cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 49 Documents
Search results for , issue "Vol 9, No 2: February 2018" : 49 Documents clear
Evaluation of Power Minimization for Routing Protocol and Multicast Networks Shabir Ahmed mir; T Padma
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp299-301

Abstract

In this paper explore the scenario of wireless multicast with a single source and multiple relay that together convey consecutively refined sources to multiple receiver. Joint source-channel coding (JSCC) protocol is proposed aimed at mitigating the complexity and difficulty in signal synchronization in multicast taking end-to-end mean cube error deformation  as the quality of service measure the problems of JSCC communication are formulated to minimize the total power utilization where both relay selection and power allocation at the base station (BS) and all the relays are jointly determined  to solve the formulated problem that is nonetheless nonlinear in nature a two-step iterative algorithm is investigated for power allocations at all transmitters where a in order quadratic programming method is developed into find a strict local minimum. To reduce the computation complexity a heuristic algorithm for relay selection is presented. Case studies are conducted to verify the proposed formulations and solution methods.
Gaze Tracking Algorithm Using Night Vision Camera T.A. Izzuddin; M.H. Jali; A.R. Abdullah; R. Sudirman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp438-446

Abstract

Nowadays, the advancement of medical technology has given birth into many innovative machines and devices to improve our health life, especially to those who are disabled or gifted.   On some people with severe disabilities such as quadriplegia, the human eye-ball does not only serve as a vision system, but also a means of conveying information and intention to other people. This is because although quadriplegic patients suffer the loss of motor sensory functions from the neck and below, upper neck functions such as the vision system is normally spared. This enables the patient to control the movement of his/her eyeballs to convey desired information. Although many similar researches have been done, this paper proposes the use of image processing on image captured using webcam with its Infra-Red (IR) filter removed (a.k.a night vision) to achieve robustness. This allows the algorithm to properly track the location of the iris despite of its and the pupil color variations. Two image processing algorithms are then used, each with owns tradeoff between speed and accuracy.  Analysis on both algorithms shows good tracking performance despite of the mentioned tradeoff.
High Frequency Transformer for Ship Electrical Power System AnuPriya K R; Sasilatha T
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp347-350

Abstract

The system represented during this paper uses 3 matrix converters and a high frequency electrical device to attain isolation and voltage transformation from primary to secondary aspect. Two matrix converters manufacture high frequency voltage across a transformer, with open all over primary. a 3rd matrix device converts the high frequency cut voltage to line frequency. The non-idealities like outflow inductance of the electrical device have a big impact on the device performance. This paper studies the impact of outflow inductance on the regulation of the output voltage of the device. The simulation study has been carried out in SIMULINK and also the results are presented.
Active and Reactive Power Scheduling Optimization using Firefly Algorithm to Improve Voltage Stability under Load Demand Variation Mohamad Khairuzzaman Mohamad Zamani; Ismail Musirin; Halim Hassan; Sharifah Azwa Shaaya; Shahril Irwan Sulaiman; Nor Azura Md. Ghani; Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp365-372

Abstract

This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.
Full C-Band Tunable V-Cavity-Laser based TOSA and SFP Transceiver Modules Saravanan K; V Mathivanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp327-331

Abstract

We report the latest development in tunable transmitter optical sub-assembly (TOSA) and small form-factor pluggable (SFP) transceivers based on simple and compact V-cavity laser (VCL), aiming for low-cost deployment in metro, access and data center networks. The VCL employs a half-wave coupler to achieve high side-mode suppression ratio (SMSR) and the Vernier effect to achieve a wide wavelength tuning range. Full C-band tuning from 1529.55-nm to 1566.31-nm with SMSR above 36 dB is demonstrated. Since the laser does not involve any grating or epitaxial regrowth, and has a simple tuning algorithm, it allows simpler processes for fabrication and testing as compared to other widely tunable laser structures. Compact TOSAs and SFP transceiver modules have been developed for full C-band tuning with up to 93 channels at 50 GHz spacing. Transmission experiments are carried out for direct modulation with data rates from 2.5 Gbps to 8.5 Gbps. The results of reliability tests of the modules are also presented.
Performance Of Full-Duplex One-Way And Two-Way Cooperative Relaying Networks Arunmozhi Sinouvassane; Nagarajan G
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp526-538

Abstract

The wireless research requires concurrent transmission and reception in a single time/frequency channel with good spectral efficiency. The Full duplex system is the alternate for the conventional half duplex systems. An investigation on the need for a full duplex two way (FD-TWR) and one way relaying (FD-OWR) to improve the performance of outage probability and average rate employing amplify-and-forward (AF) and decode-and-forward (DF) protocol is considered. Further the relaying systems performance under the network coding schemes is taken into consideration. The outage probability and average rate of FD-TWR and FD-OWR using a physical layer network coding was performed. In contrast to “straightforward” network coding which performs arithmetic function on digital bit streams after information have been received. The result shows the DF protocol achieves better outage probability and average rate, when compared to the AF protocol. And comparing the full duplex schemes like FD-TWR and FD-OWR, it is found that the FD-TWR achieves better outage probability and average rate, when compared to the FD-OWR. The performance was extended with different loop interference among the relay antennas. The performance show that FD-TWR performs well even in spite of loop interference. 
Alternative Methods for Forecasting Variations in Hospital Bed Admission S. Sarifah Radiah Shariff; Mohd Azuan Suhaimi; Siti Meriam Zahari; Zuraidah Derasit
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp410-416

Abstract

The Malaysian healthcare system is well-being recognized for providing a wide range of access to primary healthcare. The number of hospitals is found to be growing in line with the increase in population. However, over-crowding has become the most common scene that people see in every hospital. The number of  patients being admitted may  somehow  mislead  healthcare planners,  and  thus  causing  them  to  underestimate  the  resources  that  are  required  within  the  hospital. Thus, this study aims to identify better forecasting models for variations in hospital bed admission considering State Space Model (SSM). Data on the admission rate of a state hospital was collected, spanning the period of historical data from 2001 until 2015. The findings indicate that State Space model can outperform common model due to its lower Mean Squared Errors. Female aged between 25 -34 years old are found to be having the highest variation, which could lead to unpredictable in terms of being admitted to hospital.
Cascaded Ripple Carry Adder Based SRCSA for Efficient FIR Filter Mohamed Syed Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp253-256

Abstract

Filter is one of the key components of all signals processing elements. Both the FIR and IIR filter are used to reduce the unwanted signal in the original signal. Here discussing the FIR filter and design the efficient FIR filter using Dual Ripple Carry Adder (RCA) based SQRT-carry select adder (CSLA). Many components present in the FIR filter, one of the main component is Adder. Adder is used to combine the signal for avoid the noise occurring in the output. Proposed a Dual RCA based SQRT-CSLA for speed up the filtering process. The filter performance can be analyzed by Xilinx simulation environment.
Explanatory Server Protection Problem for Automated Wireless System Singh Poja Ramesh; Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp302-305

Abstract

Many sorts of servers exists which incorporates both openly available servers and inside servers, for example, mail servers, web servers, application servers, assemble and test servers and so forth., that store numerous private and delicate data. Giving security to such servers has turned out to be one of the center necessities in this day and age as they are under danger of assault. The information put away on the server can go from hierarchical data, for example, classified client related records, extend subtle elements, company's product source code to private media data, individual information, national security related data, patients database, address papers of the focused exams and so forth. On the off chance that such delicate information gets into wrong hands, it can be abused. Along these lines the business and the notoriety of the association would beat stake. It can likewise posture risk to countries. The fundamental reasons of security break in servers is because of the utilization of versatile stockpiling gadgets, for example, pen drives, hard circles, and so on., which can be potential transporters of malware and Trojans. At the point when tainted by such infection, these compact stockpiling gadgets can bring about serious harm. Physically keeping up and securing servers would be extremely troublesome and can likewise prompt tremendous authoritative overhead. Henceforth the requirement for computerized security system to distinguish, keep and shield the servers from the aggressors. Security strategies assume a critical part in keeping the trade off of system security which would influence the server security.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue