Articles
9,199 Documents
An Advanced Robust AVR-PSS Based H2 and H∞ Frequency Approachs Simulated Under a Realized GUI
Kabi Wahiba;
Ghouraf Djamel Eddine;
Naceri Abdellatif
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp468-477
This article present a comparative study between two advanced robust frequency control strategies and their implementation using our realised Graphical User Interface ‘GUI’ under MATLAB software: the first method based on loop-shaping H∞ optimization technique and the second on robust H2 control method (LQG controller associated with KALMAN filter), and applied on automatic excitation control of synchronous generators, to improve transient stability and robustness of a single machine- infinite bus (SMIB) system operating in different several conditions. The computer simulation results (static and dynamic stability), with test of robustness against machine parameters uncertainty (electric and mechanic), have proved that good dynamic performances, showing a stable system responses almost insensitive to large parameters variations, and more robustness using robust H∞ controller in comparison with H2 approach by exploiting our developed GUI interface in this work.
Research of Emotion Recognition Based on Speech and Facial Expression
Yutai Wang;
Xinghai Yang;
Jing Zou
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: January 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The paper introduced the present status of speech emotion recognition. In order to improve the single-mode emotion recognition rate, the bimodal fusion method based on speech and facial expression was proposed. The emotional databases of Chinese speech and facial expressions were established with the noise stimulus and movies evoking subjects' emtion. On the foundation, we analyzed the acoustic features of Chinese speech signals under different emotional states, and obtained the general laws of prosodic feature parameters. We discussed the single-mode speech emotion recognitions based on the prosodic features and the geometric features of facial expression. Then, the bimodal emotion recognition was obtained by the use of Gaussian Mixture Model. The experimental results showed that, the bimodal emotion recognition rate combined with facial expression was about 6% higher than the single-model recognition rate merely using prosodic features. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1873
A Distributed Network Intrusion Detection System with Active Surveillance Agent
Bin Zeng;
Lu Yao;
Rui Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detection and intrusion inferring. The GIDC is installed in administration center for communicating and managing LIDMs, it can also do the intrusion detection and intrusion inferring. The SA contains several optional functions for information gathering. After an attack behavior is discovered, the SA may be used to launch some kinds of information gathering to the attacker, so that the proposed SA-NIDS has the active surveillance ability. For the intrusion inferring, the pattern matching and the statistical approach are applied in SA-NIDS. The experimental results can satisfy the needs of network information safety. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3707
Behavioral and performance jellyfish attack
Layth A. Khalil Al Dulaimi;
R. Badlishah Ahmad;
Naimah Yaakob;
Syadiah Nor Wan Shamsuddin;
Mohamed Elshaikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i2.pp683-688
Wwe provide a simulation-based study of the effects of jellyfish attacks on mobile ad hoc networks (MANETs). For this purpose we suggest a simulation based on the effects of jellyfish attacks on the network through a number of different scenarios. In particular, we examine how the number of attackers affects performance measures such as the ratio of packet delivery, throughput, and end-to-end delays. The results have enabled us to propose measures to reduce the effects of jellyfish attacks on MANETs.
Hybrid Approach for Water Demand Prediction Based on Fuzzy Congnitive Maps
G. Jenitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i2.pp567-570
In this study, we propose a new hybrid approach for time series prediction based on the efficient capabilities of fuzzy cognitive maps (FCMs) with structure optimization algorithms and artificial neural networks (ANNs). The proposed structure optimization genetic algorithm (SOGA) for automatic construction of FCM is used for modeling complexity based on historical time series, and artificial neural networks (ANNs) which are used at the final process for making time series prediction. The suggested SOGA-FCM method is used for selecting the most important nodes (attributes) and interconnections among them which in the next stage are used as the input data to ANN used for time series prediction after training. The FCM with proficient learning calculations and ANN have been as of now demonstrated as adequate strategies for setting aside a few minutes arrangement anticipating. The execution of the proposed approach is exhibited through the examination of genuine information of every day water request and the comparing expectation. The multivariate examination of recorded information is held for nine factors, season, month, day or week, occasion, mean and high temperature, rain normal, touristic action and water request. The entire approach was actualized in a clever programming device at first sent for FCM forecast. Through the exploratory investigation, the value of the new mixture approach in water request forecast is illustrated, by computing the mean outright blunder (as one of the outstanding expectation measures). The outcomes are promising for future work to this bearing.
A novel key exchange algorithm for security in internet of things
Suresh Koduru;
PVGD Prasad Reddy;
Padala Preethi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i3.pp1515-1520
Today Internet of things (IoT) interconnects any object possessing sensing and computing capabilities to the internet. In this era, increasing number of electronic devices and applications in Internet of Things (IoT) requires secured communication with low power consumption capabilities. As security is a major challenge in internet of things, it is important to design a key management solution that considers resource constrained nodes and hence key management in public key cryptography is a crucial issue. In this paper, a novel key exchange algorithm was developed and implemented on a low powered “Raspberry pi machine” to realize the overall impact it creates on the device. The performance of the proposed algorithm had shown a great improvement over the popular Diffie Hellman key exchange algorithm and a two-level security for data exchange between the parties is implemented.
Grid-connected Photovoltaic Power Systems and Power Quality Improvement Based on Active Power Filter
Brahim Berbaoui;
Samira Dib;
Rachid Dehini
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 8: August 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i8.pp5861-5868
This paper presents a Parallel Active Power Filter (PAPF) using Photovoltaic cells Energy to feed linear or nonlinear loads with current perturbations compensation and the excess of the energy is injected into the mains. As a result of using instantaneous p-q theory as a control scheme, the multi-function operation such as harmonic elimination, reactive power control and uninterruptible power supply will be achieved. The system consisting of Photovoltaic cells, connected to a diode rectifier feeding a parallel active power filter is simulated in MATLAB/SIMULINK environment. The simulation results prove the efficiency of using the proposed method for Photovoltaic cells energy injection and power quality improvement in the grid power system.
Automated Guide Vehicles Dynamic Scheduling Based on Annealing Genetic Algorithm
Zou Gan;
Li Tao;
Qin Ying
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Dispatching automated guided vehicles (AGVs) is the common approach for AGVs scheduling in practice, the information about load arrivals in advance was not used to optimize the performance of the automated guided vehicles system (AGVsS). According to the characteristics of the AGVsS, the mathematical model of AGVs scheduling was established. A heuristic algorithm called Annealing Genetic Algorithm (AGA) was presented to deal with the AGVs scheduling problem,and applied the algorithm dynamically by using it repeatedly under a combined rolling optimization strategy. the performance of the proposed approach for AGVs scheduling was compared with the dispatching rules by simulation. Results showed that the approach performs significantly better than the dispatching rules and proved that it is really effective for AGVsS. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2481
Positioning of a Wireless Relay Node for Useful Cooperative Communication
Tariq Muhamad Amjad;
Elsheikh Mohamed Ahmed Elsheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i3.pp959-965
Given the exorbitant amount of data transmitted and the increasing demand for data connectivity in the 21st century, it has become imperative to search for pro-active and sustainable solutions to the effectively alleviate the overwhelming burden imposed on wireless networks. In this study a Decode and Forward cooperative relay channel is analyzed, with the employment of Maximal Ratio Combining at the destination node as the method of offering diversity combining. The system framework used is based on a three-node relay channel with a source node, relay node and a destination node. A model for the wireless communications channel is formulated in order for simulation to be carried out to investigate the impact on performance of relaying on a node placed at the edge of cell. Firstly, an AWGN channel is used before the effect of Rayleigh fading is taken into consideration. Result shows that performance of cooperative relaying performance is always superior or similar to conventional relaying. Additionally, relaying is beneficial when the relay is placed closer to the receiver.
Testing MANET Protocol using Zigbee based Xbee Modules
S. Sundar;
Piyush Arora;
Sarthak Agrawal;
R. Kumar;
Harish M. Kittur
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v3.i2.pp441-445
In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.