cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
A deep learning signed medical image based on cryptographic techniques Dalia H. Elkamchouchi; Abeer D. Algarni; Rania M. Ghoniem; Heba G. Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp481-495

Abstract

Innovative medical multimedia communications technology requirements have enhanced safety principles, allowing significant advancement in security standards. In hospitals and imaging centers, massive amounts of medical images have been created. To successfully access the medical databases and utilize those rich resources in assisting diagnosis and research, image processing enabled communication solutions are necessary. Our article presents a rigorous verified model by employing deep learning to enhance the cryptographic performance of biomedical images using hybrid chaotic Lorentz map diffusion and de-oxyribonucleic acid (DNA) confusion stages. It consists of two encryption/decryption techniques, the initial signal is verified using digital signature and two unique non-consecutive stages of chaotic diffusion with a single DNA scrambling stage in between. The encoded secret bit stream is generated and used to encrypt or decode the original signal in the diffusion manner to disintegrate the redundancy in the plain image statistics, utilizing hybrid chaotic system. Using DNA confusion step to make the relationship between the original signal and the utilized key more ambiguous. These stages make the proposed image cryptosystem more resistant to known/ chosen plaintext assaults. The performance of the suggested technique will be assessed to the most similar techniques reported in the literature for comparative purposes.
Classification of lower limb rehabilitation exercises with multiple and individual inertial measurement units Rashmin S. Tanna; Chandulal H. Vithalani
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i2.pp840-849

Abstract

Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb injuries play a critical role in terms of stress on joints after the injury. The primary objective of the paper is to find how accurately and efficiently a single and a two IMU sensor-based system could classify SSLR (Seated straight leg raise) and LSLR (Lying straight leg raise) exercises using machine learning. Inertial Measurement Units (IMUs) that include accelerometer and gyroscope were calibrated and tested, individual and combined, for classified seating as well as lying exercise and for different demanded personalities. Individual IMUs achieved about 96 % accuracy in binary classification. However, the combined (two) IMUs achieved about 96.8 % accuracy. The merits of the proposed IMU based sensor system are that it is easy to install, cost effective and very useful for telemedical operations in pandemic situations like COVID19. On the basis of these results, it could be concluded that the accuracy of a single IMU sensor system and a two IMU sensor-based system is approximately 96% and both were efficiently able to classify SSLR and LSLR exercises as well as identify the individual performing the exercise.
Utilizing the power controller, enhance the operation of a single-phase AC to DC converter Raghad Hameed Ahmed; Mohammed Taha Yunis; Basima Taresh Dawood
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1224-1232

Abstract

Smooth switching technology with a single-phase converter from AC to DC is existing in this work. A study of implementing a buck-batch converter was explored and the implementation details assessed. The system explaining the versatile balanced power control (VPBC) has advantages, the suggested boost buck processor is charged during the downtime; the voltage is relieved via the MOSFET switch. It has enhanced the power factor to 0.9715 at full load in further development. The advanced model of the AC to DC converter design will maintain stability and its reliability will depend on the average “charge” and “discharge” with the help of the VPBC-controlled current of the inductor, compensate automatically. Because of this process, a linear construction between line current and voltage is achieved by running normal work at regular intervals. As a result, they almost realized the PF at the input source. The output voltage of the planned for any load condition in the transformer model is always constant (0-1,000) watts. Suggested circuit has a great dynamic reaction.  Suggested PFC circuit is usable for a range of loads. From the simulation, the efficiency of the suggested transformer is 91.11% upper at the rated load. Designed by MATLAB.
Introduction to Sumba’s traditional typical woven fabric motifs based on augmented reality technology Fairuz Iqbal Maulana; Bening Insaniyah Al-Abdillah; Ruth Rade Awang Pandango; Andini Putri Maharani Djafar; Frihandhika Permana
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp509-517

Abstract

Sumba woven cloth is one of the points of pride in East Sumba and West Sumba. The process of making Sumba woven cloth is not easy, making the patterned cloth is really valuable. These various motifs have their own stories behind them. Sumba woven fabric is one of the cultural heritages that must be preserved. One way to preserve this cultural heritage is implementing technological developments, such as augmented reality (AR) technology on smartphones. The combination of culture and technology can play a role in preserving Indonesia's cultural diversity. In applying this technology, we use the analysis, design, development, implementation, and evaluation (ADDIE) method starting from the stages of analysis, design, development, implementation, and evaluation. In an implementation, there will be a woven fabric catalog book that becomes a marker to bring up a 3D model of Sumba woven fabric that has been knitted in the form of clothes. The results revealed that the shortest distance between the marker and the camera at which 3D objects may be displayed is 20 cm, and the marker's reading angle is just approximately 0°-45°. The average duration observed is 0.056 seconds, and the average speed obtained is 8.92 meters per second.
Threat modeling in application security planning citizen service complaints Agus Tedyyana; Fajar Ratnawati; Elgamar Syam; Fajri Profesio Putra
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i2.pp1020-1027

Abstract

The mobile-based service complaint application is one way to implement good governance today. Public facilitated to make complaints without going through a complicated process. Security aspects must be considered to protect user privacy. The security design must be considered so that no one is harmed by the application's users damaged in the application's use. This study used threat modeling during the planning stage of developing a citizen service complaint application to obtain information about vulnerabilities. The researcher uses the threat modeling process that the open web application security project (OWASP) organization has formulated as a framework. The researchers took steps to describe application information, determine and rank threats, countermeasures, and mitigation. In the final stage, the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) threat modeling methodology is used to analyze and assess mitigation actions against threats in the application. The researcher gets a defense strategy to reduce the danger based on the threat analysis results. Threat modeling in the early phase software development life cycle process is constructive in ensuring that software is developed with adequate security based on threat mitigation from the beginning.
Latest trends and their adoptions in electrical power systems – an industrial perspective Butukuri Koti Reddy; Bhanur Srirajvarun Reddy; Palavarapu Prakash; Dongari Vamshy; Penubaka Ram Kishore Kumar Reddy; Mohammed M. Alhaider
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp8-14

Abstract

Electricity is a vital part in every day’s life and is one of the greatest gifts given by science to the mankind. It has provided all the comfort to the human beings right from lighting to large machines through computers and amusement equipment. Electrical power system (EPS) is moving fast into new horizons and making the entire world dynamic just like the speed of electron. In this paper, the latest trends that are happening globally in electrical power systems are highlighted. The major changes that are taking place in all applicable fields such renewable energy, especially photovoltaics (PV), smart grids (SG), ulta high voltage (UHV) transmission, distributed generation, micro grids, de-regulation and e-mobility are reviewed for updating all the stake holders of it. Also, the adoption of latest technologies such as internet of things (IoT) and artificial intelligence (AI) are briefly mentioned.
Modified three-term conjugate gradient algorithm and its applications in image restoration Yahya Ismail Ibrahim; Hisham Mohammed Khudhur
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1510-1517

Abstract

In image restoration, the goal is often to bring back a high-quality version of an image from a lower-quality copy of it. In this article, we will investigate one kind of recovery issue, namely recovering photos that have been blurred by noise in digital photographs (sometimes known as "salt and pepper" noise). When subjected to noise at varying frequencies and intensities (30,50,70,90). In this paper, we used the conjugate gradient algorithm to Restorative images and remove noise from them, we developed the conjugate gradient algorithm with three limits using the conjugate condition of Dai and Liao, where the new algorithm achieved the conditions for descent and global convergence under some assumptions. According to the results of the numerical analysis, the recently created approach is unequivocally superior to both the fletcher and reeves (FR) method and the fletcher and reeves three-term (TTFR) metod. Use the structural similarity index measure (SSIM), which is used to measure image quality and the higher its value, the better the result. The original image was compared with all the noisy images and each according to the percentage of noise as well as the images processed with the four methods.
An investigation of even ordered magic squares (4, 6, and 8): characteristic polynomials, eigenvalues, and encryption Saleem Al-Ashhab; Majdi Al-qdah
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1479-1489

Abstract

In this paper, we discuss and mathematically compute the eigenvalues and the characteristic polynomials of special even square matrices of orders 4x4 and 8x8. Also, we introduce two 8th order compound magic squares. The computed values are verified using Maple software. First, for the 4th order square matrix, the characteristic polynomial was derived to be: λ(λ-2s)( λ²+4Θ) with the eigenvalues: 0,2 s, and two other conjugates. In further analysis, we performed numerical classification of the squares for the matrices of order 4. Second, for the 8th order magic square, the characteristic polynomial was obtained in the form: λ3(λ-4s)(λ4+Ωλ2+θ) where Ω,Θ are constants; the eigenvalues are 0,4 s, ∓√λ1, ∓√λ2; where λ1, λ2 are the roots of the quadratic equation: λ2+Ωλ+Θ=0. Third, for the franklin square, we obtained the eigenvalues 0,4 s, and the roots of the equation: λ2+aλ+b. Finally, we suggested a hybrid image encryption technique based on Franklin magic square matrices and improved substitution technique. The proposed a grayscale image encryption/ decryption algorithm uses circular rotation of bits and Franklin magic squares’ properties in conjunction with substitution techniques to obtain a very secure algorithm against attacks.
Optimization artificial neural network classification analysis model diagnosis Gingivitis disease Vicky Ariandi; Musli Yanto; Annisak Izzaty Jamhur; Firdaus Firdaus; Riandana Afira
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1648-1656

Abstract

Gingivitis is a disease that can be caused by the buildup of bacteria and plaque caused by leftover food. This disease can attack anyone, especially children who are not aware of maintaining dental and oral health. This study aims to build and optimize the classification analysis model for the diagnosis of Gingivitis. The classification analysis model was built using the artificial neural network (ANN) method which was optimized using fuzzy logic and the multiple linear regression (MRL) method. Optimization with fuzzy aims to develop a pattern of rules in the detection. The MRL method is also used as a process of measuring analysis patterns to ensure the analytical model presents maximum results. The results study indicate that the optimization of fuzzy and MRL methods provides excellent output. These results are based on the fuzzy output which can provide a pattern of 40 rules. The MRL method is can present the level of correlation of each analysis variable with a significant output having an average value of 94.2%. Based on the results of this study, the analysis model that is optimized with the fuzzy logic method and MRL contributes to maximizing the process of diagnosing Gingivitis.
Automatic learning algorithm for troubleshooting in hydraulic machinery Jose Castro-Puma; Miguel Castro-Puma; Verónica More-Sánchez; Juana Marcos-Romero; Elio Huamán-Flores; Claudia Poma-Garcia; Rufino Alejos-Ipanaque
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp535-544

Abstract

In Peru, there are many companies linked to the category of heavy machinery maintenance, in which, on the one hand, although it is true they generate a record of events linked to equipment maintenance indicators, on the other hand they do not make efficient use of these data generating operational patterns, through machine learning, that contribute to the improvement of processes linked to the service. In this sense, the objective of this article is to generate a tool based on automatic learning algorithms that allows predicting the location of faults in hydraulic excavators, in order to improve the management of the maintenance service. When developing the research, it was obtained that the algorithm that assembles bagged trees presents an accuracy of 97.15%, showing a level of specificity of 99.04%, an accuracy of 98.56% and a sensitivity of 97.12%. Therefore, the predictive model using the ensemble bagged trees algorithm shows significant performance in locating the system where failures occur in hydraulic excavator fleets. It is concluded then that it was possible to improve aspects associated with the planning and availability of supplies or components of the maintenance service, also optimizing the continuity and response capacity in the maintenance process.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue