Articles
58 Documents
Search results for
, issue
"Vol 13, No 1: January 2019"
:
58 Documents
clear
FPGA implementation of color image encryption using a new chaotic map
Hamsa A Abdullah;
Hikmat N Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp129-137
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map has been proposed. The proposed system consists of two phases image encryption technique. First phase consists of scrambling of pixel position and second phase consist of diffusion of bit value. In the first phase, original pixel values remain unchanged. In second phase, pixel values are modified. These modifications are done by using chaotic behavior of a recently developed chaotic map called Nahrain. A color image encryption using Nahrain chaotic map is simulated in software via Matlab, Altera Quartus Prime 17.0 Lite EditionI and ModelSim software tools then implemented in hardware via Cyclone V GX Starter Kit FPGA platform. The results show the feasibility and effectiveness of the cryptosystem. As a typical application, the image encryption/decryption is used to demonstrate and verify the operation of the cryptosystem hardware. Complete analysis on robustness of the method is investigated. Correlation, Encryption time, Decryption time and key sensitivity show that the proposed crypto processor offers high security and reliable encryption speed for real-time image encryption and transmission. To evaluate the performance, histogram, correlation, information entropy, number of pixel change rate (NPCR), and unified average changing intensity (UACI) measures are used for security analysis. The simulation results and security analysis have demonstrated that the proposed encryption system is robust and flexible. For example the amount of entropy obtained by the proposed algorithm is 7.9964, which is very close to its ideal amount: 8, and NPCR is 99.76 %, which is the excellent value to obtain. The hardware simulation results show that the number of pins that used of the proposed system reaches to 6% of total pins and Logic utilization (in ALMs) is 1%.
Oscillating wave energy power generator for lift net fishing boat
Luther Sule;
Parabelem Tinno Dolf Rompas
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp354-360
This paper compares several designs of an oscillating wave power generator suitable for local net fishing boat in the waters of Tonyaman in the Strait of Makassar, Indonesia. The designs were based on wave height data for the period of January to December 2016 and of the local fishing vessel construction data. Several generator designs were created to replace diesel engines used by the local fishermen to power their boats’ lamps in the night. Results showed that DESIGN 5 with Arm length to buoy (L1) of 4 m and Arm length to pulley (L2) of 3 m and DESIGN 6 with L1 of 4 m and L2 of 2 m were the two designs most fitting for that purpose. Both designs could produce sufficient power ( ) to power the boats’ lamps in the shortest wave height condition (0.75 m) and the tallest wave height condition (1.5 m). At the shortest wave height condition (0.75 m), DESIGN 5 produced 14,237.58 W and DESIGN 6 produced 14,290.31 W. At the tallest wave height condition (1.5 m), DESIGN 5 and DESIGN 6 generated 28,285.31 W and 28,496.25 W of power, respectively.
User command acquisition based IoT automatic control system
Inshik Kang;
Hyunok Song;
Hoekyung Jung
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp307-312
Recently, researches are being conducted to build a smart environment using various sensors and devices and to provide customized services to users through IoT (Internet of Things). The existing IoT system operates the device only by using the threshold value. So, there are problems that device operates when a service that does not consider a user characteristic is provided or when user not necessary. In this paper, to solve these problems, the system collects the remote control commands and compares it with the value of device operation threshold and sets the changed threshold value. In addition, devices not registered in the server constitute the environment by linking with existing task. Therefore, it is possible to provide a customized service to the users.
A statistical jacobian application for power system optimization of voltage stability
Raja Masood Larik;
Mohd. Wazir Mustafa;
Manoj Kumar Panjwani
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp331-338
Despite a tremendous development in optimal power flow (OPF), owing to the obvious complexity, non-linearity and unwieldy size of the large interconnected power systems, several problems remain unanswered in the existing methods of OPF. Seizing specific topics for maximizing voltage stability margin and its implementation, a detailed literature survey discussing the existing methods of solution and their drawbacks is presented in this research. The phenomenon of voltage collapse in power systems, methods to investigate voltage collapse, and methods related to voltage stability are briefly surveyed. Finally, the study presents a statistical method for analyzing a power system through eigenvalue analysis in relation to the singular values of the load flow Jacobian. Future study may focus on changes in theories in conjunction with large power systems.
Securing SAAS service under cloud computing based multi-tenancy systems
Trinathbasu Miriyala;
JKR Sastry
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp65-71
Cloud computing technologies are being used by many who need computing resources such as software, platform and infrastructure as per their business requirements in terms of provisioning and pay for the usage as per actual consumption of the services based on the SLA signed by the user and cloud service provider. Software running on a physical machine is being provided as services to the end users. For the reasons of cost economies access to software that uses a database is being provided to multiple users. The access to the software is provided either directly or through a virtual machine. The software being provided as service uses the same database for many of the users who have requisitioned for the same. As a result, there could be encroachments by the users into the data of others. There is a need to secure the data belonging to several users while all of them access the data using the same application. In this paper an efficient method is presented for securing the data processed by software which is offered as a service to multiple users either directly or through virtual machines.
Functional usability analysis of top Korean mobile role playing games based on user interface design
Seunh Hoon Lee;
Doo Heon Song
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp123-128
Mobile Tole Playing Games (RPGs) are now very popular in gaming market. Still, we have great constraint in hardware provided such as screen size and interaction speed. Adopting techniques such as auto play enables the game designers to weaken the burdens of porting RPG scales to mobile platform. However, the interface design in mobile platform becomes quite different from PC based platform. In this paper, we investigate how user interface functionalities are provided for popular mobile RPGs based on google play downloaded between the year of 2014 and 2016. We analyze the commonalities and the differences of recent successful mobile RPGs first and take a user survey with heuristics. In result, subjects who are 16 ~ 25 in age weakly accept current interface layout and control as over 70% positive rate in 4 point Likert scale test.
Performance evaluation of cloud service with hadoop for twitter data
Ganesh Panatula;
K Sailaja Kumar;
D Evangelin Geetha;
T V Suresh Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp392-404
In the era of rapid growth of cloud computing, performance calculation of cloud service is an essential criterion to assure quality of service. Nevertheless, it is a perplexing task to effectively analyze the performance of cloud service due to the complexity of cloud resources and the diversity of Big Data applications. Hence, we propose to examine the performance of Big Data applications with Hadoop and thus to figure out the performance in cloud cluster. Hadoop is built based on MapReduce, one of the widely used programming models in Big Data. In this paper, the performance analysis of Hadoop MapReduce WordCount application for Twitter data is presented. A 4-node in-house Hadoop cluster was setup and experiment was carried out for analyzing the performance. Through this work, it was concluded that Hadoop is efficient for BigData applications with 3 or more nodes with replication factor 3. Also, it was observed that system time was relatively more compared to user time for BigData applications beyond 80GB. This experiment had also thrown certain pattern on actual data blocks used to process the WordCount application.
Solar PV fed non-isolated DC-DC converter for BLDC motor drive with speed control
G. G RajaSekhar;
Basavaraja Banakar
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp313-323
Brushless DC motors (BLDC) are predominantly used these days due to its meritorious advantages over conventional motors. The paper presents PV fed BLDC speeds control system. A closed-loop interleaved boost converter increases the voltage from PV system to required level. Converter for BLDC operates at fundamental switching frequency which reduces losses due to high switching frequency. Internal current control method is developed and employed for the speed control of PV fed BLDC motor by sensing the actual speed feedback. Internal current controlled PV fed BLDC drive is analyzed with increamental speed with fixed torque and decreamental speed with fixed torque operating conditions. Also the system with speed control is verified for variable torque condition. The system is developed and results are developed using MATLAB/SIMULINK software.
Integration of synthetic minority oversampling technique for imbalanced class
Noviyanti Santoso;
Wahyu Wibowo;
Hilda Hikmawati
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp102-108
In the data mining, a class imbalance is a problematic issue to look for the solutions. It probably because machine learning is constructed by using algorithms with assuming the number of instances in each balanced class, so when using a class imbalance, it is possible that the prediction results are not appropriate. They are solutions offered to solve class imbalance issues, including oversampling, undersampling, and synthetic minority oversampling technique (SMOTE). Both oversampling and undersampling have its disadvantages, so SMOTE is an alternative to overcome it. By integrating SMOTE in the data mining classification method such as Naive Bayes, Support Vector Machine (SVM), and Random Forest (RF) is expected to improve the performance of accuracy. In this research, it was found that the data of SMOTE gave better accuracy than the original data. In addition to the three classification methods used, RF gives the highest average AUC, F-measure, and G-means score.
University course timetabling model using ant colony optimization algorithm approach
Munirah Mazlan;
Mokhairi Makhtar;
Ahmad Firdaus Khair Ahmad Khairi;
Mohamad Afendee Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp72-76
Due to the increased number of students and regulations, all educational institutions have renewed their interest to appear in the number of complexity and flexibility since the resources and events are becoming more difficult to be scheduled. Timetabling is the type of problems where the events need to be organized into a number of timeslots to prevent the conflicts in using a given set of resources. Thus in the intervening decades, significant progress has been made in the course timetabling problem monitoring with meta-heuristic adjustment. In this study, ant colony optimization (ACO) algorithm approach has been developed for university course timetabling problem. ACO is believed to be a powerful solution approach for various combinatorial optimization problems. This approach is used according to the data set instances that have been collected. Its performance is presented using the appropriate algorithm. The results are arguably within the best results range from the literature. The performance assessment and results are used to determine whether they are reliable in preparing a qualifying course timetabling process.