cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 49 Documents
Search results for , issue "Vol 10, No 1: April 2018" : 49 Documents clear
Cyber Threat Intelligence – Issue and Challenges Md Sahrom Abu; Siti Rahayu Selamat; Aswami Ariffin; Robiah Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp371-379

Abstract

Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Availability Prediction Methods for Terrestrial Free-Space-Optical Link Under Tropical Climate Ahmed Basahel; Md Rafiqul Islam; Mohamed Habaebi; Suriza Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp224-229

Abstract

Free-space optical (FSO) links provide high speed point-to-point wireless communication, but its availability can easily be affected by weather conditions. In heavy rainfall regions, FSO links are relatively sensitive to rain. Availability prediction of FSO is indispensable part, especially in tropical areas. In this paper, methods to predict FSO link availability are presented. The overall performance of FSO link is described in terms of the availability that can be achieved over anticipated link distance. The availability prediction methods demonstrated for an FSO link ranges up to 5 km. The availability prediction methods are based on long-term statistics of atmospheric attenuations and FSO link budget under tropical climate condition. In tropical regions, for a terrestrial FSO link, carrier class availability can be achieved over a few hundred meters only; whereas enterprise class availability can be achieved over a few kilometers link distances. 
Sizing and Cost Analysis of Self-Consumed Solar PV DC System Compared with AC System for Residential House T. M. N. T. Mansur; N. H. Baharudin; R. Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp10-18

Abstract

The use of solar photovoltaic (PV) system has grown significantly in Malaysia after Renewable Energy Act has been gazetted in 2011.The objective of this paper is to highlight the technical and economic analysis of solar PV DC system to generate enough energy for residential customer group that consumed 200 kWh per month so that they are less dependent on energy from the utility grid. The results are then compared to the solar PV AC system with similar load setup. The methodology involves gathering solar energy resource, configuring daily load demand, sizing PV array, battery bank and inverter and lastly simulation of the design system by using Homer software.  Based on Homer simulation, the solar PV AC system required slightly larger PV array sizes than the solar PV DC system to compensate losses due to the inverter efficiency which is not counted in DC system.Moreover, the solar PV AC system is almost 8.0% more expensive with 6% higher COE than the solar PV DC system due to the present of inverter.Lastly, both systems will benefit from reduction of energy consumed up to 2,434 kWh annually and to the environmental aspect, will avoid 1.7 tons of CO2 releases into the atmosphere.
Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced Huda Adibah Mohd Ramli; Ani Liza Asnawi; Farah Nadia Mohd Isa; Amelia Wong Azman; Mohamad ‘Ismat Hafizi Mansor
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp330-336

Abstract

Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Design and Fabrication of an Intelligent Walking Staff for Visually Impaired Subjects Rashidah Funke Olanrewaju; Muhammad Luqman Azzaki Mohd Radzi; Mariam Rehab; Fawwaz Eniola Fajingbesi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp266-270

Abstract

The joy we derive from our ability to commute and interact freely with the world as a result of our possession of sight with the naked eyes are enormous however the Visually impaired people find great difficulty in moving around freely without a human guide, especially in a new terrain. This research reports the design and fabrication process of an intelligent walking staff (iWalk) specially designed for the visually disabled individuals to argument their loss of sight, improve and ease their navigation. iWalk was designed around water and ultrasonic sensors to detect obstacles and water ahead. iWalk also has a wireless RF remote control buzzer for localization and detection in case it gets misplaced. The proposed system operability and efficiency was adequately tested using physical dataset composed of randomized locations with random obstacles and water. The proposed algorithm achieves an overall efficiency of 90% detection rate for water and ultrasonic sensor and 85.75% for the RF wireless remote control.
Task Scheduling in Heterogeneous Multiprocessor Environments – An Efficient ACO-Based Approach Nekiesha Edward; Jeffrey Elcock
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp320-329

Abstract

In heterogeneous computing environments, finding optimized solutions continues to be one of the most important and yet, very challenging problems. Task scheduling in such environments is NP-hard, so efficient mapping of tasks to the processors remains one of the most critical issues to be tackled. For several types of applications, the task scheduling problem is crucial, and across the literature, a number of algorithms with several different approaches have been proposed. One such effective approach is known as Ant Colony Optimization (ACO). This popular optimization technique is inspired by the capabilities of ant colonies to find the shortest paths between their nests and food sources. Consequently, we propose an ACO-based algorithm, called rACS, as a solution to the task scheduling problem. Our algorithm utilizes pheromone and a priority-based heuristic, known as the upward rank value, as well as an insertion-based policy and a pheromone aging mechanism to guide the ants to high quality solutions. To evaluate the performance of our algorithm, we compared our algorithm with the ACS algorithm and the ACO-TMS algorithm using randomly generated directed acyclic graphs (DAGs). The simulation results indicated that our algorithm experienced comparable or even better performance, than the selected algorithms.
Type-2 Fuzzy Logic in Pair Formation Lakshmi Shrinivasan; J. l R. Rao
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp94-99

Abstract

This paper gives an overview of Type-2 Fuzzy sets (T2FSs) and Type-2 fuzzy Logic system (T2FLS) considering one aviation scenario. The existing type-1 Fuzzy system has limited capability to handle the uncertainty directly. In order to overcome the limitations of Type-1 fuzzy Logic system (T1FLS), a next level of fuzzy set is introduced, that is known as T2FSs. Here we will discuss about: Type-2 fuzzy sets, type-2 membership functions, inference engine, type reduction and defuzzification. Pair formation is the undertaken aviation scenario which is very critical in a fighting situation. Crisp data are taken by the sensors of aircraft and with the techniques of data fusion, a constant decision is passed whether two aircrafts can achieve pair formation or not. Experiments are evaluated and performance is compared with ground truth and existing T1FLS, which proves better in terms of decision making while a certain amount of uncertainty is present.
AWGN and Rayleigh Fading Behavior of the Wireless Decode-and-Forward Relay Channel with Arbitrary Time and Power Allocation Muhammad Zarol Fitri Khairol Fauz; Elsheikh Mohamed Ahmed Elsheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp248-257

Abstract

Relying has in use for decades to tackle some of the challenges of wireless communication such as extending transmitting distance, transmitting over rough terrains. Diversity achieved through relaying is also a means to combat the random behavior of fading channels. In this work, effect of time and power allocation on relay performance is studied. The channel considered is the three-node channel with half-duplex constraint on the relay. The relaying technique assumed is decode-and-forward. Mutual information is used as the criteria to measure channel performance. There is half-duplex constraint and a total transmission power constraint on the relay source node and the relay node. A model is established to analyze the mutual information as a function of time allocation and power allocation in the case of AWGN regime. The model is extended to the Rayleigh fading scenario. In both AWGN and Rayleigh fading, results showed that the importance of relaying is more apparent when more resources are allocated to the relay. It was also shown that quality of the source to destination link has direct impact on the decision to relay or not to relay. Relatively good source to destination channel makes relaying less useful. The opposite is true for the other two links, namely the source to relay channel and the relay to destination channel. When these two channels are good, relaying becomes advantageous. When applied to cellular systems, we concluded that relaying is more beneficial to battery-operated mobile nodes than to base stations.
Swarm Based Cross Layer Optimization Protocol for WMSN DeepaliParag Adhyapak; Sridharan Bhavani; Aparna Pradeep Laturkar
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp302-308

Abstract

Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Pornography Addiction Detection based on Neurophysiological Computational Approach Norhaslinda Kamaruddin; Abdul Wahab Abdul Rahman; Dini Handiyani
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp138-145

Abstract

The rise of Internet access, social media and availability of smart phones intensify the epidemic of pornography addiction especially among younger teenagers. Such scenario may offer many side effects to the individual such as alteration of the behavior, changes in moral value and rejection to normal community convention. Hence, it is imperative to detect pornography addiction as early as possible. In this paper, a method of using brain signal from frontal area captured using EEG is proposed to detect whether the participant may have porn addiction or otherwise. It acts as a complementary approach to common psychological questionnaire. Experimental results show that the addicted participants had low alpha waves activity in the frontal brain region compared to non-addicted participants. It can be observed using power spectra computed using Low Resolution Electromagnetic Tomography (LORETA). The theta band also show there is disparity between addicted and non-addicted. However, the distinction is not as obvious as alpha band. Subsequently, more work need to be conducted to further test the validity of the hypothesis. It is envisaged that with more participants and further investigation, the proposed method will be the initial step to groundbreaking way of understanding the way porn addiction affects the brain.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue