cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 26, No 2: May 2022" : 64 Documents clear
Modeling the impact of jamming attacks in the internet of things Imane Kerrakchou; Sara Chadli; Yassine Ayachi; Mohammed Saber
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1206-1215

Abstract

Security is a key requirement in the context of the Internet of Things. The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of the most commonly utilized methods is Jamming. However, there are also some other attack types that we need to be aware of, such as Tampering, Wormhole, etc. In this paper, we have provided an analysis of the layered IoT architecture. A detailed study of different types of Jamming attacks, in a wireless sensor network, is presented. The packet loss rate, energy consumption, etc. are calculated, and the performance analysis of the WSN system is achieved. The protocol chosen to evaluate the performance of the WSN is the S-MAC protocol. Different simulations are realized to evaluate the performance of a network attacked by the different types of Jamming attacks.
Artificial intelligent controller-based energy management system for grid integration of PV and energy storage devices Durga Prasad Ananthu; Neelshetty K.; M. Venkateshkumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp617-628

Abstract

In the modern world, photovoltaic (PV) energy generation is becoming more prevalent and cost-effective. To address climate change, many countries have prioritised photovoltaics and made significant investments in energy generation. Because of its non-linear nature, solar energy generation is extremely difficult. This is completely dependent on the solar radiation and the outside temperature. The maximum power generation of a PV system in non-linear weather circumstances and the grid integration of PV with power management are discussed in this article. Artificial intelligence (AI) is vital for improving the energy output of PV systems across a wide range of environmental conditions because traditional controllers do not aid a solar system in producing the maximum energy. The grid integration of PV and EMS (energy management systems) was covered in the later part of this article. In this paper, artificial intelligence is used to provide customers with continuous power through a battery system, which plays a critical role in energy management. Furthermore, the suggested model was simulated in Matlab and its performance was evaluated under various operational scenarios. To demonstrate the effectiveness of the proposed system, the results are compared to IEEE 519.
Cuckoo search algorithm and particle swarm optimization based maximum power point tracking techniques Sally Abdulaziz; Galal Atlam; Gomaa Zaki; Essam Nabil
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp605-616

Abstract

Increasing the efficiency of photovoltaic (PV) systems is a pressing issue, and several studies have focused on the Maximum Power Point Tracking (MPPT) techniques to extract the maximum PV output power. Many MPPT techniques have been discussed in the last decade, and optimization-based MPPT techniques have shown better performance than other MPPT techniques. In this study, two optimization techniques, the cuckoo search algorithm and particle swa9rm optimization with changing inertia weight techniques are discussed and applied to a PV system to track the maximum power point. The MSX-60 PV module and boost DC-DC converter are used in this paper to simulate and model the MPPT system using MATLAB/Simulink to show which technique has the best performance under various solar irradiation scenarios. In addition, different structures of PV arrays such as series-parallel, bridge link, and total cross-tied PV structures are simulated to analyze their effect on the efficiency of MPPT processes.
Matic motorcycle transmission damage detection system using internet of things-based expert system Suhadi Suhadi; Muhamad Nur; Sulistyowati Sulistyowati; Amat Suroso
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1018-1026

Abstract

The development of the motorcycle industry in Indonesia has developed quite significantly from year to year, the BPS (Central Statistics Agency) noted that in 2019 the number of motorcycle sales reached 106.657.952 units, and the AISI (Indonesian Motorcycle Industry Association) in 2020 the type of scooter (matic) of 2,696,557 units or 87.9%, this automatic type of motorbike is the largest contributor to two-wheeled vehicles and is the favorite type of vehicle for Indonesians. Automatic transmission or what is known as CVT (Continuous Variable Transmission), which is an automatic speed transfer system according to engine speed using a V-belt. In previous research, the use of IoT (Internet of Things) is used as an automatic air quality monitoring control system, air quality conditions can be seen quickly and accurately from the monitor. The goal of this study is to use a vibration sensor and the CBR (Case Based Reasoning) method to solve damage to matic motor components. The results of this study are (a) the case average value is 0,76, (b) the CVT component parameter is 80% the average value is 0,94, (c) the CVT component weight parameter is from 60% the average value is 1,26.
Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition Asmae Bengag; Amina Bengag; Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1091-1102

Abstract

Wireless body area networks (WBANs) are very helpful for monitoring the patient’s case, due to the medical sensors. However, this technology faces several problems such as loss communication, security issues and energy consumption. Our work focused on the security and specifically the intrusion detection system (IDS), which is one of the most effective techniques used to identify the presence of intrusions in a network. To make the IDS more efficient, the fuzzy logic (FL) is one of the well-known techniques that is known for its powerful mechanism used to differentiate network traffic levels. In this paper, we start to present an overview of IDS and FL functionality. Moreover, we give a survey of recent works dealing IDS based on FL in wireless sensor and classify them on different measures. Hence, our comparative study is very helpful for the researchers, to understand the use of FL in IDS and have clear vision for developing their own security solution. In the second part, we develop a novel IDS based on Mamdani type fuzzy inference system for detecting jamming attacks in WBAN. Our IDS was built in Matlab, also we are used Castalia platform and OMNET++ simulator to simulate different scenarios of WBAN.
Application of machine learning algorithms for predicting outcomes of accident cases in Moroccan courts Aissa Haidar; Tarik Ahajjam; Imad Zeroual; Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1103-1108

Abstract

Due to the large number of legal cases, the processing of them by the courts is generally very slow. Among these cases, we find accidents cases, which require a great speed of judgment to compensate the victims of those accidents. To this end, we thought of exploiting the possibilities offered by machine learning in order to simulate the work of judges and contribute to speeding up the time of decision. Further, we applied different machine learning algorithms, such as linear regression, decision trees, and random forests. According to the results achieved, the Random Forest is the most perfect model for with the utmost accuracy about 91.05%
Metaheuristic nature-inspired algorithms for reservoir optimization operation: a systematic literature review Nor Shuhada Ibrahim; Nafrizuan Mat Yahya; Saiful Bahri Mohamed
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1050-1059

Abstract

The purpose of this systematic literature review (SLR) article is to discuss the findings of the state-of-art metaheuristic nature-inspired algorithm (MHNIA) in reservoir optimization operation. The rationale of this approach is to elucidate the optimal way as decision making that implemented MHNIA for several complex problems in reservoir optimization operation. Commonly, the metaheuristic optimization algorithm has always been used in hydrology field, especially in reservoir optimization. Hence, this presented study reviewed a considerable amount from the previous studies of commonly nature-based optimization algorithms applied in reservoir operations. Hence, preferred reporting items for systematic review and meta-analyses (PRISMA) has been used as guidance. The source was utilized from two primary journal databases: Scopus and web of science. According to the proposed search string, the findings managed to express into nine main themes which are optimize in water release, optimize reservoir operation problems, optimize hydropower operation, optimize condensate fluids in reservoir storage, optimize water pumped storage, optimize water quality control, optimize system performance operation, optimize water demand and optimize reservoir control as flood preventing. Overall, 24 articles that passed the minimum quality were retrieved using systematic searching strategies.
Enhanced performance of long-term evolution small-cell networks using improved mobility algorithms Abdullah Mohammed Abdullah Al-Amodi; Amlan Datta; Abdulrahman Mohammed Hussain Obaid
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp878-887

Abstract

With an ever-increasing number of user equipment (UE) and bandwidth demands of new applications, the deployment of dense heterogeneous cellular networks has been adopted in many network scenarios. The small cells are unable to unload the traffic due to the random UEs mobility and cells deployment. This degrades the network performance such as handover success, throughput, and load distribution. To address such a problem, we propose an enhanced mobility load-balancing algorithm for small cells. The conventional mobility load balancing (MLB) algorithms study only the fixed or adaptive thresholds of the network separately to consider the load balance process, while other MLB algorithms consider the neighboring cells of the network those experience unnecessary MLB actions. The proposed load balancing algorithms study overloaded cells and neighbors using the proposed efficiency parameter, B. To identify the overloaded cells, we propose B which compares between a pre-defined threshold and the network threshold to categorize medium and overloaded cells, based on B, the algorithm is triggered. Then, to control the shifted load to a target neighbor cell, we propose the Rescue factor, f. the f ensures the load of the target cell after handover is equal or less than Ɓ. The simulation results showed a lower standard deviation and higher throughput and physical resource block utilization than surveyed algorithms.
Early fault identification for operating circuit breaker based on classifier model system Abadal-Salam T. Hussain; Shouket A. Ahmed; Taha A. Taha
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp699-706

Abstract

One of the most important switchgear in a substation is the circuit breaker (CB); it is used either in the transmission or distribution sections. Currently, the maintenance of a CB is done by capturing the trip time using a handheld device; the trip time is the time from trip initiation to the moment of current flow cessation in the load side of the CB. For the maintenance staff of the Iraqi National Power Board (INPB), their decision is mainly aimed to pinpoint the specific problem of the CB, the breaker parameters, such as latch, buffer, mcon, acon, and end which can be analysed using data mining methods such as K-means clustering and Sammon mapping (KCSM). The advantages of this approach include early identification of faults and saving more cost and time of repairing and replacing damaged CBs as the number of damaged CBs can be decreased. The problem with this method is the prolonged time of testing the conventional trip as it requires removing the CBs from service and planned outage. Furthermore, the CB may not capture the crucial information that causes slow tripping. Hence, the main objectives of this work are to analyse CB trip coil current data and study the effect and relationship between two different analytical approaches to analyse the data. The result of this technique showed excellent identification of the switch faults.
Security approach for instant messaging applications: viber as a case study Mohammed Falih Kadhim; Adel Al-Janabi; Ahmed Hazim Alhilali; Nabeel Salih Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1109-1115

Abstract

A variety of internet-based applications are widely used in our animation activities because they provide free and useful services. These applications, such as Instant Messaging, can be run via the web, mobile, or computer-based devices. Therefore, the security and privacy of user data over these apps have been concerned in recent years because of sensitive and confidential information considerations. Consequently, many instant messaging applications, like Viber, have various security and privacy issues that need to be understood and resolved. Viber users reached 800 million, and they increased dramatically due to the efficient services that this app provides. Hence, a loophole in an application’s design may allow illegal access to the app and gain confidential and sensitive data. In this article, we proposed a security approach for Viber to safeguard user confidential data and sensitive information. The proposed approach involves two theoretical solutions: Short message service (SMS) authentication code and the physical hardware number to prevent illegal access to user data. Several scenarios are adopted to assess the proposed approach and achieve security and privacy for the user information.

Filter by Year

2022 2022


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue