Articles
64 Documents
Search results for
, issue
"Vol 26, No 2: May 2022"
:
64 Documents
clear
Modeling the impact of jamming attacks in the internet of things
Imane Kerrakchou;
Sara Chadli;
Yassine Ayachi;
Mohammed Saber
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1206-1215
Security is a key requirement in the context of the Internet of Things. The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of the most commonly utilized methods is Jamming. However, there are also some other attack types that we need to be aware of, such as Tampering, Wormhole, etc. In this paper, we have provided an analysis of the layered IoT architecture. A detailed study of different types of Jamming attacks, in a wireless sensor network, is presented. The packet loss rate, energy consumption, etc. are calculated, and the performance analysis of the WSN system is achieved. The protocol chosen to evaluate the performance of the WSN is the S-MAC protocol. Different simulations are realized to evaluate the performance of a network attacked by the different types of Jamming attacks.
Artificial intelligent controller-based energy management system for grid integration of PV and energy storage devices
Durga Prasad Ananthu;
Neelshetty K.;
M. Venkateshkumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp617-628
In the modern world, photovoltaic (PV) energy generation is becoming more prevalent and cost-effective. To address climate change, many countries have prioritised photovoltaics and made significant investments in energy generation. Because of its non-linear nature, solar energy generation is extremely difficult. This is completely dependent on the solar radiation and the outside temperature. The maximum power generation of a PV system in non-linear weather circumstances and the grid integration of PV with power management are discussed in this article. Artificial intelligence (AI) is vital for improving the energy output of PV systems across a wide range of environmental conditions because traditional controllers do not aid a solar system in producing the maximum energy. The grid integration of PV and EMS (energy management systems) was covered in the later part of this article. In this paper, artificial intelligence is used to provide customers with continuous power through a battery system, which plays a critical role in energy management. Furthermore, the suggested model was simulated in Matlab and its performance was evaluated under various operational scenarios. To demonstrate the effectiveness of the proposed system, the results are compared to IEEE 519.
Cuckoo search algorithm and particle swarm optimization based maximum power point tracking techniques
Sally Abdulaziz;
Galal Atlam;
Gomaa Zaki;
Essam Nabil
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp605-616
Increasing the efficiency of photovoltaic (PV) systems is a pressing issue, and several studies have focused on the Maximum Power Point Tracking (MPPT) techniques to extract the maximum PV output power. Many MPPT techniques have been discussed in the last decade, and optimization-based MPPT techniques have shown better performance than other MPPT techniques. In this study, two optimization techniques, the cuckoo search algorithm and particle swa9rm optimization with changing inertia weight techniques are discussed and applied to a PV system to track the maximum power point. The MSX-60 PV module and boost DC-DC converter are used in this paper to simulate and model the MPPT system using MATLAB/Simulink to show which technique has the best performance under various solar irradiation scenarios. In addition, different structures of PV arrays such as series-parallel, bridge link, and total cross-tied PV structures are simulated to analyze their effect on the efficiency of MPPT processes.
Matic motorcycle transmission damage detection system using internet of things-based expert system
Suhadi Suhadi;
Muhamad Nur;
Sulistyowati Sulistyowati;
Amat Suroso
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1018-1026
The development of the motorcycle industry in Indonesia has developed quite significantly from year to year, the BPS (Central Statistics Agency) noted that in 2019 the number of motorcycle sales reached 106.657.952 units, and the AISI (Indonesian Motorcycle Industry Association) in 2020 the type of scooter (matic) of 2,696,557 units or 87.9%, this automatic type of motorbike is the largest contributor to two-wheeled vehicles and is the favorite type of vehicle for Indonesians. Automatic transmission or what is known as CVT (Continuous Variable Transmission), which is an automatic speed transfer system according to engine speed using a V-belt. In previous research, the use of IoT (Internet of Things) is used as an automatic air quality monitoring control system, air quality conditions can be seen quickly and accurately from the monitor. The goal of this study is to use a vibration sensor and the CBR (Case Based Reasoning) method to solve damage to matic motor components. The results of this study are (a) the case average value is 0,76, (b) the CVT component parameter is 80% the average value is 0,94, (c) the CVT component weight parameter is from 60% the average value is 1,26.
Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition
Asmae Bengag;
Amina Bengag;
Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1091-1102
Wireless body area networks (WBANs) are very helpful for monitoring the patient’s case, due to the medical sensors. However, this technology faces several problems such as loss communication, security issues and energy consumption. Our work focused on the security and specifically the intrusion detection system (IDS), which is one of the most effective techniques used to identify the presence of intrusions in a network. To make the IDS more efficient, the fuzzy logic (FL) is one of the well-known techniques that is known for its powerful mechanism used to differentiate network traffic levels. In this paper, we start to present an overview of IDS and FL functionality. Moreover, we give a survey of recent works dealing IDS based on FL in wireless sensor and classify them on different measures. Hence, our comparative study is very helpful for the researchers, to understand the use of FL in IDS and have clear vision for developing their own security solution. In the second part, we develop a novel IDS based on Mamdani type fuzzy inference system for detecting jamming attacks in WBAN. Our IDS was built in Matlab, also we are used Castalia platform and OMNET++ simulator to simulate different scenarios of WBAN.
Application of machine learning algorithms for predicting outcomes of accident cases in Moroccan courts
Aissa Haidar;
Tarik Ahajjam;
Imad Zeroual;
Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1103-1108
Due to the large number of legal cases, the processing of them by the courts is generally very slow. Among these cases, we find accidents cases, which require a great speed of judgment to compensate the victims of those accidents. To this end, we thought of exploiting the possibilities offered by machine learning in order to simulate the work of judges and contribute to speeding up the time of decision. Further, we applied different machine learning algorithms, such as linear regression, decision trees, and random forests. According to the results achieved, the Random Forest is the most perfect model for with the utmost accuracy about 91.05%
Metaheuristic nature-inspired algorithms for reservoir optimization operation: a systematic literature review
Nor Shuhada Ibrahim;
Nafrizuan Mat Yahya;
Saiful Bahri Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1050-1059
The purpose of this systematic literature review (SLR) article is to discuss the findings of the state-of-art metaheuristic nature-inspired algorithm (MHNIA) in reservoir optimization operation. The rationale of this approach is to elucidate the optimal way as decision making that implemented MHNIA for several complex problems in reservoir optimization operation. Commonly, the metaheuristic optimization algorithm has always been used in hydrology field, especially in reservoir optimization. Hence, this presented study reviewed a considerable amount from the previous studies of commonly nature-based optimization algorithms applied in reservoir operations. Hence, preferred reporting items for systematic review and meta-analyses (PRISMA) has been used as guidance. The source was utilized from two primary journal databases: Scopus and web of science. According to the proposed search string, the findings managed to express into nine main themes which are optimize in water release, optimize reservoir operation problems, optimize hydropower operation, optimize condensate fluids in reservoir storage, optimize water pumped storage, optimize water quality control, optimize system performance operation, optimize water demand and optimize reservoir control as flood preventing. Overall, 24 articles that passed the minimum quality were retrieved using systematic searching strategies.
Enhanced performance of long-term evolution small-cell networks using improved mobility algorithms
Abdullah Mohammed Abdullah Al-Amodi;
Amlan Datta;
Abdulrahman Mohammed Hussain Obaid
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp878-887
With an ever-increasing number of user equipment (UE) and bandwidth demands of new applications, the deployment of dense heterogeneous cellular networks has been adopted in many network scenarios. The small cells are unable to unload the traffic due to the random UEs mobility and cells deployment. This degrades the network performance such as handover success, throughput, and load distribution. To address such a problem, we propose an enhanced mobility load-balancing algorithm for small cells. The conventional mobility load balancing (MLB) algorithms study only the fixed or adaptive thresholds of the network separately to consider the load balance process, while other MLB algorithms consider the neighboring cells of the network those experience unnecessary MLB actions. The proposed load balancing algorithms study overloaded cells and neighbors using the proposed efficiency parameter, B. To identify the overloaded cells, we propose B which compares between a pre-defined threshold and the network threshold to categorize medium and overloaded cells, based on B, the algorithm is triggered. Then, to control the shifted load to a target neighbor cell, we propose the Rescue factor, f. the f ensures the load of the target cell after handover is equal or less than Ɓ. The simulation results showed a lower standard deviation and higher throughput and physical resource block utilization than surveyed algorithms.
Early fault identification for operating circuit breaker based on classifier model system
Abadal-Salam T. Hussain;
Shouket A. Ahmed;
Taha A. Taha
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp699-706
One of the most important switchgear in a substation is the circuit breaker (CB); it is used either in the transmission or distribution sections. Currently, the maintenance of a CB is done by capturing the trip time using a handheld device; the trip time is the time from trip initiation to the moment of current flow cessation in the load side of the CB. For the maintenance staff of the Iraqi National Power Board (INPB), their decision is mainly aimed to pinpoint the specific problem of the CB, the breaker parameters, such as latch, buffer, mcon, acon, and end which can be analysed using data mining methods such as K-means clustering and Sammon mapping (KCSM). The advantages of this approach include early identification of faults and saving more cost and time of repairing and replacing damaged CBs as the number of damaged CBs can be decreased. The problem with this method is the prolonged time of testing the conventional trip as it requires removing the CBs from service and planned outage. Furthermore, the CB may not capture the crucial information that causes slow tripping. Hence, the main objectives of this work are to analyse CB trip coil current data and study the effect and relationship between two different analytical approaches to analyse the data. The result of this technique showed excellent identification of the switch faults.
Security approach for instant messaging applications: viber as a case study
Mohammed Falih Kadhim;
Adel Al-Janabi;
Ahmed Hazim Alhilali;
Nabeel Salih Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v26.i2.pp1109-1115
A variety of internet-based applications are widely used in our animation activities because they provide free and useful services. These applications, such as Instant Messaging, can be run via the web, mobile, or computer-based devices. Therefore, the security and privacy of user data over these apps have been concerned in recent years because of sensitive and confidential information considerations. Consequently, many instant messaging applications, like Viber, have various security and privacy issues that need to be understood and resolved. Viber users reached 800 million, and they increased dramatically due to the efficient services that this app provides. Hence, a loophole in an application’s design may allow illegal access to the app and gain confidential and sensitive data. In this article, we proposed a security approach for Viber to safeguard user confidential data and sensitive information. The proposed approach involves two theoretical solutions: Short message service (SMS) authentication code and the physical hardware number to prevent illegal access to user data. Several scenarios are adopted to assess the proposed approach and achieve security and privacy for the user information.