cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 25 Documents
Search results for , issue "Vol 2, No 2: May 2016" : 25 Documents clear
Lifetime Prolonging for Clustered Heterogeneous Wireless Sensor Networks by SEP-FUZZY Basim Abood; Muhammed Shemyal Nisar; Aliaa Hussien; Yu Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp380-389

Abstract

The most important consideration in designing protocols for wireless sensor networks is the energy constraint of nodes because in most cases battery recharging is inconvenient or impossible. Therefore, many researches have been done to overcome this demerit. Clustering is one of the main approaches in designing scalable and energy-efficient protocols for WSNs.In this paper, we proposed a novel scheme to investigate the cluster, the Fuzzy Logic Cluster Stable Election Protocol (SEP - FUZZY), which uses Fuzzy Logic Inference System (FIS) in the cluster process. We compare our technique with two approaches (LEACH, and SEP) to show that using a multi parameter FIS enhances the network lifetime significantly. Simulation results demonstrate that the network lifetime achieved by the proposed method could be increased by nearly 27% more than that obtained by LEACH protocol, and by nearly 23% more than that obtained by Stable Election Protocol.
Extension of Linear Channels Identification Algorithms to Non Linear Using Selected Order Cumulants Mohammed Zidane; Said Safi; Mohamed Sabri
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp334-343

Abstract

In this paper, we present an extension of linear communication channels identification algorithms to non linear channels using higher order cumulants (HOC). In the one hand, we develop a theoretical analysis of non linear quadratic systems using second and third order cumulants. In the other hand, the relationship linking cumulants and the coefficients of non linear channels presented in the linear case is extended to the general case of the non linear quadratic systems identification. This theoretical development is used to develop three non linear algorithms based on third and fourth order cumulants respectively. Numerical simulation results example show that the proposed methods able to estimate the impulse response parameterswith different precision.
A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN Yassine Maleh; Abdellah Ezzati
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp431-451

Abstract

Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, we present an illustration of different attacks and vulnerabilities in WSN. Then we proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Our evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
Model Predictive Current Control of Grid Connected PV Systems Satya Ravi Rai; Jaya Kumar S V; Keerthi Deepika K
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp285-296

Abstract

This paper deals with the design and simulation of an efficient solar photovoltaic system with a maximum power point tracking system (MPPT). Maximum power point (MPP) is obtained by using Perturb and Observe (P&O) algorithm. The output from solar panel is fed to the DC-DC (Boost) converter which steps up the output voltage. It is then fed to a 3-phase inverter. The inverter used is a 3-phase two-level inverter implemented with a Model Predictive Control strategy. Model of the system is considered in order to predict the control variables. Optimum switching state is selected by minimizing the cost function for each sampling period. This is achieved through modelling and MATLAB simulation of various stages that constitute the overall system.
Energy Preservation in Heterogeneous Wireless Sensor Networks through Zone Partitioning Shahzad Hassan; Muhammad S.Nisar; Hongbo Jiang
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp390-395

Abstract

Energy preservation is critical task in the wireless sensor networks and the energy cost increases proportionally as the transmission distance increases. Since nodes are equipped with limited energy it is very crucial to decrease the energy consumption by decreasing the communication distance between the nodes. In clustering protocols inter-cluster and intra-cluster communication is most neglected part. We have proposed a new zone based clustering protocol which reduces the intra- clustering and inter-clustering transmission distance between the communicating nodes. Experimental results reveal that our proposed protocols have outperformed the compared protocols in terms of stability period, instability period and throughput.
Reconfiguration of Distribution Networks with Presence of DGs to improving the Reliability Amir Sabbagh Alvani; Seyed Mehdi Mahaei
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp241-247

Abstract

In this paper, the network reconfiguration in the presence of distributed generation units with the aim of improving the reliability of the network is studied. For this purpose four reliability parameters in the objective function are considered, which is average energy not supplied system average interruption frequency index, system average interruption duration index and momentary average interruption frequency index. The new method will be normalized objective function. Another suggestion of this paper are considering the different fault rates, locating time of faults type and prioritization of customers based on their importance. This nonlinear problem has optimized by particle swarm optimization (PSO) algorithm.
Improved UFIR Tracking Algorithm for Maneuvering Target Shoulin Yin; Jinfeng Wang; Tianhua Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp344-350

Abstract

Maneuvering target tracking is a target motion estimation problem, which can describe the irregular target maneuvering motion. It has been widely used in the field of military and civilian applications. In the maneuvering target tracking, the performance of Kalman filter(KF) and its improved algorithms depend on the accuracy of process noise statistical properties. If there exists deviation between process noise model and the actual process, it will generate the phenomenon of estimation error increasing. Unbiased finite impulse response(UFIR) filter does not need priori knowledge of noise statistical properties in the filtering process. The existing UFIR filters have the problem that generalized noise power gain(GNPG) does not change with measurement of innovation. We propose an improved UFIR filter based on measurement of innovation with ratio dynamic adaptive adjustment at adjacent time. It perfects the maneuvering detect-ability. The simulation results show that the improved UFIR filter has the best filtering effect than KF when process noise is not accurate.
Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud Salah H. Abbdal; Thair A. Kadhim; Zaid Ameen Abduljabbar; Zaid Alaa Hussien; Ali A. Yassin; Mohammed Abdulridha Hussain; Salam Waley
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp452-460

Abstract

Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
Review on AC-AC Converter Based Dynamic Voltage Restorer Tamilvanan G.; Mahendran S.
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp297-304

Abstract

The maintain power quality is one of the major part of all kind of industry as well as power systems. Voltage sag and voltage swell the common power quality issue. The Dynamic Voltage Restorer is the common Device which is used to mitigate the above problems. In this paper provides review on various type of AC-AC converter based DVR. The use of AC-AC converter can compensate the voltage sag and swell without need of any kind of storage elements like capacitor and batteries. The absence of storage elements can reduce size and weight of the DVR. The feature various type of AC- AC converters based DVR is concentrated in this paper.
RFID Personnel Control System That Can Be Managed Via 4.5G Abdülkadir ÇAKIR; Halil KAYGISIZ
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp396-408

Abstract

The current study aimed to reveal that personnel control by the employer should be conducted using Radio Frequency Identification (RFID) technology in an easier and more modular way. The most important feature differentiating the RFID from the existing technologies is that it works wirelessly. The hardware used in the study can be managed via Ethernet port. In this study, it is ensured that data be transmitted via Internet by using a mobile cellular communication system. The control of the set up system can be conducted wirelessly via any environment in which an Internet connection can be established. Thanks to the created system, information about arrival and departure dates of the places to where the mobile personnel should go can be monitored 24/7 from anywhere that has internet connection. As a result of the tests and applications that have been conducted, it has been seen that the data could not be transmitted in a radio-frequency environment because of the error caused by the RFID tag. As a result of the calculations made after the application, it has been put forward that the error margin is 7±1%.

Page 1 of 3 | Total Record : 25


Filter by Year

2016 2016


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue