cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 102 Documents
Search results for , issue "Vol 12, No 1: January 2014" : 102 Documents clear
Review on Islanding Detection Methods for Photovoltaic Inverter Xi Zhongmei; Zhang Zhiming; Wang Ranran; Zhang Chuanyang; Liu Mochen; Wang Tao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Solar power generation, which is regarded as an ideal environment-friendly manner for power generation, is getting more and more attention. When photovoltaic inverter is connected to the grid,the island effect is a special problem to confront. This paper briefly analyzes the island effects and makes a summary of both domestic and external research progress concerning islanding detection methods; the islanding detection methods can be divided into two classes: one is grid-side detection; the other is local detection. The local detection is generally divided into passive methods and active methods. The theory of advantages and disadvantages of those methods are briefly introduced in this paper. At the end of the paper, to deal with the disadvantages of those methods that are mentioned, it proposes the research direction for deeper study of islanding detection methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.4147  
Chaos-Based Image Encryption Algorithm Using Decomposition Hongyao Deng; Xiuli Song
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle, diffusion and combination. Decomposition is that an original image is decomposed to components according to some rule. The purpose of the shuffle is to mask original organization of the pixels of the image, and the diffusion is to change their values. Combination is not necessary in the sender. To improve the efficiency, the parallel architecture is taken to process the shuffle and diffusion. To enhance the security of the algorithm, firstly, a permutation of the labels is designed. Secondly, two Logistic maps are used in diffusion stage to encrypt the components. One map encrypts the odd rows of the component and another map encrypts the even rows. Experiment results and security analysis demonstrate that the encryption algorithm not only is robust and flexible, but also can withstand common attacks such as statistical attacks and differential attacks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3018
Non-Equidistant Multivariable Model MGRM (1,n) Based on Vector Valued Continued Fraction and Reciprocal Accumulated Generating Operation Youxin Luo
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Grey system theory is a scientific theory possessed with wide adaptability to study poor information. The construction method of the background value in multivariable grey model was analyzed. The trapezoid formula and extrapolation method using rational interpolation and numerical integration was proposed based on the theory of vector valued continued fractions. And a non-equidistant multivariable grey model MGRM(1,n) was built through applying reciprocal accumulated generating operation. The model is suitable for building both equidistant and non-equidistant models, and it broadens the application range of the grey model and effectively increases both the fitting and the prediction precisions of the model. The applicability and the reliability of the model built were proven by real cases. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.2709
Intelligent Data Mining and Decision System for Commercial Decision Making Qishen Zhou; Zuowei Yin; Qiu Ying; Shanhui Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information system and data mining are important resources for the investors to make decisions. Information theory pointed that the information is increasing all the time, when the corporations build their millions of databases in order to improve the efficiency. Database technology caters to the needs of fully developing the information resources. This essay discusses the problem of decision making support system and the application of business data mining in commercial decision making. It is recommended that the intelligent decision support system should be built. Besides, the business information used in the commercial decision making must follow the framework of a whole system under guideline, which should be designed by the company.DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3977
Radiation Characteristics of Guided and Leaky modes for a Plasma Column Antenna Bo Yin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 A substantial problem for the radiation of a plasma column antenna is investigated. By means of the study on electromagnetic (EM) waves propagating along the plasma column and acting with plasma, it is found that a plasma column can radiate the EM energy when it works as two kinds of operation modes. The first one is a guided mode which leads to a surface current radiation, and its operation condition is obtained by determining the relation of plasma frequency and signal frequency. The second one is a leaky mode which causes a leaky wave radiation, and its operation condition is presented by analyzing normalized complex propagation constant. With further dealing with the leaky mode, its far field is got by applying the Schelkunoff’s equivalence principle on the surface of the plasma column. Radiation patterns of two kinds of modes are presented in their respective operation frequency bands, and reveal the radiation properties of the plasma antenna. The presented results are very helpful for further investigation in the design and application of plasma column antennaDOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3500
Study on Current Sensorless Vector Control Method for Electric Vehicle Drive Motor Jing Lian; Yafu Zhou; Jing Chang; Linhui Li; Xiaoyong Shen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the aggravation of environment pollution and the reduction of petroleum resources, the development of electric vehicle (EV) draws more and more people’s attention. In the EV research field, that seeking for a high efficient and reliable motor control method that suits the operating conditions and characteristics of the vehicle drive motor has become one of the key techniques that need to be broken through urgently. Owing to the problems that the efficient work area is narrow and it leads to over-current phenomenon when traditional motor vector control method is applied to vehicle drive motor, this paper presents a current sensorless vector control technique for electric vehicle drive motor. According to motor speed and command torque which is gained from the speed loop control, this method directly controls the magnitude and phase angle of voltage vector to realize the orientation control of the magnetic field and then achieve the purpose of controlling the motor torque and speed. The feasibility and effectiveness of this method are verified by simulation results and bench test. Moreover, this method can not only improve the efficient work area, but also increase the reliability of motor control system. At the same time, it overcomes the dependence on the current sensor, circumvents the over-current defect caused by traditional motor vector control approach and reduces its cost. So it is a suitable and efficient control method for electric vehicle drive motor. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3964 
Research on Space Target Recognition Algorithm Based on Empirical Mode Decomposition Xia Tian; Hou Chengyu; Shen Yiying
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The space target recognition algorithm, which is based on the time series of radar cross section (RCS), is proposed in this paper to solve the problems of space target recognition in the active radar system. In the algorithm, EMD method is applied for the first time to extract the eigen of RCS time series. The normalized instantaneous frequencies of high-frequency intrinsic mode functions obtained by EMD are used as the eigen values for the recognition, and an effective target recognition criterion is established. The effectiveness and the stability of the algorithm are verified by both simulation data and real data. In addition, the algorithm could reduce the estimation bias of RCS caused by inaccurate evaluation, and it is of great significance in promoting the target recognition ability of narrow-band radar in practice. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.4142
Fractal and Chaos Characteristics in Rock Milled Process Xinxia CUI; Chenxu LUO
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to research the mechanism and to reveal the natural characteristics in rock milled process, the milling load was deemed to be a component of the deterministic nonlinear dissipation system. The characteristic factor model of milling load was built on the basis of time delay method, and the phase-space of milling load was rebuilt. the dimensional phase-type of broken attractor was described. The results indicated that the broken attractor was a fractal set ,which acquired through the scale conversion of phase-space developed by each dimension. The relevant dimension of broken attractor can be as the identification to reflect the change of rock broken mechanism. And the Lyapunov exponential spectrum and the maximum Lyapunov exponent were acquired by confirming the system reconstruction dimension. The chaos phenomenon was existed in the rock milled process, which provides the basis for building the deterministic model of rock milled process. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3448
Detecting DDoS Attacks Against DNS Servers Using Time Series Analysis Tongguang Ni; Xiaoqing Gu; Hongyuan Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Domain Name System (DNS) Service is the basic support of Internet, which security plays a vital role in the entire Internet. Because DNS requests and responses are mostly UDP-based, and the existing large numbers of open recursive DNS servers, it is vulnerable to distributed denial of services (DDoS) attacks. Through the analysis of several aspects of these attacks, a novel approach to detect DDoS attack is proposed based on characteristics of attack traffics (CAT) time series. Then CAT time series are transformed into a multidimensional vector series and a support vector machine (SVM) classifier is applied to identity the attacks. The experiment results show that our approach can identify the state features of the abnormal flow due to the DDoS attacking flows, and detect DDoS attacks accurately DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3355
A Stable Control Strategy for Input-Series Output-Series Connected Boost half Bridge DC-DC Converter Amir Mahmood Soomro; Amjad Ali Syed; Shahnawaz Farhan Khahro; Xiaozhong Liao; Farhan Manzoor
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Boost half bridge DC-DC converters in the combination of an input-series and output-series (ISOS) connected configuration with a stable control strategy has been investigated in this paper. A stable control strategy comprises of two loops that are current loop and voltage loop. The reference to the current loop has been chosen from the input side of the DC-DC converter. The reference to the voltage loop has been selected from the output side of the DC-DC converter. Such a reference makes the circuit configuration simple, easy and eventually results in reduced cost. The control strategy for input-series output-series (ISOS) configuration of DC-DC converters is proposed to achieve equal input voltage sharing (IVS) as well output voltage sharing (OVS). Furthermore, in this paper, the performance of the stable control strategy for input-series output-series (ISOS) boost half bridge DC-DC converter has been observed not only for the fixed but also for the varying and continuously varying load. The proposed Stable control scheme has been developed by modeling it on MATLAB using Simulink and Simpower toolboxes. The operation of the proposed stable control strategy has been found to be satisfactory.DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3098

Page 6 of 11 | Total Record : 102


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue