Articles
66 Documents
Search results for
, issue
"Vol 19, No 1: July 2020"
:
66 Documents
clear
New reliable modifications of HPM and HAM
Khawlah Hussain
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp371-379
In this article, a new modification of the homotopy perturbation method (HPM) and homotopy analysis method (HAM) is presented and applied to non-homogeneous fractional Volterra integro-differential equations with boundary conditions. A comparative study between the new modified homotopy perturbation method (MHPM) and the new modified homotopy analysis method (MHAM). Several illustrative examples are given to demonstrate the effectiveness and reliability of the methods.
Gesture recognition vehicle using PIC microcontroller
K. Selvakumar;
Palanisamy R;
M.Arun Noyal Doss;
P. Gopi;
A. Esakkipandi;
L. Mathivadhanam;
T. Abul Kalam Asath
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp66-75
In this paper we introduce a hand controlled robotic vehicle. Hand control robotic vehicle consists of a transmitter module and a receiver module. The transmitter will be placed on a hand glove and the receiver will be placed on the motor drive along with PIC microcontroller and motor driver IC. The RF transmitter sends commands to the IC which then forwards the commands to RF receiver. The RF receiver then sends the commands to PIC microcontroller on the vehicle which processes the commands so that the vehicle moves in the specified direction. It is having proposed utility in field ofconstruction, hazardous waste disposal and field survey near borders etc. This project is developed as a travel buddy and industrial uses. Having future scope of advanced robotics that are designed and can be easily controlled using hand gesture only.
Modified FCS-MPC algorithm for five-leg voltage source inverter
Riyadh Ghanem Omar
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp47-57
This paper represents a test of a modified algorithm to minimize the cost function in the traditional finite control-set model predictive current control (FCS-MPC) to control the (five-leg) DC voltage input inverter. A Matlab/Simulink description of a system presents a certain deviation limits between the reference and the actual measured phase currents, also the model implements a load current limitation. The algorithm picks out a proper switching state, which makes the lower error value between the wanted and the prognosticated currents; the proposed technique sets the chosen switching state as a driving signal to the ten switches. The modified program eliminates the switching combination with error values above the requested ones. Thereafter the system response enhanced by lowering the overshoots. The rigidness of the model is examined by using a step change in reference signals.
Acceptance of mobile payments by retailers using UTAUT model
Nor Hapiza Mohd Ariffin;
Fauziah Ahmad;
Umar Mohd Haneef
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp149-155
Mobile payment is a form of payment transaction processing where the payer utilizes mobile communication methods together with mobile devices to initiate, authorize or complete payment. Hence, with the huge increase in mobile device usage, the retail sector will be able to collect large volumes of data. Unfortunately, most Malaysians still do not make full use of digital payments or cashless payments. Consumers in South East Asia still tend to use money or bank cards, and companies have been "limitedly effective" in encouraging a cashless revolution. The objective of this study was to identify the acceptance of mobile payment by retailers, the factors that contribute to the acceptance of mobile payment and the relationship between the factors were also the aim of this research. Several factors were contributing to mobile payments such as performance expectancy, effort expectancy, social influence, facilitating conditions, habit, privacy, perceived security and intentions which was based on the UTAUT model. This study used questionnaires to collect data and the data analysis was carried out using SPSS software. Based on the analysis that has been conducted, it can be seen that all the hypotheses of this research have a significant relationship except for the relationship between privacy and intentions that has a negative linear relationship. It is hoped that this research will give values to retailers with an understanding of the contributing factors that affect their acceptance of mobile payment technology in the retailing business.
DA systematic approach for solving mixed constraint fuzzy balanced and unbalanced transportation problem
Ahmed Hamoud;
Kirtiwant Ghadle;
Priyanka Pathade
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp85-90
In the present article, a mixed type transportation problem is considered. Most of the transportation problems in real life situation have mixed type transportation problem this type of transportation problem cannot be solved by usual methods. Here we attempt a new concept of Best Candidate Method (BCM) to obtain the optimal solution. To determine the compromise solution of balanced mixed fuzzy transportation problem and unbalanced mixed fuzzy transportation problem of trapezoidal and trivial fuzzy numbers with new BCM solution procedure has been applied. The method is illustrated by the numerical examples.
PV system reactive power coordination with ULTC & shunt capacitors using grey wolf optimizer algorithm
Mogaligunta Sankaraiah;
S Suresh Reddy;
M Vijaya Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp1-10
The presence of PV systems increases rapidly in distribution systems to improve reliability and quality of supply. This will influence the performance of under load tap changing (ULTC) transformer and related reactive power devices. Therefore, many researchers are working on this area. This paper main objective is to reduce switching operations of reactive power devices (ULTC and Shunt capacitors) together with system power loss. Distribution system load and solar system power will predict one day in advance and grey wolf optimizer (GWO) algorithm proposed to solve the objective function. Reactive power of solar system is coordinated together with ULTC and shunt capacitors (SCs) with the aid of forecasted load. Distribution system losses and switching operations of ULTC and SCs converted into objective function in terms of cost. The proposed method is applied on practical 10KV system and the results are compared with conventional and particle swarm optimization (PSO) methods considering grid conditions.
E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm
Salah H. Abbdal Refish;
Salam Waley Shneen
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp485-491
Users need more efficient and more secure when they use the Internet. Password authentication code (PAC) is the critical issue in many applications such as web-sites and data base systems etc. In this paper, PAC between two users to confirm authentication between them based two factors has presented.. Two factors is the most good solution in this field. A legitimate user needs to make sure about his partner to ensure their communication. So, this solution produces two important algorithms, the first one is utilized the Diffie-Hellman which considered the base of this work. The second is routing in message passing networks (RMPN) algorithm which determine the positions of bits which sent to specific party. The overall of this method convincingly to be more secure against both online and offline attacks. This scheme has some advantages such as secrecy of session key, password privacy, and mutual authentication. The performance and security analyses prove that the scheme is very efficient and mathematically immune for attackers.
Intelligent security system detects the hidden objects in the smart grid
Ammar Wisam Altaher;
Abdullah Hasan Hussein
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp188-195
Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.
Speaker ethnic identification for continuous speech in malay language using pitch and MFCC
Rafizah Mohd Hanifa;
Khalid Isa;
Shamsul Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp207-214
Voice recognition has evolved exponentially over the years. The purpose of voice recognition or sometimes called speaker identification, is to identify the person who is speaking. This can be done by extracting features of speech that differ between individuals due to physiology (shape and size of the mouth and throat) and also behavioral patterns (pitch, accent and style of speaking). This paper explains an approach of voice recognition to identify the ethnicity of Malaysian people. Pitch and 13 Mel-Frequency Cepstrum Coefficients (MFCCs) are extracted from 52 recorded continuous speech in Malay for use as features to train the classifiers using Tree, Naïve Bayes, Nearest Neighbors and Support Vector Machine (SVM) and another 10 recorded speeches are used for testing. The results reveal that the use of a combination of pitch and 13 coefficients for features extraction and training the data using SVM provide better accuracy (57.7%) than the use of only 13 coefficients (53.8%).
A hybrid water cycle-particle swarm optimization for solving the fuzzy underground water confined steady flow
Elsayed Metwalli Badr;
Horia Elgendy
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp492-504
Groundwater sustainability is the development and use of groundwater resources to meet current and future beneficial uses without causing unacceptable environmental or socioeconomic consequences. This study is the first time to apply the hybrid optimization technique for solving of managing underground water aquifers, the confined steady flow problems, where a hybrid water cycle - particle swarm optimization WCA-PSO is proposed. In particular, we introduce a novel hybrid algorithm using water cycle algorithm (WCA) and particle swarm Optimization (PSO). The performance of the novel hybrid algorithm WCA-PSO is evaluated to solve 10 benchmark problems chosen from literature. The simulation results and comparison with pure WCA and PSO algorithms confirm the effectiveness of the proposed algorithm WCA-PSO for solving various benchmark optimization functions. Finally, we solve the problem of managing underground water aquifers by WCA, PSO and the hybrid optimization WCA-PSO. The experimental results analysis and statistical tests prove that the hybrid algorithm WCA-PSO overcomes the pure algorithms.