cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 66 Documents
Search results for , issue "Vol 23, No 3: September 2021" : 66 Documents clear
Mathematical modeling and algorithm for calculation of thermocatalytic process of producing nanomaterial Bakhtiyar Ismailov; Zhanat Umarova; Khairulla Ismailov; Aibarsha Dosmakanbetova; Saule Meldebekova
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1590-1601

Abstract

At present, when constructing a mathematical description of the pyrolysis reactor, partial differential equations for the components of the gas phase and the catalyst phase are used. In the well-known works on modeling pyrolysis, the obtained models are applicable only for a narrow range of changes in the process parameters, the geometric dimensions are considered constant. The article poses the task of creating a complex mathematical model with additional terms, taking into account nonlinear effects, where the geometric dimensions of the apparatus and operating characteristics vary over a wide range. An analytical method has been developed for the implementation of a mathematical model of catalytic pyrolysis of methane for the production of nanomaterials in a continuous mode. The differential equation for gaseous components with initial and boundary conditions of the third type is reduced to a dimensionless form with a small value of the peclet criterion with a form factor. It is shown that the laplace transform method is mainly suitable for this case, which is applicable both for differential equations for solid-phase components and calculation in a periodic mode. The adequacy of the model results with the known experimental data is checked.
Survey on: A variety of AQM algorithm schemas and intelligent techniques developed for congestion control Amar A. Mahawish; Hassan J. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1419-1431

Abstract

The congestion on the internet is the main issue that affects the performance of transition data over the network. An algorithm for congestion control is required to keep any network efficient and reliable for transfer traffic data of the users. Many Algorithms had been suggested over the years to improve the control of congestion that occurs in the network such as drop tail packets. Recently there are many algorithms have been developed to overcome the drawback of the drop tail procedure. One of the important algorithms developed is active queue management (AQM) that provides efficient congestion control by reducing drop packets, this technique considered as a base for many other congestion control algorithms schema. It works at the network core (router) for controlling the drop and marking of packets in the router's buffer before the congestion inception. In this study, a comprehensive survey is done on the AQM Algorithm schemas that proposed and modification these algorithms to achieve the best performance, the classification of AQM algorithms based on queue length, queue delay, or both. The advantages and limitations of each algorithm have been discussed. Also, debate the intelligent techniques procedure with AQM algorithm to achieve optimization in performance of algorithm operation. Finally, the comparison has been discussed among algorithms to find the weakness and powerful of each one based on different metrics.
Design and implementation of an adaptive multilevel wireless security system using IoT Mohammed M. Sultan; Amer T. Saeed; Ahmed M. Sana
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1804-1813

Abstract

Securing property plays a crucial role in human life. Therefore, an adaptive multilevel wireless security system (ML-WSS) based on the internet of things (IoT) has been proposed to observe and secure a certain place. ML-WSS consists of hardware and software components, such as a set of sensors, Wi-Fi module, and operation and monitoring mobile application (OMM). The OMM application is designed to remotely monitor and control the proposed system through the Internet and by using ThingSpeak cloud as a data store. The proposed scheme is based on dividing the required zone of the place into three regions (levels), low-risk region (LRR) as level-1, moderate-risk region (MRR) level-2, and high-risk region (HRR) as level-3. Each level may contain one or set of sensors, so the number of sensors, their placement, and under which level is labelled is specified according to the security requirements. Several processes are done based on these levels when a breach occurs in the system. Mathematical model and pseudocode were created to illustrate the mechanism of the proposed system. The results show that the proposed system has been implemented successfully and the number of breaches that occurs in level-3 area was reduced by 50% as compared to level-1.
A novel hybrid approach based artificial bee colony and salp swarm algorithms for solving ORPD problem Souheil Salhi; Djemai Naimi; Ahmed Salhi; Saleh Abujarad; Abdelouahab Necira
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1825-1837

Abstract

Optimal reactive power dispatch (ORPD) is an important task for achieving more economical, secure and stable state of the electrical power system. It is expressed as a complex optimization problem where many meta-heuristic techniques have been proposed to overcome various complexities in solving ORPD problem. A meta-heuristic search mechanism is characterized by exploration and exploitation of the search space. The balance between these two characteristics is a challenging problem to attain the best solution quality. The artificial bee colony (ABC) algorithm as a reputed meta-heuristic has proved its goodness at exploration and weakness at exploitation where the enhancement of the basic ABC version becomes necessary. Salp swarm algorithm (SSA) is a newly developed swarm-based meta-heuristic, which has the best local search capability by using the best global solution in each iteration to discover promising solutions. In this paper, a novel hybrid approach-based ABC and SSA algorithms (ABC-SSA) is that developed to enhance the exploitation capability of the ABC algorithm using SSA and applied for solving ORPD problem. The efficiency of ABC-SSA is investigated using two standard test systems IEEE-30 and IEEE-300 buses, and that by considering the famous objective functions in ORPD problem.
State feedback containment control of multi-agents system with lipschitz nonlinearity Siti Nurfarihah Sheikh Hanis; Ahmad Sadhiqin Mohd Isira; Azdiana Md Yusop; Mohd Hendra Hairi; Wong Chunyan; Cherry D. Casuat; Zaiton Abdul Mutalip
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1398-1409

Abstract

This paper studies the containment control problem of the leader-follower configuration in a multi-agents system included with a type of nonlinearity such as Lipschitz with respect to continuous-time and directed spanning forest communication network topology. A state feedback containment controller is designed and proposed with control theory and the Laplacian network structure where it utilizes the relative information of each agent. The controller designed ensures that the followers are contained by the leaders that form the convex hull formation. For the containment to happen, a minimum of one leader is needed to have a direct communication trajectory to the followers. Lyapunov stability theory is used to provide the stability conditions after analyzing the network structure. Finally, it has been shown from simulation that the followers are contained successfully with the proposed controller.
Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix Adityas Widjajarto; Muharman Lubis; Vreseliana Ayuningtyas
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1643-1653

Abstract

The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.
Identification of optimum segment in single channel EEG biometric system Muhammad Afif Hendrawan; Pramana Yoga Saputra; Cahya Rahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1847-1854

Abstract

Nowadays, biometric modalities have gained popularity in security systems. Nevertheless, the conventional commercial-grade biometric system addresses some issues. The biggest problem is that they can be imposed by artificial biometrics. The electroencephalogram (EEG) is a possible solution. It is nearly impossible to replicate because it is dependent on human mental activity. Several studies have already demonstrated a high level of accuracy. However, it requires a large number of sensors and time to collect the signal. This study proposed a biometric system using single-channel EEG recorded during resting eyes open (EO) conditions. A total of 45 EEG signals from 9 subjects were collected. The EEG signal was segmented into 5 second lengths. The alpha band was used in this study. Discrete wavelet transform (DWT) with Daubechies type 4 (db4) was employed to extract the alpha band. Power spectral density (PSD) was extracted from each segment as the main feature. Linear discriminant analysis (LDA) and support vector machine (SVM) were used to classify the EEG signal. The proposed method achieved 86% accuracy using LDA only from the third segment. Therefore, this study showed that it is possible to utilize single-channel EEG during a resting EO state in a biometric system.
Load shedding scheme based metaheuristic technique for power system controlled islanding N. Z. Saharuddin; I. Zainal Abidin; H. Mokhlis; E. F. Shair
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1306-1314

Abstract

Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. The implementation of controlled islanding will lead to the formation of few islands, that can operate as a stand-alone island. However, some of these islands may not be balanced in terms of generation and load after the islanding execution. Therefore, a good load shedding scheme is required to meet the power balance criterion so that it can operate as a balanced stand-alone island. Thus, this paper developed a load shedding scheme-based metaheuristics technique namely modified discrete evolutionary programming (MDEP) technique to determine the optimal amount of load to be shed in order to produce balanced stand-alone islands. The developed load shedding scheme is evaluated and validated with two other load shedding techniques which are conventional EP and exhaustive search techniques. The IEEE 30-bus and 39-bus test systems were utilized for this purpose. The results proves that the load shedding based MDEP technique produces the optimal amount of loads to be shed with shortest computational time as compared with the conventional EP and exhaustive search techniques.
An analysis of manual and autoanalysis for submicrosecond parameters in the typical first lightning return stroke Muhammad Akmal Bahari; Zikri Abadi Baharudin; Tole Sutikno; Ahmad Idil Abdul Rahman; Mohd Ariff Mat Hanafiah; Mazree Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1451-1457

Abstract

The mechanism on how lightning detection system (LDS) operated never been exposed by manufacturer since it was confidential. This scenario motivated the authors to explore the issue above by using MATLAB to develop autoanalysis software based on the feature extraction. This extraction is intended for recognizing the parameters in the first return stroke, and compare the measurement between the autoanalysis software and the manual analysis. This paper is a modification based on a previous work regarding autoanalysis of zero-crossing time and initial peak of return stroke using features extraction programming technique. Further, the parameter on rising time of initial peak is added in this autoanalysis programming technique. Finally, the manual analysis using WaveStudio (LeCroy product) of those two lightning parameters is compared with autoanalysis software. This study found that the autoanalysis produce similar result with the manual analysis, hence proved the reliability of this software.
Internet of things based attendance system design and development in a smart classroom Dania Eridani; Eko Didik Widianto; Ike Pertiwi Windasari; Wildan Budi Bawono; Nadia Febrianita Gunarto
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1432-1439

Abstract

Attendance records are one of the main administrative roles on campuses. Therefore, several technologies can be used on an attendance system, including barcode, radio frequency identification (RFID), fingerprint, and faceprint. The main functions of attendance systems on campuses are mainly focused on how to obtain the attendee data list, store on the database, and display the list on the information system. This research proposes an attendance system in the smart classroom which supports the system’s previous activities as well as its integration with security and classroom management. In this system, the NodeMCU which was connected to the Wi-Fi router served as the controller, while the fingerspot revo FF-153BNC functioned as the system input. In addition, the database server was used to allocate attendee and classroom management data. This system is connected with the information system and classroom display unit, and component and system testing were applied in this research. The results showed that each system unit successfully integrated and managed the attendance, security, and classroom schedule.

Filter by Year

2021 2021


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue