance of Rabin Karp in text matching. The test underwent 20 sentences and 10 times using the dice coefficient for text similarity testing. The conclusion of this research should not use the K-gram 0 to 2 due to the K-gram basic principle: character deduction. Subsequently, if the character is 0,1,2, it does not have a meaning yet; thus, it gets a high similarity percentage. Based on trials by taking samples of K-gram 0 to 8 from 10 test data sets; the K-gram 3 is the best among K-grams 0 to 8.
Elastic net feature selected multivariate discriminant mapreduce classification
Arunadevi Nakkiran;
Vidyaa Thulasiraman
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i1.pp587-596
Analyzing the big stream data and other valuable information is a significant task. Several conventional methods are designed to analyze the big stream data. But the scheduling accuracy and time complexity is a significant issue. To resolve, an elastic-net kernelized multivariate discriminant map reduce classification (EKMDMC) is introduced with the novelty of elastic-net regularization-based feature selection and kernelized multivariate fisher Discriminant MapReduce classifier. Initially, the EKMDMC technique executes the feature selection to improve the prediction accuracy using the Elastic-Net regularization method. Elastic-Net regularization method selects relevant features such as central processing unit (CPU) time, memory and bandwidth, energy based on regression function. After selecting relevant features, kernelized multivariate fisher discriminant mapr classifier is used to schedule the tasks to optimize the processing unit. Kernel function is used to find higher similarity of stream data tasks and mean of available classes. Experimental evaluation of proposed EKMDMC technique provides better performance in terms of resource aware predictive scheduling efficiency, false positive rate, scheduling time and memory consumption.
Toward mobile learning at Jordanian higher education institutions
Ahmad Shukri Mohd Noor;
Marwan Nasser Yousef Atoom;
Masita Abdul Jalil
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i3.pp1538-1545
Globally, teaching methods and tools in higher education institutions (HEIs) have changed nowadays. Many attempts have been made in Jordanian higher education institutions (JHEIs) in order to improve and continuity of the educational process, especially during coronavirus pandemic. The outbreak of this virus has become a major disruption where all Jordanian universities cancelled classes and moved toward online learning, and mobile learning (ML) has appeared as one of the possible solutions. ML is in its early stages at JHEIs, and it is academically unexplored enough. So, this study explores the ML experience at JHEIs during coronavirus disease 2019 (COVID-19) crisis. The data were collected using a web survey where 272 students in JHEIs participated. The results revealed that the smartphone is the most widely used mobile device for ML ML is easy to use, ML increases the interaction between the instructor and the students and among the students themselves, ML has a positive impact on students’ performance, and also students are willing to use ML in the future. The outcomes of the study support policy makers at JHEIs to make educational decisions relating ML phenomenon.
Prediction of of heart diseases utilising support vector machine and artificial neural network
Alaa Khaleel Faieq;
Maad M. Mijwil
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i1.pp374-380
The heart, like a pump, is an organ about the size of a fist, mainly composed of muscle and connective tissue that functions to distribute blood to tissues. The heart is located under the rib cage, above the diaphragm between the lungs, slightly closer to the left. Sometimes a small, unexpected problem with the veins or the valves that supply the heart affects a person's life and can lead to death. Early diagnosis is essential to predict diseases that affect the human heart and lead people to live another period of life. In this context, the authors introduce two methods for early diagnosis of heart disease, the support vector machine and artificial neural network. The medical data is taken from the University of California Irvine (UCI) Machine Learning Repository database, and it contains reports of 170 people. The investigation results confirm that the optimal execution is the support vector machine technique. It gives high-accuracy prediction results. As for the performance of the forward propagation artificial neural networks (ANN) technique is acceptable.
Sentiment analysis on vaccine COVID-19 using word count and Gaussian Naïve Bayes
Nur Ghaniaviyanto Ramadhan;
Faisal Dharma Adhinata
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i3.pp1765-1772
Since the Coronavirus disease 2019 (COVID-19) pandemic hit the world, it had a significant negative impact on individuals, governments, and the global economy. One way to reduce the negative impact of COVID-19 is to vaccinate. Briefly, vaccination aims to enable the formed immune system to remember the characteristics of the targeted viral pathogen and be able to initiate an immune response that is rapid and strong enough to defeat future live viral pathogens. However, there are still many people in the world who are anti-vaccine. This certainly greatly hampers the process of accelerating the formation of the body's immune system widely in the community. Anti-vaccine people can be found on various social media platforms. Twitter was chosen as the data source because twitter is a common source of text for sentiment analysis. This study aims to analyze public sentiment on the COVID-19 vaccine through twitter in the form of tweets and retweets. This study uses the Gaussian Naïve Bayes method to see the results of the classification of sentiment analysis. The results obtained based on experiments prove that the Gaussian Naïve Bayes method can produce an average accuracy of 97.48% for each vaccine dataset used.
Security approach for instant messaging applications: viber as a case study
Mohammed Falih Kadhim;
Adel Al-Janabi;
Ahmed Hazim Alhilali;
Nabeel Salih Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1109-1115
A variety of internet-based applications are widely used in our animation activities because they provide free and useful services. These applications, such as Instant Messaging, can be run via the web, mobile, or computer-based devices. Therefore, the security and privacy of user data over these apps have been concerned in recent years because of sensitive and confidential information considerations. Consequently, many instant messaging applications, like Viber, have various security and privacy issues that need to be understood and resolved. Viber users reached 800 million, and they increased dramatically due to the efficient services that this app provides. Hence, a loophole in an application’s design may allow illegal access to the app and gain confidential and sensitive data. In this article, we proposed a security approach for Viber to safeguard user confidential data and sensitive information. The proposed approach involves two theoretical solutions: Short message service (SMS) authentication code and the physical hardware number to prevent illegal access to user data. Several scenarios are adopted to assess the proposed approach and achieve security and privacy for the user information.
Inert and mobile agents navigation interaction using reciprocal velocity obstacles for collisions avoidance
Susi Juniastuti;
Moch Fachri;
Supeno Mardi Susiki Nugroho;
Mochamad Hariadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1116-1124
Reciprocal velocity obstacles (RVO) is a method used for multiagents navigation that enables collision and oscillation-free avoidance against other mobile agents. Despite its ability in collision avoidance between agents, RVO has a hard time dealing with static obstacle avoidance. This problem has led to a tendency to use RVO only for agents avoidance and use other methods to handle static obstacles avoidance. In this paper, we present our new approach for interaction between mobile agents against static obstacles in the RVO based collision avoidance. We propose a concept called inert agents that interact as static obstacles. This inert agent is stand firm as static obstacles should be, while the inert agent also able to satisfy reactive collision avoidance nature of RVO to produce better avoidance result. We conduct an experiment to compare the performance of avoidance in a certain scenario. Our method shows better results when compared with generic static obstacles.
Recognition of Arabic handwritten words using convolutional neural network
Asmae Lamsaf;
Mounir Ait Kerroum;
Siham Boulaknadel;
Youssef Fakhri
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1148-1155
A new method for recognizing automatically Arabic handwritten words was presented using convolutional neural network architecture. The proposed method is based on global approaches, which consists of recognizing all the words without segmenting into the characters in order to recognize them separately. Convolutional neural network (CNN) is a particular supervised type of neural network based on multilayer principle; our method needs a big dataset of word images to obtain the best result. To optimize our system, a new database was collected from the benchmarking Arabic handwriting database using the pre-processing such as rotation transformation, which is applied on the images of the database to create new images with different features. The convolutional neural network applied on our database that contains 40320 of Arabic handwritten words (26880 images for training set and 13440 for test set). Thus, different configurations on a public benchmark database were evaluated and compared with previous methods. Consequently, it is demonstrated a recognition rate with a success of 96.76%.
Development and performance evaluation of object and traffic light recognition model by way of deep learning
Shweta Bali;
Tapas Kumar;
Shyam Sunder Tyagi
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i3.pp1486-1494
Deep learning models have shown incredible achievement in the field of autonomous driving, covering different aspects ranging from recognizing traffic signs and traffic lighs, vehicle detection, license plate detection, pedestrian detection. Most of the algorithms perrform better when the traffic lights are bigger in size, but the performance degrades in case of small-sized traffic lights. In this paper, the main emphasis is on evaluating two most promising deep learning architectures: single shot detector (SSD) and faster region convolutinal network (Faster R-CNN) on “la route automatisée (LaRA) traffic light dataset” which contains small traffic lights as objects. The strengths and weaknesses are evaluated based on different parameters. The performance is compared in terms of mean average Precision (mAP@0.50) and average recall. The impact of data augmentation on the two architectures is also analyzed. ResNet50 V1 as feature extractor for Faster R-CNN achieved 96% mAP (mean average precision) which performed better than Original ResNet50 V1 Faster R-CNN pipeline. Also, different parameters such as batch size, learning rate and optimizer are tuned for detecting and classifying small traffic lights into different categories.
Advanced control of a permanent magnet synchronous generator for a wind turbine
Abdelkader Belkacem;
Zinelaabidine Boudjema;
Ghalem Bachir;
Rachid Taleb
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i1.pp194-201
This article presents an improved vector control scheme based on super twisting continuous sliding mode for a permanent magnet synchronous generator integrated in a dual roror wind turbine system. To augment the energy effectiveness of wind systems, several research has recently been realized by different researchers and in various technologies fields. The field of machine control occupied a large part of this research as the objective was always to find the most optimal control solution. Two main objectives are targeted in this work. The first goal is to develop the vector control performance of the permanent magnet synchronous generator by using second order continuous sliding mode controller, which is known for their robustness and ability to reduce chattering phenomenon. The second objective of this work is to use a dual rotor wind turbine in order to increase the energy efficiency of the wind power system used. The obtained simulation results showed the efficacy of the techniques used.