cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 67 Documents
Search results for , issue "Vol 21, No 2: February 2021" : 67 Documents clear
A note on complex fuzzy subfield Muhammad Gulzar; Fareeha Dilawar; Dilshad Alghazzawi; M. Haris Mateen
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1048-1056

Abstract

In this paper, we introduce idea of complex fuzzy subfield and discuss its various algebraic aspects. We prove that every complex fuzzy subfield generate two fuzzy fields and shows that intersection of two complex fuzzy subfields is also complex fuzzy subfields. We also present the concept of level subsets of complex fuzzy subfield and shows that level subset of complex fuzzy subfield form subfield.  Furthermore, we extend this idea to define the notion of the direct product of two complex fuzzy subfields and also investigate the homomorphic image and inverse image of complex fuzzy subfield.
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks Baban Ahmed Mahmood; Aso Ahmed Majeed; Ahmed Chalak Shakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1193-1200

Abstract

The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.
Evaluation of the stability enhancement of the conventional sliding mode controller using whale optimization algorithm Aws Mahmood Abdullah; Ali Mohsin Kaittan; Mustafa Sabah Taha
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp744-756

Abstract

The proposed work is an attempt to investigate the stability of the nonlinear system by using a whale optimization algorithm as of one of the meta-heuristic optimization methods, and this investigation was conducted on a single inverted pendulum as a study model. The evaluation measures which were used in this article values of gain and sliding surface of the conventional sliding mode controller to illustrate the extent of the system`s stability. Furthermore, control action, the relationship between error and its derivative, desired, and actual position in addition to sliding response graphically showed the feasibility of the proposed solution. The attained results illustrated considerable improvement in the settling time and minimizing the impact of chattering behavior.
Modeling and real time digital simulation of microgrids for campuses Malta and Jordan based on multiple distributed energy resources Sidahmed Khiat; Abdelkader Chaker; Lazaros Zacharia; Ahmed Onen
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp657-672

Abstract

This paper presents the modeling and real-time digital simulation of two microgrids: the malta college of arts, science and technology (MCAST) and the german jordan university (GJU). The aim is to provide an overview of future microgrid situation and capabilities with the benefits of integrating renewable energy sources (RES), such as photovoltaic panels, diesel generators and energy storage systems for projects on both campuses. The significance of this work starts with the fact that real measurements were used from the two pilots, obtained by measuring the real physical systems. These measures were used to plan different solutions regarding RES and energy storage system (ESS) topologies and sizes. Also, the demand curves for the real microgrids of MCAST and GJU have been parameterized, which may serve as a test bed for other studies in this area. Based on actual data collected from the two pilots, a real-time digital simulation is performed using an RT-LAB platform. The results obtained by this tool allow the microgrid manager to have a very accurate vision of the facility operation, in terms of power flow and default responses.  Several scenarios are studied, extracting valuable insight for implementing both projects in the future. Eventually, the proposed models would be a blueprint for training and research purposes in the microgrid field.
A secure cloud service deployment framework for DevOps Rao Ravinder; V. Sucharita
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp874-885

Abstract

The advancements in cloud computing and leveraging the benefits from cloud computing to the service providers have increased the deployment of traditional applications to the cloud. The applications once deployed on the cloud, due to various reasons, need migration from development infrastructure to operational infrastructure, one operational instance to other operational instances due to load balancing and the cycle continues due to the use of DevOps as development strategies for cloud computing applications. Advocates of hybrid and public clouds observe cloud computing makes it possible for organizations to avert or minimize upfront IT infrastructure expenses.  Proponents also assert that cloud computing systems permit businesses to receive their software up and running faster, using improved manageability and less maintenance, so it empowers IT teams to rapidly adapt tools to meet the varying and unpredictable requirements. DevOps is a lot of practices that mechanizes the procedures between programming improvement and IT groups, all together that they can fabricate, test, and discharge programming quicker and even more dependably. The idea of DevOps is established on building a culture of a joint effort between groups that generally worked in relative siloes. The guaranteed advantages incorporate expanded trust, quicker programming discharges, capacity to explain basic issues rapidly and better oversee impromptu work. Thus, this work identifies the need for providing multiple security protocols during the complete life cycle of cloud application development and deployment. This work proposes a novel framework for automatic selection and deployment of the security protocols during cloud service deployments. The framework identifies the need for security aspects and selects the appropriate security algorithms for virtual machines. The proposed framework demonstrates nearly 80% improvement over the security policy deployment time. 
Energy budget and methods for determining coordinates for a radiomonitoring system based on a small spacecraft Altay Aitmagambetov; Yuri Butuzov; Valery Tikhvinskiy; Aigul Kulakayeva; Zhadyra Ongenbayeva
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp945-956

Abstract

The existing ground-based radio monitoring systems do not allow performing the functions and tasks of radio spectrum monitoring in a quality manner. Therefore, to improve the efficiency of the radio spectrum monitoring systems for countries with a large territory, such as the Republic of Kazakhstan, it is proposed to use low-orbit small spacecrafts as radio monitoring stations. The analysis of the energy budget of radio lines on the basis of existing radio electronic means on the territory of the Republic of Kazakhstan, carried out in this work, showed the possibility of using low-orbit small spacecrafts for performing the functions and tasks of radio monitoring. The paper proposes and develops a method for determining the coordinates of radio emission sources based on the goniometric method using scanning antennas on board of one spacecraft. The ranges of the antenna scanning angles are substantiated, and the estimates of the coordinates determination errors are made. Algorithms have been developed and computer programs have been compiled to determine the coordinates of the radio emission sources, which will make it possible to use this method at the initial stages of developing a radio spectrum monitoring system based on one small spacecraft.
Content based video retrieval using discrete cosine transform Sumaya Hamad; Ahmeed Suliman Farhan; Doaa Yaseen Khudhur
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp839-845

Abstract

A content based video retrieval (CBVR)framework is built in this paper.  One of the essential features of video retrieval process and CBVR is a color value. The discrete cosine transform (DCT) is used to extract a query video features to compare with the video features stored in our database. Average result of 0.6475 was obtained by using the DCT after implementing it to the database we created and collected, and on all categories. This technique was applied on our database of video, Check 100 database videos, 5 videos in each category.
Knowledge discovery from gene expression dataset using bagging lasso decision tree Umu Sa'adah; Masithoh Yessi Rochayani; Ani Budi Astuti
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1151-1159

Abstract

Classifying high-dimensional data are a challenging task in data mining. Gene expression data is a type of high-dimensional data that has thousands of features. The study was proposing a method to extract knowledge from high-dimensional gene expression data by selecting features and classifying. Lasso was used for selecting features and the classification and regression tree (CART) algorithm was used to construct the decision tree model. To examine the stability of the lasso decision tree, we performed bootstrap aggregating (Bagging) with 50 replications. The gene expression data used was an ovarian tumor dataset that has 1,545 observations, 10,935 gene features, and binary class. The findings of this research showed that the lasso decision tree could produce an interpretable model that theoretically correct and had an accuracy of 89.32%. Meanwhile, the model obtained from the majority vote gave an accuracy of 90.29% which showed an increase in accuracy of 1% from the single lasso decision tree model. The slightly increasing accuracy shows that the lasso decision tree classifier is stable.
Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility Khalid W. Al-Ani; Salman Yussof; Hussein M. Haglan; Hothefa Shaker; Linda Mahdi Alani
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1230-1237

Abstract

Mobility is one of the important issues in Mobile Ad hoc Networks (MANET). By definition, MANET nodes are free to move around and this may cause difficulty in routing. MANET routing protocols must consider this factor when making routing decision. Zone Routing Protocol (ZRP) is a hybrid routing protocol, which utilizes the proactive and reactive routing protocols advantages. ZRP proactively maintains routing information within a routing zone, while reactively discovering routes to destinations beyond the routing zone. Since ZRP is based on the concept of routing zone, determining an optimum routing zone radius has the major impact on the performance of that protocol. In this research, we studied the effect of zone radius on the performance of ZRP with different levels of node mobility. Node mobility is defined using two different parameters: node speed and pause time. Based on the simulation results, ZRP protocol using zone radius of two provides the best packet delivery fraction, throughput and normalized routing load. However, a larger zone radius will provide a lower delay.
A hybrid of CNN and LSTM methods for securing web application against cross-site scripting attack Raed Waheed Kadhim; Methaq Talib Gaata
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1022-1029

Abstract

Cross-site scripting (XSS) is today one of the biggest threatthat could targeting the Web application. Based on study published by the open web applications security project (OWASP), XSS vulnerability has been present among the TOP 10 Web application vulnerabilities.Still,an important security-related issue remains how to effectively protect web applications from XSS attacks.In first part of this paper, a method for detecting XSS attack was proposed by combining convolutional neural network (CNN) with long short term memories (LSTM), Initially, pre-processing was applied to XSS Data Set by decoding, generalization and tokanization, and then word2vec was applied to convert words into word vectors in XSS payloads. And then we use the combination CNN with LSTM to train and test word vectors to produce a model that can be used in a web application. Based on the obtaned results, it is observed that the proposed model achevied an excellent result with accuracy of 99.4%.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue