Articles
48 Documents
Search results for
, issue
"Vol 9, No 1: January 2018"
:
48 Documents
clear
The Application of S-Transform to Reduce Border Distortion Effect Based on Window Length
S. Habsah Asman;
M. A. Talib Mat Yusoh;
A. Farid Abidin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp177-182
The enhancement of powerful signal processing tools has broadened the scope research in power quality analysis.The necessity of processing tools to compute the signals accurately without border distortion effect presence has demanded nowadays. Hence, S-Transform has been selected in this paper as a time-frequency analysis tools for power disturbance detection and localization as it capable to extract features and high resolution to deal with border distortion effect. Various window length signal has been analyzed to overcome the border distortion effect in S-Transform.To ascertain validity of the proposed scheme, it is validated with IEEE 3 bus test system and simulation results show that the proposed technique can minimize the border effect while detecting transient and voltage sag during fault system. As a result, the longest window length which is four cycle, outperform the least MSE value which indicate the best performance. While, the shortest window length resulting highest MSE value which indicate the worst performance.
A High Frequency Converter for EV Application
G. Kannan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp5-11
An electrical vehicle (EV) is advancing as alternative power trains for green transportation. the DC–DC converter for auxiliary power supply of electric loads .In this paper presented a new topologyof high frequency converter for electric vehicle was proposed,This converter has to be capable of handling the energy transfer from the 28V DC bus and the 550 high voltage DC bus (used for the electric traction). The control strategy is phase shift of the full bridge converter. Using this topology we reduce the switching losses. Conventional converter at two levels of voltage by only one full bridge converter using two planar transformers in high frequency the primary are coupled in parallel and the secondary are in series. We minimized the size and the weight of the converter. The high frequency converter advantages in terms of cost, efficiency, flexibility, and increased due to the possibility of easy synchronous rectification implementation.
A Study about SOA Based Agriculture Management Data Framework
Prasanna Moorthi N;
Mathivananr Mathivananr
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp39-42
Agricultural MDF is a sort of data framework concentrating on the agricultural generation, administration, logical research data gathering, ordering, arranging, recovery and yield; it is an imperative piece of the farming informatization. In view of the examination of circumstance and issue of rural data management, this paper give a coordination model of utilizing SOA to outline agrarian MDF. The SOA's hypothesis, execute innovation and application structure and character were talked about in detail. In light of the investigation of necessity is meaning of agrarian MDF. Utilizing the planning thought of SOA, based-SOA farming MDF was presented, and the fundamental idea, model of configuration was talked about in points of interest.
Analysis of BBNs Over Fault Detection and Diagnosis in Industrial Application
Upadhyay Anand Trilokinath;
Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp68-72
In Industrial procedures, to trust the achievement of planned operation, actualising new and exact strategy for perceiving irregular working conditions, known as shortcomings, is essential. A powerful technique for blame location and analysis helps to decrease the effect of these deficiencies, praises the wellbeing of operation, limits downtime and lessens fabricating costs. In this paper, utilisation of BBNs examined for a benchmark synthetic modern process, known as, Tennessee Eastman keeping in mind the end goal to accomplish prime blame location and specific likely finding of their causes. Use of Bayesian conviction systems for blame location and conclusion of Tennessee Eastman prepare in the graphical setting depiction has not been tried yet. The accomplishment of this component affirms capacity and straightforwardness utilisation of it as an asymptomatic framework in specific current procedures.
Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data
A. Mohamed Divan Masood;
S. K. Muthusundar
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp107-110
The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.
Content Based Image Retrieval Using Lacunarity and Color Moments Of Skin Diseases
I Gusti Ayu Triwayuni;
I Ketut Gede Darma Putra;
I Putu Agus Eka Pratama
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp243-248
The research conducted contributed in the form of CBIR application which was developed using texture and color feature extraction in searching the contents information of an object of skin disease image. The textured feature is extracted using Lacunarity, while for color feature extraction using Color Moments as well as a combination of both methods. The results of color characteristic extraction test using Color Moments Method yielded images corresponding to 100% similarity percentages and experimentation of texture characteristic extraction using Lacunarity Method yielded images corresponding to a percentage of suitability of 25%, followed by a combined test of both methods and the normalization process produces images corresponding to a percentage of conformity of 60%.
Determining Hotspots of Road Accidents using Spatial Analysis
S.Sarifah Radiah Shariff;
Hamdan Abdul Maad;
Nursyaza Narsuha Abdul Halim;
Zuraidah Derasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp146-151
Road accidents continuously become a major problem in Malaysia and consequently cause loss of life or property. Due to that, many road accident data have been collected by highway concessionaries or build–operate–transfer operating companies in the country meant for coming up with proper counter measures. Several analyses can be done on the accumulated data in order to improve road safety. In this study the reported road accidents cases in North South Expressway (NSE) from Sungai Petani to Bukit Lanjan during 2011 to 2014 period is analyzed. The aim is to determine whether the pattern is clustered at certain area and to identify spatial pattern of hot spots across this longest controlled-access expressway in Malaysia as hotspot represents the location of the road which is considered high risk and the probability of traffic accidents in relation to the level of risk in the surrounding areas. As no methodology for identifying hotspot has been agreed globally yet; hence this study helped determining the suitable principles and techniques for determination of the hotspot on Malaysian highways. Two spatial analysis techniques were applied, Nearest Neighborhood Hierarchical (NNH) Clustering and Spatial Temporal Clustering, using CrimeStat® and visualizing in ArcGIS™ software to calculate the concentration of the incidents and the results are compared based on their accuracies. Results identified several hotspots and showed that they varied in number and locations, depending on their parameter values. Further analysis on selected hot spot location showed that Spatial Temporal Clustering (STAC) has a higher accuracy index compared to Nearest Neighbor Hierarchical Clustering (NNH). Several recommendations on counter measures have also been proposed based on the details results.
A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS
Singh Omkar Ramabhilash;
Santosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp33-35
Novel coal mine administration framework to tackle the ongoing observing and profoundly effective safeguard issues of underground work stages. In this paper proposing a robot that has the fitness to identify the covered mine and let the client control it remotely to stay away from others conscious causalities. The robot is outfitted with exceptional wheels controlled by H-Bridge module, enabling it to move in every single conceivable bearing. In this venture we concentrate on the security of people and the robot; the robot is outfitted with unique range sensors that assistance in staying away from the snags in the field by extraordinarily recognizing the position of obstructions. For the manufacture of the venture, a unique model made of lightweight temperature safe metal is utilized on which every one of the articles is conveyed. Gas immediate, mischance help ask for, video gushing and voice declaration are the extra components of this framework. Advance, a remote ZigBee is added to the robot, which gets the constant estimations of flame, temperature. ARM microcontroller charges the robot. The camcorder connection to the gadget will transmit the picture in the Motion-JPEG arrange alongside a speaker who will enable us to send the crisis charge with the assistance of the voice message device. The application firmware keeps running on top of a RTOS to deal with multitasking prerequisites of the framework. This strategy has a down to earth profit if diminishing the quantity of causalities, after the execution of the procedure; the robot can be controlled productively with slightest buffering time.
Codesign Methodology based FPGA and Embedded Linux for Motor Control
Ibtihel Jaziri;
Lotfi Charaabi;
Khaled Jelassi
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp204-211
Recently, the complexity of the embedded electrical systems is increasing due to the growing of industrial necessities. To handle with this complexity, the use of reconfigurable hardware/software codesign methodology using digital platforms becomes necessary. Reconfigurable methodology can be seen as an essential feature in motor control systems as it offers many advantages such as increased flexibility, low energy consumption. In these kind of systems, both hardware and software designs can be reconfigurated depending upon the designer requirements. This paper presents hardware/software codesign methodology with flexible hardware devices and configurable graphical user interface: the hardware architecture is based on field-programmable gate array and the software architecture is based on embedded Linux operating system running on Beaglebone. The user interface is designed as a graphical user interface developed on an emebdded server; this enables the user to access to the system rapidly, parameterize and observe the behavior of the controller.
E-Commerce Recommender For Usage Bandwidth Hotel
Sfenrianto Sfenrianto;
Melva Hermayanty Saragih;
Bayu Nugraha
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp227-233
The customer interest is often affected the promotions or product offered it his/her access. The aim of this research is to evaluate the recommendation system, as a promotion model or product offered, on e-commerce to the customer interest. This research focuses on e-commerce which offers the bandwidth internet for a hotel. Firstly, prototype of e-commerce which has recommendation system is built. Then, the eCommerce is evaluated by value creation of an eCommerce. There are four factors value creation, efficiency, lock-in, complementary and novelty based on R. Amit’s and Zott theory. After conducting the evaluation, two factors, efficiency and complementary, are significant to the value creation for eCommerce recommendation, yet the other factors, lock-in and novelty are not significant. This research also confirms that the number of subscribers’ eCommerce increases until 45.06% with using the recommendation than without recommendation.