cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 16, No 3: December 2019" : 65 Documents clear
Twitter data analysis using hadoop ecosystems and apache zeppelin Stanly Wilson; Sivakumar R
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1490-1498

Abstract

The day-to-day life of the people doesn't depend only on what they think, but it is affected and influenced by what others think. The advertisements and campaigns of the favourite celebrities and mesmerizing personalities influence the way people think and see the world. People get the news and information at lightning speed than ever before. The growth of textual data on the internet is very fast. People express themselves in various ways on the web every minute. They make use of various platforms to share their views and opinions. A huge amount of data is being generated at every moment on this process. Being one of the most important and well-known social media of the present time, millions of tweets are posted on Twitter every day. These tweets are a source of very important information and it can be made use for business, small industries, creating government policies, and various studies can be performed by using it. This paper focuses on the location from where the tweets are posted and the language in which the tweets are written. These details can be effectively analysed by using Hadoop. Hadoop is a tool that is used to analyze distributed big data, streaming data, timestamp data and text data. With the help of Apache Flume, the tweets can be collected from Twitter and then sink in the HDFS (Hadoop Distributed File System). These raw data then analyzed using Apache Pig and the information available can be made use for social and commercial purposes. The result will be visualized using Apache Zeppelin.
A new methodology for technical losses estimation of radial distribution feeder Khairul Anwar Ibrahim; Mau Teng Au; Chin Kim Gan
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1126-1135

Abstract

Power distribution feeders is one of the key contributors of technical losses (TL) as it is typically large in numbers and scattered over large geographic areas. Traditional approach using classical formulation or time series load flow simulations to determine TL in each and every feeder and feeder sections in all distribution network require is an expensive exercise as it requires extensive modelling of the feeders and voluminous data. This paper presents a simple analytical approach to estimate monthly TL of a radial distribution feeder using analytical approach. TL for each feeder sections are evaluated on a monthly basis based on estimation of the load profile of the load points, peak power loss characteristics and loss factor. Total feeder TL are then estimated as the sum of all TL contributed by each feeder section. The developed models and procedure have been demonstrated through case studies performed on three (3) typical and representative feeders characterized by the different area served, number of feeder sections, load distribution and feeder length. The results shows close agreement (less than 5% differences) when compared with time series load flow simulations. With this model, the approach could be extended and applied to estimate TL of any radial distribution feeders of different configurations and characteristics
Comparison by simulation of PEGASIS and IEEPB routing protocols Samah Alnajdi; Fuad Bajaber
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1569-1576

Abstract

As the applications of wireless sensor networks (WSNs) became widely used throughout the years the importance of advanced sensor networks techniques increased as well. One of the main techniques used in WSNs is hierarchical routing which mainly aims to reduce the consumption of sensor nodes energy by assigning different roles to the sensor nodes to create multi-layer scheme for data transmission. This paper embraces a simulation for two known hierarchical routing protocols: Power-Efficient Gathering in Sensor Information Systems (PEGASIS) protocol and an Improved Energy-Efficient PEGASIS-Based (IEEPB) protocol. Both protocols aim to reduce the transmission distance in order to save the nodes energy by performing chain-based clustering. For evaluation, we measured the residual energy and control overhead throughout the network operation time and the results showed major flaws in both protocols such as long link problem and poor leader selection method in PEGASIS. Moreover, high nodes density problem in IEEPB.
Investigation of indoor propagation of WLAN signals Mohammed Sameer Salim; khalil Hassan Sayidmarie; Abdullah Hassan Aboud
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1356-1363

Abstract

The propagation of radio waves inside a typical university building is investigated by simulation and measurements. The Line of sight (LOS) and Obstructed Line of sight (OLOS) propagation scenarios were considered. The received power from a WLAN access point operating at 2.45GHz was determined from the simulations and measurements at various positions, orientations, and heights of the Tx and Rx antennas. The path loss exponents were estimated from the obtained simulation and measurement results of the received power variation with distance. The obtained path loss exponent values were found between 1.15-1.63 for LOS propagation and 2.14-2.55 for OLOS.
Developed artificial neural network based human face recognition Maryam Mahmood Hussein; Ammar Hussein Mutlag; Hussain Shareef
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1279-1285

Abstract

Face recognition has become one of the most important challenging problems in personal computer-human interaction, video observation, and biometric. Many algorithms have been developed in the recent years. Theses algorithms are not sufficiently robust to address the complex images. Therefore, this paper proposes soft computing algorithm based face recognition. One of the most promising soft computing algorithms which is back-propagation artificial neural network (BP-ANN) has been proposed. The proposed BP-ANN has been developed to improve the performance of the face recognition. The implementation of the developed BP-ANN has been achieved using MATLAB environment. The developed BP-ANN requires supervised training to learn how to anticipate results from the desired data. The BP-ANN has been developed to recognition 10 persons. Ten images have been used for each person. Therefore, 100 images have been utilized to train the developed BP-ANN. In this research 50 images have been used for testing purpose. The results show that the developed BP-ANN has produced a success ratio of 82%.
Annealing strategy for an enhance rule pruning technique in ACO-Based rule classification Hayder Naser Khraibet AL-Behadili; Ku Ruhana Ku-Mahamud; Rafid Sagban
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1499-1507

Abstract

Ant colony optimization (ACO) was successfully applied to data mining classification task through ant-mining algorithms. Exploration and exploitation are search strategies that guide the learning process of a classification model and generate a list of rules. Exploitation refers to the process of intensifying the search for neighbors in good regions, whereas exploration aims towards new promising regions during a search process. The existing balance between exploration and exploitation in the rule construction procedure is limited to the roulette wheel selection mechanism, which complicates rule generation. Thus, low-coverage complex rules with irrelevant terms will be generated. This work proposes an enhancement rule pruning procedure for the ACO algorithm that can be used in rule-based classification. This procedure, called the annealing strategy, is an improvement of ant-mining algorithms in the rule construction procedure. Presented as a pre-pruning technique, the annealing strategy deals first with irrelevant terms before creating a complete rule through an annealing schedule. The proposed improvement was tested through benchmarking experiments, and results were compared with those of four of the most related ant-mining algorithms, namely, Ant-Miner, CAnt-Miner, TACO-Miner, and Ant-Miner with hybrid pruner. Results display that our proposed technique achieves better performance in terms of classification accuracy, model size, and computational time. The proposed annealing schedule can be used in other ACO variants for different applications to improve classification accuracy.
Network intrusion detection system by using genetic algorithm Hamizan Suhaimi; Saiful Izwan Suliman; Ismail Musirin; Afdallyna Fathiyah Harun; Roslina Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1593-1599

Abstract

Developing a better intrusion detection systems (IDS) has attracted many researchers in the area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is proposed as a tool that capable to identify harmful type of connections in a computer network. Different features of connection data such as duration and types of connection in network were analyzed to generate a set of classification rule. For this project, standard benchmark dataset known as KDD Cup 99 was investigated and utilized to study the effectiveness of the proposed method on this problem domain. The rules comprise of eight variables that were simulated during the training process to detect any malicious connection that can lead to a network intrusion. With good performance in detecting bad connections, this method can be applied in intrusion detection system to identify attack thus improving the security features of a computer network.
The sensorless control system for controlling the speed of direct current motor Khac-Khiem Nguyen; Trong-Thang Nguyen
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1171-1178

Abstract

This research aims to propose an algorithm for controlling the speed of the Direct Current (DC) motor in the absence of the sensor of speed. Based on the initial mathematical model of DC motor, the authors build the dynamic state equation of DC motor, and then build an estimation model to determine the speed of the DC motor without a sensor. The advantages of the proposed method are demonstrated through the closed-loop control model using the PID controller. In order for the results to be objective, we assume that the parameters of the DC motor in the estimation model are not known correctly. The results show that the quality of control in the absence of a sensor is equivalent to the case with the sensor.
LQR control of interleaved double dual boost converter for electrical vehicles and renewable energy conversion J. S. V. Siva Kumar; P. Mallikarjunarao
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1240-1248

Abstract

The automobile industry is one of the major industries that are having its new innovations at a great pace according to the requirements of the day-to-day life. Due to the usage of conventional vehicles on a large scale which usually use petroleum products as fuel, is leading to a vast environmental effect, mainly due to the emission of greenhouse gases. So in order to reduce the ill effects of the greenhouse gas emissions great efforts are being put in   manufacturing of electrical vehicles. Among the currently available greenhouse technologies the fuel cell provides high energy density in spite of its expenses. So, in this aspect a required mechanism has to be adopted to make it energy efficient and affordable. In order to overcome the drawback of fuel cell i.e. low output voltage, the boost converters are to be used and to be more precise Non-isolated Interleaved Double Dual Boost (IDDB) converters are recommended which makes it efficient and also the reduction of overall vehicle weight can be achieved. The LQR control technique is applied in this work to make the transient response of the fuel cell powered IDDB converter for various load conditions effective. The verification of results is done with simulation techniques using MATLAB/Simulink.
Solutions of reaction-diffusion equations using similarity reduction and HSSOR iteration Nur Afza Mat Ali; Rostang Rahman; Jumat Sulaiman; Khadizah Ghazali
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1430-1438

Abstract

Similarity method is used in finding the solutions of partial differential equation (PDE) in reduction to the corresponding ordinary differential equation (ODE) which are not easily integrable in terms of elementary or tabulated functions. Then, the Half-Sweep Successive Over-Relaxation (HSSOR) iterative method is applied in solving the sparse linear system which is generated from the discretization process of the corresponding second order ODEs with Dirichlet boundary conditions. Basically, this ODEs has been constructed from one-dimensional reaction-diffusion equations by using wave variable transformation. Having a large-scale and sparse linear system, we conduct the performances analysis of three iterative methods such as Full-sweep Gauss-Seidel (FSGS), Full-sweep Successive Over-Relaxation (FSSOR) and HSSOR iterative methods to examine the effectiveness of their computational cost. Therefore, four examples of these problems were tested to observe the performance of the proposed iterative methods.  Throughout implementation of numerical experiments, three parameters have been considered which are number of iterations, execution time and maximum absolute error. According to the numerical results, the HSSOR method is the most efficient iterative method in solving the proposed problem with the least number of iterations and execution time followed by FSSOR and FSGS iterative methods.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue