2018 2nd International Conference on Electrical Engineering and Informatics (ICon EEI), 2018
This paper proposes features that are extracted solely from Freeman Chain Code (FCC) for handwrit... more This paper proposes features that are extracted solely from Freeman Chain Code (FCC) for handwritten character recognition purpose. Targeting alphanumeric Roman characters, its structure constructed from the chain code is disassembled into segments and landmarks, before each segment is traced to detect predefined line shapes. Two types of feature vectors, sequentially connected shape identifiers and concurrently used shape occurrence counts and size ratios along with landmark positions, are produced from the tracing. Effectiveness of the proposed feature vectors are tested with Hidden Markov Model (HMM) for sequential, while concurrent feature vector is with Artificial Neural Network (ANN), showing mediocre results where only digit character class achieves the highest 80% classification accuracy.
ARPN journal of engineering and applied sciences, 2015
Chain code is used as representation for an image in form of sequence of directional codes along ... more Chain code is used as representation for an image in form of sequence of directional codes along the border or structure line. Issue arises during its extraction when the line has branches and the sequence must be continuous; no restarting at any junction is allowed. This paper presents a chain codes extraction of Thinned Binary Image (TBI) from upper-case Centre of Excellent for Document Analysis and Recognition (CEDAR) dataset using Meta-heuristic techniques. There are six methods in Meta-heuristic techniques that called Differential Evolution (DE), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Ant-Colony Optimization (ACO), Harmony Search Algorithm (HSA) and Simulated Annealing (SA). In the feature extraction, Freeman Chain Code (FCC) was used as data representation that uses 8neighbourhood directions. However, the FCC representation is dependent on the route length and branches of the characters’ node. These six methods are used to find the shortest route that co...
Chain code is used as representation for an image in form of sequence of directional codes along ... more Chain code is used as representation for an image in form of sequence of directional codes along the border or structure line. Issue arises during its extraction when the line has branches and the sequence must be continuous; no restarting at any junction is allowed. To find the shortest route possible covering all edges in the image to produce the shortest chain code, optimization using simulated annealing is performed. The overall resulting chain code length is shorter compared with by using harmony search algorithm for searching.
This paper describes a proposed algorithm for recognition of Korean Letters to the Latin language... more This paper describes a proposed algorithm for recognition of Korean Letters to the Latin language using Principle Component Analysis (PCA) and Back Propagation-Neural Network (BP-NN). The proposed algorithm uses input in the form of image of Korean letters in original 65×65 pixels that is taken from itself. Then, it will be done some processes namely, pre-processing converts image pixel into binary image 15×15 pixels. Further, it transforms from image Red Green Blue (RGB) into binary. Lastly, noise removal from the image. The image will be extracted to produce the image feature. The feature should be processed firstly using Principle Components Analysis (PCA). PCA is used to reduce dimension of image feature before entering classification stage. Classification stage uses a method that called BP-NN. Architecture of ANN uses three hidden layers. Each layer consists of 20, 20 and 5 neurons, and 1 neuron output. The proposed algorithm uses data sampling that is Korean vowels, are obtain...
This review aimed to summarize the relevant literature and data regarding the pathophysiology of ... more This review aimed to summarize the relevant literature and data regarding the pathophysiology of glaucoma, definition of OPP, relationship between OPP and the development and progression of glaucoma, as well as key factors that influence OPP. Methods and materials A comprehensive literature search on PubMed was performed for studies published up to October 2015 with keywords 'ocular perfusion pressure', 'glaucoma', 'autonomic dysregulation', 'intraocular pressure', 'risk', 'progression', 'severity', 'circadian rhythm', 'body posture', 'anti-hypertensive medications', and 'anti-glaucomatous medications'. Combinations of these terms were used as well. Selected papers were then reviewed thoroughly and evidence was summarized.
International Journal of Electrical, Energy and Power System Engineering, 2020
Nowadays development of technology is growing fast, especially Android Operating System (OS). And... more Nowadays development of technology is growing fast, especially Android Operating System (OS). Android is a technology that can help human to improve their works both quality and quantity, e.g. making decisions. This study discusses the application of decision support systems to select university. Many students are still confused to select the best university for them. Hence, this application aims to assist students for making decisions using weighted product (WP) method. It exploits some criteria namely, distance, university accreditation and number of lecturers. The research methodology are used namely problem analysis, analysis both hardware and software requirements, design system, implementation and testing. Ultimately, application can be utilized. This application is built on Android Studio and Java Development Kit. It is implemented in Universities in Riau. This application can help students to choose the best university quickly and accurately.
Pocket Switched Network (PSN) is a branch of Delay Tolerant Network (DTN) which is intended to wo... more Pocket Switched Network (PSN) is a branch of Delay Tolerant Network (DTN) which is intended to work in a challenged network. Challenged network is network with lack of infrastructure such as disaster area. As such, the network has intermittent connectivity. PSN provides a new paradigm to distribute messages in the network by taking advantage of roaming nodes from one place to another. In this paper, network performances of eight PSN routing protocols are investigated namely, First Contact, Direct Delivery, Epidemic, PRotocol using History of Encounter and Transitivity (PRoPHET), Spray and Wait, Binary Spray and Wait, Fuzzy Spray, Adaptive Fuzzy Spray and Wait. The performance metrics are packet delivery ratio, overhead ratio and average latency. Opportunistic Network Environment (ONE) simulator is used to evaluate the network performance. Experiments show that Epidemic has the best performance in term of message delivery ratio, but it has the highest overhead ratio. Direct Delivery ...
to 10) described by either two-level systems (2LS) or three-level systems (3LS). The calculated s... more to 10) described by either two-level systems (2LS) or three-level systems (3LS). The calculated secondorder correlation function g 2 (t) for this "waveguide QED" system has rich structure that is sensitive to the frequency of the incident photons and the separation between the qubits, arising from the interference among photons scattered multiple times by the qubits. In the multiple 2LS case [1], transmitted and reflected photons can both be bunched initially and then oscillate between bunched and anti-bunched for a long time interval that increases as the number of impurities, N, increases (up to 10). For 3LS qubits, when operating at the peak of electromagnetically induced transparency (EIT), the N=2 case generates bunched photons persisting for a long time, comparable to that in the N=10 2LS case. To probe the interplay between the time-delay inherent in the 3LS under EIT conditions and the 2LS-produced correlations, we study the hybrid structures 3LS-2LS-3LS and 2LS-3LS-2LS.
Store-Carry-Forward (SCF) approach provides a new paradigm to route messages in Pocket Switched N... more Store-Carry-Forward (SCF) approach provides a new paradigm to route messages in Pocket Switched Network (PSN). In this approach, a router node will store and carry the messages while roaming from one place to another place. Whenever the node meets a destination node, the routing messages will be immediately forwarded to the destination node. Unfortunately, this approach is hampered by the lack of infrastructure in the network, which directly effects on the quality of interconnection among nodes. Therefore, end-to-end connection between the source node and the destination node is difficult to be obtained. Many approaches have been proposed to overcome this problem. Indeed, several routing protocols have also considered these approaches for distributing their routing messages. However, a paper survey that comprehensively summarizes the proposed solutions are difficult to be found in the literature. This leads not easy to understand problems, solutions and future works for these approaches in the network. This paper presents a comprehensive survey to track the development of Spray-and-Wait (SNW) routing protocol, one of the most popular SCF-based routing protocol in PSN.
International Journal of Computational Science and Engineering, 2018
In the present paper, we suggest an implementation of an automatic understanding system of the st... more In the present paper, we suggest an implementation of an automatic understanding system of the statement in human-machine communication. The architecture we adopt is based on a stochastic approach that assumes that the understanding of a statement is nothing but a simple theme identification process. Therefore, we present a new theme identification method based on a documentary retrieval technique which is text (document) classification (Bawakid and Oussalah, 2010). The method we suggest was validated on a basic platform that gives information related to university schooling management (querying a student database), taking into consideration a textual input in French. This method has achieved a theme identification rate of 95% and a correct utterance understanding rate of about 91.66%.
2018 2nd International Conference on Electrical Engineering and Informatics (ICon EEI), 2018
This paper proposes features that are extracted solely from Freeman Chain Code (FCC) for handwrit... more This paper proposes features that are extracted solely from Freeman Chain Code (FCC) for handwritten character recognition purpose. Targeting alphanumeric Roman characters, its structure constructed from the chain code is disassembled into segments and landmarks, before each segment is traced to detect predefined line shapes. Two types of feature vectors, sequentially connected shape identifiers and concurrently used shape occurrence counts and size ratios along with landmark positions, are produced from the tracing. Effectiveness of the proposed feature vectors are tested with Hidden Markov Model (HMM) for sequential, while concurrent feature vector is with Artificial Neural Network (ANN), showing mediocre results where only digit character class achieves the highest 80% classification accuracy.
ARPN journal of engineering and applied sciences, 2015
Chain code is used as representation for an image in form of sequence of directional codes along ... more Chain code is used as representation for an image in form of sequence of directional codes along the border or structure line. Issue arises during its extraction when the line has branches and the sequence must be continuous; no restarting at any junction is allowed. This paper presents a chain codes extraction of Thinned Binary Image (TBI) from upper-case Centre of Excellent for Document Analysis and Recognition (CEDAR) dataset using Meta-heuristic techniques. There are six methods in Meta-heuristic techniques that called Differential Evolution (DE), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Ant-Colony Optimization (ACO), Harmony Search Algorithm (HSA) and Simulated Annealing (SA). In the feature extraction, Freeman Chain Code (FCC) was used as data representation that uses 8neighbourhood directions. However, the FCC representation is dependent on the route length and branches of the characters’ node. These six methods are used to find the shortest route that co...
Chain code is used as representation for an image in form of sequence of directional codes along ... more Chain code is used as representation for an image in form of sequence of directional codes along the border or structure line. Issue arises during its extraction when the line has branches and the sequence must be continuous; no restarting at any junction is allowed. To find the shortest route possible covering all edges in the image to produce the shortest chain code, optimization using simulated annealing is performed. The overall resulting chain code length is shorter compared with by using harmony search algorithm for searching.
This paper describes a proposed algorithm for recognition of Korean Letters to the Latin language... more This paper describes a proposed algorithm for recognition of Korean Letters to the Latin language using Principle Component Analysis (PCA) and Back Propagation-Neural Network (BP-NN). The proposed algorithm uses input in the form of image of Korean letters in original 65×65 pixels that is taken from itself. Then, it will be done some processes namely, pre-processing converts image pixel into binary image 15×15 pixels. Further, it transforms from image Red Green Blue (RGB) into binary. Lastly, noise removal from the image. The image will be extracted to produce the image feature. The feature should be processed firstly using Principle Components Analysis (PCA). PCA is used to reduce dimension of image feature before entering classification stage. Classification stage uses a method that called BP-NN. Architecture of ANN uses three hidden layers. Each layer consists of 20, 20 and 5 neurons, and 1 neuron output. The proposed algorithm uses data sampling that is Korean vowels, are obtain...
This review aimed to summarize the relevant literature and data regarding the pathophysiology of ... more This review aimed to summarize the relevant literature and data regarding the pathophysiology of glaucoma, definition of OPP, relationship between OPP and the development and progression of glaucoma, as well as key factors that influence OPP. Methods and materials A comprehensive literature search on PubMed was performed for studies published up to October 2015 with keywords 'ocular perfusion pressure', 'glaucoma', 'autonomic dysregulation', 'intraocular pressure', 'risk', 'progression', 'severity', 'circadian rhythm', 'body posture', 'anti-hypertensive medications', and 'anti-glaucomatous medications'. Combinations of these terms were used as well. Selected papers were then reviewed thoroughly and evidence was summarized.
International Journal of Electrical, Energy and Power System Engineering, 2020
Nowadays development of technology is growing fast, especially Android Operating System (OS). And... more Nowadays development of technology is growing fast, especially Android Operating System (OS). Android is a technology that can help human to improve their works both quality and quantity, e.g. making decisions. This study discusses the application of decision support systems to select university. Many students are still confused to select the best university for them. Hence, this application aims to assist students for making decisions using weighted product (WP) method. It exploits some criteria namely, distance, university accreditation and number of lecturers. The research methodology are used namely problem analysis, analysis both hardware and software requirements, design system, implementation and testing. Ultimately, application can be utilized. This application is built on Android Studio and Java Development Kit. It is implemented in Universities in Riau. This application can help students to choose the best university quickly and accurately.
Pocket Switched Network (PSN) is a branch of Delay Tolerant Network (DTN) which is intended to wo... more Pocket Switched Network (PSN) is a branch of Delay Tolerant Network (DTN) which is intended to work in a challenged network. Challenged network is network with lack of infrastructure such as disaster area. As such, the network has intermittent connectivity. PSN provides a new paradigm to distribute messages in the network by taking advantage of roaming nodes from one place to another. In this paper, network performances of eight PSN routing protocols are investigated namely, First Contact, Direct Delivery, Epidemic, PRotocol using History of Encounter and Transitivity (PRoPHET), Spray and Wait, Binary Spray and Wait, Fuzzy Spray, Adaptive Fuzzy Spray and Wait. The performance metrics are packet delivery ratio, overhead ratio and average latency. Opportunistic Network Environment (ONE) simulator is used to evaluate the network performance. Experiments show that Epidemic has the best performance in term of message delivery ratio, but it has the highest overhead ratio. Direct Delivery ...
to 10) described by either two-level systems (2LS) or three-level systems (3LS). The calculated s... more to 10) described by either two-level systems (2LS) or three-level systems (3LS). The calculated secondorder correlation function g 2 (t) for this "waveguide QED" system has rich structure that is sensitive to the frequency of the incident photons and the separation between the qubits, arising from the interference among photons scattered multiple times by the qubits. In the multiple 2LS case [1], transmitted and reflected photons can both be bunched initially and then oscillate between bunched and anti-bunched for a long time interval that increases as the number of impurities, N, increases (up to 10). For 3LS qubits, when operating at the peak of electromagnetically induced transparency (EIT), the N=2 case generates bunched photons persisting for a long time, comparable to that in the N=10 2LS case. To probe the interplay between the time-delay inherent in the 3LS under EIT conditions and the 2LS-produced correlations, we study the hybrid structures 3LS-2LS-3LS and 2LS-3LS-2LS.
Store-Carry-Forward (SCF) approach provides a new paradigm to route messages in Pocket Switched N... more Store-Carry-Forward (SCF) approach provides a new paradigm to route messages in Pocket Switched Network (PSN). In this approach, a router node will store and carry the messages while roaming from one place to another place. Whenever the node meets a destination node, the routing messages will be immediately forwarded to the destination node. Unfortunately, this approach is hampered by the lack of infrastructure in the network, which directly effects on the quality of interconnection among nodes. Therefore, end-to-end connection between the source node and the destination node is difficult to be obtained. Many approaches have been proposed to overcome this problem. Indeed, several routing protocols have also considered these approaches for distributing their routing messages. However, a paper survey that comprehensively summarizes the proposed solutions are difficult to be found in the literature. This leads not easy to understand problems, solutions and future works for these approaches in the network. This paper presents a comprehensive survey to track the development of Spray-and-Wait (SNW) routing protocol, one of the most popular SCF-based routing protocol in PSN.
International Journal of Computational Science and Engineering, 2018
In the present paper, we suggest an implementation of an automatic understanding system of the st... more In the present paper, we suggest an implementation of an automatic understanding system of the statement in human-machine communication. The architecture we adopt is based on a stochastic approach that assumes that the understanding of a statement is nothing but a simple theme identification process. Therefore, we present a new theme identification method based on a documentary retrieval technique which is text (document) classification (Bawakid and Oussalah, 2010). The method we suggest was validated on a basic platform that gives information related to university schooling management (querying a student database), taking into consideration a textual input in French. This method has achieved a theme identification rate of 95% and a correct utterance understanding rate of about 91.66%.
Uploads
Papers by Deni yulianti