cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
Performance Characteristics of Miniature Photovoltaic Farm Under Dynamic Partial Shading Antonius Rajagukguk; Dedet Candra Riawan; Mochamad Ashari
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i1.pp400-408

Abstract

This paper presents investigation of  performance characteristic on a miniature photovoltaic farm under dynamic partially shaded condition. Effects of applying bypass diodes in each photovoltaics modul and the transient current of the diode is also investigated. The miniature of PV Farm consisting 4 photovoltaic panels, connected in series to form one string. The whole system comprises 5 photovoltaic strings, which are connected in parallel producing 30 volt and 60 watt peak power fromminiature PV farm.  Shading of 10%, 20 % up to 50 % with dynamically changed is applied. Result from both laboratory tests and simulations is investigated and show very similar.
Clustering Fragments Metagenome Using Self-Organizing Map Yunita Fauzia Achmad; Wisnu Ananta Kusuma; Heru Sukoco
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Metagenome is a combination of several microorganisms collected from the environment. In metagenome analysis, it is required binning for grouping metagenome fragment yielded by sequencer. This research used the composition approach for conducting metagenome fragment binning. In this approach, binning could be implemented using unsupervised or supervised learning. We used Self-Organizing Map (SOM) for conducting binning used on unsupervised learning. We compared two techniques of training in SOM, namely sequential training and batch training for finding the best techniques. The results showed that the batch training could obtain 3.8% error valued on the map of [10 15]. This error value is smaller than that of sequential training. DOI:  http://dx.doi.org/10.11591/telkomnika.v13i3.7115 
Design of 130nm RFCMOS differential low noise amplifier Maizan Muhamad; Hanim Hussin; Norhayati Soin
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp172-177

Abstract

In this paper, an inductively degenerated CMOS differential low noise amplifier circuit topology is presented. This low noise amplifier is intended to be used for wireless LAN application. The differential low noise amplifier proposed provide high gain, low noise and large superior out of band IIP3. The LNA is designed in 130 nm CMOS technology. Simulated results of gain and NF at 2.4GHz are 20.46 dB and 2.59 dB, respectively. While the simulated S11 and S22 are −11.18 dB and −9.49 dB, respectively. The IIP3 is −9.05 dBm. The LNA consumes 3.4 mW power from 1.2V supply. 
0.345 Attenuation Law of Vibration Signals During Caving Xu Li; Tao Gu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To study on the characteristics of the vibration signals of coal and stone hitting the armor plate during caving, a hybrid algorithm based on first order forward difference and wavelet transform modulus-maxima method is presented which can be used in the longwall top coal face. First, in order to reduce the noise interference, the pre-processing of the vibration signals is done by the first order forward difference method. Second, the wavelet transform modulus-maxima method is used to analyze the resluts of the difference for the post-processing of the data. Finally, attenuation formula is defined in the first-level details (D1). We can learn by the experimental results that the hybrid algorithm provides real-time, high confidence identification of coal and stone by analysis of the first-level details that has approximate 0.345 attenuation law between the wavelet transform modulus-maxima (the maximum coefficient) and the wavelet transform modulus-minima (the minimum coefficient). Because the wavelet transform modulus-maxima’s abscissa and the wavelet transform modulus-minima’s abscissa are adjacent to each other, the concept of Singularity-point Couple(SPC) is defined. Based upon the attenuation law and the defined concept, interference signals can be eliminated, vibration signals can be restored, and some prediction work can be done. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4885
LEDs Lighting Arrangements for Underground Mines Pratap Singh Yadav; Nitai Pal; Dheeraj Kumar; S. Vamsi Krishna
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Lighting condition is very critical to mine workers, since they completely depend upon visual indication. Effective lighting systems provide better visibility and contribute to improved safety, production, productivity and efficiency of equipments. This paper intended to present a simulation study of configurations for the uniform illumination over a rectangular-target surface (underground mine 26X4.8 m gallery) using power LEDs. This cost effective lighting involved different sets of arrangements of LEDs that provide a close uniform light level for given optimized parameters. The optimized values of the variables in the arrangements were obtained by the using of MATLAB functions for optimization toolbox. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.7969 
The Research of the Intelligent Device Management and Diagnostic Cao Pan; Jian Tao; Hongyuan Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 By our research and implementation of intelligent device management and diagnostic system which are based on Wireless HART Technology. In this essay we focus on the application of the wireless HART intelligent devices, explaining the wireless HART protocol and its four-level model, putting forward the wireless HART-USB potable gateway, by which the operating personnel at the scene can obtain data for diagnosis and modification directly from the PC. Then we briefly discuss the design module of intelligent device management system. In the end, we mainly emphasize on the introduction of the mathematical model which is based on the pneumatic control regulator and is used for diagnosis. And we represent the steps of verifying its correctness. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1631
Lightning Performance and its Prevention for Quadruple-circuit Transmission Line with 220kV/110kV Voltage in a Tower Li Chunhua; Wang Weiran; Su Jie; Li Tao
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

According to the physical process of discharge development of insulator that is struck by lightning, the lightning flashover model for quadruple-circuit transmission line with dual voltage 220kV/110kV in same tower is established basing on EMTP. The actual evaluation index of lightning protection performance is adopted with the consideration of influence of system voltage. The characteristics of multi-circuit trip-out simultaneously for mixed-voltage lines in same tower is studied, and the distinctions of lightning protection performance caused by differentiated configuration mode of lightning protection measures including phase sequence arrangement, coupling ground wire and so on. The results indicate that the lightning withstand level fluctuates approximately with the phase angle in the form of non-standard sinusoidal wave. The lightning withstand level emerges as optimum performance under the completely reversed phase sequence. The effect of coupling ground wire on top of tower is superior to that on bottom. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3413
Learning Based Route Management in Mobile Ad-Hoc Networks Rahul M Desai; B P Patil; Davinder Pal Sharma
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i3.pp718-723

Abstract

Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, dynamic source routing are optimized versions of distance vector or link state routing protocols.  Reinforcement Learning is new method evolved recently which is learning from interaction with an environment. Q Learning which is based on Reinforcement learning that learns from the delayed reinforcements and becomes more popular in areas of networking. Q Learning is applied  to the routing algorithms where the routing tables in the distance vector algorithms are replaced by the estimation tables called as Q values. These Q values are based on the link delay. In this paper, various optimization techniques over Q routing are described in detail with their algorithms.
User command acquisition based IoT automatic control system Inshik Kang; Hyunok Song; Hoekyung Jung
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i1.pp307-312

Abstract

Recently, researches are being conducted to build a smart environment using various sensors and devices and to provide customized services to users through IoT (Internet of Things). The existing IoT system operates the device only by using the threshold value. So, there are problems that device operates when a service that does not consider a user characteristic is provided or when user not necessary. In this paper, to solve these problems, the system collects the remote control commands and compares it with the value of device operation threshold and sets the changed threshold value. In addition, devices not registered in the server constitute the environment by linking with existing task. Therefore, it is possible to provide a customized service to the users.
Evaluation of computer network security using attack undirected geography Chanintorn Jittawiriyanukoon
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1508-1514

Abstract

To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue