Articles
68 Documents
Search results for
, issue
"Vol 20, No 1: October 2020"
:
68 Documents
clear
Sensitivity analysis based artificial neural network approach for global solar radiation prediction in India
Rajasekaran Meenal;
A. Immanuel Selvakumar;
Prawin Angel Michael;
Ekambaram Rajasekaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp31-38
The objective of this paper is to build an artificial neural network model to predict global solar radiation (GSR) with improved accuracy using less number of best input parameters selected using sensitivity analysis. In this work, the input parameters used for training the artificial neural network (ANN) models are bright sunshine duration, maximum and minimum temperature, day length, months, extra terrestrial radiation (H0), relative humidity and geographical parameters of the locations namely the latitude and longitude. Sensitivity analysis is used to discover how the output data are influenced by the changeability of the input data.Three ANN models namely T-ANN, S-ANN and TS-ANN are proposed with most suitable input parameters selected using sensitivity analysis. The principle of this feature selection using sensitivity analysis is to improve the prediction accuracy of solar radiation models with less number of inputs. The proposed ANN model is also tested under noisy data and proved that ANN is able to perform reasonably good in GSR prediction on practical applications where the data is affected by noise caused by errors on measuring, fault of data acquisition system, recording problems, and so on.
An overview of traffic congestion detection and classification techniques in VANET
Nurshahrily Idura Ramli;
Mohd Izani Mohamed Rawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp437-444
Vehicular traffic congestion has been and still is a major problem for many countries and knowledge about the traffic condition is important in order to schedule, plan and avoid traffic congestion. With recent development in technology, various efforts and methods are proposed in mitigating traffic congestion. Vehicular Ad-hoc NETwork (VANET) is very much in the hype in addressing this issue due to its capabilities and adaptation to scalability, highly dynamic topology as well as cooperative communication. A popular focus is in detecting and classisying traffic congestion which presents various techniques and methodologies. This paper presents an overview of traffic congestion detection and classification methods of various related techniques in VANET, organized from the research perspective. Qualitative analysis is presented to classify these strategies in its system architecture, detection and classification methods, as well as its simulated mobility environment and simulation tools used. The analysis is useful in understanding all the techniques and methods applied in resolving this issue in the research domain.
Improving data quality using a deep learning network
Chulhyun Hwang;
Kyouhwan Lee;
Hoekyung Jung
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp306-312
IoT data is collected in real time and is treated as highly reliable data because of its high precision. However, it often exhibits incomplete values for reasons such as sensor aging and failure, poor operating environment, and communication problems. The characteristics of IoT data transmitted with high precision and time series are suitable to use LSTM, which is one kind of RNN. In this paper, when applying LSTM to data quality improvement in IoT environment where data are collected simultaneously from several sensors, it is suggested that it is effective to construct LSTM individually for each sensor accuracy.
Optimal short-term hydro-thermal scheduling using multi-function global particle swarm optimization
Surender Reddy Salkuti
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp537-544
An optimal short-term hydro-thermal scheduling (ST-HTS) problem is solved in this paper using the multi-function global particle swarm optimization (MF-GPSO). A multi-reservoir cascaded hydro-electric system with a non-linear relationship between water discharge rate, power generation and net head is considered in this paper. The ST-HTS problem determines the optimal power generation of hydro and thermal generators which is aimed to minimize total fuel cost of thermal power plants during a determined time period. Effects of valve point loading and prohibited operating zones in the fuel cost function of the thermal power plants is examined. Power balance, reservoir volume, water balance and operation constraints of hydro and thermal plants are considered. The effectiveness and feasibility of MF-GPSO algorithm is examined on a standard test system, and the simulation results are compared with other algorithms presented in the literature. The results show that the MF-GPSO algorithm appears to be the best in terms of convergence speed and optimal cost compared with other techniques reported in the literature.
Deep image mining for convolution neural network
Dhamea A. Jasm;
Murtadha M. Hamad;
Azmi Tawfek Hussein Alrawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp347-352
Image mining is the method of searching and discovering valuable information and knowledge from a huge image dataset. Image mining is based on data mining, digital image processing, machine learning, image retrieval, and artificial intelligence. Image mining handled with the hidden information extraction, an association of image data and additional pattern which are not clearly visible in the image. Choosing the proper objects or the feature of the image to be suitable for image mining process is the main challenge would face the programmer. The process includes fine out the most efficient routes at a shorter time and saving the users effort. The main objective of this paper is to design and implement the image classification system with a higher performance, where a CIFAR-10 data set is used to train and testing classification models using CNN. A convolutional neural network is trustworthy, and it could lead to high-quality results. The high accuracy of 98% has been obtained using deep convolutional neural network (DCNN).
Impact of engineering parameters on performance of relay-assisted network
Issam Maaz;
Jean-Marc Conrat;
Jean-Christophe Cousin;
Samer Alabed
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp248-255
This paper compares the performance of a relay assisted network to the performance given by a classical macrocell network without the presence of relay node schemes. The capacity enhancement provided by a relaying system as a function of the relay antenna height and the propagation environment surrounding the relay nodes is analyzed and discussed in details. The analysis in this work is based on the theoretical Shannon capacity where both measured/experimental path loss and calibrated path loss models are taken into consideration. In this work, we assume a decode and forward scheme, a full-duplex relaying protocol and an optimized relay location is investigated. A 30 % of improvement in the macrocell capacity is achieved with the usage of relaying scenario compared to a classical macrocell network. Furthermore, increasing the relay antenna height from 4 meters to 12 meters can significantly increase the relay capacity to more than 20 % in suburban and moderate urban environments.
Neutral expression synthesis using kernel active shape model
Marcella Peter;
Jacey-Lynn Minoi;
Suriani Ab Rahman
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp150-157
This paper presents a modified kernel-based Active Shape Model for neutralizing and synthesizing facial expressions. In recent decades, facial identity and emotional studies have gained interest from researchers, especially in the works of integrating human emotions and machine learning to improve the current lifestyle. It is known that facial expressions are often associated with face recognition systems with poor recognition rate. In this research, a method of a modified kernel-based active shape model based on statistical-based approach is introduced to synthesize neutral (neutralize) expressions from expressional faces, with the aim to improve the face recognition rate. An experimental study was conducted using 3D geometric facial datasets to evaluate the proposed modified method. The experimental results have shown a significant improvement on the recognition rates.
Optimal power scheduling for economic dispatch using moth flame optimizer
N. A. M. Kamari;
M. A. Zulkifley;
N. F. Ramli;
I. Musirin
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp379-384
This paper proposes the optimal generator allocation to solve economic dispatch (ED) problem in power system using moth flame optimizer (MFO). With this approach, the optimum power for each unit generating in the system will be searched based on the power constraints per unit and the amount of power demand. The objective function of this study is to minimize the total cost of generation. The amount of power loss is measured to determine the effectiveness of the proposed technique. The performance of the MFO technique is also compared to the evolutionary programming (EP) and particle swarm optimization (PSO) methods. Five- and thirty-bus power system networks are selected as test systems and simulated using MATLAB. Based on simulation results, MFO provides better results in regulating the optimum power generation with minimum generation cost and power loss, compared to EP and PSO.
Hybrid order characteristics in car-following behavior
Chunling Tu;
Shengzhi Du
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp158-166
This paper addresses the discovery of an interesting property in car-following processes, which was not reported in the existing literatures. A hybrid order behavior is supported by both experimental data and theoretical simulations. To demonstrate this behavior, the first order and the second order car-following behaviors are defined. Then, by comparing the first and the second order car-following behaviors in the existing analystic models and the real traffic context, this paper finds that a significant amount of the second order car-following processes in real traffic context do not match the existing models and structural mismatches are observed. The popularity and significance of such cases suggest the existence of unmodelled dynamics in the existing methods, that is, the car following behavior should be determined by more factors than the immediate proceeding vehicle. Therefore, the existing car-following models must be improved to accommodate these factors. This forms one of the main values of this paper. This paper then defines the hybrid order car-following behavior and prompts to associate this behavior with the concerned unmodelled dynamics (mismatches between the actual traffic data and the simulation from models). The neural network is employed to model such dynamics. The idea of the proposed hybrid order behavior matches the fact that the car-following behavior is determined by multiple vehicles driving in front of the subject car instead of only the immediate proceeding one. This is valuable because it provides guidance on the improvement of existing car-following models. The neural network model validates that the consideration of multiple vehicles improves the accuracy of car-following modelling.
Design and implementation of pipelined and parallel AES encryption systems using FPGA
Mohamed Nabil;
Ashraf A. M. Khalaf;
Sara M. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp287-299
The information security is one of the most important issues in the design of any communication network.One of the most common encryption algorithms is the advanced encryption standard (AES).The main problem facing the AES algorithm is the high time consumption due to the large number of rounds used for performing the encryption operation. The more time the encryption system consumes to encrypt the data, the more chances the hackers have to break the system.This paper presents two effective algorithms that can be used to solve the mentioned problem and to achieve an effective processing time reduction using pipelined and parallel techniques to perform the encryption steps. These algorithms are based on using certain techniques to make the system able to encrypt many different states (the data will be encrypted) in the same time with no necessity to wait for the previous encryption operation to be completed. These two algorithms are very effective especially for big data size. This paper describes in detail the AES encryption system algorithm and a detailed explanation for the proposed algorithms. Moreover, the research shows the implementation of the three algorithms: the traditional, the pipelined, and the parallel algorithms, and finally a comparison between them.