cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 66 Documents
Search results for , issue "Vol 23, No 1: July 2021" : 66 Documents clear
Sentiment classification of user's reviews on drugs based on global vectors for word representation and bidirectional long short-term memory recurrent neural network Hadab Khalid Obayed; Firas Sabah Al-Turaihi; Khaldoon H. Alhussayni
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp345-353

Abstract

The process of product development in the health sector, especially pharmaceuticals, goes through a series of precise procedures due to its directrelevance to human life. The opinion of patients or users of a particular drugcan be relied upon in this development process, as the patients convey their experience with the drugs through their opinion. The social media field provides many datasets related to drugs through knowing the user's ratingand opinion on a drug after using it. In this work, a dataset is used that includes the user’s rating and review on the drug, for the purpose of classifying the user’s opinions (reviews) whether they are positive ornegative. The proposed method in this article includes two phases. The first phase is to use the Global vectors for word representation model for converting texts into the vector of embedded words. As for the second stage, the deep neural network (Bidirectional longshort-termmemory) is employedin the classification of reviews. The user's rating is used as a ground truth inevaluating the classification results. The proposed method present sencouraging results, as the classification results are evaluated through threecriteria, namely Precision, Recall and F-score, whose obtained values equal(0.9543, 0.9597and0.9558), respectively. The classification results of theproposed method are compared to a number of classifiers, and it was noticed that the results of the proposed method exceed those of the alternative classifiers.
Monte Carlo analysis for solar PV impact assessment in MV distribution networks Dilini Almeida; Jagadeesh Pasupuleti; Shangari K. Raveendran; M. Reyasudin Basir Khan
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp23-31

Abstract

The rapid penetration of solar photovoltaic (PV) systems in distribution networks has imposed various implications on network operations. Therefore, it is imperative to consider the stochastic nature of PV generation and load demand to address the operational challenges in future PV-rich distribution networks. This paper proposes a Monte Carlo based probabilistic framework for assessing the impact of PV penetration on medium voltage (MV) distribution networks. The uncertainties associated with PV installation capacity and its location, as well as the time-varying nature of PV generation and load demand were considered for the implementation of the probabilistic framework. A case study was performed for a typical MV distribution network in Malaysia, demonstrating the effectiveness of Monte Carlo analysis in evaluating the potential PV impacts in the future. A total of 1000 Monte Carlo simulations were conducted to accurately identify the influence of PV penetration on voltage profiles and network losses. Besides, several key metrics were used to quantify the technical performance of the distribution network. The results revealed that the worst repercussion of high solar PV penetration on typical Malaysian MV distribution networks is the violation of the upper voltage statutory limit, which is likely to occur beyond 70% penetration level.
Logistics tracking system based on decentralized IoT and blockchain platform Marouane El Midaoui; El Mehdi Ben Laoula; Mohammed Qbadou; Khalifa Mansouri
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp421-430

Abstract

Most of supply chain networks have encountered difficulties when trying to integrate all components and stakeholders (Customers, warehouse, transportation, and raw material production. Etc...), which make supply chain management system suffering from a lack of efficiency and transparency that make a steady increase in good’s falsification and consumer’s disappointment. All information about good’s production, storage and transportation should flow clearly during all stages of the supply chain by tracking and authenticating to avoid product’s contamination or fraud in the network. Current tracking IoT-based systems are built on top of centralized architecture and this leaves a gap for tampering and false information especially in urban area, but also the exsiting solutions cannot allow the information to be shared with authority or consumers. To effectively assess and assure traceability and transparency this paper propose an approach using a distributed ledger (blockchain) besides a configuable IoT-based system to take into account all needed data including specific case of urban area, with an opendata platform at the disposal of stockholders, authority and consumers.
Towards using UAV for improving 5G cellular communication systems Mohamed El Sayed Kotb; Wagdy R. Anis; Ahmed A. Abd-Elhafez
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp265-272

Abstract

Unmanned aerial vehicles (UAVs) have sparked a lot of interest in the wireless networking community as an emerging subject in aerial robotics. The UAV environment can be used to improve UAV communications in various ways. These smart devices cater for a broad variety of wireless technologies and applications because of UAV's inherent features related to versatile mobility in 3D space, autonomous operations as well as intelligent positioning. This study will investigate the convergence synergies between 5G/B5G mobile systems and UAV technologies, with the UAV being integrated into current cellular networks as a modern aerial user equipment (UE). In this integration, UAVs play the function of cellular flying customers, and are hence referred to as cellularly linked UAVs (a.k.a. UAVUE, drone-UE, 5G-connected drone, or aerial user). The major goal of this research is to provide a thorough analysis of the integration task, as well as major technical breakthroughs from 5G/B5G and current work in prototyping architecture and field trials that support cell-based UAVs. This study examines recent 3GPP standards advances as well as socio-economic challenges that must be addressed before this promising technology can be properly implemented. There are already some accessible issues clearing the way for potential study opportunities.
Secured protection of transmission line by distance relay using data mining approach M. Kiruthika; Bindu S.
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp1-13

Abstract

Distance relay is one of the most important protection element of a transmission line used in protection schemes. Relay may malfunction if it is not able to distinguish faults from system stressed conditions. This work mainly focusses on enhancing the performance of the distance relay in a secured manner based on data mining approach which uses two phases of classification. Level 1 classifier identifies the system conditions like normal, fault, and power swing and level 2 classifier gets initiated when there is a power swing and distinguishes between the persistence of power swing condition and a three-phase fault. In both the phases, the protection scheme in the respective zone where the fault occurred gets activated. The proposed methodology is tested for an IEEE 9-bus system wherein the data is collected from phasor measurement units placed in optimal locations. Optimal PMU placement is economical since it overcomes issues like cost, communication infrastructure issues, maintenance and complexity. The results proved that the proposed method is effective with good efficiency and higher accuracy with less number of PMUs.
Efficient multi-keyword similarity search over encrypted cloud documents Ayad I. Abdulsada; Dhafer G. Honi; Salah Al-Darraji
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp510-518

Abstract

Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing. Searchable encryption is acryptographic tool that gives users the ability to search the encrypted data while being encrypted. However, the existing schemes either serve a single exact search that loss the ability to handle the misspelled keywords or multi-keyword search that generate very long trapdoors. In this paper, we address the problem of designing a practical multi-keyword similarity scheme that provides short trapdoors and returns the correct results according to their similarity scores. To do so, each document is translated intoa compressed trapdoor. Trapdoors are generated using key based hash functions to en-sure their privacy. Only authorized users can issue valid trapdoors. Similarity scores of two textual documents are evaluated by computing the Hamming distance between their corresponding trapdoors. A robust security definition is provided together withits proof. Our experimental results illustrate that the proposed scheme improves thesearch efficiency compared to the existing schemes. Further more, it shows a high level of performance.
A novel compact dual band RFID handheld reader antenna for microwave ISM band application Wahiba Belgacem; Miloud Bousahla; Sidi Mohammed Meriah
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp321-329

Abstract

This paper presents a new design of dual band RFID reader antenna for ISM-band industrial science and medical applications at 2.4 GHz and 5.8 GHz. Theantenna is designed and physically built using FR4 substrate and taking a 1.5 thickness, 4.3 relative permittivity and 0.025 loss tangents. Different slots havebeen introduced to reduce the antenna dimensions and to achieve the dual bandfor microwave ISM band application. The dimension of the proposed antenna is 34 × 34 × 1.5 mm3, which it could be easily integrated into RFID readers.Numerical simulations have been performed usingcomputer simulationtechnology (CST) Microwave Studio software. A parametric study wasinvestigated in order to show the effect of slots variation and to obtain the desiredfunctional characteristics. Experimental results show a good agreement withresults obtained by simulations. A satisfactorily omnidirectional for the radiationpatterns across the antenna operation bands was obtained.
Energy efficient WSN using hybrid modification PEGASIS with ant lion optimization Ahmed Abdul Azeez Asmael; Basman Al-Nedawe
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp273-284

Abstract

Wireless sensor nodes consist of tiny electronic devices that can sense, transmit, and measure data from physical environments such as the field of minter surveillance. These sensor nodes significantly depend on batteries to gain energy which is used to operations associated with communication and computation. Generally, designing communication protocols is feasible to achieve effective usage of these energy resources of the sensor node. Both reported medium access control and routing can achieve energy-saving that supporting real time functionality. This paper emphasizes the use of hybrid modified PEGASIS-Ant lion optimization. Several steps are entailed in this research. First is random distribution of node followed by clustering the map as a circular region. Then, the nodes are connected to the closest node in that region. In consequence, PEGASIS-Ant lion optimization is applied to enhance the connection of the nodes and accomplish the maximum life batter of the sensor. At last, the experiments performed in this work demonstrate that the proposed optimization technique operates well in terms of network latency, power duration and energy’s consumption. Furthermore, the life span of the nodes has improved greatly by 87% over the original algorithm that accomplished a rate of life nodes of 60%.
Development of a model for evaluating the effectiveness of innovative startups based on information cycles and using neural networks Morozov Viktor; Kolomiiets Anna; Mezentseva Olga
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp396-404

Abstract

An integrated approach to the creation and development of innovative startup projects in the field of information technology is considered. To conduct research, the authors proposed a model of information cycles of startup projects based on the creation of an information model of such projects. At the same time there are dynamic processes of changes in the parameters of the model, which are turbulent in nature and require the use of tools and methods of artificial intelligence for research. The key areas of knowledge of such influence are defined. The mathematical model of processes of management of development of IT startups on the basis of creation and development of a difficult IT product, taking into account influences of environments of the project is constructed, the basic characteristics are allocated and parameters are defined. To do this, the construction of predictive models is proposed to be carried out by modified Demarc trends, the method of self-organization and the neural network. The modeling of the main objective functions of the mathematical model of these processes is performed. The analysis of the received results is carried out and the conclusions are made.
A survey of various intelligent home applications using IoT and intelligent controllers Mustafa Asaad Omran; Wasaan Kadhim Saad; Bashar Jabbar Hamza; Ahmed Fahem Al-baghdadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp490-499

Abstract

The tremendous development in technology used in our daily life was one of the most important incentives for researchers to add technology that is easy to use and useful in human life, an example internet of things (IoT) and systems of intelligence used in various fields. This article provides an overview of the smart home (SH) study of the Internet of Things as smart homes (SHs) have attracted great interest with communication technology advancements. The intelligent home is an Internet of Things technology that allows the monitoring and control of devices via the Internet using a home automation system (HAS). Followed by the justification for choosing the smart home and smart home engineering, and what are the most used communication protocols for smart homes, whether wired or wireless.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue