cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 28 Documents
Search results for , issue "Vol 4, No 1: October 2016" : 28 Documents clear
Design of MPC for Superheated Steam Temperature Control in a Coal-fired Thermal Power Plant A. Yasmine Begum; G. V. Marutheeswar
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp73-82

Abstract

A superheater is a vital part of the steam generation process in the boiler-turbine system. Reliable control of temperature in the superheated steam temperature system is essential to guarantee efficiency and high load-following capability in the operation of coal-fired Thermal power plant. The PI and PID controllers are extensively used in cascade control of secondary superheated steam temperature process.The design and implementation of a Model Predictive Control (MPC) strategy for the superheated steam temperature regulation in a thermal power plant is presented. A FOPTD model  is derived from  the dynamic model of the superheater. This model is required by the MPC algorithm to calculate the future control inputs. A new MPC controller is designed and its performance is tested through simulation studies. Compared with the superheater steam temperature control using a conventional PID controller, the steam temperature controlled by the MPC controller is found to be more stable. The stable steam temperature leads to energy saving and efficient plant operation, as verified by the simulation results. 
Two Dimensional Tunable Optical-CDMA System Rajesh Yadav Yadav; Gurjit Kaur Kaur
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp125-132

Abstract

In this work an experimental demonstration is proposed to implement the synchronous optical code division multiple access system using two dimensional wavelength hopping and time spreading optical prime code is presented. An optical CDMA system is configured on latest version of optisystem by optiwave for the 20 users (Prime Number = 5) connected in a network operating at a bit rate 10 Gbps each. Tunability is achieved by using a MATLAB based delay selector which serves as the source of control signal for optical delay lines. The encoded optical signal of each user has been assigned a particular mode. The resulting optical signal is then transmitted over parabolic index multimode optical fiber. The received signal can successfully be retrieved at the decoder, when the encoder and decoder are configured for the same user. The performance of Optical CDMA system is evaluated in terms of the autocorrelation and cross correlation function, BER, Q factor, eye diagram and compared with 1D code for a given prime number. 
SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison Mourade Azrour; Mohammed Ouanan; Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp231-239

Abstract

Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
The Peak of the PQRST and the Trajectory Path of Each Cycle of the ECG 12-Lead Wave Sabar Setiawidayat; Djanggan Sargowo; Setyawan P. Sakti; Sri Andarini
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp169-175

Abstract

The objective of this present article is to describe the record of the ECG 12-lead examination in order to obtain the peaks of the P, Q, R, S and T from each cycle and also to present the Peak of the PQRST and the trajectory path of each cycle of the ECG 12- lead wave. The duration of the peak R to another is used as the period  of each cycle, while the Phytagoras theorem is employed to count the trajectory path of the wave in each step. The Peak PQRST is utilized to diagnose the  heart condition, and the trajectory path  is the distance taken up by the impulses in the heart muscles. The discrete data from the MIT-BIH and the results of the measurement itself are employed as the data to obtain the values of the peak PQRST and the trajectory path of the wave of each cycle.
Insulating Material Erosion in Atmospheric Non-Thermal Plasma Jet Device K. M. Ahmed; T. M. Allam; M. A. Abouelatta; S. A. Ward; A. A. Lashin; H. M. Soliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp20-28

Abstract

This paper reports on the selection of insulating material types in a developed atmospheric-pressure non-thermal plasma jet (ANPJ-II) device which was operated previously in our laboratory based on the minimum erosion area of the insulator’s nozzle. Three identical insulator groups used in our experiment include; Teflon insulator material with different thicknesses of 1.5 mm and 2 mm respectively, and Ceramic insulating material with thickness of 2 mm. ANPJ-II device is operated with each of the three insulator groups. These insulators are operated and analyzed with different operation times for compressed Air or Nitrogen gas with a flow rate of 12 L/min and input voltage of 6 kV.  The erosion area of these insulator materials is measured as a function of the operation time. The Ceramic insulator was found to have the minimum erosion area. Also, the temperature of both the cathode and the insulating material (Teflon or Ceramic) are measured to study the effect of operation time and the gas type on the device components.
Efficiency of JSON approach for Data Extraction and Query Retrieval Mohd Kamir Yusof; Mustafa Man
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp203-214

Abstract

Students’ Information System (SIS) in Universiti Sultan Zainal Abidin (UniSZA) handles thousands of records on the information of students, subject registration, etc. Efficiency of storage and query retrieval of these records is the matter of database management especially involving with huge data. However, the execution time for storing and retrieving these data are still considerably inefficient due to several factors. In this contribution, two database approaches namely Extensible Markup Language (XML) and JavaScript Object Notation (JSON) were investigated to evaluate their suitability for handling thousands records in SIS. The results showed JSON is the best choice for storage and query speed. These are essential to cope with the characteristics of students’ data. Whilst, XML and JSON technologies are relatively new to date in comparison to the relational database. Indeed, JSON technology demonstrates greater potential to become a key database technology for handling huge data due to an increase of data annually.
An Improved Criterion for Induced Stability of Fixed-Point Digital Filters with Saturation Arithmetic Priyanka Kokil; Xavier Arockiaraj S
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp65-72

Abstract

This paper establishes a criterion for the induced  stability of fixed-point state-space digital filters with saturation nonlinearities and external interference. The criterion is established in a linear matrix inequality (LMI) setting, and therefore, computationally tractable. The criterion turns out to be an improvement over a previously reported criterion. A comparison of the presented criterion with existing criterion is made. Numerical examples are given to demonstrate the usefulness of the proposed approach.
Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms Mahaba Saad; Khalid Youssef; Hala Abdel-Kader
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp116-124

Abstract

Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal data. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is usually referred to as “the study of secret”. Encryption is the process of converting normal text to unreadable form. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6).  The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations. 

Page 3 of 3 | Total Record : 28


Filter by Year

2016 2016


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue