cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 649 Documents
Detection and Identification of Detonation Sounds in an Internal Combustion Engine using Wavelet and Regression Analysis Agus Sujono; R. Soekrisno; Eka Firmansyah; Oyas Wahyunggoro
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1248.973 KB) | DOI: 10.11591/eecsi.v1.392

Abstract

Improving efficiency and power in an internal combustion engine is always impeded by detonation (knock) problems. This detonation problem has not been explained fully yet. Quick and accurate detection of detonation is also in the development stage. This research used a new method of detonation sound detection which uses microphone sensors, analysis of discrete wavelet transform (DWT), and analysis of the regression function envelope to identify the occurrence of detonation. The engine sound was captured by the microphone; it was recorded on a computer; it was proceeded using a DWT decomposition filtering technique; it was then subjected to normalization and regression function envelope to get the shape of the wave pattern for the vibration. Vibrational wave patterns were then compared to a reference using the Euclidean distance calculation method, in order to identify and provide an assessment decision as to whether or not detonation had occurred. The new method was applied using Matlab and it has yielded results which are quite effective for the detection and identification of detonation and it is also capable of producing an assessment decision about the occurrance of detonation.
Using Sub-optimal Kalman Filtering for Anomaly Detection in Networks Joseph Ndong
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (690.142 KB) | DOI: 10.11591/eecsi.v1.393

Abstract

Possibility theory can be used as a suitable frameworkto build a normal behavioral model for an anomaly detector.Based on linear and/or nonlinear systems, sub-optimal filteringapproaches based on the Extended Kalman Filter and the UnscentedKalman Filter are calibrated for entropy reduction andcould be a good basis to find a suitable model to build a decisionvariable where, a decision process can be applied to identifyanomalous events. Sophisticated fuzzy clustering algorithms canbe used to find a set of clusters built on the decision variable,where anomalies might happen inside a few of them. To achievean efficient detection step, a robust decision scheme is built, bymeans of possibility distributions, to separate the clusters intonormal and abnormal spaces. We had studied the false alarmrate vs. detection rate trade-off by means of ROC (ReceiverOperating Characteristic) curves to show the results. We validatethe approach over different realistic network traffic.
Time Domain Analysis of Sound Signals for Bearing Damage Identification Muhammad Aswin; ING Wardana; Yudy S. Irawan; Hadi Suyono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1487.677 KB) | DOI: 10.11591/eecsi.v1.394

Abstract

Time domain analysis requires less computational time compared to the frequency domain. Analysis is performed directly on the signal without any conversion at all. This paper describes high-frequency signal analysis on sound produced by rotated bearing. Three bearing conditions - normal, damaged, and badly damaged - was chosen to obtain the characteristics of high frequency sound. From the entire spectrum of the recorded sound, the higher frequency range looks very different for the three conditions bearing. Phisically, more damage rotated bearing, the disturbance sound heard more loudly. Bearings were rotated at various rpm, from low to high, to ensure the similarities and differences in characteristics. Average energy and standard deviation were calculated as bearing damage indication.
Detection Technique of Squamous Epithelial Cells in Sputum Slide Images using Image Processing Analysis Fatin Izzwani Azman; Kamarul Hawari Ghazali; Rosyati Hamid; Noor Amira Syuhada Mahamad Salleh
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1202.393 KB) | DOI: 10.11591/eecsi.v1.395

Abstract

A good quality sputum is important to detect diseases. The presence of squamous epithelial cells (SEC) in sputum slide images is important to determine the quality of sputum. The presence of overlapping SEC in sputum slide images causes the process become complicated and tedious. Therefore this paper discusses on technique of detection and summation for Squamous Epithelial Cell (SEC) in sputum slide image. We addressed the detection problem by combining K-means and color thresholding algorithm. The design of aided system is evaluated using 200 images and the proposed technique is capable to detect and count each SEC from overlapping SEC image. Total of 200 images were clustered to 10 groups, labelled as Group Cell 1 to group Cell 10 that correspond to the number of cells in the image. Therefore, each group will contain 20 images. The accuracy of the algorithm to detect SEC was also measured, and results show that in 91% which provides a correct SEC detection and summation.
Medical Image Encryption by Using Modification of SomdipDey Advanced Encryption Image Technique Al Farissi; Agung Wahyu Nugroho; Megah Mulya
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.252 KB) | DOI: 10.11591/eecsi.v1.396

Abstract

The rapid growth of technology led the security ofdata becomes a very important issue, in particular data onmedical field. Therefore the security of data need to beconsidered. This research will focus on the security of medicalimage. The appropriate technologies to increase the security ofmedical image is the image encryption. This research, applied atechnique that can encrypt a medical image, it is SompdipDeyAdvanced Encryption Image Technique. This technique hasthree phases, namely Bits Rotation and Reversal, Extended HillCipher and Modified MSA Randomization. This research wasalso conducted on a modification of the stage Extended HillCipher that produces a better result so that the security ofmedical data will be increased.
An Adaptive Contrast Enhancement Algorithm with Details Preserving Jing Rui Tang; Nor Ashidi Mat Isa
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1011.963 KB) | DOI: 10.11591/eecsi.v1.397

Abstract

This paper presents an adaptive contrastenhancement algorithm with details preserving (ACEDP) toenhance gray-scale image. Initially, the input image is classifiedinto low-, middle- or high-level image based on the gray-leveldistribution of maximum number of pixels. The proposedACEDP algorithm assigns different plateau functions fordifferent type of image and histogram clipping is then performedfollowed by histogram equalization. Simulation results show thatthe proposed technique outperforms several techniques inliterature. It demonstrates good ability in contrast enhancementas well as details preservation.
Embedding Authentication and DistortionConcealment in Images – A Noisy Channel Perspective Qurban A Memon
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1036.993 KB) | DOI: 10.11591/eecsi.v1.398

Abstract

In multimedia communication, compression of data is essential to improve transmission rate, and minimize storage space. At the same time, authentication of transmitted data is equally important to justify all these activities. The drawback of compression is that the compressed data are vulnerable to channel noise. In this paper, error concealment methodologies with ability of error detection and concealment are investigated for integration with image authentication in JPEG2000.The image authentication includes digital signature extraction and its diffusion as a watermark. To tackle noise, the error concealment technologies are modified to include edge information of the original image.This edge_image is transmitted along with JPEG2000 compressed image to determine corrupted coefficients and regions. The simulation results are conducted on test images for different values of bit error rate to judge confidence in noise reduction within the received images.
Color Thresholding Techniques Performance for Night Vision Surveillance Using Thermal Imaging Noor Amira Syuhada Mahamad Salleh; Kamarul Hawari Ghazali; Fatin Izzwani Azman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (891.09 KB) | DOI: 10.11591/eecsi.v1.399

Abstract

Visible surveillance is commonly an active research worldwide. The need of surveillance allows thermal imaging to participate in this study activity. The drawback of visible surveillance for night monitoring is overcome by the technology of the thermal imaging. To achieve the goal of the surveillance system , the works on detection must be very efficient to do the detection Throughout this research , we developed an algorithm involving thresholding technique for subject detection using thermal image to find the for night surveillance system.
Implementation of Image Segmentation Using RGB Color Detection on Virtual Reality Robot as Spy Tool Rossi Passarella; Sutarno .; Ahmad Rezqy FF
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (922.144 KB) | DOI: 10.11591/eecsi.v1.400

Abstract

Humans cannot spy in small places that difficult topass. We need small size robot which remotely controlled so itcan be used for spying. The virtual reality technology in thisresearch was created using image segmentation with RGB colordetection and Pythagoras algorithm. A wireless camera is usedfor replacement of human eye to be able to look at thecircumstances around a robot. The camera can turn to the left orright in accordance with the user's head movement. The webcamis used as a sensor to detect the movement of a human head.Systems were created to be able to detect color and get the anglevalue and work well to move the camera in accordance with theuser's head movement. In this way, the user can act as thoughthey are on the robot and perform the surveillance
Illumination Estimation Based Color to Grayscale Conversion Algorithms Wei Hong Lim; Nor Ashidi Mat Isa
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (857.939 KB) | DOI: 10.11591/eecsi.v1.401

Abstract

In this paper, a new adaptive approach, namelythe illumination estimation approach is introduced into the colorto grayscale conversion technique. In this approach, someassumptions will be made to calculate the weight contribution ofred, green, and blue components during the conversion process.Two color to grayscale conversion algorithms are developedunder this approach, namely the Gray World Assumption Colorto Grayscale Conversion (GWACG) and Shade of GrayAssumption Color to Grayscale (SGACG) conversion algorithms.Based on the extensive experimental results, the proposedalgorithms outperform the conventional conversion techniquesby producing resultant grayscale images with higher brightness,contrast, and amount of details preserved. For this reason, theseproposed algorithms are suitable for pre- and post- processing ofdigital images.

Page 7 of 65 | Total Record : 649