cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 16, No 2: November 2019" : 65 Documents clear
Chaotic immune symbiotic organisms search for SVC installation in voltage security control Mohamad Khairuzzaman Mohamad Zamani; Ismail Musirin; Saiful Izwan Suliman; Muhammad Murtadha Othman
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp623-630

Abstract

Parallel with the urbanization of the world, energy demand in the world also increased. The increase in energy demand will require a power system to be operated near its stability limit. To mitigate the problem, Flexible Alternating Current Transmission System (FACTS) devices can be installed as a compensation scheme to improve voltage security in a power system. For an effective compensation, FACTS devices should be optimally allocated in a power system. Although optimization techniques can be implemented to optimally allocate these devices, problems have been reported which would affect the performance of the optimization techniques in terms of producing high quality solutions. This paper presents the implementation of Chaotic Immune Symbiotic Organisms Search for solving optimal Static VAr Compensator (SVC) allocation problem for voltage security control. The optimization is validated in IEEE 26-Bus Reliability Test System (RTS) realizes the capability of CISOS in solving the optimization problem. Comparative studies with respect to Particle Swarm Optimization (PSO) and Evolutionary Programming (EP) resulting in good agreement on the results and demonstrated superior performance of CISOS. Results of the study can be beneficial to power system community in terms of compensation planning prior to real world implementation.
A new compression technique in MANET: compressed-LZW algorithm Hadeel Noori Saad; Fairouz mushtaq Jafar; Hanan Abbas Salman
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp890-896

Abstract

Now a days mobile ad hoc networks MANETs play a vital role in tremendous communication applications. This networks require infrastructure less module in non- centralized application’s area. Low battery power is of great concern to sustain for a long time, thus researchers try to assist in this critical maintenance point. This work proposed an enhanced version of well-known compression technique LZW to reduce data communication and maintain battery life. Compressed-LZW is a technique to code data stream into further compact form by merging successive redundant compressed code, and achieved by padding the code stream with the displacement of the next similar code. Compressed-LZW outperform its successor in saving consumed energy as expressed in the implementation and results by generating less output codes.
File encryption based on reduced-round AES with revised round keys and key schedule Edjie Malonzo De Los Reyes; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp897-905

Abstract

The continuing advancement of technology had provided security issues in protecting the confidentiality of information. The need to protect unauthorized access of a third party is warranted.  In this paper, the reduced-round modified AES with revised round keys and key schedule is proposed to ensure file confidentiality.  The modifications to the AES cipher round was the reduction of the round iterations from 10 to 6, and additional key permutations were added in between states; while in the key schedule, additional byte substitution process was appended.  Time and throughput were utilized to measure the performance of the application's encryption/decryption process; while the avalanche effect and randomness tests were used to measure the security of the modified AES algorithm.  The results of evaluations have shown that the encryption and decryption time have improved by 1.27% and 1.21% respectively while the throughput has similarly improved by 1.29% and 3.19% for both encryption and decryption respectively.  Whereas the avalanche effect of the modified AES was 50.06% which was more than the ideal value of 50% and it was also better than the standard AES which was 49.94% using the sample dataset.  Finally, all the ciphertext outputs of the modified AES passed the randomness tests.
A review on various methods of collaborative computing Mohd Afiq Bin Zamanhuri; Zalilah Abd Aziz; Rose Hafsah Abd Rauf; Elly Johana Johan; Noratikah Shamsudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp1002-1008

Abstract

Currently, mosques in Malaysia distribute their lecture schedules either on paper-based form or by uploading the schedule on their social media platform. This has some disadvantages such as paper schedules are susceptible to damages and information on social media platform is often not updated to current changes. Collaborative Computing is a system that enable individuals to work together remotely by making use of the reach ability of the internet. In order to utilise the Internet’s obvious advantages over paper-based and rapid information distribution and asynchronous communication, a review is conducted to study the available methods of collaborative computing, further analyse current research papers. Result shows that Centralized Computing method is the most suitable method for developing collaborative mobile application for Islamic Lectures schedule.
Simulative Study of Simple Ring Resonator Based Brewster Plate for Power System operation Stability Iraj Sadegh Amiri; Ahmed Nabih Zaki Rashed
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp1070-1076

Abstract

This study has outlined the simulative study of simple ring resonator based Brewster plate in the air. The obtained results are achieved with the variations of space length, curvature radius and phase angle of the spherical mirror. Beam radius criterion and stability parameters are measured with the variations of refractive index and thickness of Brewster plate in the air. The negative and positive effects of increasing operating parameters are observed on the performance of ring resonator system efficiency. 
A heat waste recovery system via thermoelectric generator Chai-Phing Chen; Siaw-Paw Koh; Sieh-Kiong Tiong; Jian-Ding Tan; Albert Yu-Chooi Fong
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp586-590

Abstract

Be it in the power production or consumption end, improvement on the power efficiency has become one of the most pivoting research topics over the past few decades. In order to reduce the reliance on fossil fuels and negative impacts on the environment, many ways are found to show promising results to increase power efficiency. One of the most effective ways is to recover and reuse heat waste. In this research, a heat waste recovery system is proposed by using thermoelectric generators (TEGs). This proposed heat recovery system can be implemented at the exhaust or the chiller section of a power system to abstract the excessive and unwanted heat and reuse it before it dissipates into the environment or goes to waste. Experiments are setup and conducted with controlled heat levels to investigate the performance of the proposed system in converting heat waste into electricity under different temperatures. The results show that the generated power hikes as the heat set-points increase from 30°C to 240°C. The output power fluctuates and shows no significant increase as the temperature increases from 240°C onwards. The maximum power is generated at 290°C. It can thus be concluded that the proposed system successfully generates electricity under different level of heat waste temperature. In time to come, this research can further explore the possibility on the optimization of the generated power.
Evaluation review of effectiveness and security metrics performance on information technology domain Roshidi Din; Rosmadi Bakar; Azizan Ismail; Aida Mustapha; Sunariya Utama
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp1059-1064

Abstract

Information Technology (IT) development is the vital required for human life activities in this global era. This implementation of IT system has becomes competitive among developers to increase the quality of system performance. In order to discover the IT performance of system, it neccesary to evaluate the IT implementation performance. It determines the anticipated system output to prepare to enhance the application performance. In this paper the evaluation performance that is reviewd are effectiveness and security metrics because both of evaluations able to improve the development and protection of system. Therefore, this paper classifies some IT domain development that used in term of effectiveness and security metric approach from previous researchers’ effort. It is categorized the domain based on both evaluation term of effectiveness and security metrics from specific parameter their used. The concern of this paper is to discover the important effectiveness and security metrics in IT domain performance that is anticipated to achieve expected performance.
Obstacle aware delay optimized rectilinear steiner minimum tree routing Shyamala G; G R Prasad
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp640-652

Abstract

This work presents a method to solve the problem of constructing Rectilinear Steiner Minimum Tree (RSMT) for a group of pins in the presence of obstacles. In modern very large-scale integrated circuit (VLSI) designs, the obstacles, generally blocks the metal and the device layer. Therefore routing on top of blockage is a possible solution but buffers cannot be placed over the obstacle. Modern VLSI design OARSMT construction has long wire length, which results in signal violation. To address this issue a slew constraint interconnect need to be considered in routing over obstacle. This is called the Obstacle-Avoiding Rectilinear Steiner minimum trees (OARSMT) problem with slew constraints over obstacles. The drawback of traditional OARSMT is that they only consider slew constraint, and delay constraints are neglected. It induces high routing resources overhead due to buffer insertion and does not solve global routing solution. This work presents an Obstacle Aware Delay Optimized Rectilinear Steiner Minimum Tree (OADORSMT) Routing to address the delay, slew constraint and reduce the routing resources. Experiments are conduced to evaluate the performance of proposed approach over existing approach in term of wire length and worst negative slack. The experiments are conducted for small and large nets considering fixed and varied obstacles and outcome shows the proposed efficiency over existing approaches. The OADORSMT is designed in such a way where it can be parallelized to obtain better efficiency.
An efficient two-stage user association scheme for green C-RAN systems Ismail Hburi; H. F. Khazaal
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp794-802

Abstract

This paper addresses the energy efficiency (EE) based user-association problem in cloud radio-access network. In specific, a low-complexity 2-stage iterative algorithm is developed for this purpose by jointly employing the coordinated multi-point (CoMP) and user-clustering techniques. The first stage of the algorithm applies a greedy search to form user-cluster and activate corresponded remote radio heads (RRHs) for CoMP transmission, only an RRH j with good channel gain could be included in the serving cluster of user k. Next, in the second stage, a re-clustering procedure is utilized to mitigate inter-cluster interference (ICI) and assign optimal power for scheduled users. Our obtained findings confirm that the transmit power, RRH density, and the number of users served by these RRHs can significantly affect the EE. Also, the results show that under certain system settings the proposed scheme can enhance the EE by almost 39.6% compared to conventional CoMP without user clustering technique.
An exploratory study of industry 4.0 in Malaysia: a case study of higher education institution in Malaysia Mohd Arshad Mokhtar; Nurulhuda Noordin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp978-987

Abstract

Industry 4.0 is defining as a smart factory through the emerging technology of the virtual and physical world as a collective term of technologies and concepts of value chain organization. The lack of understanding about Industry 4.0 concepts in Malaysia, especially from Higher Education Institution perspective, becoming an issue in Malaysia. Furthermore, industries in Malaysia are still relying on external expertise to implement Industry 4.0 in their environment with the expectation of an increase in productivity, efficiency, quality and to move away from foreign workers. This research aims to describe the relationship between technologies within Industry 4.0, people and the environment from the perspective of the Higher Education Institution in Malaysia and identify the problem of applying Industry 4.0 at the Higher Education Institution. Qualitative interviews were conducted with participants from an academic area and Industry 4.0 expert who has experience in both industry and academia. The Work System Framework is adopted in this research as a theoretical lens to extract the relevant information and deepen the understanding of applying Industry 4.0 at the Higher Education Institution in Malaysia. Results of this research reveal the problems faced by the Higher Education Institution in Malaysia towards applying Industry 4.0 in teaching and learning based on the relationship of people, technology and the environment. The results may contribute knowledge to the universities in preparation for future-ready graduates or talents as human capital for Industry 4.0 in Malaysia.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue