cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 67 Documents
Search results for , issue "Vol 19, No 3: September 2020" : 67 Documents clear
Performance comparison of field oriented control based permanent magnet synchronous motor fed by matrix converter using PI and IP speed controllers Mohamed Bouazdia; Mohamed Bouhamida; Rachid Taleb; Mouloud Denai
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1156-1168

Abstract

This paper focuses on modeling and closed-loop speed control of a three-phase Permanent Magnet Synchronous Motor (PMSM) fed by a Matrix Converter (MC) based on Field-Oriented Control (FOC). The model considers a set of a small input filter with supply impedance or cable effect, to improve the quality of the input current. A simplified form of the Venturini modulation algorithm is used for switching the matrix converter and a comparative study of two types of speed controllers is presented, namely a proportional integral (PI) and a proportional integral (PI) to improve performances of the drive system in transient and stable conditions. The overall drive system is simulated using Matlab/Simulink environment. The motor performance is evaluated under different operating conditions such as sudden changes in the load or changes in the angular speed reference. The results of the converter MC gives unlimited output frequency, sinusoidal input current and output voltage waveforms and unity input displacement factor. The IP controller is shown to achieve better performance of the speed control loop, with or without the load torque as compared to the PI classic controller.
Coaxial treatment chamber for liquid food treatment through pulsed electric field Rai Naveed Arshad; Zulkurnain Abdul Malek; Mohd. Hafizi Ahmad; Zolkafle Buntat; C L G Pavan Kumara; Asaad Zuhair Abdulameer
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1169-1176

Abstract

Over the last couple of decades, pulsed electric field (PEF) attained substantial consideration in the food industry with an effort to generate replacements to conventional thermal treatment. It is recognised to produce secure and chill-stable liquid food samples with fresh and nutritional qualities. The uniform electric field in the treatment zone has been recognised as the main handling parameter. The design of the treatment chamber shows an essential impact on the effectiveness of the procedure by controlling homogenous treatment. This study revealed the homogeneity of the electric field strength of the different existing treatment chambers through COMSOL Multiphysics. It adopted a study to design a co-axial treatment chamber for continuous treatment of liquid samples. This research helps to take some fundamental designing steps for a new treatment chamber with a uniform distribution of the electric field.
Development of a portable electronic device for the detection and indication of fireworks and firecrackers for security personnel Aaron Don Munsayac Africa; Stephanie Claire Alberto; Travis Evan Tan
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1194-1203

Abstract

The use of fireworks and firecrackers to celebrate festivities is a very common activity in the Philippines. But due to the lack of strict control and regulation, there are unwanted risks of accidents from occurring due to the poor handling and storage conditions of these devices. Proper monitoring is important to reduce any unnecessary risks imposed on human life and property. While existing storage monitoring devices exist, the developed prototype is designed to contain sensors that are more suited in monitoring the ideal conditions of where the fireworks are stored. Monitoring the climate conditions on these devices may seem trivial at first, but such climate change can involve a rapid rise in temperature that can accidentally ignite the fireworks and deal with catastrophic damage. Another concern is the rise of humidity that may alter that chemical characteristics of the gunpowder stored in the fireworks.  Such changes may not have any noticeable effects until it arrives in the consumer, that may experience an unwanted and unintended change in the performance of the fireworks leading to accidents. Therefore, it is important for this device to properly monitor the surrounding area then indicate various forms of alarms as a method of redundancy.
A chaos-based medical image encryption method Xuehong Wang; Chunling Tu
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1316-1324

Abstract

The information in the e-health system involves the patient’s privacy which is extremely sensitive. For instance, these information record social security numbers and detailed medical history.  When the breach happens, there are illegal, or disclosure behaviors taken to privacy that should be compromised security. In this paper, the medical digital images are protected by the proposed chaos-based encryption method in the process of transmission and utilization. Then the authentication is granted to patients and telemedicine staffs by the decryption method proposed. The Qi 3-D four wing chaotic system is employed in this method. The proposed method promises the keys with higher complexity and unpredictability than traditional cryptography methods by introducing the chaotic dynamics in the new cryptography. Digital medical images are used to validate the proposed method under the brute and the differential attacks. The pixels of the image are scrambled completely based on cat map and the sub-blocks of the image are diffused in the way that the original image is changed into a chaotic image robust to all kinds of attacks. The experiments show that the proposed method has higher performance and higher computation for decryption.
Investigation of voltage regulation in grid–connected PV system Soumen Gorai; Sattianadan D; V. Shanmugasundaram; S. Vidyasagar; G. R. Prudhvi Kumar; M. Sudhakaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1131-1139

Abstract

In the present scenario the power demand on the load side is increasing day by day, so to balance the power demand and power supply various renewable energy comes to picture as the additional source of electricity generation. The power generated by various renewable resources such as solar, wind, tidal energy and geothermal sources is environmentally clean and have a less emission impact. Out of which PV system draws more attention because it generates energy with a much lower level of carbon dioxide emissions. In the proposed work the objective is to investigate the synchronisation of the grid-connected PV system in terms of voltage and frequency. It includes the P-V characteristics under the circumstances of MPPT technique such as perturb & observe (P&O) method can able to track the local maximum point. The proposed inverter is a voltage source H-Bridge inverter which is controlled using a Clarke and Park transformation to drive a controlled current into the grid to maintain the THD value within the standards. As the grid frequency is fluctuating between SRF-PLL is generally used to fix the output frequency and phase of the grid. It also includes with the design of a three-phase H-bridge inverter as an interface between PV system and grid system. The proposed work is designed and simulated in MATLAB SIMULINK 2017b environment.
Age group differences on perception of autoplay in mobile game playing among korean gamers Doo Heon Song; Seunghun Lee
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1519-1524

Abstract

Autoplay functions are embedded in most mobile role playing games and mobile multiplayer online battle arena games recently. Theoretically, there are different views on autoplay function in that it may be a ‘fake play’ from the traditional view and it is economical and gives functional benefits for game developing companies on balancing from functionalists’ view. In this paper, we investigate how this autoplay functions are perceived to the Korean mobile gamers. We report that there exists a strong age group effect on it and age 25 is the inflection point. Among 304 subjects including 69 females participated in this survey, the positive perception rate is positively proportional to the age from 36% to 73%. The reasons they choose to play autocombat function are convenience and utilizing sack times but the older groups (over 30) emphasize playing while doing other personal doings. Those who do not use autoplay function sustain the traditional view of game playing in that autoplay is ‘not’ the real game playing and there exists an age effect in that the inclination rate of autoplay function is negatively proportional to the age.
Genetic algorithm for intrusion detection system in computer network Hamizan Suhaimi; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Roslina Mohamad; Yuslinda Wati Mohamad Yusof; Murizah Kassim c
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1670-1676

Abstract

Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In network intrusion detection system (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of genetic algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   
Mitigation of overvoltage due to high penetration of solar photovoltaics using smart inverters volt/var control Dilini Almeida; Jagadeesh Pasupuleti; Janaka Ekanayake; Eshan Karunarathne
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1259-1266

Abstract

The modern photovoltaic (PV) inverters are embedded with smart control capabilities such as Volt/Var and Volt/Watt functions to mitigate overvoltage issues. The Volt/Var control has gained a significant attention in regulating grid voltage through reactive power compensation. However, the reactive power capability of a PV inverter is limited during peak irradiance and could be improved by curtailing the active power generation and by oversizing the PV inverter. This paper analyzes the performance of Volt/Var function of smart PV inverters in mitigating overvoltage issues due to high PV integration and thus increasing the hosting capacity of low voltage distribution networks (LVDNs). The study is conducted on a real Malaysian LVDN considering two different Volt/Var set points under different PV penetration levels. Results demonstrate that the oversized smart PV inverter could enhance the Volt/Var functionality by increasing its reactive power capability than a typical smart PV inverter. Further it reveals that adaptation of sensitive Volt/Var set points with shorter deadbands increase the PV hosting capacity of LVDNs.
Interaction between updated FR-CG algorithms with optimal Cuckoo algorithm Rana Z. Alkawaz; Abbas Y. AlBayati; Marwan S. Jameel
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1497-1504

Abstract

In this article we have derived two versions, ξk and ρk were derived from an algorithm based on the first suggested modified Fletcher-Reeves method in the article for the two-term CG method and another term to get a downward search towards the function minimum point with the search for an inaccurate line and we have proved rapprochement. These two algorithms combined with the Cuckoo algorithm to achieve a remarkable performance in reducing the number of repetitions in order to reach the minimization of 10 functions is unconstrained in the numerical results. 
A self-rectifying memristor model for simulation and ReRAM applications Sinan Sabah; Nasri Bin Sulaiman
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1204-1209

Abstract

In this paper, a self-rectifying memristor (SRM) model is proposed for memristive circuit simulations. This model is based on the behavior of voltage controlled, bipolar memristors that exhibit diode-like rectification behavior when reverse biased. Such unique feature can solve the sneak path problem in crossbar memristive memory structures without requiring additional cell selectors. The results show that the proposed model satisfies the basic memristor’s i-v characteristics and fits many different memristor devices adequately. The proposed model is implemented in Verilog-A so that it is conveniently incorporated into various memristor applications with different circuit simulators

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue