cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 65 Documents
Search results for , issue "Vol 28, No 3: December 2022" : 65 Documents clear
A new logic circuits optimization algorithm using bipartite graph Oday Ahmed Al-Ghanimi; Hussein K. Khafaji
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1621-1632

Abstract

Designing a logic circuit from the scratch requires its description in logical expression, (e.g. sum of products), and then the expression should be optimized to diminish the cost and complexity of the circuit by reducing the number of literals, the number of logical terms, and/or logical operations. Karnaugh map, K-Map, is the most popular method in the optimization process, but it suffers from many drawbacks such as its inefficiency or the inability to be used in minimizing logical expression containing more than four literals, in addition to the complexity of implementing it as a program. In this paper, we propose a new algorithm to optimize the logic circuits depending on the bipartite graph and some of the suggested mathematical operations. The proposed algorithm is simple for programming implementation, literal-unlimited number, and is easy to be visualized and understandable. Many of the logic circuits of 3, 4, 5, and 6 literals were optimized and the results were correctly matched with the results of the Karnaugh map. Also, tens of logic circuits of more than 6 literals are optimized and the results were correctly checked with their truth tables and Logic-Friday tool.
Reconfigurable data encoding schemes for on-chip interconnect power reduction in deep submicron technology Vennapusapalli Shavali; Sreeramareddy Gorlagummanahally Maripareddy; Patil Ramana Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1330-1344

Abstract

With technology scaling, size of both transistor and interconnects are reduced. Power dissipation due to dynamic switching is high in the interconnects. Suitable encoding schemes that reduces transition between data bits are used to minimize interconnect power dissipation. In this paper transition between data bits is minimized based on three novel data encoding schemes identifying the novel methods estimates bit transitions in a pair of data bits and performs half inversion or full inversion on one byte of data thus reducing the switching activity by 50%. The encoder and decoder for the three encoding schemes are modelled in verilog hardware description language (HDL) and implemented using application specefic integrates circuit (ASIC) flow targeting 32 nm. Technology over all power dissipation of encoding scheme is 1.04 μW in addition over head area of 210 cells with encoding delay of 340 ps. Encoder decoder register transfer logic (RTL) code is implemented and the total area required is 34980 units. The data encoding and decoding schemes are suitable for low power applications.
Analysis of the current state of deepfake techniques-creation and detection methods Ashraf A. Abu-Ein; Obaida M. Al-Hazaimeh; Alaa M. Dawood; Andraws I. Swidan
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1659-1667

Abstract

Deep learning has effectively solved complicated challenges ranging from large data analytics to human level control and computer vision. However, deep learning has been used to produce software that threatens privacy, democracy, and national security. Deepfake is one of these new applications backed by deep learning. Fake images and movies created by Deepfake algorithms might be difficult for people to tell apart from real ones. This necessitates the development of tools that can automatically detect and evaluate the quality of digital visual media. This paper provides an overview of the algorithms and datasets used to build deepfakes, as well as the approaches presented to detect deepfakes to date. By reviewing the background of deepfakes methods, this paper provides a complete overview of deepfake approaches and promotes the creation of new and more robust strategies to deal with the increasingly complex deepfakes.
New methods for proportional-integral controller design for time-delay systems Aye Taiwo Ajiboye; Jayeola Femi Opadiji; Abdulrahman Olalekan Yusuf; Olusogo Joshua Popoola; Esther Toyin Olawole; Olalekan Femi Adebayo
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1437-1450

Abstract

The development of structured methods for proportional-integral (PI) controller design for systems with time delay are proposed in this article. Several PI controller design methods for time-delay systems have been reported. However, combining two or more methods to form new ones have not been given serious attention. The system stability region in the controller parameters space was determined by plotting the stability boundaries. In this study, the controller gains were first obtained using genetic algorithm (GA), weighted geometric center (WGC), and centroid of convex stability region (CCSR). Thereafter, these gains were combined by finding the centroids of lines joining any of the two gain locations, and triangle whose vertices are the location of the three gains in the convex stability region, thus yielding four additional methods, M1, M2, M3, and M4. Compared to a particular existing method, some of the proposed methods yield faster response speed at the expense of reference input tracking, while the reverse is the case for others. Any of the proposed methods (M1, M2, M3, and M4) can be selected depending on the system performance specifications.
Smart technologies of the risk-management and decision-making systems in a fuzzy data environment Yesmagambetova Marzhan; Keribayeva Talshyn; Koshekov Kairat; Belginova Saule; Alibekkyzy Karlygash; Ospanov Yerbol
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1463-1474

Abstract

The purpose of this article is to provide a methodology for calculating and predicting the quality of solution implementation in complicated multi-parametric organizational and technological challenges with control agent uncertainty. The article's study findings are centered on the practical application of formal methods in predicting the outcomes of control and decision-making risks under the uncertainty of model agents. The proposed mathematics and simulation applications use a multi-agent strategy to handle the general problem of assessing quality control based on "producer risk (project customer)" and "user risk." Computer experiments with simultaneous graphical visualization of the results improve the accuracy of mathematical modeling, increasing the study's effectiveness. Under the uncertainty of system agents, a simulation model has been designed to analyze and anticipate the dependability of control and the hazards of decision-making. The suggested model is unique in that it takes into account the statistical nature of normative values as well as the rules of equal probability. To handle a frequent problem, the proposed system technique employs a dual approach. It accomplishes this by assessing the quality of the control process based on the magnitude of the risks in the decision-making system.
A new approach for road extraction using data augmentation and semantic segmentation Kawther Ould Babaali; Ehlem Zigh; Mohamed Djebbouri; Oussama Chergui
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1493-1501

Abstract

Accurate road extraction from remote sensing images is a challenging task. Several methods of extraction have been developed but the precision of extraction is still limited for the unpaved and small-width roads. This paper proposes an accurate road extraction approach called DAA-SSEG since it uses data augmentation architecture (DAA) and semantic segmentation model (SSEG). The proposed approach DAA-SSEG is based on a modified full convolutional neural network that overcomes the vanishing gradient and the training saturation issues. It recognizes roads at the pixel level. Furthermore, The DAA-SSEG approach uses a new plan of data augmentation based on geometric transformation and images refinement techniques. It allows getting a richer dataset thus better training and an accurate extraction. The experiment denotes that the proposed approach DAA-SSEG, that combine data augmentation architecture and semantic segmentation method, outperforms some state-of-the-art methods in terms of F-measures. The results demonstrate that it ensures accurate extraction of unpaved and small-width roads, in urban and rural areas. Moreover, the proposed approach distinguishes between roads and trails and can extract some roads not labeled beforehand.
Reactive power control and performance analysis of doubly fed induction generatorin micro grid Syed Sarfaraz Nawaz; Sandipam Tara Kalyani
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1214-1226

Abstract

For both financial and environmental considerations, the power system includes a large number of solar and wind generating plants. In reality, wind energy has always been used using a doubly fed induction generator (DFIG) based variable speed wind turbine. This study examines the effectiveness of indirect control of a doubly fed induction generator for closed loop reactive power adjustment. A wind energy conversion system with continuous grid power's design, analysis, and MATLAB simulation are also covered. For DFIG to work reliably and be controlled to ensure stability for the power system, a seamless transition mode change is required. The horizontal axis wind turbine technology provides the necessary reactive power into the grid under all unexpected circumstances. The concept of DFIG mathematical modelling is covered. Various simulated outputs at loading circumstances are shown, along with separate control of active and reactive powers and variations in prime mover speed and excitation. This study examines the performance enhancement of DFIG using its grid-based proportional integral (PI), proportional integral derivative (PID), and fractional order proportional integral derivative (FOPID) controllers. Based on the thorough simulation findings, the type of control system that gives the efficient performance of DFIG in grid is ultimately decided. These simulation results demonstrate how the suggested controllers outperform the current controllers in terms of improving system performance.
Integration of an optimized neural network in a photovoltaic system to improve maximum power point tracking efficiency Ezzitouni Jarmouni; Ahmed Mouhsen; Mohamed Lamhamedi; Hicham Ouldzira; Ilias En-naoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1276-1285

Abstract

Due to the variability of weather conditions and equipment properties the maximum power point tracking (MPPT) performance is influenced. MPPT controllers are widely used to improve photovoltaic (PV) efficiency because MPPT can produce maximum power under various weather conditions. Among the most used techniques and representing a satisfactory efficiency are those based on artificial intelligence. Since the use of neural networks requires resources at the implementation level, the optimization of these systems is an important phase. This work represents an optimized system for tracking the maximum power point, the latter based on a multi-layer neural network. The optimized multi layer perceptron (MLP) will ensure a fast convergence to the maximum power point with a low oscillation compared to the classical method.
Comparison of the efficiency of machine learning algorithms for phishing detection from uniform resource locator Ahana Nandi Tultul; Romana Afroz; Md Alomgir Hossain
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1640-1648

Abstract

We are using cyberspace for completing our daily life activities because of the growth of Internet. Attackers use some approachs, such as phishing, with the use of false websites to collect personal information of users. Although, software companies launch products to prevent phishing attacks, identifying a webpage as legitimate or phishing, is a very defficult and these products cannot protect from attacks. In this paper, an anti-phishing system has been introduced that can extract feature from website’s URL as instant basis and use four classification algorithms named as K-Nearest neighbor, decision tree, support vector machine, random forest on these features. According to the comparison of the experimental results from these algorithms, random forest algorithm with the selected features gives the highest performance with the 95.67% accuracy rate. Then we have used one deep learning algorithm as enhanced of our experiment named as deep neural decision forests which have given performance with the 92.67% accuracy rate. Then we have created a system which can extract the features from raw URL and pass the features to our deep neural decision forest trained model and can classify the URL as Phishing or legitimate.
Islamic events reminder system via short message service notifications alert Maha Ibrahim Khaleel; Anwar Hamza Bresam
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1649-1658

Abstract

For persons working in the field of modern technology, the lack of awareness about Islamic events remains a significant obstacle. One of the numerous reasons why the event gets forgotten on its designated date. This prompted the creation of an automatic reminder system with mobile technology integration. This paper has the purpose of assisting people in remembering their daily Islamic events, as well as serving as a model for informing people of Islamic occasions via short message service (SMS) notifications. As a result, the main goal is to develop an Islamic model that uses SMS to inform people. To develop a free system based on the concept of recalling the most significant events in Muslim history in order to keep people informed. (Microsoft Visual Studio.net and Microsoft SQL Server Management Studio Express) as our main database. The text message reminder system is made up of two parts: an SMS application for automatic text messaging and a web-based application for customer registration and automatic reminder scheduling. The automated method delivered 100% of the SMS messages to the participants throughout the pilot testing. Finally, the system displayed a notice indicating that the text messages were successfully despatched, and the application was confirmed to be functional.

Filter by Year

2022 2022


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue