cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 48 Documents
Search results for , issue "Vol 8, No 2: November 2017" : 48 Documents clear
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle Muhammad Faiz Bin Ramli; Syariful Syafiq Shamsudin; Ari Legowo
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp441-449

Abstract

Achieving a robust obstacle detection system for small UAV is very challenging. Due to size and weight constraints, very limited detection sensors can be equipped in the system. Prior works focused on a single sensing device which is either camera or range sensors based. However, these sensors have their own advantages and disadvantages in detecting the appearance of the obstacles. In this paper, combination of both sensors based is proposed for a small UAV obstacle detection system. A small Lidar sensor is used as the initial detector and queue for image capturing by the camera. Next, SURF algorithm is applied to find the obstacle sizes estimation by searching the connecting feature points in the image frame. Finally, safe avoidance path for UAV is determined through the exterior feature points from the estimated width of the obstacle. The proposed method was evaluated by conducting experiments in real time with indoor environment. In the experiment conducted, we successfully detect and determine a safe avoidance path for the UAV on 6 different sizes and textures of the obstacles including textureless obstacles.
Analysis and Measurement of Wave Guides Using Poisson Method M. Sudha; A. Kumaravel
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp546-548

Abstract

The Poisson equation is used to analyze and measure the waveguide in quick and exact calculation of Green's capacity. For this reason, Green's capacity is composed as far as Jacobian elliptic capacities including complex contentions. Another calculation for the quick and precise assessment of such Green's capacity is definite. The principle advantage of this calculation is effectively appeared inside the casing of the Limit Integral Resonant Mode Expansion technique, where a generous decrease of the computational exertion identified with the assessment of the referred to Green's capacity is gotten.
Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks Younsung Choi
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp296-301

Abstract

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
Performance Analysis of HRO-B+ Scheme for the Nested Mobile Networks using OPNet Shayma Senan; Aisha Hassan A. Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp522-532

Abstract

As a demand of accessing Internet is increasing dramatically, host mobility becomes insufficient to fulfill these requirements. However, to overcome this limitation, network mobility has been introduced. One of its implementation is NEMO Basic Support protocol which is proposed by Internet Engineering Task Force (IETF). In NEMO, one or more Mobile Router(s) manages the mobility of the network in a way that its nodes would be unaware of their movement. Although, it provides several advantages, it lacks many drawbacks in term of route optimization especially when multiple nested mobile networks are formed. This paper presents a new hierarchical route optimization scheme for nested mobile networks using Advanced Binding Update List (BUL+), which is called HRO-B+. From performance evaluation, it shows that this scheme performs better in terms of throughput, delay, response time, and traffic, and achieves optimal routing.
Synchronous Winches to Lift the Ship and Distributed Control System to Distribute the Motor Loads for Marine Using CAN Protocol R. Sundar
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp586-588

Abstract

A shiplift is a modern alternative for these older systems. It consists of a structural platform that is lifted and lowered exactly vertical, synchronously by a number of hoists. First, the platform is lowered underwater, then the ship is floated above the support, and finally the platform with ship is lifted and the ship is brought to the level of the harbor. The modern ship lifts use synchronous winches to hoist a ship.Our project proposes a new method to construct an automated ship lifting installation. According to this, each hoisting winch is entirely controlled by a dedicated microcontroller. All such hoists on either side of the platform are networked via CAN. This result in a distributed control system that runs all the hoists synchronously, thereby achieving precisely distributed motor loads and assuring that ships cannot slip. The project uses four such hoists to raise and lower the platform. Hoists are driven by dc motors with the microcontroller controlling the winch rotational speed. Each hoist is a CAN node on the network. In order to safely operate any shiplift, all hoists must be perfectly synchronized. Winches operate at the specified speed, regardless of load, behaving as if they are mechanically coupled together. A fifth node on the network acts as the control and monitoring unit for the entire hoisting maneuver. It has switches to start and stop the process and LCD screen to display the distribution of motor loads. The Ship lifting speed is changes according to the weight of the ship.
Performance Analysis of Self-Consumed Solar PV System for A Fully DC Residential House T. M. N. T. Mansur; N. H. Baharudin; R. Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp391-398

Abstract

Malaysia is moving forward by promoting used of renewable energy such as solar PV to the public where it is generated at the distribution voltage level. The fluctuation of fuel prices becomes main concern to the consumers since it affecting the electricity tariff. The objective of this project is to design a self-consumed DC power system for a residential house from renewable energy resource which is solar PV that it will independent from the utility grid. The methodology proposed are configuring daily load demand, sizing PV array and battery bank and simulation of the design system by using PVsyst. Based on solar energy resource, the optimum PV array size is 2.0 kWp while the battery bank size is 700 Ah at 48 V which is designated for 4 days of autonomy. The system could meet 100% of load demand throughout the year with 67.9% of performance ratio. The loss to the system is contributed by the temperature effect to the PV module, unused energy because of battery full capacity, converter and battery efficiencies. Using this concept, the proposed design set-up is expected to benefit the residential consumers in reducing utility electricity consumption up to 2,434 kWh per year and avoiding 1.7 tons of carbon emissions into the environment annually.
Fingertip Detection Using Histogram of Gradients and Support Vector Machine Ali Sophian; Dayang Qurratu’aini
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp482-486

Abstract

One important application in computer vision is detection of objects. One important application in computer vision is detection of objects. This paper discusses detection of fingertips by using Histogram of Gradients (HOG) as the feature descriptor and Support Vector Machines (SVM) as the classifier. The SVM is trained to produce a classifier that is able to distinguish whether an image contains a fingertip or not. A total of 4200 images were collected by using a commercial-grade webcam, consisting of 2100 fingertip images and 2100 non-fingertip images, were used in the experiment. Our work evaluates the performance of the fingertip detection and the effects of the cell’s size of the HOG and the number of the training data have been studied. It has been found that as expected, the performance of the detection is improved as the number of training data is increased. Additionally, it has also been observed that the 10 x 10 size gives the best results in terms of accuracy in the detection. The highest classification accuracy obtained was less than 90%, which is thought mainly due to the changing orientation of the fingertip and quality of the images. 
Enhanced Capability, Reliability, and Productivity for Submerged Geophysical Mapping of Unexploded Weapons CH. Vijayalakshmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp564-566

Abstract

This paper presents comes about because of innovation advancement endeavors throughout the most recent 6 years concentrated on submerged unexploded weapons (UXO) discovery and arrangement. Our approach abuses coordinated geo-referenced detecting advancements and have application for undertakings running from ports and harbor improvement to seaward vitality and wind cultivate improvement. Compelling discovery of UXO, accomplished through various innovations, uses techniques archived in the United States Air Force (USAF) Military Munitions Response Program (MMPR) Underwater Military Munitions Guidance Document, distributed in 2014. Evaluation stages and advances include: remotely worked vehicles (ROVs) for starting site observation; multibeam echo sounder (MBES) for bathymetry; sides can sonar (SSS) for ocean bottom target discovery; sub-base profiling for residue portrayal; stationary examining sonar for high resolution base conditions; attractive field mapping by means of towed, vessel-sent, base after wing or from a towed gliding stage for shallow-water settings; ROV-based optical and acoustic studies and target cross examinations; and ROV-based electromagnetic enlistment (EMI) exhibits for target cross examination and characterization. The specialized difficulties identifying with precise geo-situating of these frameworks and cases of co-enrollment results are examined in most recent 10 years, the GDC has encouraged unified control of more than 100 remotely executed ventures.
Development of Efficient Iris Identification Algorithm using Wavelet Packets for Smartphone Application Teddy Surya Gunawan; Nurul Shaieda Solihin; Malik Arman Morshidi; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp450-456

Abstract

Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. By having this iris recognition for identification and verification, the smartphone will be secured since every person have their own iris type. In this paper, we proposed an efficient iris recognition using Wavelet Packets and Hamming distance which has lightweight computational requirements while maintaining the accuracy. There are several steps needed in order to recognize the iris which are pre-processing the iris image consists of segmentation and normalization, extract the feature that available in the iris image and identify this image to see whether it match with the person or not. For comparison purposes, different types of wavelet bases will be compared, including symlets, discrete meyer, biorthogonals, daubechies, and coiflets. Performance of the proposed algorithm was tested on Chinese Academy of Sciences Institute of Automation (CASIA) iris image database. The optimum wavelet basis function obtained is symlet. Results showed that the accuracy of the proposed algorithm is 100% identification rate.
Analysis of Regulated Kinase Signal Network through Feedback Loops in Extra-Cellular Signal C. Periyasamy Periyasamy
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp549-551

Abstract

Signal network assumes a vital part in directing the principal cell capacities, for example, cell expansion, survival, separation and motility. Improvement and investigation of scientific model can help us gain a profound comprehension of the unpredictable conduct of ERK flag transduction organizes. This paper exhibits a computational model that offers an incorporated quantitative and dynamic reproduction of ERK flag transduction arranges, actuated by epidermal development figure. The mathematic demonstrate contains the enactment energy of the pathway, a huge number of input circles and association of platform proteins. The model gives knowledge into flag reaction connections between the authoritative of EGF to its receptor at the phone surface and actuation of downstream proteins in the flagging course. The diverse impact of positive and negative input circles of the ERK flag transduction pathway were for the most part examined, showing that criticism circles were the primary affecting variable to the swaying of ERK flag transduction pathway. The forecasts of this wavering of ERK enactment concur well with the writing. It can prompt flag floods of the downstream substrates and instigate relating natural practices.

Filter by Year

2017 2017


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue