Articles
64 Documents
Search results for
, issue
"Vol 31, No 3: September 2023"
:
64 Documents
clear
G-code converter using interface system for a STEP file (ISO 10303)
Zammeri Abd Rahman;
Saiful Bahri Mohamed;
Mohamad Minhat;
Alias Mohd;
Zulkifli Abd Rahman;
Roslan Awang
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1362-1371
The STEP file is the “standard for the exchange of product model data,” which is usually used to exchange geometric data in boundary representation (B-rep) between different computer-aided design (CAD) platforms. These data can be fully utilized and integrated into a larger manufacturing organization, such as a computer-aided manufacturing (CAM) environment for computer numerical control (CNC) machining applications based on ISO 6983. The 3D models of 2D machining profiles were created in CAD software and saved as STEP files. The data structure was analyzed by comparing the geometric entities of the CAD model and the STEP file. The algorithm was created using the hypertext preprocessor (PHP) programming language and produced a computer interface system to convert STEP files into G-code format. The machining blocks with profile machining features were simulated using a CNC simulator and PC-based open architecture control (OAC) software. The G-code was validated on a three-axis CNC milling machine, and the result was compared to the CAD model to confirm the machining profile. The integrated interface system I2S demonstrates its ability to interpret all 2D profiles and generate machining tool paths and G-code, allowing data flow between CAD and CAM environments and shortening product development cycles.
Predictive source management for low power domestic direct current grids
Satish B. Ashwath Narayan;
Pasumarthi Usha
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1578-1588
The decrease in the price of solar photo voltaic (PV) panels has led to the widespread adoption of the solar power as a renewable energy source, not only at the grid level but also on the roof tops of the residential buildings. The solar PV panels produce direct current (DC) and can be readily used to drive DC powered loads or charge batteries. Direct powering of the loads from the solar panels is hindered by the highly variant nature of solar power generation which depends on a number of external as well as internal factors. The paper proposes a prediction based direct connection between PV panel and DC loads, only when the panel will be able to supply the required power to the load. The loads have been categorized based on how they need to be powered and their priority levels. The data specific to the rooftop was collected over two years using which the prediction of the panel output was carried out. Combining the load categorization and the power prediction a smart management system was designed which was able to decide on how the loads need to be powered and hence were connected to the appropriate source.
Arabic text steganography using lunar and solar diacritics
Rawaa Hamza Ali;
Ban Nadeem Dhannoon;
Mohamed Iedan Hamel
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1559-1567
The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important information using text steganography. This work-study takes advantage of the possibility of concealing data in all diacritics after the two letters ال)) in the cover text. In the presented study, we propose a new algorithm in steganography in Arabic text as a cover text. After pre-processing the cover text, the algorithm hides the elements of secret messages inside the Arabic letters by adding appropriate diacritics (like Hamzah Al-Wasl) on the extracted words beginning with (ال) according to its third letter type (solar or lunar). In the proposed algorithm, the length of the secret message is determined so that the intended recipient can extract the hidden message accurately. The proposed algorithm is robust against the attack because the change in the cover text is small and imperceptible. On the other hand, since Arabic is used as a cover text, the breadth of the inclusion depends on the number of words beginning with (ال) definition.
Evaluation of CHB MLI based shunt APF using low pass filter and self-tuning filter
Musa Yusup Lada;
Mohd Amran Mohd Radzi;
Jasronita Jasni;
Hashim Hizam;
Auzani Jidin;
Syahrul Hisham Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1274-1285
The increasing demand for high-rating power supply in the distribution system causes the conventional inverter topology, six step voltage source inverter (SSVSI) unsuitable for being applied as active power filter (APF). Multilevel inverter (MLI) is generally the best suitable inverter for APF, but not all types of MLI can be used for high-voltage applications. Among the MLIs topology, cascaded H-bridge (CHB) is the best choice since it can produce output voltage more than twice the amount of DC source. Moreover, CHB MLI topology uses fewer power devices and is simple in design. Low pass filter (LPF) is a common method used for harmonic extraction in this controller. However, this method faces various problems, such as an additional need for phase lock loop (PLL) algorithm and slow transient and steady-state responses. Therefore, self-tuning filter (STF) is introduced as a new filtering method to overcome this problem. This paper evaluates CHB MLI's performance for APF using STF as a harmonic extraction. The model was developed and verified in MATLAB/Simulink. The results show that harmonic extraction using STF performs better total harmonic distortion (THD) than conventional LPF. Nevertheless, both algorithms produce THD below 5%, defined as the permissible value stated in IEEE 519.
Identification and categorization of diseases in arecanut: a machine learning approach
Ajit Hegde;
Vijaya Shetty Sadanand;
Chinmay Ganapati Hegde;
Krishnamurthy Manjunath Naik;
Kanaad Deepak Shastri
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1803-1810
Arecanut is one of the prominent commercial crops that are grown worldwide for traditional medicines, furniture, cosmetics, food, veterinary preparations, and textile industries. It experiences a variety of diseases during its existence, from the bottom to the tip. The conventional method for detection of diseases is through visual inspection and it is also necessary to have properly designed laboratories to check these harvests. It is a time consuming and tedious task to inspect these crops across wide acres of plantations. The proposed system has been developed that uses convolutional neural network (CNN) to identify and categorize diseases in arecanuts, trunks and leaves also suggesting effective preventative measures. Proprietary dataset consists of 1,100 photos of healthy and diseased arecas. The ratio between the train and test data is 80:20. Binary cross entropy is employed as the loss function for model construction, with accuracy serving as the metrics and Adam serving as the optimizing function. In identification and categorization of arecanut diseases, the suggested approach was shown to be efficient with 93.05% accuracy.
Enterprise information security risks: a systematic review of the literature
Jenner Lavalle Sandoval;
Domingo Hernández Celis;
Michael Cabanillas-Carbonell;
Laberiano Andrade-Arenas
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1589-1604
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment and improvement of information technology (IT) infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets.
Design thermohygrometer based on internet of things in clinical laboratory
I Made Agus Mahardiananta;
Putu Vierda Lya Suandari;
I Gusti Agung Ngurah Devasya Putra Pratama
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1311-1318
Clinical laboratory units must meet safety requirements such as temperature stability and room humidity because the materials and substances used are sensitive to changes in temperature and environmental conditions, so it is important to carry out routine monitoring. The purpose of this research is to design an internet of things (IoT)-based thermohygrometer that can make it easier for users to monitor temperature and humidity even though the user is outside the laboratory. This tool can also store the results of temperature and humidity measurements making it easier for the user to monitor changes in temperature and humidity that occur. The method used is descriptive exploratory with a prototype system, namely the system development process, users and the required data and results obtained through a tool that has been designed. The results of research conducted using an IoT-based thermohygrometer prototype after statistical testing, there was no significant difference between the reference thermohygrometer and the IoT-based thermohygrometer prototype and the readings from the thinkspeak web. For temperature and humidity measurements that have been carried out at the X clinical laboratory in Denpasar, it still does not meet the standards.
Non-contact evaluation of pigs’ body temperature under various infrared sources
Hoc Thai Nguyen;
Tien Xuan Dao;
Duong Tri Ngo
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1382-1391
The purpose of this study is to verify the feasibility of using an infrared camera to measure the surface temperature and then estimate the core body temperature of pigs under various infrared sources. We first conducted experiments with pig-body temperature measurement by an infrared camera. Then we have tried to increase the accuracy rate in estimating the core body temperature of pigs by measuring the temperature of moving pixels. We concluded that the relation between the core body temperature and the estimated pig-body temperature was y = 1.0392x−0.6621 with no static infrared source in the field view of infrared camera. With the existence of heat lamps in the field of view of the infrared camera, the relation was y = 1.0248x − 0.0921. With both the root mean square error and the mean absolute error lower than 1.12 ◦C, the experimental simulation results show that the proposed method is feasible and effective in fast and non-contact evaluation of pigbody temperature under various infrared sources.
Airport traffic optimisation and airdrome analysis using mathematical modelling
Douae Zbakh;
Marwane Benhadou;
Abderrahmane Benkacem;
Abdelouahid Lyhyaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1744-1753
An airport is considered to be a complex system, so managers nowadays are looking for verifiable solutions that could be tested and virtually simulated, in order to optimize safety, improve regularity, and reduce delays and risks of collision. To respond to this dilemma, many solutions were tested using safe simulation methods. The specific problem tackled in this paper refers to aerodrome capacity optimization, and specialy arcrafts mouvements. For this purpose, we introduce a mathematical model that was applied to Mohamed V Casablanca Airport, and the corresponding event actualization and graph was constructed taking into account uncertainty in flight schedules, aircraft types and their stand. Finally, the airdrome model was simulated using a special parameter in Arena tool.
Energy efficient secured-quality of service routing protocol for mobile ad hoc network using multi-objective optimization
Veeramani Ramasamy;
Madhan Mohan Ramalingam;
Mahesh Chitraivel
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v31.i3.pp1486-1495
This article proposed a hybrid energy-efficient secured quality of service (QoS) based multipath routing protocol. A modified crow search combined with the tunicate swarm butterfly optimisation algorithm (TSBO) with a density-based clustering technique strategy is proposed for the selection of cluster heads after the initial cluster formations. Among all the nodes, the cluster head is selected, and employing the collaborative trust-based approach (CTBA), which employs the trust factor for mobile ad hoc network (MANET) data transmission, a node's authentication is supplied. Finally, to implement the safe routing technique, this article suggested a hybrid multipath routing protocol combining multi-objective grey wolf optimisation (MO-GWO) with a fruit fly algorithm. The NS3 simulator is used to assess the proposed work. The packet delivery ratio metric performs 4% better than the current models. As a result, the suggested approach performs better for the end-to-end delay, energy consumption, packet delivery ratio (PDR), and throughput; it also uses less energy and has a shorter delay. Additionally, single-path nodes with the same energy value have lower throughput than multi-path nodes.