GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2020
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 18, No. 2 ( 2020-05-01), p. 979-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 18, No. 2 ( 2020-05-01), p. 979-
    Abstract: 〈 span 〉 Several detecting algorithms are developed for real-time surveillance systems in the smart cities. The most popular algorithms due to its accuracy are: Temporal Differencing, Background Subtraction, and Gaussian Mixture Models. Selecting of which algorithm is the best to be used, based on accuracy, is a good choise, but is not the best. Statistical accuracy anlysis tests are required for achieving a confident decision. This paper presents further analysis of the accuracy by employing four parameters: false recognition, unrecognized, true recognition, and total fragmentation ratios. The results proof that no algorithm is selected as the perfect or suitable for all applications based on the total fragmentation ratio, whereas both false recognition ratio and unrecognized ratio parameters have a significant impact. The mlti-way Analysis of Variate (so-called K-way ANONVA) is used for proofing the results based on SPSS statistics. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2020
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 23, No. 1 ( 2021-07-01), p. 140-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 23, No. 1 ( 2021-07-01), p. 140-
    Abstract: As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 3 ( 2021-03-10), p. 1455-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 3 ( 2021-03-10), p. 1455-
    Abstract: Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 2 ( 2021-02-01), p. 968-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 2 ( 2021-02-01), p. 968-
    Abstract: 〈 p 〉 〈 span 〉 This study outlines the management of either direct or external modulation semiconductor laser systems for the key solution of bit rate up to 25 Gb/s under relative intensity noise (RIN) control. The bias and modulation peak currents based laser rate equations are optimized to achieve max Q factor and min bit error rate (BER) using first proposed model and optical/electrical signal power, optical/electrical signal to noise ratio are also enhanced using second proposed model. The percentage enhancement ratio in max. Q-factor and min. BER using first proposed model ranges from 53.25 % to 71.63 % in compared to the previous model. In the same way, by using second proposed model, the electrical signal power at optical receiver is enhanced within the range of 48.66 % to 68.88 % in compared to the previous model. Optical signal/noise ratio (OSNR) after optical fiber cable (OFC), signal/noise ratio (SNR) after electrical filter are measured with using different electrical pulse generators and electrical modulators at the optimization stage. The first proposed model reported better max. Q and min. BER values than the previous model. In addition to the second proposed model (direct modulation) has outlined better optical/electrical signal power than the previous model, while max. Q, min. BER values are kept constant. It is found that non return to zero pulse generator has presented better signal power than other pulse generators by using second proposed model. As well as the mixed of raised cosine pulse generator with external modulator reported max. Q, min. BER with other pulse generators by using first proposed model. OSNR at OFC is optimized by using continuous phase frequency shift keying (CPFSK) electrical modulator, While SNR at optical receiver is optimized by using phase shift keying (PSK) electrical modulator. 〈 /span 〉 〈 /p 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 3 ( 2021-03-10), p. 1567-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 3 ( 2021-03-10), p. 1567-
    Abstract: 〈 p 〉 This study has outlined the fiber bragg grating (FBG) temperature sensors signal processing for data communications by using OptiGrating simulation software. The reflectivity of the silica and sapphire fiber grating spectrum is reported against the grating wavelength for internal and external temperature variations. As well as apodized Gaussian reflectivity of the silica and sapphire fiber grating spectrum is simulated and clarified against the grating wavelength for high temperature variations. The temperature sensitivity of sapphire FBG nearly 0.11 pm/ 〈 sup 〉 0 〈 /sup 〉 C, where its value is three times higher than silica FBG. It is observed that silica and Sapphire FBG sensors were tested up to 1000 〈 sup 〉 0 〈 /sup 〉 C by using Gaussian apodization type, side lobes in reflectivity spectrum are totally suppressed. 〈 /p 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 3 ( 2021-03-10), p. 1575-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 3 ( 2021-03-10), p. 1575-
    Abstract: 〈 p 〉 〈 span id="docs-internal-guid-52da184f-7fff-738a-f0e7-e8dd779e097b" 〉 〈 span 〉 This paper has presented high modulated soliton power transmission interaction with optical fiber and optical wireless communication channels at flow rate of 40 Gbps and 20 km link range. The proposed modulation schemes are continuous phase frequency shift keying (CPFSK), Quadrature amplitude modulation (QAM), differential phase shift keying (DPSK), frequency shift keying (FSK), pulse amplitude modulation (PAM), minimum shift keying (MSK), and optical quadrature phase shift keying (OQPSK). CPFSK has presented better performance than other proposed modulation schemes for both optical fiber and optical wireless communication channels. The enhancement of optical signal/noise ratio at fiber/wireless channel, received electrical power and signal/noise ratio at optical receiver with increase of bits per symbol for different proposed modulation schemes except for CPFSK scheme. Therefore it is evident that CPFSK modulation scheme is more efficient and better performance than other modulation schemes for different communication channels. The obtained results are simulated with optisystem program version 13. 〈 /span 〉 〈 /span 〉 〈 /p 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 2 ( 2021-02-01), p. 978-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 2 ( 2021-02-01), p. 978-
    Abstract: 〈 span 〉 The work has presented duobinary modulation and predistortion techniques for the radio over fiber system enhancement for achieving security level. Duobinary modulation technique has more compact modulated spectral linewidth with standard non return to zero modulation code. Different NRZ/RZ rectangle shape employed that are namely exponential rectangle shape (ERS), and Gaussian rectangle shape (GRS) for different transmission bit rates. Switching bias voltage, and switching RF voltage based LiNbO 〈 sub 〉 3 〈 /sub 〉 modulator are changed to measure the performance parameters of the radio over fiber (RoF) system. Predistortion technique improves the linearity of transmitter amplifiers and it is considered as a power efficiency technique. The optimum values of the Q-factor, data error rate (BER), electrical power, signal gain, noise figure, and light signal/noise ratio are achieved with 8 Volt for both switching biases/switching RF signal at 100 GHz. Signal quality/BER and electrical power after the receiver enhancement ratio by using this technique at different RF signal frequencies.  〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 2 ( 2021-02-01), p. 957-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 21, No. 2 ( 2021-02-01), p. 957-
    Abstract: 〈 p 〉 〈 span 〉 The paper outlines the simulation of various pulse generators for the enhancement of optical fiber access transmission networks within flow rate of 10 Gbps and transmission range of 100 km. The pulse generators are gaussian, hyperbolic secant, triangle, sine, raised cosine in the transmission stage. Proposed pulse generators are mixed with both electro-absorption modulator (EAM) and mach-zehnder modulator (MZM) for efficient transmission. We have compared the max.  the quality factor with using proposed pulse generators against nonreturn to zero (NRZ) return to zero (RZ) pulse generators in the previous research works for different bit sequences. The signal power amplitude is tested for both optical fiber and PIN photodetector optical time-domain visualizer and RF spectrum analyzer by using in the optimum cases for different bit sequence. It is observed that proposed pulse generators/EAM have presented an efficient increase in Q-factor value compared with proposed pulse generators/MZM for different bit sequences. 〈 /span 〉 〈 /p 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2016
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 2, No. 2 ( 2016-05-01), p. 452-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 2, No. 2 ( 2016-05-01), p. 452-
    Abstract: Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2016
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2022
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 28, No. 3 ( 2022-12-01), p. 1817-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 28, No. 3 ( 2022-12-01), p. 1817-
    Abstract: The  〈 span 〉 amount of interest in digital images is growing because of the advent of the World Wide Web. Many different industries are making use of digital images today, including medicine, design, journalism, education, and more. Images can be stored and retrieved using a variety of techniques and methods. Nevertheless, the majority of those engines are dependent on Meta data (key-words, descriptions, tags). Although efficient, costly, and able to target keywords and tags with each image, and these engines have their shortcomings. Though it may be possible to use a filtering system to give more accurate results, there are additional issues. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...