Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2016
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 2, No. 2 ( 2016-05-01), p. 452-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 2, No. 2 ( 2016-05-01), p. 452-
    Abstract: Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2016
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  International Journal of Public Health Science (IJPHS) Vol. 10, No. 4 ( 2021-12-01), p. 906-
    In: International Journal of Public Health Science (IJPHS), Institute of Advanced Engineering and Science, Vol. 10, No. 4 ( 2021-12-01), p. 906-
    Abstract: To resolve the health crisis caused by coronavirus disease (COVID-19), the Indonesian government is trying to implement a mandatory vaccination policy for all Indonesians. It was just that the success of this policy is largely determined by acceptance preceded by the public intention to be vaccinated, in which public perception plays a major role in determining intention. This research, therefore, aimed to evaluate and examine the role of perceived risk, benefit, and susceptibility on the COVID-19 vaccination intention. By using a cross-sectional approach, this quantitative study involved 98 participating respondents who were determined by the purposive sampling method. The results of this study finally found and proven that perceived risk (coefficient β=0.290 and T-value 2.456 with p-value=0.011), perceived benefits (β= 0.394 and T-value 3.873 with p-value=0.000), and perceived susceptibility (β=0.233 and T-value 3,230 with p-value=0.001) had a positive and significant effect on the COVID-19 vaccination intention.
    Type of Medium: Online Resource
    ISSN: 2620-4126 , 2252-8806
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    detail.hit.zdb_id: 2710781-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2022
    In:  International Journal of Public Health Science (IJPHS) Vol. 11, No. 3 ( 2022-09-01), p. 967-
    In: International Journal of Public Health Science (IJPHS), Institute of Advanced Engineering and Science, Vol. 11, No. 3 ( 2022-09-01), p. 967-
    Abstract: Departing from the mandatory vaccination had been debated and received a lot of rejection which has caused intense emotions. In this study, the authors tried to evaluate the mandatory regulation of coronavirus disease 2019 (COVID-19) vaccination from a human rights and utilitarianism perspective. By conducting normative research method, this study revealed that indeed the obligation that tends to be coercive for COVID-19 vaccination seems to violate individual human rights which each individual has the right to decide for themselves whether they want to participate in the program or not without coercion. However, mandatory vaccination is still justified, from a human rights perspective, to protect other people's rights not to be infected with infectious diseases. This is also in line with a utilitarian perspective that departs from the argument that vaccines provide a myriad of benefits for many people in the midst of a pandemic, therefore to create benefits for the majority of society, the mandatory COVID-19 vaccination is something that is needed. Even if necessary, both sanctions and punishments can be justified in utilitarianism to achieve the greatest utility for the society.
    Type of Medium: Online Resource
    ISSN: 2620-4126 , 2252-8806
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2022
    detail.hit.zdb_id: 2710781-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2022
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 28, No. 1 ( 2022-10-01), p. 183-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 28, No. 1 ( 2022-10-01), p. 183-
    Abstract: Deep learning models on the same database have varied accuracy ratings; as such, additional parameters, such as pre-processing, data augmentation and transfer learning, can influence the models’ capacity to obtain higher accuracy. In this paper, a fully automated model is designed using deep learning algorithm to capture images from patients and pre-process, segment and classify the intensity of cancer spread. In the first pre-processing step, pectoral muscles are removed from the input images, which are then downsized. The removal of pectoral muscles after identification may become crucial in classification systems. Finally, the pectoral musclesaredeleted from the picture by using an area expanding segmentation. All mammograms are downsized to reduce processing time. Each stage of the fully automated model uses an optimisation approach to obtain highaccuracy results at respective stages. Simulation is conducted to test the efficacy of the model against state-of-art models, and the proposed fully automated model is thoroughly investigated. For a more accurate comparison, we include the model in our analysis. In a nutshell, this work offers a wealth of information as well as review and discussion of the experimental conditions used by studies on classifying breast cancer images.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2022
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2023
    In:  International Journal of Electrical and Computer Engineering (IJECE) Vol. 13, No. 1 ( 2023-02-01), p. 335-
    In: International Journal of Electrical and Computer Engineering (IJECE), Institute of Advanced Engineering and Science, Vol. 13, No. 1 ( 2023-02-01), p. 335-
    Abstract: 〈 span lang="EN-US" 〉 The advancement of systems with the capacity to compress audio signals and simultaneously secure is a highly attractive research subject. This is because of the need to enhance storage usage and speed up the transmission of data, as well as securing the transmission of sensitive signals over limited and insecure communication channels. Thus, many researchers have studied and produced different systems, either to compress or encrypt audio data using different algorithms and methods, all of which suffer from certain issues including high time consumption or complex calculations. This paper proposes a compressing sensing-based system that compresses audio signals and simultaneously provides an encryption system. The audio signal is segmented into small matrices of samples and then multiplied by a non-square sensing matrix generated by a Gaussian random generator. The reconstruction process is carried out by solving a linear system using the pseudoinverse of Moore-Penrose. The statistical analysis results obtaining from implementing different types and sizes of audio signals prove that the proposed system succeeds in compressing the audio signals with a ratio reaching 28% of real size and reconstructing the signal with a correlation metric between 0.98 and 0.99. It also scores very good results in the normalized mean square error (MSE), peak signal-to-noise ratio metrics (PSNR), and the structural similarity index (SSIM), as well as giving the signal a high level of security. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2722-2578 , 2088-8708
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2023
    detail.hit.zdb_id: 2667127-X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  Indonesian Journal of Electrical Engineering and Computer Science Vol. 22, No. 3 ( 2021-06-01), p. 1777-
    In: Indonesian Journal of Electrical Engineering and Computer Science, Institute of Advanced Engineering and Science, Vol. 22, No. 3 ( 2021-06-01), p. 1777-
    Abstract: One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least significant bit (LSB) method in the spatial and transform domains using discrete wavelet transform. The audio files of the message and the cover are in *.wav format. The experimental results showed the success of the transformation in concealing audio secret messages, as well the remarkability of the stego signal quality in both techniques. A peak signal-to-noise ratio peak signal-to-noise ratio (PSNR) scored (20-26) dB with wavelet and (81-112) dB with LSB for cover file size 4.96 MB and structural similarity index metric structural similarity index metric (SSIM) has been used to measure the signal quality which gave 1 with LSB while wavelet was (0.9-1), which is satisfactory in all experimented signals with low time consumption. This work also used these metrics to compare the implementation of LSB and WAV.
    Type of Medium: Online Resource
    ISSN: 2502-4760 , 2502-4752
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2018
    In:  International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 6, No. 2 ( 2018-05-28), p. 111-
    In: International Journal of Reconfigurable and Embedded Systems (IJRES), Institute of Advanced Engineering and Science, Vol. 6, No. 2 ( 2018-05-28), p. 111-
    Abstract: 〈 span style="font-size: 9pt; font-family: 'Times New Roman', serif;" 〉 This is a novel research paper provides an optimal solution for object tracking using visual servoing control system with programmable gate array technology to realize the visual controller. The controller takes in account the robot dynamics to generate the joint torques directly for performing the tasks related to object tracking using visual servoing. Also, the notion of dynamic perceptibility provides the capability of the designed system to track desired objects employing direct visual servoing technique. This idea is assimilated in the suggested controller and realized in the programmable gate array. Additionally, this paper grants an ideal control framework for direct visual servoing robots that incorporates dynamic perceptibility features. With the aim of evaluating the proposed FPGA based architecture, the control algorithm is applied to Hardware-in-the-loop simulation (HIL) set up of three degrees of freedom rigid robotic manipulator with three links. Furthermore, different investigations are performed to demonstrate the behavior of the proposed system when a trajectory adjacent to a singularity is attained. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2089-4864 , 2089-4864
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2018
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2021
    In:  IAES International Journal of Robotics and Automation (IJRA) Vol. 10, No. 3 ( 2021-09-01), p. 161-
    In: IAES International Journal of Robotics and Automation (IJRA), Institute of Advanced Engineering and Science, Vol. 10, No. 3 ( 2021-09-01), p. 161-
    Abstract: 〈 p 〉 Nowadays, the development of computer vision technology help to overcome track and identify humans within a location in the complex environment through mobile robots, which gives the motivation to presents a vision-based approach to a mobile security robot. The proposed system utilizes a wireless camera to detect the objects in the field of robot view. Principle component analysis (PCA) algorithm and filters are used to implement and demonstrate the process of the images. This gives the designed system the ability to recognize objects independently from current light conditions. Frame tracking in the images uses an attention system to get an estimate of the position of a person. This estimate helps the applied camera to identify objects with changing background lighting conditions such as a fire inside a building. By using this estimate, the applied camera could identify objects with changing background lighting conditions such as a fire inside premises. The system has been tested using the MATLAB environment, and the empirical performance explains the efficiency and strongness of the suggested device. 〈 /p 〉
    Type of Medium: Online Resource
    ISSN: 2722-2586 , 2089-4856
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2021
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2018
    In:  International Journal of Advances in Applied Sciences Vol. 7, No. 2 ( 2018-06-01), p. 191-
    In: International Journal of Advances in Applied Sciences, Institute of Advanced Engineering and Science, Vol. 7, No. 2 ( 2018-06-01), p. 191-
    Abstract: 〈 span lang="EN-US" 〉 Keeping time as base, a gadget has been proposed, where electrical accessories like Mobiles are charged within a fraction of minutes which is highly efficient and time saver as compared to the present time chargers which take nearly two hours to get fully charged. Objective of this project is to create a circuit which will be charged quickly and wireless. Wireless charging circuit works on the principle of inductive coupling. AC energy has been converted to DC energy through diode rectifier. Oscillator circuit produces high frequency passed by transmitter circuit to transmit magnetic field which is received by receiver circuit. A wireless charging concept with super capacitor will lead to faster charging and long operative life. Here super capacitor is used as a storage device. A Super capacitor has magnificent property, it can charge as well as discharge very quickly and linearly alike battery. The main difference between battery and super capacitor is specific energy, Super capacitor have 10-50 time less than battery. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2252-8814
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2018
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Institute of Advanced Engineering and Science ; 2023
    In:  International Journal of Electrical and Computer Engineering (IJECE) Vol. 13, No. 2 ( 2023-04-01), p. 1680-
    In: International Journal of Electrical and Computer Engineering (IJECE), Institute of Advanced Engineering and Science, Vol. 13, No. 2 ( 2023-04-01), p. 1680-
    Abstract: 〈 span lang="EN-US" 〉 The concept of knowledge management (KM) and organizational learning (OL) has been embraced by organizations to complement each other. Higher education institutions have embraced KM and OL as a means to improve organizational efficiency. This research explores the link between KM and OL. The target population included all the 432 academicians and administrators from 35 public universities in Iraq. The sampling was selected using a stratified random sampling technique. The correlation among the components of KM and OL was tested as well as the effect of KM components on OL. The findings were derived using smart partial least square. The findings showed that there is significant correlation between components of KM and components of OL. The regression analysis showed also that the effect of KM and its components; knowledge creation, knowledge sharing, knowledge storage, knowledge application and knowledge acquisition on OL are significant. These findings provide insights to universities management on strategies to implement KM practices that can align with OL practices to assure dynamic lifelong mechanisms for the basic daily activities such as teaching, learning, researching, and supervision. 〈 /span 〉
    Type of Medium: Online Resource
    ISSN: 2722-2578 , 2088-8708
    URL: Issue
    Language: Unknown
    Publisher: Institute of Advanced Engineering and Science
    Publication Date: 2023
    detail.hit.zdb_id: 2667127-X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages