cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,049 Documents
Lifetime Prolonging for Clustered Heterogeneous Wireless Sensor Networks by SEP-FUZZY Basim Abood; Muhammed Shemyal Nisar; Aliaa Hussien; Yu Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp380-389

Abstract

The most important consideration in designing protocols for wireless sensor networks is the energy constraint of nodes because in most cases battery recharging is inconvenient or impossible. Therefore, many researches have been done to overcome this demerit. Clustering is one of the main approaches in designing scalable and energy-efficient protocols for WSNs.In this paper, we proposed a novel scheme to investigate the cluster, the Fuzzy Logic Cluster Stable Election Protocol (SEP - FUZZY), which uses Fuzzy Logic Inference System (FIS) in the cluster process. We compare our technique with two approaches (LEACH, and SEP) to show that using a multi parameter FIS enhances the network lifetime significantly. Simulation results demonstrate that the network lifetime achieved by the proposed method could be increased by nearly 27% more than that obtained by LEACH protocol, and by nearly 23% more than that obtained by Stable Election Protocol.
Study on Moving Objects by Video Monitoring System of Recognition and Tracing Scheme Peilong Xu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 9: September 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper a recognition and tracing scheme for moving objects by video monitoring system was studied. During moving objects recognition, Multi frame sampling method was used to establish the initial background. Edges of the moving objects were drawn according to the changes of the images, and the influence factors for edges drawing were eliminated. In the end, tracing for moving objects could be realized by recognition of morphological characteristics. The experiments indicate that, for field environment, the number of collected frames between 120 to 180 could get better image background. The shadows of the moving objects are the main factor which influence detection of object edges, and they could be eliminated by Shadow edge detection operator. For vehicles tracing, adjacent frame matching method could be used to reflect the time-space transformation of the vehicles. This scheme could realize the recognition and tracing of moving objects by video monitoring system effectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.2740
Bayesian Network Structure Learning Based On Rough Set and Mutual Information Zuhong Feng; Xiujuan Gao; Long Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In Bayesian network structure learning for incomplete data set, a common problem is too many attributes causing low efficiency and high computation complexity. In this paper, an algorithm of attribute reduction based on rough set is introduced. The algorithm can effectively reduce the dimension of attributes and quickly determine the network structure using mutual information for Bayesian network structure learning. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3768
Prediction of Solar Radiation Intensity using Extreme Learning Machine Hadi Suyono; Hari Santoso; Rini Nur Hasanah; Unggul Wibawa; Ismail Musirin
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp691-698

Abstract

The generated energy capacity at a solar power plant depends on the availability of solar radiation. In some regions, solar radiation is not always available throughout the day, or even week, depending on the weather and climate in the area. To be able to produce energy optimally throughout the year, the availability of solar radiation needs to be predicted based on the weather and climate behavior data. Many methods have been so far used to predict the availability of solar radiation, either by mathematical approach, statistical probability, or even artificial intelligence-based methods. This paper describes a method of predicting the availability of solar radiation using the Extreme Learning Machine (ELM) method. It is based on the artificial intelligence methods and known to have a good prediction accuracy. To measure the performance of the ELM method, a conventional forecasting method using the Multiple Linear Regression (MLR) method has been used as a comparison. The implementation of both the ELM and MLR methods has been tested using the solar radiation data of the Basel City, Switzerland, which are available to public. Five years of data have been divided into training data and testing data for 6 case-studies considered. Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) have been used as the parameters to measure the prediction results based on the actual data analysis. The results show that the obtained average values of RMSE and MAE by using the ELM method respectively are 122.45 W/m2 and 84.04 W/m2, while using the MLR method they are 141.18 W/m2 and 104.87 W/m2 respectively. It means that the ELM method proved to perform better than the MLR method, giving 15.29% better value of RMSE parameter and 24.79% better value of MAE parameter.
3D Corresponding Control Points Estimation using Mean Shift Iteration Shan-shan Fan; Xuan Yang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mean shift algorithm is widely used in 2D images. In this paper a novel 3D corresponding control points estimation using mean shift algorithm is proposed. This algorithm is not a simple extension from 2D to 3D, but computes the probability density function in each slice of the search region and connects them into a whole density function smoothed by Gaussian function. And then we calculate and compare Bhattacharyya coefficients to determine a new location of the trace point. A cylinder instead of ellipsoid is utilized as the search region to improve tracking accuracy. Also three revising methods different from the direct round-off way are proposed to modify the floating trace point. Experiment demonstrates the feasibility of this 3D mean shift algorithm and the effectiveness of the three revising methods. DOI:http://dx.doi.org/10.11591/telkomnika.v10i5.1286
Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud K Gangadhara Rao; Vijayakumari Rodda; B Basaveswara Rao
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i2.pp507-513

Abstract

Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. 
Modelling emotion expression through agent oriented methodology S.Filzah Zulkifli; CW Shiang; N Jali; M.A. Khairuddin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp972-977

Abstract

This paper presents Modelling Emotion Expression through Agent Oriented Methodology. Considering emotions of the intended users in the software engineering can uncover new requirements to improve and more accepted the system. While emotion is paying much attention nowadays, there is lacking systematic way to model the emotion based system. Without the systematic approach, it is hard to debug, design and develop an emotion based system. Since the emotional requirement of people has not being fully investigated, the research outcome propose the emotion modelling as part of the complete set of agent-oriented modelling for virtual character in eLearning system, The contribution of this paper is to introduce agent oriented modelling to systematic model an emotion based solution for an eLearning system and instructional video design. With the emotion model, it can serve as a guide to design, redesign, and discuss the emotion elements among the software development team. This is important for better debugging and project management especially for emotion led system.
Research on End-to-End Delay Performance Based on GPS Scheduling System Wang Yang; Zhou Jin-he; Ye Keng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper summarizes some results of network calculus. It derives the bounds on end-to-end delay and effective bandwidth by network based on leaky bucket regulators. The simulation results show that the network calculus is a good fit for calculating end-to-end delay. And it provides effective control, scheduling and management in the integration network conditions in the following step. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5474
How to Improve the Independent Ability of ForCES Routers Qi Fang; Weiming Wang; Xiaochun Wu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As network requirement of a new generation emerges, such as the endless stream of multimedia services and data center network, network management is heavy, extremely difficult and prone to error. How to achieve the self-management of the network, reduce manual input and improve stability and high efficiency of network is a hot topic in the field of network technology. As we known, network element needs to support the capability of self-management. But in the ForCES architecture, the self-management of network nodes is clearly insufficient. Based on the cognition with the characteristics of artificial intelligence, we explore the ForCES architecture introducing cognizance. So it has the capable of self-learning and self-management. This paper focuses on introducing the basic features, architecture and key technologies of cognition-based ForCES by means of the traditional definition and features of ForCES. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2179
Household Purposes in A Single Touch Via Bluetooth Using Smartphones Bhavani Rohit; Rengamani J
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp351-353

Abstract

Technology emerges in our environment day by day. But, still, we lag in keep on using multiple remotes for every device in our homes. Once Bluetooth came up it changes. People started using mobile phones connected to their devices to hear songs wireless and change channels using a mobile phone. A further implementation is kept on moving with multiple remotes for their usage. So, we had an idea that all our household devices may be controlled on our mobile phones via Bluetooth which is cheaper even for urban peoples. Now, all home devices with remote are IR based which doesn't work on sunlight, fluorescent bulbs due to interference. Switch over Bluetooth control reduces remotes in a sense called plastics. Mobile applications are evolved user-friendly to all the people on the day to day lives. Merge those applications to the household devices to control all household devices operated via remote such as TV, DVD, Home theatres, AC, even Table fan etc., Instead of removing IR's just interface Bluetooth chip on those household devices to control every remote device by using your smartphone. Why I am moving to Bluetooth instead of Wi-Fi. Bluetooth is cheaper, advanced to control devices in the range of 50 meters. But IR is useful to 10 meters, and once you block the signal, it will not work.

Page 2 of 905 | Total Record : 9049


Filter by Year

2012 2025


Filter By Issues
All Issue Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue