Articles
67 Documents
Search results for
, issue
"Vol 21, No 2: February 2021"
:
67 Documents
clear
A note on complex fuzzy subfield
Muhammad Gulzar;
Fareeha Dilawar;
Dilshad Alghazzawi;
M. Haris Mateen
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp1048-1056
In this paper, we introduce idea of complex fuzzy subfield and discuss its various algebraic aspects. We prove that every complex fuzzy subfield generate two fuzzy fields and shows that intersection of two complex fuzzy subfields is also complex fuzzy subfields. We also present the concept of level subsets of complex fuzzy subfield and shows that level subset of complex fuzzy subfield form subfield. Furthermore, we extend this idea to define the notion of the direct product of two complex fuzzy subfields and also investigate the homomorphic image and inverse image of complex fuzzy subfield.
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks
Baban Ahmed Mahmood;
Aso Ahmed Majeed;
Ahmed Chalak Shakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp1193-1200
The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.
Evaluation of the stability enhancement of the conventional sliding mode controller using whale optimization algorithm
Aws Mahmood Abdullah;
Ali Mohsin Kaittan;
Mustafa Sabah Taha
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp744-756
The proposed work is an attempt to investigate the stability of the nonlinear system by using a whale optimization algorithm as of one of the meta-heuristic optimization methods, and this investigation was conducted on a single inverted pendulum as a study model. The evaluation measures which were used in this article values of gain and sliding surface of the conventional sliding mode controller to illustrate the extent of the system`s stability. Furthermore, control action, the relationship between error and its derivative, desired, and actual position in addition to sliding response graphically showed the feasibility of the proposed solution. The attained results illustrated considerable improvement in the settling time and minimizing the impact of chattering behavior.
Modeling and real time digital simulation of microgrids for campuses Malta and Jordan based on multiple distributed energy resources
Sidahmed Khiat;
Abdelkader Chaker;
Lazaros Zacharia;
Ahmed Onen
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp657-672
This paper presents the modeling and real-time digital simulation of two microgrids: the malta college of arts, science and technology (MCAST) and the german jordan university (GJU). The aim is to provide an overview of future microgrid situation and capabilities with the benefits of integrating renewable energy sources (RES), such as photovoltaic panels, diesel generators and energy storage systems for projects on both campuses. The significance of this work starts with the fact that real measurements were used from the two pilots, obtained by measuring the real physical systems. These measures were used to plan different solutions regarding RES and energy storage system (ESS) topologies and sizes. Also, the demand curves for the real microgrids of MCAST and GJU have been parameterized, which may serve as a test bed for other studies in this area. Based on actual data collected from the two pilots, a real-time digital simulation is performed using an RT-LAB platform. The results obtained by this tool allow the microgrid manager to have a very accurate vision of the facility operation, in terms of power flow and default responses. Several scenarios are studied, extracting valuable insight for implementing both projects in the future. Eventually, the proposed models would be a blueprint for training and research purposes in the microgrid field.
A secure cloud service deployment framework for DevOps
Rao Ravinder;
V. Sucharita
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp874-885
The advancements in cloud computing and leveraging the benefits from cloud computing to the service providers have increased the deployment of traditional applications to the cloud. The applications once deployed on the cloud, due to various reasons, need migration from development infrastructure to operational infrastructure, one operational instance to other operational instances due to load balancing and the cycle continues due to the use of DevOps as development strategies for cloud computing applications. Advocates of hybrid and public clouds observe cloud computing makes it possible for organizations to avert or minimize upfront IT infrastructure expenses. Proponents also assert that cloud computing systems permit businesses to receive their software up and running faster, using improved manageability and less maintenance, so it empowers IT teams to rapidly adapt tools to meet the varying and unpredictable requirements. DevOps is a lot of practices that mechanizes the procedures between programming improvement and IT groups, all together that they can fabricate, test, and discharge programming quicker and even more dependably. The idea of DevOps is established on building a culture of a joint effort between groups that generally worked in relative siloes. The guaranteed advantages incorporate expanded trust, quicker programming discharges, capacity to explain basic issues rapidly and better oversee impromptu work. Thus, this work identifies the need for providing multiple security protocols during the complete life cycle of cloud application development and deployment. This work proposes a novel framework for automatic selection and deployment of the security protocols during cloud service deployments. The framework identifies the need for security aspects and selects the appropriate security algorithms for virtual machines. The proposed framework demonstrates nearly 80% improvement over the security policy deployment time.
Energy budget and methods for determining coordinates for a radiomonitoring system based on a small spacecraft
Altay Aitmagambetov;
Yuri Butuzov;
Valery Tikhvinskiy;
Aigul Kulakayeva;
Zhadyra Ongenbayeva
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp945-956
The existing ground-based radio monitoring systems do not allow performing the functions and tasks of radio spectrum monitoring in a quality manner. Therefore, to improve the efficiency of the radio spectrum monitoring systems for countries with a large territory, such as the Republic of Kazakhstan, it is proposed to use low-orbit small spacecrafts as radio monitoring stations. The analysis of the energy budget of radio lines on the basis of existing radio electronic means on the territory of the Republic of Kazakhstan, carried out in this work, showed the possibility of using low-orbit small spacecrafts for performing the functions and tasks of radio monitoring. The paper proposes and develops a method for determining the coordinates of radio emission sources based on the goniometric method using scanning antennas on board of one spacecraft. The ranges of the antenna scanning angles are substantiated, and the estimates of the coordinates determination errors are made. Algorithms have been developed and computer programs have been compiled to determine the coordinates of the radio emission sources, which will make it possible to use this method at the initial stages of developing a radio spectrum monitoring system based on one small spacecraft.
Content based video retrieval using discrete cosine transform
Sumaya Hamad;
Ahmeed Suliman Farhan;
Doaa Yaseen Khudhur
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp839-845
A content based video retrieval (CBVR)framework is built in this paper. One of the essential features of video retrieval process and CBVR is a color value. The discrete cosine transform (DCT) is used to extract a query video features to compare with the video features stored in our database. Average result of 0.6475 was obtained by using the DCT after implementing it to the database we created and collected, and on all categories. This technique was applied on our database of video, Check 100 database videos, 5 videos in each category.
Knowledge discovery from gene expression dataset using bagging lasso decision tree
Umu Sa'adah;
Masithoh Yessi Rochayani;
Ani Budi Astuti
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp1151-1159
Classifying high-dimensional data are a challenging task in data mining. Gene expression data is a type of high-dimensional data that has thousands of features. The study was proposing a method to extract knowledge from high-dimensional gene expression data by selecting features and classifying. Lasso was used for selecting features and the classification and regression tree (CART) algorithm was used to construct the decision tree model. To examine the stability of the lasso decision tree, we performed bootstrap aggregating (Bagging) with 50 replications. The gene expression data used was an ovarian tumor dataset that has 1,545 observations, 10,935 gene features, and binary class. The findings of this research showed that the lasso decision tree could produce an interpretable model that theoretically correct and had an accuracy of 89.32%. Meanwhile, the model obtained from the majority vote gave an accuracy of 90.29% which showed an increase in accuracy of 1% from the single lasso decision tree model. The slightly increasing accuracy shows that the lasso decision tree classifier is stable.
Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility
Khalid W. Al-Ani;
Salman Yussof;
Hussein M. Haglan;
Hothefa Shaker;
Linda Mahdi Alani
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp1230-1237
Mobility is one of the important issues in Mobile Ad hoc Networks (MANET). By definition, MANET nodes are free to move around and this may cause difficulty in routing. MANET routing protocols must consider this factor when making routing decision. Zone Routing Protocol (ZRP) is a hybrid routing protocol, which utilizes the proactive and reactive routing protocols advantages. ZRP proactively maintains routing information within a routing zone, while reactively discovering routes to destinations beyond the routing zone. Since ZRP is based on the concept of routing zone, determining an optimum routing zone radius has the major impact on the performance of that protocol. In this research, we studied the effect of zone radius on the performance of ZRP with different levels of node mobility. Node mobility is defined using two different parameters: node speed and pause time. Based on the simulation results, ZRP protocol using zone radius of two provides the best packet delivery fraction, throughput and normalized routing load. However, a larger zone radius will provide a lower delay.
A hybrid of CNN and LSTM methods for securing web application against cross-site scripting attack
Raed Waheed Kadhim;
Methaq Talib Gaata
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp1022-1029
Cross-site scripting (XSS) is today one of the biggest threatthat could targeting the Web application. Based on study published by the open web applications security project (OWASP), XSS vulnerability has been present among the TOP 10 Web application vulnerabilities.Still,an important security-related issue remains how to effectively protect web applications from XSS attacks.In first part of this paper, a method for detecting XSS attack was proposed by combining convolutional neural network (CNN) with long short term memories (LSTM), Initially, pre-processing was applied to XSS Data Set by decoding, generalization and tokanization, and then word2vec was applied to convert words into word vectors in XSS payloads. And then we use the combination CNN with LSTM to train and test word vectors to produce a model that can be used in a web application. Based on the obtaned results, it is observed that the proposed model achevied an excellent result with accuracy of 99.4%.