cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 70 Documents
Search results for , issue "Vol 20, No 3: December 2020" : 70 Documents clear
Thermal exchange optimization based control of a doubly fed induction generator in wind energy conversion systems Mohammed Mazen Alhato; Soufiene Bouallègue
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1252-1260

Abstract

This paper presents a novel design method to attain the optimal parameters of proportional integral (PI) controllers for a doubly fed induction generator (DFIG) in wind energy based on a thermal exchange optimization (TEO) algorithm. Since the gains of PI controllers are usually selected by classical and tedious trials-errors based procedures, their tuning for such a wind energy converter is formulated as a constrained nonlinear optimization problem. Inspired by Newton’s law of cooling, the TEO algorithm is successfully applied to solve such a control problem under time-domain performances and operational constraints in order to extract the maximum available power. In order to assess the performances of the proposed TEO algorithm, a comparative study between the TEO algorithm and homologues ones is performed. Moreover, a statistical analysis using Friedman and Bonferroni-Dunn’s tests indicates that the TEO lgorithm gives very competitive results in comparison to the other reported metaheuristic algorithms.
Design of experiments approach for modeling the electrical response of a photovoltaic module Fatma Zohra Kessaissia; Abdallah Zegaoui; Rachid Taleb; Chahinez Fares; Michel Aillerie
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1140-1147

Abstract

In the current paper, modeling and evaluation of the significant effect of independent variables on the behavior of the electrical response of a multi-crystalline photovoltaic (PV) module using design of experiments (DoE) approach is simulated. The main purpose of this contribution is to evaluate the maximum power response dependence within the indoor conditions of both variations of solar irradiation and surface temperature and checking the pertinent one on the defined response. the DoE approach is used for estimating both main and combined effect of the two independents considered variables. Multiple linear regression was been introduced to justify the relationship between the independent input variables and dependent output variable, also to determine which input factor is the most significant on the output variable. The DoE model can be used for predicting the response variable at different operating condition in a considered domain study. In addition, DoE approach based on statistical tool for analyzing the accuracy of the predictive model, then the significance of coefficients in the predictive model using statistical and graphical analysis. Therefore, an ANOVA Table can summarize the results, detect the parameters influences on responses variations and determine the best predictive model then reproduce the most possible the experimental data.
Detection and classification of various pest attacks and infection on plants using RBPN with GA based PSO algorithm Kapilya Gangadharan; G. Rosline Nesa Kumari; D. Dhanasekaran; K. Malathi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1278-1288

Abstract

Machine learning methodologies are commonly used in the field of precession farming. It prospects greatly in the plant safety measure like disease detection and classification of pest attacks. It highly influences the crop production and management. The venture of our system is to produce healthy plantation. The proposed system involves enhanced feature fractal texture analysis, Statistical feature selection and machine learning methodology for classification. Hence more than ever there is a need for such a tool that combines image processing methodologies and the neural network concepts and that is supported by huge cloud of structured data which makes the diagnosis and classification part much easier and convenient. The proposed system recognizes and classifies the plant taxonomy and the infection based on the selected statistical features. The neural network concept followed in our proposed system is focused on artificial neural network which uses recursive back propagation neural network to speed up the training process as well as reduce multiclass problem in the network and optimize the weights on hidden layers of the Network using Genetic algorithm based particle swarm optimization technique. We have used MATLAB to implement the concept and obtained better accuracy in disease/pest detection and proved to be an efficient method.
A new approach for improving clustering algorithms performance Anfal F. N. Alrammahi; Kadhim B. S. Aljanabi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1569-1575

Abstract

Clustering represents one of the most popular and used Data Mining techniques due to its usefulness and the wide variations of the applications in real world. Defining the number of the clusters required is an application oriented context, this means that the number of clusters k is an input to the whole clustering process. The proposed approach represents a solution for estimating the optimum number of clusters. It is based on the use of iterative K-means clustering under three different criteria; centroids convergence, total distance between the objects and the cluster centroid and the number of migrated objects which can be used effectively to ensure better clustering accuracy and performance. A total of 20000 records available on the internet were used in the proposed approach to test the approach. The results obtained from the approach showed good improvement on clustering accuracy and algorithm performance over the other techniques where centroids convergence represents a major clustering criteria. C# and Microsoft Excel were the software used in the approach.
Naïve Bayes and linear discriminate analysis based diagnostic analytic of harmonic source identification M. H Jopri; MR Ab Ghani; A.R Abdullah; Tole Sutikno; M Manap; J. Too
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1626-1633

Abstract

The diagnostic analytic type of harmonic source is a vital research due to diagnose and identify type of harmonic source that exist in the power system. This paper presents a comparison of machine learning (ML) algorithm namely as the Naïve Bayes (NB) and linear discriminate analysis (LDA) in identifying and diagnosing the harmonic sources.  The MLs inputs are the voltage and current feature sets that estimated from the time-frequency representation (TFR) of S-transform analysis. Four specific cases of harmonic source location are considered in this research, whereas harmonic voltage (HV) and harmonic current (HC) source type-load are used in the diagnosing process. The sufficiency of the proposed methodology is tested and verified on the IEEE 4-bust test feeder, and to prevent overfitting, the K-fold cross-validation technique is implemented for performance evaluation. To identify the best ML, the performance measurement consist of the accuracy, precision, geometric mean, F-measure, sensitivity, and specificity are conducted.
Total energy consumption analysis in wireless Mobile ad hoc network with varying mobile nodes Mohammed Ayad Saad; Sameer A. S. Lafta; Raed Khalid Al-Azzawi; Adnan Hussein Ali; Sameer Alani; M. M. Hashim; Bassam Hasan
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1397-1405

Abstract

The energy protocols that have a mechanisms of shortest path routing considered predominant in the networking scenarios. The interesting matter in the routing protocols designing deal with mobile ad hoc network (MANET) must have an energy efficient network for better network performances. The Performances of such routing protocols that can be assessed will be focused on many metrics like delay, throughput, and packet delivery.  MANET is a distribution network, having no infrastructure and network decentralization. There routing protocols are utilized for detecting paths among mobile nodes to simplify network communication. The performance comparison of three protocols are Optimized Link State Routing (OLSR), the second is Ad hoc On-Demand Distance Vector (AODV), while the third is Dynamic Source Routing (DSR) routing protocols concerning to average energy consumption and mobile node numbers are described thoroughly by NS-3 simulator.  The nodes number is changing between 10 and 25 nodes, with various mobility models. The performance analysis shows that the suggested protocols are superior in relations to the energy consumption for networking data transmission and the performance of the wireless network can be improved greatly.
Enhancement in resource allocation system for cloud environment using modified grey wolf technique Soukaina Ouhame; Youssef Hadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1530-1537

Abstract

Cloud computing is new trend of technology which provides services with the help of internet based on specific rules.VM is one of the main elements of cloud computing it work on virtualizations concept. Due to the growth of cloud computing user demands for better service are increasing and it make different kind of issues in cloud environment. Data allocation sysytem in VM is one of them for that reason in this paper a new technique used for improvment of data allocation system in VM for cloud computing. The improvement took place GWO algorithm two main section of this algorithm are modified which are local search section and fitness function value. The above proposed technique used to improve three main parameter of scheduling which are energy consumption, throughput and average network executation time in VM for cloud computing. The proposed technique result are compare with ABC algorithm and GWO algorithm based on those result the proposed algorithm improved the three main parameter of load balancing technique in cloud computing.
Biometric authenticator algorithm based on multiresolution analysis Kerrache Soumia; Beladgham Mohammed; Hamza Aymen; Kadri Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1332-1341

Abstract

In this paper, we propose a feature extraction method for two-dimensional imageauthentication algorithm using curvelet transform and principal component analysis(PCA). Since wavelet transform can not adequately describe facial curves features,Theproposed approach involves image denoising applying a 2D-Curvelet transform toachieve compact representations of curves singularities. To assess the performanceof the presented method, we have employed three classifification techniques: Neuralnetworks (NN), K-Nearest Neighbor (KNN) and Support Vector machines (SVM).Extensive experimental results and comparison with the existing methods show the effectiveness of the proposed recognition method in the ORL face database and CASIAiris database.
An approach for enhancing data confidentiality in Hadoop Shahab Wahhab Kareem; Raghad Zuhair Yousif; Shadan Mohammed Jihad Abdalwahid
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1547-1555

Abstract

The amount of data processed and stored in the cloud is growing dramatically. The traditional storage devices at both hardware and software levels cannot meet the requirement of the cloud. This fact motivates the need for a platform which can handle this problem. Hadoop is a deployed platform proposed to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data of the cloud system. Hadoop has no strategy to assure the safety and confidentiality of the files saved inside the Hadoop distributed File system(HDFS). In the cloud, the protection of sensitive data is a critical issue in which data encryption schemes plays avital rule. This research proposes a hybrid system between two well-known asymmetric key cryptosystems (RSA, and Paillier) to encrypt the files stored in HDFS. Thus before saving data in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in comparison to the RSA cryptosystem alone.
Biometric and RFID based authentication system for exam paper leakages detection using IoT technology J. Ann Roseela; T. Godhavari
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1271-1277

Abstract

Education is the soul of a community; it goes from one generation to another. Exam is the prime responsibility of an educational framework. The reason for an examination is to select talented applicants for multiple positions. Exam is an important aspect of the education system to test students' abilities online and in oral papers. Every year we receive deferred/canceled exam messages due to paper leakage. Therefore, we have come up with a affordable and concise outcome, and we have decided to design and implement the "Exam Paper Leak Protection Framework", which will be a much more secure structure depending on the controller. Together with RFID Reader, Fingerprints sensor, Buzzer, LCD, and Wi-Fi module. First, the university will send a selection sheet to an educational institution "electronic sealed box" known the "electronic control box". Electronic control box is a prototype that can be proposed using controller, and the RTC to display the current date and time. If anybody tries to intrude the box the buzzer will beep and alert message will be send to the university.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue