cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 25 Documents
Search results for , issue "Vol 7, No 3: September 2018" : 25 Documents clear
Distributed Scheme To Authenticate Data Storage Security In Cloud Computing Bandarupalli, Rakesh; Rajitha, O.; Parveen Sultana, H.
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v7i3.715

Abstract

Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centers, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features.  Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers.  In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the data management and services may not be absolutely truthful.  This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching Anil Gupta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.232 KB) | DOI: 10.11591/eei.v7i3.754

Abstract

With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
SGSC Framework: Smart Government in Supply Chain Based on FODA Ahmad Nurul Fajar; Ditdit Nugeraha Utama
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.337 KB) | DOI: 10.11591/eei.v7i3.817

Abstract

Smart System has implemented in government sector. There are varies Implementation that was utilized by research activities for numerous domains is very broad. Besides that, the Industry, transportation and health, also where such a system is incredibly beneficial. This study discuss supply chain and governmental link issue, coordination of all stakeholder in supply chain has to reflect the government role. It support with the condition in Indonesian government environment is unique. It is a challenge to construct smart system based on Feature Oriented Domain Analysis (FODA) approach. It can produce software product line (SPL). We proposed framework for develop software product line for smart supply chain in government sector. It is used to enhance and improve the development of software systems by multiple software system developers. It will be a guidance for construct smart government, and more specificity in supply chain for government system area environment. It is called SGSC Framework. It consists of four layers, such as optimization layer, integration layer, supply chain layer and data layer.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
E-Learning Effectiveness Analysis in Developing Countries: East Nusa Tenggara, Indonesia Perspective Sfenrianto Sfenrianto; Ellen Tantrisna; Habibullah Akbar; Mochamad Wahyudi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.482 KB) | DOI: 10.11591/eei.v7i3.849

Abstract

The adoption of e-learning in developing countries like Indonesian Universities have been focused in urban areas like the big cities, especially in Java island. There is a lack of development of e-learning in a remote city like Kupang East Nusa Tenggara Indonesia which is located far away from the capital city. This research aims to assess the effectiveness of e-learning by analyzing three factors in one of the higher institution in Kupang city, i.e. Sekolah Tinggi Kesehatan Citra Mandiri Husada Kupang (STIKes CHMK). The factors include culture, technology and infrastructure, and content satisfaction. The data were collected using questionnaires. Research shows that with proper preparation for e-learning, the acceptance of e-learning in rural areas is significantly high. This finding suggests that e-learning can greatly benefit the students like Kupang city in developing countries.
Speaker Recognition in Content-based Image Retrieval for a High Degree of Accuracy Suhartono Suhartono; Fresy Nugroho; Muhammad Faisal; Muhammad Ainul Yaqin; Suyanta Suyanta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.047 KB) | DOI: 10.11591/eei.v7i3.957

Abstract

The purpose of this research is to measure the speaker recognition accuracy in Content-Based Image Retrieval. To support research in speaker recognition accuracy, we use two approaches for recognition system: identification and verification, an identification using fuzzy Mamdani, a verification using Manhattan distance. The test results in this research. The best of distance mean is size 32x32. The best of the verification for distance rate is 965, and the speaker recognition system has a standard error of 5% and the system accuracy is 95%. From these results, we find that there is an increase in accuracy of almost 2.5%. This is due to a combination of two approaches so the system can add to the accuracy of speaker recognition.
Oscillatory Stability Prediction Using PSO Based Synchronizing and Damping Torque Coefficients Nor Azwan Mohamed Kamari; I. Musirin; Z. A. Hamid; M. H. M. Zaman
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.535 KB) | DOI: 10.11591/eei.v7i3.961

Abstract

This paper presents the assessment of stability domains for the angle stability condition of the power system using Particle Swarm Optimization (PSO) technique. An efficient optimization method using PSO for synchronizing torque coefficients Ks and damping torque coefficients Kd to identify the angle stability condition on multi-machine system. In order to accelerate the determination of angle stability, PSO is proposed to be implemented in this study. The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as Evolutionary Programming (EP) and Artificial Immune System (AIS). Validation with respect to eigenvalues determination, Least Square (LS) method and minimum damping ratio ξmin confirmed that the proposed technique is feasible to solve the angle stability problems.
Creating Color Image Features Using Local Contrast Method Ayman Al-Rawashdeh; Ziad Al-Qadi
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (699.305 KB) | DOI: 10.11591/eei.v7i3.1216

Abstract

Digital color images are now one of the most popular data types used in the digital processing environment. Color image recognition plays an important role in many vital applications, which makes the enhancement of image recognition or retrieval system an important issue. Using color image pixels to recognize or retrieve the image, but the issue of the huge color image size that requires accordingly more time and memory space to perform color image recognition and/or retrieval. In the current study, image local contrast was used to create local contrast victor, which was then used as a key to recognize or retrieve the image. The proposed local contrast method was properly implemented and tested. The obtained results proved its efficiency as compared with other methods.
Maximum Loadability Enhancement with a Hybrid Optimization Method E. E. Hassan; T. K. A. Rahman; Z. Zakaria; N. Bahaman; M. H. Jifri
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (423.736 KB) | DOI: 10.11591/eei.v7i3.1168

Abstract

Nowadays, a power system is operating in a stressed condition due to the increase in demand in addition to constraint in building new power plants. The economics and environmental constraints to build new power plants and transmission lines have led the system to operate very close to its stability limits. Hence, more researches are required to study the important requirements to maintain stable voltage condition and hence develop new techniques in order to address the voltage stability problem. As an action, most Reactive Power Planning (RPP) objective is to minimize the cost of new reactive resources while satisfying the voltage stability constraints and labeled as Secured Reactive Power Planning (SCRPP). The new alternative optimization technique called Adaptive Tumbling Bacterial Foraging (ATBFO) was introduced to solve the RPP problems in the IEEE 57 bus system. The comparison common optimization Meta-Heuristic Evolutionary Programming and original Bacterial Foraging techniques were chosen to verify the performance using the proposed ATBFO method. As a result, the ATBFO method is confirmed as the best suitable solution in solving the identified RPP objective functions.
Weather Forecasting Using Merged Long Short-term Memory Model Afan Galih Salman; Yaya Heryadi; Edi Abdurahman; Wayan Suparta
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (701.711 KB) | DOI: 10.11591/eei.v7i3.1181

Abstract

Over decades, weather forecasting has attracted researchers from worldwide communities due to itssignificant effect to global human life ranging from agriculture, air trafic control to public security. Although formal study on weather forecasting has been started since 19th century, research attention to weather forecasting tasks increased significantly after weather big data are widely available. This paper proposed merged-Long Short-term Memory for forecasting ground visibility at the airpot using timeseries of predictor variable combined with another variable as moderating variable. The proposed models were tested using weather timeseries data at Hang Nadim Airport, Batam. The experiment results showedthe best average accuracy for forecasting visibility using merged Long Short-term Memory model and temperature and dew point as a moderating variable was (88.6%); whilst, using basic Long Short-term Memory without moderating variablewasonly (83.8%) respectively (increased by 4.8%).

Page 1 of 3 | Total Record : 25