cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
An Advanced Robust AVR-PSS Based H2 and H∞ Frequency Approachs Simulated Under a Realized GUI Kabi Wahiba; Ghouraf Djamel Eddine; Naceri Abdellatif
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i3.pp468-477

Abstract

This article present a comparative study between two advanced robust frequency control strategies and their implementation using our realised Graphical User Interface ‘GUI’ under MATLAB software: the first method based on loop-shaping H∞ optimization technique and the second on robust H2 control method (LQG controller associated with KALMAN filter), and applied on automatic excitation control of synchronous generators, to improve transient stability and robustness of a single machine- infinite bus (SMIB) system operating in different several conditions. The computer simulation results (static and dynamic stability), with test of robustness against machine parameters uncertainty (electric and mechanic), have proved that good dynamic performances, showing a stable system responses almost insensitive to large parameters variations, and more robustness using robust H∞ controller in comparison with H2 approach by exploiting our developed GUI interface in this work.
Research of Emotion Recognition Based on Speech and Facial Expression Yutai Wang; Xinghai Yang; Jing Zou
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: January 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The paper introduced the present status of speech emotion recognition. In order to improve the single-mode emotion recognition rate, the bimodal fusion method based on speech and facial expression was proposed. The emotional databases of Chinese speech and facial expressions were established with the noise stimulus and movies evoking subjects' emtion. On the foundation, we analyzed the acoustic features of Chinese speech signals under different emotional states, and obtained the general laws of prosodic feature parameters. We discussed the single-mode speech emotion recognitions based on the prosodic features and the geometric features of facial expression. Then, the bimodal emotion recognition was obtained by the use of Gaussian Mixture Model. The experimental results showed that, the bimodal emotion recognition rate combined with facial expression was about 6% higher than the single-model recognition rate merely using prosodic features. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1873
A Distributed Network Intrusion Detection System with Active Surveillance Agent Bin Zeng; Lu Yao; Rui Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detection and intrusion inferring. The GIDC is installed in administration center for communicating and managing LIDMs, it can also do the intrusion detection and intrusion inferring. The SA contains several optional functions for information gathering. After an attack behavior is discovered, the SA may be used to launch some kinds of information gathering to the attacker, so that the proposed SA-NIDS has the active surveillance ability. For the intrusion inferring, the pattern matching and the statistical approach are applied in SA-NIDS. The experimental results can satisfy the needs of network information safety.  DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3707
Behavioral and performance jellyfish attack Layth A. Khalil Al Dulaimi; R. Badlishah Ahmad; Naimah Yaakob; Syadiah Nor Wan Shamsuddin; Mohamed Elshaikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i2.pp683-688

Abstract

Wwe provide a simulation-based study of the effects of jellyfish attacks on mobile ad hoc networks (MANETs). For this purpose we suggest a simulation based on the effects of jellyfish attacks on the network through a number of different scenarios. In particular, we examine how the number of attackers affects performance measures such as the ratio of packet delivery, throughput, and end-to-end delays. The results have enabled us to propose measures to reduce the effects of jellyfish attacks on MANETs.
Hybrid Approach for Water Demand Prediction Based on Fuzzy Congnitive Maps G. Jenitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp567-570

Abstract

 In this study, we propose a new hybrid approach for time series prediction based on the efficient capabilities of fuzzy cognitive maps (FCMs) with structure optimization algorithms and artificial neural networks (ANNs). The proposed structure optimization genetic algorithm (SOGA) for automatic construction of FCM is used for modeling complexity based on historical time series, and artificial neural networks (ANNs) which are used at the final process for making time series prediction. The suggested SOGA-FCM method is used for selecting the most important nodes (attributes) and interconnections among them which in the next stage are used as the input data to ANN used for time series prediction after training. The FCM with proficient learning calculations and ANN have been as of now demonstrated as adequate strategies for setting aside a few minutes arrangement anticipating. The execution of the proposed approach is exhibited through the examination of genuine information of every day water request and the comparing expectation. The multivariate examination of recorded information is held for nine factors, season, month, day or week, occasion, mean and high temperature, rain normal, touristic action and water request. The entire approach was actualized in a clever programming device at first sent for FCM forecast. Through the exploratory investigation, the value of the new mixture approach in water request forecast is illustrated, by computing the mean outright blunder (as one of the outstanding expectation measures). The outcomes are promising for future work to this bearing.
A novel key exchange algorithm for security in internet of things Suresh Koduru; PVGD Prasad Reddy; Padala Preethi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1515-1520

Abstract

Today Internet of things (IoT) interconnects any object possessing sensing and computing capabilities to the internet. In this era, increasing number of electronic devices and applications in Internet of Things (IoT) requires secured communication with low power consumption capabilities. As security is a major challenge in internet of things, it is important to design a key management solution that considers resource constrained nodes and hence key management in public key cryptography is a crucial issue. In this paper, a novel key exchange algorithm was developed and implemented on a low powered “Raspberry pi machine” to realize the overall impact it creates on the device. The performance of the proposed algorithm had shown a great improvement over the popular Diffie Hellman key exchange algorithm and a two-level security for data exchange between the parties is implemented.
Grid-connected Photovoltaic Power Systems and Power Quality Improvement Based on Active Power Filter Brahim Berbaoui; Samira Dib; Rachid Dehini
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 8: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i8.pp5861-5868

Abstract

This paper presents a Parallel Active Power Filter (PAPF) using Photovoltaic cells Energy to feed linear or nonlinear loads with current perturbations compensation and the excess of the energy is injected into the mains. As a result of using instantaneous p-q theory as a control scheme, the multi-function operation such as harmonic elimination, reactive power control and uninterruptible power supply will be achieved. The system consisting of Photovoltaic cells, connected to a diode rectifier feeding a parallel active power filter is simulated in MATLAB/SIMULINK environment. The simulation results prove the efficiency of using the proposed method for Photovoltaic cells energy injection and power quality improvement in the grid power system.
Automated Guide Vehicles Dynamic Scheduling Based on Annealing Genetic Algorithm Zou Gan; Li Tao; Qin Ying
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dispatching automated guided vehicles (AGVs) is the common approach for AGVs scheduling in practice, the information about load arrivals in advance was not used to optimize the performance of the automated guided vehicles system (AGVsS). According to the characteristics of the AGVsS, the mathematical model of AGVs scheduling was established. A heuristic algorithm called Annealing Genetic Algorithm (AGA) was presented to deal with the AGVs scheduling problem,and applied the algorithm dynamically by using it repeatedly under a combined rolling optimization strategy. the performance of the proposed approach for AGVs scheduling was compared with the dispatching rules by simulation. Results showed that the approach performs significantly better than the dispatching rules and proved that it is really effective for AGVsS. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2481
Positioning of a Wireless Relay Node for Useful Cooperative Communication Tariq Muhamad Amjad; Elsheikh Mohamed Ahmed Elsheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i3.pp959-965

Abstract

Given the exorbitant amount of data transmitted and the increasing demand for data connectivity in the 21st century, it has become imperative to search for pro-active and sustainable solutions to the effectively alleviate the overwhelming burden imposed on wireless networks. In this study a Decode and Forward cooperative relay channel is analyzed, with the employment of Maximal Ratio Combining at the destination node as the method of offering diversity combining. The system framework used is based on a three-node relay channel with a source node, relay node and a destination node. A model for the wireless communications channel is formulated in order for simulation to be carried out to investigate the impact on performance of relaying on a node placed at the edge of cell. Firstly, an AWGN channel is used before the effect of Rayleigh fading is taken into consideration. Result shows that performance of cooperative relaying performance is always superior or similar to conventional relaying. Additionally, relaying is beneficial when the relay is placed closer to the receiver. 
Testing MANET Protocol using Zigbee based Xbee Modules S. Sundar; Piyush Arora; Sarthak Agrawal; R. Kumar; Harish M. Kittur
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v3.i2.pp441-445

Abstract

In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue