cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 48 Documents
Search results for , issue "Vol 9, No 1: January 2018" : 48 Documents clear
Controlling Pornography Over The Web Archenaa J; E. A. Mary Anitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp104-106

Abstract

This investigation analyzed the degree to which youngsters are protected on the web with an emphasis on web erotica. The goals of this investigation incorporate (a) to find out the degree to which kids peer connections impact their web get to; (b) to decide the effect of sex on understudy utilization of web for long range informal communication; (c) to test whether sex have huge impact on understudy utilization of web for texting; (d) to test whether sex affect on understudy utilization of web for Email; (e) to decide the commitment of sex understudy utilization of web for video posting/seeing; (f) to test whether sex have huge commitment on understudy utilization of web for their homework; and (g) to discover the degree of youngsters open to erotica on the web. Essential wellspring of information gathering was utilized in this investigation and the factual devices utilized for information examination incorporate the Chi-square test measurement, Bar outline, Pie diagram and rate circulation. The outcome got was that greater part of kids don't approach web through associate connections which suggests that the degree to which youngsters peer connections impact their web get to is low. It was uncovered that understudies utilize the web for long range interpersonal communication, video posting/review, and Emailing yet don't utilize it for texting and in getting their work done. It was discovered that dominant part of the kids are not presented to online erotica, in opposite it ought to be noticed that the couple of kids who utilize the web for these exercises are at danger of being presented to obscenity on the web.
Impact of Inter-eNodeB Handover Pameters on Performance Optimization of LTE Networks Mina Malekzadeh; Fatemeh Rezaiee
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp212-220

Abstract

Handover, as a resource consuming process, is an important issue in mobile communications which can highly affect the overall performance of the LTE networks. Since the handover process mainly relies on four main entry condition parameters, optimizing these parameters will in turn improve the handover process. In this work, we investigate the effectiveness of the four handover parameters by measuring the resulting downlink throughput and number of the required handovers. We furthermore determine the optimized values of the parameters through implementing different sets of experiments. Finally, by applying the obtained optimized parameters on two main LTE handover algorithms i.e. A3RSRP and A2A4RSRQ, their performance is compared regarding to different speeds of the mobile equipment. We determine how to accurately select the optimal settings for the parameters so that greater LTE performance can be achieved. 
A Review on ZIGBEE in WSN Karthikeyan V
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp29-32

Abstract

Zigbee is fastidious for a group of abnormal state communication conventions. Zigbee is a run of the mill remote correspondence innovation. ZigBee uses low rate, low-control advanced radios taking into account an IEEE 802 standard for individual region systems. The change characterised by the ZigBee particular is proposed to be easier and less extravagant than the different WPANs remote single zone system, for example, Bluetooth. ZigBee is focused on radio-recurrence applications that compel a low in order rate, long battery life, and secure systems administration. ZigBee has a characterized rate of 250 kbps most appropriate for occasional or irregular information or a single sign transmission from a sensor or data gadget. It is a standard Open convention with no or unimportant permitting charges, chipsets accessible from various sources, remotely redesigned firmware, completely remote and low power, lattice systems administration to work on batteries, low support and bigger system size with standard based high security. 
Adaptive Link Aware on-demand Multicast Routing Scheme in MANET Ruban Chakravarthy; G. Ranganathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp56-59

Abstract

The main objective of this paper is to propose a new multicast routing scheme to adopt with the dynamic topology of MANET at the same time to provide high multicast efficiency and packet delivery ratio. The proposed scheme is named as Link Aware on Demand Multicast Routing (LAOMR) scheme. In this scheme, initially the source node forms the multicast group by announcing itself as a multicast source agent to all the nodes in the network. The nodes which are eager to join in the group are sending the join request to the source node. Then the source node finds the route to reach the multicast group through some intermediate nodes. The intermediate nodes are not interested to hear the multicast message but they are act as the routers to forward the packets to the multicast group. The intermediate nodes are chosen based on the link residual life (LRL) of the nodes. The node which has the highest LRL and closer to the multicast group is selected as the forwarder node. So, the proposed scheme reduces the link failure in the multicast route and increases the multicast efficiency, throughput. The performance is evaluated by using the simulation results obtained from NS2 Simulator.
Chaos Based Image Encryption Suresh. G. B; V. Mathivanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp97-100

Abstract

New method of secure image encryption and decryption scheme based on the chaos is proposed. There are two steps are followed after the preprocessing step in the proposed system namely, Encryption and Decryption. In preprocessing, images are denoised using median filter. Then the original input images will be encrypted by using the chaos mapping algorithm. At last the original images are retrieved back from the encrypted image by using the key that is specified during the encryption process for the decryption of the original images. Then the histogram mapping is done for the encrypted and the decrypted images. The proposed system is tested on well-known images like Lena, Mandrill, Clown and Barbara. The experimental results have demonstrated that the introduced image encryption scheme can achieve high security for practical image encryption.
Encryption Techniques and Wireless Power Transfer Schemes Nur Hazwani Hussin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp183-190

Abstract

Wireless power transfer (WPT) is one of the most useful ways to transfer power. Based on power transfer distances, the WPT system can be divided into three categories, namely, near, medium, and far fields. Inductive coupling and capacitive coupling contactless techniques are used in the near-field WPT. Magnetic resonant coupling technique is used in the medium-field WPT. Electromagnetic radiation is used in the far-field WPT. This paper reviews the techniques used in WPT. In addition, energy encryption plays a major role in ensuring that power is transferred to the true receiver. Therefore, this paper reviews the energy encryption techniques in WPT. A comparison between different techniques shows that the distance, efficiency, and number of receivers are the main factors in selecting the suitable energy encryption technique.
A View on Creep Failure in Distribution Transformers R. Elavarasi
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp49-52

Abstract

This paper insight about reasons of disappointment in distribution transformers. It has been suggested that crawl may be a noteworthy purpose behind such disappointments. The impact of anxiety, temperature, and material on unfaltering state killjoy rate on aluminum and copper wires (utilized as a part of 25 KVA distribution transformers) have been introduced. Proposed study affirms that the disappointment rate of aluminum wound DTs is higher than the disappointment rate of copper injury DTs in force insufficient ranges and poor conveyance systems. The higher disappointment rate of aluminum wound DTs has been credited to the lifted enduring state wet blanket rate of the aluminum wire than copper wire.
Application of Artificial Neural Network in Electrical Power System P. Palanichamy
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp77-80

Abstract

The artificial neural network used to detect the fault in electrical machines and can increase the function of new entry detection when compared to the conventional method. In proposed artificial neural network has increased the precision and stability of system performance. The time-area vibration signs of a pivoting machine with ordinary and flawed apparatuses are handled for highlight extraction. The separated elements from unique and preprocessed signs are utilized as contributions to both classifiers in view of ANNs and SVMs for two-class (typical or blame) acknowledgment. The quantity of hubs in the concealed layer, if there should be an occurrence of ANNs, and the extend basis work section parameter, in the event of SVMs, alongside the choice of information components are enhanced utilizing genetic algorithm (GAs).

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue