cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 67 Documents
Search results for , issue "Vol 19, No 3: September 2020" : 67 Documents clear
Dynamic spectrum access using markov chain technique for regional area network Jayant P Pawar; Prashant V. Ingole
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1420-1427

Abstract

Cognitive Radio Network is the effective solution to the spectrum scarcity.  Dynamic spectrum access is a paradigm used to access the spectrum dynamically. A Markov Chain is a stochastic model describing a sequence of possible events in which probability of each event depends only on the state attained in the previous event. We model the dynamics of cognitive user with 2-D Markov chain. The resource distribution probability (RDP) verses addition/ elimination rate of the channels in the network is also plotted. The RDP verses utilization factor of the queue, which is the secondary user in the network, is also plotted. This plot helps to maintain the total arrival and departure rate based on the RDP. The base station of the network will use this relation to maintain the proper RDP for the devices. The dynamics of each cognitive user and its correlation with Markov Chain is an interesting approach. Here we considered the DSA at Base Station as a Markov chain and analyzed it. This analysis helps us to determine the behavior of the cognitive radio and also helps to find the fault in the cognitive devices. 
A multiband and wideband frequency reconfigurable slotted bowtie antenna Izni Husna Idris; Mohamad Rijal Hamid; Kamilia Kamardin; Mohamad Kamal A. Rahim; Huda A. Majid
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1399-1406

Abstract

A multiband and wideband frequency reconfigurable antenna is presented. A wideband from 3.5 GHz to 9.0 GHz is achieved by introducing one stripline in the middle of a slotted bowtie antenna, whereas multiband is obtained by integrating an additional two slotted arms at the end of bowtie-shaped. As a result, the antenna operated at multiband mode (1.7 GHz and 2.6 GHz) and wideband mode (3.5 GHz to 9.0 GHz) simultaneously. The reconfigurability of the antenna is attained through switches. Five states are achieved with three  pairs of switches configurations. All results are presented and discussed, including S11, current distribution, radiation pattern, and gain. The antenna is suitable to be used in multimode communication systems.
Faulty antenna detection in a linear array using simulated annealing optimization Navaamsini Boopalan; Agileswari K. Ramasamy; Farrukh Hafiz Nagi
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1340-1347

Abstract

Sonar, radar and communication systems solely depend on antenna arrays for signal attainment. These arrays are capable of producing directional signals which can be steered in a certain direction. Faulty elements in an array will result in distorted radiation pattern with increased sidelobe levels.  Far-field faulty antenna detection is necessary due to the near field repairing at complex systems like spacecraft. This paper proposes simulated annealing (SA) optimizing method to find the faulty element’s location in a linear array. In this study, a Chebyshev array is presented with the SA optimization method to detect faulty element location with a random permutation of failure locations tested. This method can successfully detect faulty antenna in a linear array. Even though, this method is developed for linear array it can easily be adapted to a planar array.
Survey on computational intelligence based image encryption techniques Thirumalaimuthu Ramanathan; Md. Jakir Hossen; Md. Shohel Sayeed; Joseph Emerson Raja
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1428-1435

Abstract

Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption.
Development of marine observation system using LPWA communication system for marine IoT service Se-Hoon Kim; Min-Ho Jeon; Yeon-Ju Jo; Chang-Heon Oh
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1556-1563

Abstract

Because oceans account for 70.8% of the Earth's surface, various internet of things (IoT) applications for the marine industry are being researched and developed. The success of an IoT technology in the maritime industry depends on the location tracking technology used and how far it can communicate. In this study, we implemented a marine observation system using low power wide area (LPWA) communication technology to provide maritime IoT services. The proposed marine observation system consists of a marine IoT module and an ocean observation monitoring system. The information collected is GPS information and communication signal reception strength. As a result of an actual field test, we were able to obtain the distance to the gateway by measuring the position through the marine IoT module, and we found that the intensity of communication was proportional to the change in sea level.
Cost estimation methods for internet infrastructure deployment in Rural Sarawak: a review Abel Chai Yu Hao; Chean Hung Lai; Hieng Tiong Su; Yi Lung Then; Fei Siang Tay; Patrick Hang Hui Then; Natalie Lim Chen Yi
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1375-1383

Abstract

In rural Sarawak, the internet accessibility is low due to unreliable power grids to support telecommunication network and large geographical area. The risk for network infrastructure implementation is high for internet service provider (ISP), thus more practical and accurate cost estimation methods should be used. This paper reviews different types of cost estimation methods and the accuracy and feasibility of each methods are discussed and compared for network infrastructure implementation in rural Sarawak. The unique characteristics of rural Sarawak are considered in this work, including the topography, development of rural areas and acceptance of new technologies. Different cost estimation methods are identified for different senarios and availability of data.
Development of solar panel cleaning robot using Arduino Faridah Hanim Binti Mohd Noh; Muhamad Faizal Yaakub; Ili Najaa Aimi Mohd Nordin; Norain Sahari; Nor Aira Zambri; Sim Sy Yi; Muhammad Syukri Mohd Saibon
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1245-1250

Abstract

Solar power is mainly harnessed from photovoltaic (PV) panels which are arranged in multiple arrays in a solar farm or solar system. Though, power generation from PV solar system is characterised by uncertain efficiency, many countries with high insolation prefer solar as an alternative way of generating clean energy. However, the efficiency of energy generated from PV panels is affected by the accumulation of dust and debris, even on one panel in an array. This condition leads to the need for regular cleaning of the surface of PV panels. Current labour-based cleaning methods for photovoltaic arrays are costly in time, water and energy usage as well as lacking in automation capabilities. To overcome this problem, a fully automatic solar panel cleaning system with/without water is proposed. Hence, in this paper, the design of a robot for automated cleaning of the surface of PV panel is presented. The design utilizes an Arduino controller system to control the robot movement during the cleaning process. In addition, it is equipped with two rough sponge and a water pump system that can be used to clean dust or debris found on PV panel surfaces. The efficiency of the PV panels before and after the cleaning process is also observed. The result shows that the developed solar panel cleaning robot is able to clean the panel effectively and increase back the output current as well as the maximum power of the panel by 50%, after the dust on the PV panel is cleaned.
Design and implementation of fast floating point units for FPGAs Mohammed Falih Hassan; Karime Farhood Hussein; Bahaa Al-Musawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1480-1489

Abstract

Due to growth in demand for high-performance applications that require high numerical stability and accuracy, the need for floating-point FPGA has been increased. In this work, an open-source and efficient floating-point unit is implemented on a standard Xilinx Sparton-6 FPGA platform. The proposed design is described in a hierarchal way starting from functional block descriptions toward modules level design. Our implementation used minimal resources available on the targeting FPGA board, tested on Sparton-6 FPGA platform and verified on ModelSim. The open-source framework can be embedded or customized for low-cost FPGA devices that do not offer floating-point units.
Enhancing advance encryption standard security based on dual dynamic XOR table and MixColumns transformation Adnan Ibrahem Salih; Ashwaq Mahmood Alabaichi; Ammar Yaseen Tuama
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1574-1581

Abstract

An efficient approach to secure information is critically needed at present. Cryptography remains the best approach to achieve security. On this basis, the national institute of standards and technology (NIST) selected Rijndael, which is a symmetric block cipher, as the advanced encryption standard (AES). The MixColumns transformation of this cipher is the most important function within the linear unit and the major source of diffusion. Dynamic MixColumns transformation can be used to enhance the AES security. In this study, a method to enhance the AES security is developed on the basis of two methods. The first method is an extension of a previous study entitled “A novel Approach for Enhancing Security of Advance Encryption Standard using Private XOR Table and 3D chaotic regarding to Software quality Factor.” In the current study, the fixed XOR operation in AES rounds is replaced with a dual dynamic XOR table by using a 3D chaotic map. The dual dynamic XOR table is based on 4 bits; one is used for even rounds, and the other is used for odd rounds. The second method is dynamic MixColumns transformation, where the maximum distance separable (MDS) matrix of the MixColumns transformation, which is fixed and public in every round, is changed with a dynamic MDS matrix, which is private, by using a 3D chaotic map. A 3D chaotic map is used to generate secret keys. These replacements enhance the AES security, particularly the resistance against attacks. Diehard and NIST tests, entropy, correlation coefficient, and histogram are used for security analysis of the proposed method. C++ is used to implement the proposed and original algorithms. MATLAB and LINX are used for the security analysis. Results show that the proposed method is better than the original AES.
Implementation of a bit permutation-based advanced encryption standard for securing text and image files Heidilyn V Gamido
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1596-1601

Abstract

The paper proposes a modification of the advanced encryption standard (AES) to address its high computational requirement steaming from the complex mathematical operations in the MixColumns Transformation which makes the encryption process slow. Bit Permutation was used instead of the MixColumns Transformation since the use of bit permutation in an encryption algorithm achieves efficiency by providing minimum encryption time and memory requirement. Results of the study showed that the modified AES algorithm exhibited faster encryption by 18.47% and faster decryption by 18.77% for text files. The modified AES algorithm also resulted to 16.53% higher avalanche effect compared with the standard AES thus improving the security performance. Application of the modified AES in encrypting images in Cipher Block Chaining mode showed that the modified algorithm also exhibited 16.88% faster encryption and 11.96% decryption compared with the standard AES. Likewise, modifying the algorithm achieved the ideal result in the histogram analysis, information entropy, the correlation coefficient of adjacent pixels to resist statistical attack.  The ideal value in number of pixels change rate and unified average change intensity were also achieved making the modified algorithm resistant to differential attack. These results show that modifying AES by using bit permutation to replace MixColumns Transformation was able to address the high computational requirement of the algorithm resulting in a faster and more secure encryption algorithm for text files and images.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue