Articles
9,199 Documents
Performance Characteristics of Miniature Photovoltaic Farm Under Dynamic Partial Shading
Antonius Rajagukguk;
Dedet Candra Riawan;
Mochamad Ashari
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i1.pp400-408
This paper presents investigation of performance characteristic on a miniature photovoltaic farm under dynamic partially shaded condition. Effects of applying bypass diodes in each photovoltaics modul and the transient current of the diode is also investigated. The miniature of PV Farm consisting 4 photovoltaic panels, connected in series to form one string. The whole system comprises 5 photovoltaic strings, which are connected in parallel producing 30 volt and 60 watt peak power fromminiature PV farm. Shading of 10%, 20 % up to 50 % with dynamically changed is applied. Result from both laboratory tests and simulations is investigated and show very similar.
Clustering Fragments Metagenome Using Self-Organizing Map
Yunita Fauzia Achmad;
Wisnu Ananta Kusuma;
Heru Sukoco
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Metagenome is a combination of several microorganisms collected from the environment. In metagenome analysis, it is required binning for grouping metagenome fragment yielded by sequencer. This research used the composition approach for conducting metagenome fragment binning. In this approach, binning could be implemented using unsupervised or supervised learning. We used Self-Organizing Map (SOM) for conducting binning used on unsupervised learning. We compared two techniques of training in SOM, namely sequential training and batch training for finding the best techniques. The results showed that the batch training could obtain 3.8% error valued on the map of [10 15]. This error value is smaller than that of sequential training. DOI: http://dx.doi.org/10.11591/telkomnika.v13i3.7115
Design of 130nm RFCMOS differential low noise amplifier
Maizan Muhamad;
Hanim Hussin;
Norhayati Soin
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp172-177
In this paper, an inductively degenerated CMOS differential low noise amplifier circuit topology is presented. This low noise amplifier is intended to be used for wireless LAN application. The differential low noise amplifier proposed provide high gain, low noise and large superior out of band IIP3. The LNA is designed in 130 nm CMOS technology. Simulated results of gain and NF at 2.4GHz are 20.46 dB and 2.59 dB, respectively. While the simulated S11 and S22 are −11.18 dB and −9.49 dB, respectively. The IIP3 is −9.05 dBm. The LNA consumes 3.4 mW power from 1.2V supply.
0.345 Attenuation Law of Vibration Signals During Caving
Xu Li;
Tao Gu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To study on the characteristics of the vibration signals of coal and stone hitting the armor plate during caving, a hybrid algorithm based on first order forward difference and wavelet transform modulus-maxima method is presented which can be used in the longwall top coal face. First, in order to reduce the noise interference, the pre-processing of the vibration signals is done by the first order forward difference method. Second, the wavelet transform modulus-maxima method is used to analyze the resluts of the difference for the post-processing of the data. Finally, attenuation formula is defined in the first-level details (D1). We can learn by the experimental results that the hybrid algorithm provides real-time, high confidence identification of coal and stone by analysis of the first-level details that has approximate 0.345 attenuation law between the wavelet transform modulus-maxima (the maximum coefficient) and the wavelet transform modulus-minima (the minimum coefficient). Because the wavelet transform modulus-maxima’s abscissa and the wavelet transform modulus-minima’s abscissa are adjacent to each other, the concept of Singularity-point Couple(SPC) is defined. Based upon the attenuation law and the defined concept, interference signals can be eliminated, vibration signals can be restored, and some prediction work can be done. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4885
LEDs Lighting Arrangements for Underground Mines
Pratap Singh Yadav;
Nitai Pal;
Dheeraj Kumar;
S. Vamsi Krishna
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Lighting condition is very critical to mine workers, since they completely depend upon visual indication. Effective lighting systems provide better visibility and contribute to improved safety, production, productivity and efficiency of equipments. This paper intended to present a simulation study of configurations for the uniform illumination over a rectangular-target surface (underground mine 26X4.8 m gallery) using power LEDs. This cost effective lighting involved different sets of arrangements of LEDs that provide a close uniform light level for given optimized parameters. The optimized values of the variables in the arrangements were obtained by the using of MATLAB functions for optimization toolbox. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.7969
The Research of the Intelligent Device Management and Diagnostic
Cao Pan;
Jian Tao;
Hongyuan Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
By our research and implementation of intelligent device management and diagnostic system which are based on Wireless HART Technology. In this essay we focus on the application of the wireless HART intelligent devices, explaining the wireless HART protocol and its four-level model, putting forward the wireless HART-USB potable gateway, by which the operating personnel at the scene can obtain data for diagnosis and modification directly from the PC. Then we briefly discuss the design module of intelligent device management system. In the end, we mainly emphasize on the introduction of the mathematical model which is based on the pneumatic control regulator and is used for diagnosis. And we represent the steps of verifying its correctness. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1631
Lightning Performance and its Prevention for Quadruple-circuit Transmission Line with 220kV/110kV Voltage in a Tower
Li Chunhua;
Wang Weiran;
Su Jie;
Li Tao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
According to the physical process of discharge development of insulator that is struck by lightning, the lightning flashover model for quadruple-circuit transmission line with dual voltage 220kV/110kV in same tower is established basing on EMTP. The actual evaluation index of lightning protection performance is adopted with the consideration of influence of system voltage. The characteristics of multi-circuit trip-out simultaneously for mixed-voltage lines in same tower is studied, and the distinctions of lightning protection performance caused by differentiated configuration mode of lightning protection measures including phase sequence arrangement, coupling ground wire and so on. The results indicate that the lightning withstand level fluctuates approximately with the phase angle in the form of non-standard sinusoidal wave. The lightning withstand level emerges as optimum performance under the completely reversed phase sequence. The effect of coupling ground wire on top of tower is superior to that on bottom. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3413
Learning Based Route Management in Mobile Ad-Hoc Networks
Rahul M Desai;
B P Patil;
Davinder Pal Sharma
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v7.i3.pp718-723
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, dynamic source routing are optimized versions of distance vector or link state routing protocols. Reinforcement Learning is new method evolved recently which is learning from interaction with an environment. Q Learning which is based on Reinforcement learning that learns from the delayed reinforcements and becomes more popular in areas of networking. Q Learning is applied to the routing algorithms where the routing tables in the distance vector algorithms are replaced by the estimation tables called as Q values. These Q values are based on the link delay. In this paper, various optimization techniques over Q routing are described in detail with their algorithms.
User command acquisition based IoT automatic control system
Inshik Kang;
Hyunok Song;
Hoekyung Jung
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp307-312
Recently, researches are being conducted to build a smart environment using various sensors and devices and to provide customized services to users through IoT (Internet of Things). The existing IoT system operates the device only by using the threshold value. So, there are problems that device operates when a service that does not consider a user characteristic is provided or when user not necessary. In this paper, to solve these problems, the system collects the remote control commands and compares it with the value of device operation threshold and sets the changed threshold value. In addition, devices not registered in the server constitute the environment by linking with existing task. Therefore, it is possible to provide a customized service to the users.
Evaluation of computer network security using attack undirected geography
Chanintorn Jittawiriyanukoon
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i3.pp1508-1514
To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.