Articles
52 Documents
Search results for
, issue
"Vol 11, No 2: August 2018"
:
52 Documents
clear
Performance Investigation of Channel Noise Effect in Data Transmission Medium Using Signal to Noise Ratio (SNR)
Gebremedhn wubet wagaye
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp419-423
The noise introduced in the channel obviously affects the bit error rate of the communication system and this has direct impact in the security. Here the main problem is that the receiver terminal decoding techniques can lead to wrong interpretation even if the Bit Error Rate (BER) is acceptable. So the main idea here is to introduce high values of Signal to Noise Ratio (SNR) that can improve the bit error rate which exists due to the noise introduced in the wireless channel.
Resonant Configuration Topology Exploration for Inductive Link Power Transfer
S. Hafiz;
Zarimin Zaharudin;
Sheroz Khan;
Nur Shahida Binti Midi;
John Tan Teng Hwang;
Kushsairy Abdul Kadir;
Jawad Ali Shah
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp522-530
This paper investigates the performance of circuit topology used in wireless power applications to optimize the level of maximum efficiency. We analyse the series and the parallel resonant topologies for use in an inductive coupling link to derive power transfer efficiency expressions verified using MATLAB. We look into the two topologies into the link under resonant conditions for selectively supplying the device with power. The results are obtained analytically which are verified subsequently by MATLAB simulation. We then analyse the links to see how maximum power transfer efficiency for a given pair of coils can be achieved. The topology at a given tuning frequency is used for powering a selected resistive load. The method is presented using a given pair of coils simulated and the results agree well with the theoretical explanation and derivations.
Pole tilt monitoring system using MEMs accelerometer and BeagleBone Black
Lok De Yong;
Nurul Asyikin Mohamed Radzi;
Yanti Erana Jalil
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp658-664
Electric pole could tilt in the event of heavy storms, soil erosion and object crashing onto poles, causing serious damages if they are not fixed before condition worsen. Therefore, to monitor the health of the electric pole, a system to monitor its tilting angle is needed. In this paper, for the first time, to the best of our knowledge, an integration of Micro Electro-Mechanical Systems (MEMs) accelerometer with BeagleBone Black microcomputer will be used to develop an electric pole tile angle monitoring system. The accuracy of measuring tilt angle using single axis accelerometer versus triple axis accelerometer and the effect of rolling on tilt angle reading using single axis accelerometer versus triple axis accelerometer will be presented. Three-axis accelerometer achieves greater accuracy as the percentage error of tilting and rolling for the three-axis accelerometer are better than the single-axis accelerometer.
A Comparative Review on Data Hiding Schemes
Roshidi Din;
Raihan Sabirah Sabri;
Aida Mustapha;
Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp768-774
Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes.
Opinion Mining of Light Rail Transit Development in Indonesia
Sarifah Putri Raflesia;
Dinda Lestarini;
Firdaus Firdaus;
Desty Rodiah
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp791-796
Light rail transit (LRT), or fast tram is urban public transport using rolling stock similar to a tramway, but operating at a higher capacity, and often on an exclusive right-of-way. Indonesia as one of developing countries has been developed the LRT in two cities of Indonesia, Palembang and Jakarta. There are opinions toward the development of LRT, negative and positive opinions. To reveal the level of LRT development acceptance, this research uses machine learning approach to analyze the data which is gathered through social media. By conducting this paper, the data is modeled and classified in order to analyze the social sentiment towards the LRT development.
Verification of MATLAB/Simulink Power Cable Modelling with Experimental Analysis
Tze Mei Kuan;
Suhaila Sulaiman;
Azrul Mohd. Ariffin;
Wan Mohamad Shakir Wan Shamsuddin
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp622-629
Cross-linked polyethylene (XLPE) power cable is commonly used as the medium for transmitting power supply in the power system network. However, frequent exposure of XLPE cable to the high voltage causes its insulation to degrade over time leading to electricity outages. Degradation of cable can be prevented if regular maintenance is performed using the accurate assessment method. This study models and simulates a cable system comprising of three cable sections connected by two un-degraded cable joints. This model aims to assess defect along the tested cable with the application of time domain reflectometry (TDR) technique. A series of simulations are conducted by varying the cable insulation condition to study its influence on the cable joint reflection. These simulation results from MATLAB/Simulink are validated against the actual TDR experimental results. The identical results shown between the simulation and experimental results indicate that the cable model is valid and can be used to assess the condition of a cable.
A Review on Structured Scheme Representation on Data Security Application
Siti Norussaadah Mohd Salleh;
Roshidi Din;
Nur Haryani Zakaria;
Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp733-739
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.
E-Referral System Modeling Using Fuzzy Multiple-Criteria Decision Making
Gandung Triyono;
Sri Hartati;
Reza Pulungan;
Lutfan Lazuardi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp475-486
Currently, the quality of health services in Indonesia is getting better. However, the referral system still has some problems. The first is the difficulty in determining the referral hospital by the condition of the patient. The second is the different parameters used to determine the referral hospitals between countries. Based on those problems, it is necessary to improve the ability of the current referral system. This study developed a reference system model for assessing the suitability of the patient's background with the referral hospital. Some of the methods used are restful on web service technologies for information exchange between primary health care doctors and referral hospitals, Fuzzy Multiple-Criteria Decision Making (FMCDM) to determine the ranking of referral hospitals that fit the patient's background. The result of this study is an intelligent system model to get the referral hospital that fit the patient's background.
Intelligent Agent Simulator in Massive Crowd
Mohamad, S;
Nasir, F.M;
Sunar, M.S.;
Isa, K.;
Hanifa, R.M.;
Shah, S.M.;
Ribuan, M.N.;
Ahmad, A.
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp577-584
Crowd simulations have many benefits over real-life research such as in computer games, architecture and entertainment. One of the key elements in this study is to include elements of decision-making into the crowd. The aim of this simulator is to simulate the features of an intelligent agent to escape from crowded environments especially in one-way corridor, two-way corridor and four-way intersection. The addition of the graphical user interface enables intuitive and fast handling in all settings and features of the Intelligent Agent Simulator and allows convenient research in the field of intelligent behaviour in massive crowd. This paper describes the development of a simulator by using the Open Graphics Library (OpenGL), starting from the production of training data, the simulation process, until the simulation results. The Social Force Model (SFM) is used to generate the motion of agents and the Support Vector Machine (SVM) is used to predict the next step for intelligent agent.
Fuzzy Logic Enhanced Direct Torque Control with Space Vector Modulation
Siaw-Paw Koh;
Sieh-Kiong Tiong;
Kharudin Ali;
Ahmed Abdalla
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp704-710
Over the past few years, multiple types of modifications have been proposed onto the Direct Torque Control (DTC) scheme. Among others is the implementation of Space Vector Modulation (SVM). In this paper, two new control strategies are proposed onto an SVM-DTC. Instead of using PI torque and flux controllers, a fuzzy logic control method is implemented in the proposed modification to achieve a more constant switching frequency while minimizing the torque error. The fuzzy logic controller controls the voltages in direct and quadratic reference frame (Vd, Vq). This approach fully utilizes the switching capability of the inverter and thus improving the overall system performance. To overcome issues in open loop stator flux such as DC drift and saturation, a closed loop estimation method of stator flux is also proposed based on voltage model and low pass filter. The performance of the proposed control strategy is benchmarked with that of a conventional DTC–SVM. Simulations and experiments were carried out and the results show that the proposed method outperforms the conventional DTC-SVM in terms of DC-offset elimination and overall system robustness. Over the past few years, multiple types of modifications have been proposed onto the Direct Torque Control (DTC) scheme. Among others is the implementation of Space Vector Modulation (SVM). In this paper, two new control strategies are proposed onto an SVM-DTC. Instead of using PI torque and flux controllers, a fuzzy logic control method is implemented in the proposed modification to achieve a more constant switching frequency while minimizing the torque error. The fuzzy logic controller controls the voltages in direct and quadratic reference frame (Vd, Vq). This approach fully utilizes the switching capability of the inverter and thus improving the overall system performance. To overcome issues in open loop stator flux such as DC drift and saturation, a closed loop estimation method of stator flux is also proposed based on voltage model and low pass filter. The performance of the proposed control strategy is benchmarked with that of a conventional DTC–SVM. Simulations and experiments were carried out and the results show that the proposed method outperforms the conventional DTC-SVM in terms of DC-offset elimination and overall system robustness.