cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 52 Documents
Search results for , issue "Vol 11, No 2: August 2018" : 52 Documents clear
Street Lighting System for Smart Cities Using Micro-Controllers Aaquib Parkar; Prashant Kumar Soori
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp567-576

Abstract

The main goal is to simulate different configurations of street lighting system using DIALux and optimize the energy consumption. Data of the existing road in the United Arab Emirates is considered for simulation. Simulation results are validated by building a hardware model. This is accomplished by using LED modules instead of traditional HPS bulbs which is connected to an Arduino to control different sensors. Photo resistors are used to automatically switch the lights ON or OFF depending on the light intensity. Ultrasonic sensors are used to detect motion of cars and pedestrians in order to switch 50% of the lights off if no motion is detected. The recorded data is monitored by a Raspberry Pi which acting as a monitoring device. Practical measurements were conducted at different points on the road selected and are compared with the simulation results.The main goal is to simulate different configurations of street lighting system using DIALux and optimize the energy consumption. Data of the existing road in the United Arab Emirates is considered for simulation. Simulation results are validated by building a hardware model. This is accomplished by using LED modules instead of traditional HPS bulbs which is connected to an Arduino to control different sensors. Photo resistors are used to automatically switch the lights ON or OFF depending on the light intensity. Ultrasonic sensors are used to detect motion of cars and pedestrians in order to switch 50% of the lights off if no motion is detected. The recorded data is monitored by a Raspberry Pi which acting as a monitoring device. Practical measurements were conducted at different points on the road selected and are compared with the simulation results.
Assessment Analytic Theoretical Framework Based on Learners’ Continuous Learning Improvement M. Hamiz; M. Bakri; Norhaslinda Kamaruddin; Azlinah Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp682-687

Abstract

Currently, university students are required to follow stringent curriculum structure regardless of their performance. Personalized learning is not being offered resulting the whole cohort must compy to a customized fixed curriculum design. This is because the designed curriculum does not take into account different students’ attainment. Furthermore, there is a mismatched between supply and demand of graduates’ skill sets to fulfil the requirement of industry. Due to these issues, employers face difficulties in finding suitable high-skilled worker which contributes to large number of unemployed graduates. Thus, a systematic intervention of students’ learning process is essential to construct informed and strategic responses in order to manage challenges and minimize skill mismatch, at the same time providing adequate fundamental knowledge. In this paper, an assessment analytics framework is proposed based on automated extracted skill sets from curriculum documents and individual performance to recommend adaptive learners’ learning system (ALLS). By preparing the graduates with the required industry skill sets, the graduates’ unemployment rate is envisaged to reduce.
K-Means Clustering and Genetic Algorithm to Solve Vehicle Routing Problem with Time Windows Problem Adyan Nur Alfiyatin; Wayan Firdaus Mahmudy; Yusuf Priyo Anggodo
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp462-468

Abstract

Distribution is an important aspect of industrial activity to serve customers on time with minimal operational cost. Therefore, it is necessary to design a quick and accurate distribution route. One of them can be design travel distribution route using the k-means method and genetic algorithms. This research will combine k-means method and genetic algorithm to solve VRPTW problem. K-means can do clustering properly and genetic algorithms can optimize the route. The proposed genetic algorithm employs initialize chromosome from the result of k-means and using replacement method of selection. Based on the comparison between genetic algorithm and hybrid k-means genetic algorithm proves that k-means genetic algorithm is a suitable combination method with relative low computation time, are the comparison between 2700 and 3900 seconds.
Analysis on the Impact of Renewable Energy to Power System Fault Level A. Z. Adnan; M. E. Yusoff; H. Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp652-657

Abstract

Distributed Generation is generation of electricity from renewable energy resources, located closer to the customers or loads. Installation of Distributed Generation could improve voltage and power quality, mitigate voltage sags, minimize transmission system congestion, and provide more affordable capacity for utilizing renewable energy resources. However, high penetration of Distributed Generation to the existing national grid system may contribute several impacts including fault level, as well as the performance of power system protection. Monitoring of fault level is important in power system protection in order to sustain the health of power system networks. This paper investigates the impact of installing Distributed Generation to power system fault level. Three-phase symmetrical fault is simulated and analyzed for various sizes of distributed generation in IEEE 30 bus system using Power System Simulation for Engineering (PSS/E) software.Distributed Generation is generation of electricity from renewable energy resources, located closer to the customers or loads. Installation of Distributed Generation could improve voltage and power quality, mitigate voltage sags, minimize transmission system congestion, and provide more affordable capacity for utilizing renewable energy resources. However, high penetration of Distributed Generation to the existing national grid system may contribute several impacts including fault level, as well as the performance of power system protection. Monitoring of fault level is important in power system protection in order to sustain the health of power system networks. This paper investigates the impact of installing Distributed Generation to power system fault level. Three-phase symmetrical fault is simulated and analyzed for various sizes of distributed generation in IEEE 30 bus system using Power System Simulation for Engineering (PSS/E) software.
Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography Raihan Sabirah Sabri; Roshidi Din; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp761-767

Abstract

In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The effectiveness of evaluation itself is mainly determined by the performance aspect or critera such as capacity, imperceptibility or security. The aim of this paper is to present a review on trends for existing performance metrics used in extraction schemes from a data hiding framework. This review is hoped to help future research in evaluating the performance of data hiding framework in general and the proposed extraction schemes in specific.
Multi-Agent based MapReduce Model for Efficient Utilization of System Resources Heena Kousar; B.R. Prasad Babu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp504-514

Abstract

Recently with increased adoption of big data, Internet of Things and sensor technology by various organization for provisioning smart intelligent services for various application uses. Data processing on real-time social media and sensor data is been a key area of research in recent times and these data are massive and continuous. Smart application using sensor and social media data can be classified into three class: 1) online processing of streaming data; 2) online processing of historical data; and 3) hybrid processing of both. The existing model are designed considering stream or batch processing. For provisioning real-time processing MapReduce framework using Hadoop framework is considered by state-of-art technique for data inflow forecasting. However, the Hadoop based forecasting model are not efficient in fully utilizing system resource. Agent based MapReduce forecasting model is adopted by state-of-art technique to utilize system efficiently. However, they incurs high computation overhead, thus increase cost of computing cost. To overcome this work present an agent based Data Inflow Forecasting (DIF) model for both stream and non-stream (historical) data by using Multivariate Gaussian Mixture (MGM) model. This work present an Agent based MapReduce (AMR) framework to process data in real-time and utilize system resource efficiently. To provide scalability for processing social media and sensor data DIF-AMR model adopts cloud computing architecture. Experiment are conducted to evaluate performance of DIF-AMR of over existing model shows significant performance improvement in terms of computation time.
A Micro-Scale Cyclone-Wind Turbine for Rooftop Ventilator Unggul Wibawa; Akhmad Frandicahya Permadi; Rini Nur Hasanah
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp614-621

Abstract

This paper analyzes the model of a cyclone-turbine for a micro-scale wind-power system being motivated by an idea to harvest the abandoned energy from rooftop ventilators. The system under consideration has been equipped with a battery to form a wind-battery power system. Data obtained from a wind site observation have been used to calculate the potentially generated power and efficiency, as well as the mechanical and electrical designs to extract the energy. The design has been explored to obtain the best efficiency of the cyclone-turbine model. The impact of wind-speed variation on the resulted system output has been investigated during the charging process of battery. The conclusion emphasizes the relationship between the output power and the range values of the resulted current and voltage, as well as the optimum wind speed-range of the cyclone-turbine operation.
Evolution of Precision Agriculture Computing towards Sustainable Oil Palm Industry K.C. Goh; S.Y. Sim; H.H. Goh; K. Bilal; T.H. Sam; T.Y. Teoh; J. S. Tey
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp725-732

Abstract

Precision technology elements have not been implemented yet into the sustainable oil palm industry because the knowledge and technology gap. To resolve the gaps, promote sustainability and integrate the technologies, Oil Palm Management System (OPAMS) was introduced. The precision technologies in OPAMS comprises of Geographical Information System (GIS), Global Positioning System (GPS), remote sensing and yield monitoring. A phase by phase System Development Life Cycle (SDLC) methodology was used to generate the said system with feedbacks from oil palm planters as the inputs for OPAMS’s key features. OPAMS ultimately aims to increase the awareness of the industry on the benefits of utilizing technology to improve plantation performances, increase business and environmental sustainability.
Technical and Economic Analysis of Net Energy Metering for Residential House T. M. N. T. Mansur; N. H. Baharudin; R. Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp585-592

Abstract

Renewable Energy Act (RE Act) has been gazetted by the Malaysian Government in 2011 to encourage energy generation from renewable resources. Under Feed-in Tariff (FiT) scheme, solar PV has gained popularity due to its high FiT rates. However, the FiT scheme for solar PV has expired in 2016 and been replaced by the Net Energy Metering (NEM) scheme. The objective of this research work is to technically and economically analyze the solar PV system for a residential house under NEM scheme. The methodology involves gathering solar energy resource information and daily residential load profile, sizing PV array together with grid-connected inverter and then lastly simulation of the design system by using PVsyst software. Based on the results obtained, the amount of energy generated is higher when the capacity of solar PV system is increased. While most of the energy generated is exported to the grid, only up to 25% of load demand is supplied by the solar PV system. From economic aspect, the residential house does not need to pay the electricity bill due to the self-consumed of energy generated and profit gained from excess energy exported to the grid. From the environmental aspect, 2,434 kWh energy generated from renewable resource annually and consumed by the residential load has replaced the fossil fuel based power from grid. This value is equivalent to almost 1.7 tons of CO2 avoidance to the environment.
Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks Mohd Anuar Mat Isa; Habibah Hashim; Syed Farid Syed Adnan; Nur Nabila Mohamed; Yasin Fitri Alias
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp688-695

Abstract

The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or more computing systems on unsecure network. Later, the secret key(s) is used to encrypt all data transmitted for online systems such as internet banking, cryptocurrency transaction, IoT services etc. The timing attack was addressed by an adversary model and security assumptions. The relay attack on KEP was tested by an experiment testbed between a key fob and car using Raspberry Pi and RF module. The experiment result has shown that the propagation delay of KEP on RF communication is increased by 100% for each relay node. If the KEP runtime is increased greater than 50%, the KEP authentication key should be discarded to prevent the attacker from gaining access to the car.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue