cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Chaotic map technique for enhancement security for android mobile system based on image encryption Kawther Thabt Saleh; Nisreen Abd Alhadi Jabr; Iman Hussein Al-Qinani
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1698-1703

Abstract

Network security continues to be the priority of many organizations. To ensure the protection of their data, they pay great attention to Encryption systems. Moreover, because of the enormous developments in networks of connection particularly the internet which has used by several people to share a variety of data kinds. The security of data has been a significant issue. As a result, there is a significant focus in using methods of decryption and encryption. Numerous encryption techniques have become advanced to preserve data protection, chaotic encryption systems are one of these methods widely used in recent years, where several techniques were proposed to use a chaotic map for encrypt images for the reason that of their characteristics e.g., random action unpredictability and initial conditions sensitivity. In this paper, proof authentication of sent information is used chaotic encryption algorithm to provide cipher text and hidden in image then send to another user. This approach is applied in cellular operating system environment (android). Thus, the sending and receiving of text will be safe and secure. The proposed approach is tested on different types of mobile. The proposed system gives good results.
Deep learning approach for detecting and localizing brain tumor from magnetic resonance imaging images Abu Shahed Shah. Md. Nazmul Arefin; Shah Mohd. Ishtiaque Ahammed Khan Ishti; Mst. Marium Akter; Nusrat Jahan
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1729-1737

Abstract

Brain is the most important part of the nervous system. Brain tumor is mainly a mass or growth of abnormal tissues in a brain. Early detection of brain tumor can reduce complex treatment process. Magnetic resonance images (MRI) are used to detect brain tumor. In this paper, we have introduced a deep convolutional neural network (CNN) to automatic brain tumor segmentation using MRI medical images which can solve the vanishing gradient problem. Classifying the brain MRI images with Resnet-50 and InceptionV3 in order to identify whether there is tumor or not. After this step, we have compared the accuracy level of both of the CNN models. Thereafter, applied U-Net architecture individually with encoder Resnet-50 and InceptionV3 to avieved promising results. The publicly available low grade gliomas (LGG) segmentation dataset has been utilized to test the model. Before applying the model on the MRI images preprocessing and several augmentation techniques have been done to obtain quality a dataset. U-net architecture with InceptionV3 provided 99.55% accuracy. On the other hand, our proposed method U-net with encoder ResNet-50 showed 99.77% accuracy.
Dipole antenna with biconical and pyramidal horn design in radio frequency identification simulations Aaron Don M. Africa; Rica Rizabel M. Tagabuhin; Jan Jayson S. D. Tirados
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp181-189

Abstract

Radio frequency identification (RFID) systems are used in several applications. It is widely used in retail, corporations, and schools for several purposes such as inventory, identification, and cashless payments. The components of an RFID system include a tag and a reader. The RFID reader includes an RF module that transmits and receives signals. While the RFID tag transmits embedded signals, which is typically some form of identification. The tag is a passive component powered by the reader. The two components make use of antennas to communicate the signals with each other. The design of the antenna is an important factor to consider in the production of the RFID. The size of the antenna must be small enough to provide convenience and the gain must be strong enough to effectively transmit and receive signals between the two components. In this paper, an antenna for an RFID tag is designed using MATLAB software. The antenna to be designed must be cost-efficient and be able to radiate an acceptable gain. This research creates a dipole antenna with biconical and pyramidal horn design in RFID simulations.
Fractional PID controller based on biggest log modulus tuning method with MOPSO optimization for distillation column Fartas Nourelhouda; Khelassi Abdelmadjid
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1396-1404

Abstract

The main contribution of this work is to design a fractional order proportional integral derivative (FO-PID) controller by combining the biggest log modulus tuning (BLT) method and multi-objective particle swarm optimization (PSO) algorithm for the control of the challenging multivariable systems. The parameters of the integer proportional integral (PI) controller are designed preliminary using BLT method. The derivation parameter, the fractional integrator and the fractional derivation parameters is formulated as an optimization problem with many objective functions as minimizing the integral square error (ISE), integral time absolute error (ITAE) and objective function which contain the ISE, overshoot and settling time using PSO algorithm. An example of wood and berry distillation column is treated in this paper. A comparison between integer BLT, integer PSO, big bang-big crunch (BB-BC) algorithm, TLBO method and the proposed fractional BLT-PSO method is carried out. The simulation results using MATLAB/Simulink show the efficiency and merits of the proposed method for such systems.
Enhancement and modification of automatic speaker verification by utilizing hidden Markov model Imad Burhan Kadhim; Ali Najdet Nasret; Zuhair Shakor Mahmood
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1397-1403

Abstract

The purpose of this study is to discuss the design and implementation of autonomous surface vehicle (ASV) systems. There’s a lot riding on the advancement and improvement of ASV applications, especially given the benefits they provide over other biometric approaches. Modern speaker recognition systems rely on statistical models like hidden Markov model (HMM), support vector machine (SVM), artificial neural networks (ANN), generalized method of moments (GMM), and combined models to identify speakers. Using a French dataset, this study investigates the effectiveness of prompted te xt speaker verification. At a context-free, single mixed mono phony level, this study has been constructing a continuous speech system based on HMM. After that, suitable voice data is used to build the client and world models. In order to verify speakers, the text-dependent speaker ver-ification system uses sentence HMM that have been concatenated for the key text. Normalized log-likelihood is determined from client model forced by Viterbi algorithm and world model, in the verification step as the difference between the log-likelihood. At long last, a method for figuring out the verification results is revealed.
Cloud computing: google firebase firestore optimization analysis Andi Bahtiar Semma; Mukti Ali; Muh Saerozi; Mansur Mansur; Kusrini Kusrini
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1719-1728

Abstract

Cloud computing is a new paradigm that provides end users with a secure, personalized, dynamic computing environment with guaranteed service quality. One popular solution is Google cloud firestore, a global-scale not only structured query language (NoSQL) document database for mobile and web apps. Recent research on cloud-based NoSQL databases often discusses the difference between them and SQL databases and their performance. However, using cloud-based NoSQL databases such as firestore is tricky without any scientific comparison methodology, and it needs analysis of how its particular systems work. This study aims to discover what is the best design that could be implemented to optimize data read cost, response size, and time regarding the cloud firestore database. In this study, we develop a grade point average (GPA)-report mocking application to assess data read based on our institution’s needs. This application consists of three functions. Add the graduated GPA and students’ names, and view the ten highest GPAs, GPA average, and total graduated students. The finding indicates that aggregating data on the client side or utilizing the Google cloud function trigger, then updating aggregation data in one transaction significantly reduces document read count (cost), response size, and time.
A comprehensive survey of whale optimization algorithm: modifications and classification Saboohi Mahmood; Narmeen Zakaria Bawany; Muhammad Rizwan Tanweer
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp899-910

Abstract

Whale optimization algorithm (WOA) is an emerging nature-inspired, swarm-intelligence based algorithm to solve optimization problems more efficiently. This algorithm is based on the bubble-net hunting strategy of the humpback whales. It has gained immense popularity among researchers, typically, due to its simple nature, fast convergence, and having minimum parameters. In the recent past, it has been widely adopted in various fields including data mining, machine learning, wireless sensor networks, cloud computing, civil engineering, and power systems due to its optimal performance. The WOA has given competitive results in comparison to the state-of-the-art optimization algorithms. In this study, we aim to present a comprehensive survey of WOA consisting of more than eighty existing variants of WOA. More specifically, we intend to put forward key aspects of WOA variants with reference to modifications and applications. Further, we classify the most dominant variants of WOA in distinct categories based on modification area such as equation modification, parameter tuning or the problem space for which an algorithm has been specifically altered. We believe that this study will be beneficial for the community working on optimization problems and it can serve as a basis for understanding the modification and improvement process of an optimization algorithm.
Global convergence of a modified RMIL+ nonlinear conjugate gradient method with strong wolfe Abdelrhaman Abashar; Osman Omer Osman Yousif; Awad Abdelrahman Abdalla Mohammed; Mohammed A. Saleh
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i2.pp1184-1191

Abstract

Nonlinear conjugate gradient (CG) methods are extensively used as an important technique for addressing large-scale unconstrained optimization problems which are arise in many aspects of science, engineering, and economics. That is due to their simplicity, convergence properties, and low memory requirements. To generate a new approximation solution in each iteration, the CG methods usually implement under the strong Wolfe line search. For good performance, many studies have been carried out to modify well-known CG methods. In this paper, we did some modifications on one of CG method called RMIL+ in order to obtain a new CG method possesses the sufficient descent property and the global convergence under strong Wolfe line search. The numerical results demonstrate that the suggested method outperforms other CG methods.
Modification of the new conjugate gradient algorithm to solve nonlinear fuzzy equations Zeyad M. Abdullah; Hisham M. Khudhur; Amera Khairulla Ahmed
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1525-1532

Abstract

The conjugate gradient approach is a powerful tool that is used in a variety of areas to solve problems involving large-scale reduction. In this paper, we propose a new parameter in nonlinear conjugate gradient algorithms to solve nonlinear fuzzy equations based on Polak and Ribiere (PRP) method, where we prove the descent and global convergence properties of the proposed algorithm. In terms of numerical results, the new method has been compared with the methods of Fletcher (CD), Fletcher and Reeves (FR), and Polak and Ribiere (PRP). The proposed algorithm has outperformed the rest of the algorithms in the number of iterations and in finding the best value for the function and the best value for the variables.
Fuzzy based back stepping controller for glucose level regulation under meal disturbance Yousra Abd Mohammed; Rokaia Shalal Habeeb
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp137-145

Abstract

Diabetes is one of the most common and critical diseases around the world, which need insulin injections to control the body’s glucose rate. A robust back stepping (BS) controller design based on fuzzy system is introduced in this paper to control the glucose level with the presence of meal disturbance. The controller’s design is based on Bergman’s mathematical model. Different fuzzy controller structures are implemented (fuzzy PI, fuzzy PD, and fuzzy PID) controllers along with BS controller named as (BS-fuzzy PI, BS-fuzzy PD, BS-fuzzy PID) controllers. Simulation results using MATLAB/Simulink show efficiency and robustness of the proposed design in terms of controlling the insulin concentration level in blood under meal disturbance and retaining the glucose level to its Basal value.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue