cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 66 Documents
Search results for , issue "Vol 19, No 1: July 2020" : 66 Documents clear
New reliable modifications of HPM and HAM Khawlah Hussain
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp371-379

Abstract

In this article, a new modification of the homotopy perturbation method (HPM) and homotopy analysis method (HAM) is presented and applied to non-homogeneous fractional Volterra integro-differential equations with boundary conditions. A comparative study between the new modified homotopy perturbation method (MHPM) and the new modified homotopy analysis method (MHAM). Several illustrative examples are given to demonstrate the effectiveness and reliability of the methods.
Gesture recognition vehicle using PIC microcontroller K. Selvakumar; Palanisamy R; M.Arun Noyal Doss; P. Gopi; A. Esakkipandi; L. Mathivadhanam; T. Abul Kalam Asath
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp66-75

Abstract

In this paper we introduce a hand controlled robotic vehicle. Hand control robotic vehicle consists of a transmitter module and a receiver module. The transmitter will be placed on a hand glove and the receiver will be placed on the motor drive along with PIC microcontroller and motor driver IC. The RF transmitter sends commands to the IC which then forwards the commands to RF receiver. The RF receiver then sends the commands to PIC microcontroller on the vehicle which processes the commands so that the vehicle moves in the specified direction. It is having proposed utility in field ofconstruction, hazardous waste disposal and field  survey near borders etc. This project is developed as a travel buddy and industrial uses. Having future scope of advanced robotics that are designed and can be easily controlled using hand gesture only.
Modified FCS-MPC algorithm for five-leg voltage source inverter Riyadh Ghanem Omar
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp47-57

Abstract

This paper represents a test of a modified algorithm to minimize the cost function in the traditional finite control-set model predictive current control (FCS-MPC) to control the (five-leg) DC voltage input inverter. A Matlab/Simulink description of a system presents a certain deviation limits between the reference and the actual measured phase currents, also the model implements a load current limitation. The algorithm picks out a proper switching state, which makes the lower error value between the wanted and the prognosticated currents; the proposed technique sets the chosen switching state as a driving signal to the ten switches. The modified program eliminates the switching combination with error values above the requested ones. Thereafter the system response enhanced by lowering the overshoots. The rigidness of the model is examined by using a step change in reference signals.
Acceptance of mobile payments by retailers using UTAUT model Nor Hapiza Mohd Ariffin; Fauziah Ahmad; Umar Mohd Haneef
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp149-155

Abstract

Mobile payment is a form of payment transaction processing where the payer utilizes mobile communication methods together with mobile devices to initiate, authorize or complete payment. Hence, with the huge increase in mobile device usage, the retail sector will be able to collect large volumes of data. Unfortunately, most Malaysians still do not make full use of digital payments or cashless payments. Consumers in South East Asia still tend to use money or bank cards, and companies have been "limitedly effective" in encouraging a cashless revolution. The objective of this study was to identify the acceptance of mobile payment by retailers, the factors that contribute to the acceptance of mobile payment and the relationship between the factors were also the aim of this research. Several factors were contributing to mobile payments such as performance expectancy, effort expectancy, social influence, facilitating conditions, habit, privacy, perceived security and intentions which was based on the UTAUT model. This study used questionnaires to collect data and the data analysis was carried out using SPSS software. Based on the analysis that has been conducted, it can be seen that all the hypotheses of this research have a significant relationship except for the relationship between privacy and intentions that has a negative linear relationship. It is hoped that this research will give values to retailers with an understanding of the contributing factors that affect their acceptance of mobile payment technology in the retailing business.
DA systematic approach for solving mixed constraint fuzzy balanced and unbalanced transportation problem Ahmed Hamoud; Kirtiwant Ghadle; Priyanka Pathade
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp85-90

Abstract

In the present article, a mixed type transportation problem is considered. Most of the transportation problems in real life situation have mixed type transportation problem this type of transportation problem cannot be solved by usual methods. Here we attempt a new concept of Best Candidate Method (BCM) to obtain the optimal solution. To determine the compromise solution of balanced mixed fuzzy transportation problem and unbalanced mixed fuzzy transportation problem of trapezoidal and trivial fuzzy numbers with new BCM solution procedure has been applied. The method is illustrated by the numerical examples.
PV system reactive power coordination with ULTC & shunt capacitors using grey wolf optimizer algorithm Mogaligunta Sankaraiah; S Suresh Reddy; M Vijaya Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp1-10

Abstract

The presence of PV systems increases rapidly in distribution systems to improve reliability and quality of supply. This will influence the performance of under load tap changing (ULTC) transformer and related reactive power devices. Therefore, many researchers are working on this area. This paper main objective is to reduce switching operations of reactive power devices (ULTC and Shunt capacitors) together with system power loss.  Distribution system load and solar system power will predict one day in advance and grey wolf optimizer (GWO) algorithm proposed to solve the objective function. Reactive power of solar system is coordinated together with ULTC and shunt capacitors (SCs) with the aid of forecasted load. Distribution system losses and switching operations of ULTC and SCs converted into objective function in terms of cost. The proposed method is applied on practical 10KV system and the results are compared with conventional and particle swarm optimization (PSO) methods considering grid conditions.
E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm Salah H. Abbdal Refish; Salam Waley Shneen
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp485-491

Abstract

Users need more efficient and more secure  when they use the Internet. Password authentication code (PAC) is the critical issue in many applications such as web-sites and data base systems etc. In this paper, PAC between two users to confirm authentication between them based two factors has presented.. Two factors is the most good solution in this field. A legitimate user needs to make sure about his partner to ensure their communication.  So, this solution produces two important algorithms, the first one is utilized the Diffie-Hellman which considered the base of this work. The second is routing in message passing networks (RMPN) algorithm which determine the positions of bits which sent to specific party. The overall of this method convincingly to be more secure against both online and offline attacks. This scheme has some advantages such as secrecy of session key, password privacy, and mutual authentication. The performance and security analyses prove that the scheme is very efficient and mathematically immune for attackers.
Intelligent security system detects the hidden objects in the smart grid Ammar Wisam Altaher; Abdullah Hasan Hussein
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp188-195

Abstract

Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.
Speaker ethnic identification for continuous speech in malay language using pitch and MFCC Rafizah Mohd Hanifa; Khalid Isa; Shamsul Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp207-214

Abstract

Voice recognition has evolved exponentially over the years. The purpose of voice recognition or sometimes called speaker identification, is to identify the person who is speaking. This can be done by extracting features of speech that differ between individuals due to physiology (shape and size of the mouth and throat) and also behavioral patterns (pitch, accent and style of speaking). This paper explains an approach of voice recognition to identify the ethnicity of Malaysian people. Pitch and 13 Mel-Frequency Cepstrum Coefficients (MFCCs) are extracted from 52 recorded continuous speech in Malay for use as features to train the classifiers using Tree, Naïve Bayes, Nearest Neighbors and Support Vector Machine (SVM) and another 10 recorded speeches are used for testing. The results reveal that the use of a combination of pitch and 13 coefficients for features extraction and training the data using SVM provide better accuracy (57.7%) than the use of only 13 coefficients (53.8%).
A hybrid water cycle-particle swarm optimization for solving the fuzzy underground water confined steady flow Elsayed Metwalli Badr; Horia Elgendy
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp492-504

Abstract

Groundwater sustainability is the development and use of groundwater resources to meet current and future beneficial uses without causing unacceptable environmental or socioeconomic consequences. This study is the first time to apply the hybrid optimization technique for solving of managing underground water aquifers, the confined steady flow problems, where a hybrid water cycle - particle swarm optimization WCA-PSO is proposed. In particular, we introduce a novel hybrid algorithm using water cycle algorithm (WCA) and particle swarm Optimization (PSO). The performance of the novel hybrid algorithm WCA-PSO is evaluated to solve 10 benchmark problems chosen from literature. The simulation results and comparison with pure WCA and PSO algorithms confirm the effectiveness of the proposed algorithm WCA-PSO for solving various benchmark optimization functions. Finally, we solve the problem of managing underground water aquifers by WCA, PSO and the hybrid optimization WCA-PSO. The experimental results analysis and statistical tests prove that the hybrid algorithm WCA-PSO overcomes the pure algorithms.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue