cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 48 Documents
Search results for , issue "Vol 8, No 3: December 2017" : 48 Documents clear
RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security Meenakshi R. K; A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp709-711

Abstract

The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is designed by using RTL modeling and also the minimum numbers of logical elements are used for implementation. 
Software Aging Forecasting Using Time Series Model I M Umesh; G N Srinivasan; Matheus Torquato
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp589-596

Abstract

With the emergence of virtualization and cloud computing technologies, several services are housed on virtualization platform. Virtualization is the technology that many cloud service providers rely on for efficient management and coordination of the resource pool. As essential services are also housed on cloud platform, it is necessary to ensure continuous availability by implementing all necessary measures.  Windows Active Directory is one such service that Microsoft developed for Windows domain networks. It is included in Windows Server operating systems as a set of processes and services for authentication and authorization of users and computers in a Windows domain type network. The service is required to run continuously without downtime. As a result, there are chances of accumulation of errors or garbage leading to software aging which in turn may lead to system failure and associated consequences. This results in software aging. In this work, software aging patterns of Windows active directory service is studied. Software aging of active directory needs to be predicted properly so that rejuvenation can be triggered to ensure continuous service delivery. In order to predict the accurate time, a model that uses time series forecasting technique is built.
Modified BPNN via Iterated Least Median Squares, Particle Swarm Optimization and Firefly Algorithm Nor Azura Md. Ghani; Saadi bin Ahmad Kamaruddin; Norazan Mohamed Ramli; Ismail Musirin; Hishamuddin Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp779-786

Abstract

There is doubtlessly manufactured artificial neural system (ANN) is a standout amongst the most acclaimed all-inclusive approximators, and has been executed in numerous fields. This is because of its capacity to naturally take in any example with no earlier suppositions and loss of all inclusive statement. ANNs have contributed fundamentally towards time arrangement expectation field, yet the nearness of exceptions that normally happen in the time arrangement information may dirty the system preparing information. Hypothetically, the most widely recognized calculation to prepare the system is the backpropagation (BP) calculation which depends on the minimization of the common ordinary least squares (OLS) estimator as far as mean squared error (MSE). Be that as it may, this calculation is not absolutely strong within the sight of exceptions and may bring about the bogus forecast of future qualities. Accordingly, in this paper, we actualize another calculation which exploits firefly calculation on the minimal middle of squares (FA-LMedS) estimator for manufactured neural system nonlinear autoregressive (BPNN-NAR) and counterfeit neural system nonlinear autoregressive moving normal (BPNN-NARMA) models to cook the different degrees of remote issue in time arrangement information. In addition, the execution of the proposed powerful estimator with correlation with the first MSE and strong iterative slightest middle squares (ILMedS) and molecule swarm advancement on minimum middle squares (PSO-LMedS) estimators utilizing reenactment information, in light of root mean squared blunder (RMSE) are likewise talked about in this paper. It was found that the robustified backpropagation learning calculation utilizing FA-LMedS beat the first and other powerful estimators of ILMedS and PSO-LMedS. As a conclusion, developmental calculations beat the first MSE mistake capacity in giving hearty preparing of counterfeit neural systems.
Direction-Finding Scheme For Multi Base Position Classification Karpagavalli S; V. Balamurugan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp695-697

Abstract

In GPS denied conditions Unpretentious course structures that work especially with an excessive number of philosophies required after a colossal test that in the imaginative work gathering. The paper proposed an idea to overcome a occurring due to GPS denied condition in view of 3D inertial course system. The system would track the location for further improvement of an officer continuously in a multi-floor building of a particular area. In the midst of an urban fight situation an operation of lobbyist or putting out flames is really essential. The considerable number of fighters would be known about the area and development among themselves and to the military troop outside the building.  This framework is valuable to lead the group appropriately in urban to protect the harmed individuals and it will demonstrate the change of overview.
Survey of ICT knowledge based Agriculture Development System H J. Shanthi
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp681-683

Abstract

E-agriculture gives to applying new things to use ICTs in the country, with the main heart on agricultural. ICT in Agriculture provides a wide range of solutions to some farming ideas. The rising field focuses on the development of agricultural and rural advance through improved information and communication. This time, ICT is used as around all information and communication developments including Android mobiles, IOT devices, communication networking devices,  web services; this variety from original Internet-era technologies and sensors to other pre-accessible aids such as  TV, satellites, and radios. This technique continues to evolve in scope as new ICT applications continue to be harnessed in the agriculture industries. It involves the concept, development, design, application, and evaluation of novel ways to use ICTs in the rural domain, with the main focus on cultivation. This includes principles, norms, methods, and apparatus as well as the growth of personality and institutional capacity, and policy hold is all key mechanism of e-agriculture.
Diminishing Connectivity Failures by Auto-Reconfiguration in WSN K. Gugan; V. Saravanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp662-666

Abstract

The Wireless Sensor Network is one of the most significant purposes behind the accomplishment of long range wireless communication. Frequent connectivity failures are occurred in the sensor-organised network due to obstruction, snags, message drop because of node energy depletion; obstacle and so forth. The total communication gets collapsed if there any lessening in the nature of correspondence or quality between the sensor nodes or from the sensor nodes to the sink nodes and this prompts to connection failures. To overcome the frequent connectivity failures we propose Diminishing Connectivity Failures by Auto-Reconfiguration in WSN (DCFA). This scheme provides steadfast routes to reduce the connectivity failure and improve the network performance. 
Child Tracker: Presence and Location Finding System to Protect Child from Missing and Unexpected Cases G. Senthilnathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp743-746

Abstract

Many times children on their own are getting away from parent's view at home or on crowded areas like malls and beach. Not in all cases, but rather from time to time it is unpretentious the kids and hopeless things happening moreover. So it is fundamental for each parent to have a dominating reaction for shield the child from missing. However, the couple of GPS based after things are open in the market, they cost high and also needs a month to month charge for GSM advantage. Energize GPS is significant for outside after and not for nearby spots like strip shopping centers or houses. Also, the things accessible in the market are not viewing the improvement of a young wearing it. Our answer utilizes two contraptions for parent and tyke, clear RF correspondence between gadgets, virtual fencing using RF and tyke improvement viewing. The parent and child can wear this device rather than watch since it displays time data to them.
NFC Secured Offline Password Storage Senthil Kumar; V. Mathivanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp730-732

Abstract

In this paper is all about constructing a device called “One-WORD” that aims to solve this problem. One-word is an offline password keeper aimed at saving and encrypting the passwords in a more secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device it is completely useless without the personal code. 
Design of Android Based Smart Car D. Wilfred Shiju
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp648-650

Abstract

Android smart car is designed with safety in mind. A simple and sensitiveline, included steering wheels and new voice events, this is designed to reduceinterruption so you can stay focused on the highway.This car which can be controlling using an Android APP for smart phones.A car is regularly an electronic mechanic machine that is guide by computer and electronic controlling programming. The innovation of the Smart Car technology to developing based on remote connection using android application can control the car movements. This system use Bluetooth device controller to control the mobile App. This Bluetooth device interface with UART communication. The UART receive the command via the Bluetooth device.   This design is may helps to our rural citifies. This system is developing to help to self driving vehicles.
Immensely Discriminate Routing in Wireless Networks Sujatha V; E. A. Mary Anitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp712-714

Abstract

Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.

Filter by Year

2017 2017


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue