cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
Improved Performance of Four Switch Three Phase with SEPIC-Based Inverter Prabu B; Murugan M
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 1: April 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i1.pp96-106

Abstract

The proposed novel four-switch three-phase (FSTP) inverter is to design to reduce the rate, difficulty, mass, and switching losses of the DC-AC conversion system. Here the output line voltage cannot exceed half the input voltage in the out-dated FSTP inverter and it operates at half the DC input voltage. Single-Ended Primary-Inductance Converter (SEPIC) is a novel design for the FSTP inverter proposed in this paper. In this proposed topology the necessity of output filters is not necessary for the pure sinusoidal output voltage. Related to out-dated FSTP inverter, the proposed FSTP SEPIC inverter raises the voltage utilization aspect of the input DC supply, where the suggested topology delivers the higher output line voltage which can be extended up to the full value of the DC input voltage. In the proposed topology a control used called the integral sliding-mode (ISM) control and this control is used to enhance its dynamics and to ensure strength of the system during different operating conditions. Simulation model and results are used to authorise the proposed concept and simulations results show the effectiveness of the proposed inverter.
A Switched IMM Estimator Based on the Model Probability Cumulant Guang-Nan Zhang; Jin-Long Yang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Taking into account the disadvantage of the potential loss of accuracy due to the overmodeling at these nonmaneuvering times in the interacting multiple model (IMM) method, an improved IMM algorithm based on the Viterbi technique and the model probability cumulant is proposed. First, select one or two optimal models from the model set to enhance the model utilization rate. Then, judge the variation of the target motion state according to the maneuvering detection mechanism based on the model probability cumulant, and finally switch the different IMM methods. Simulation results show that the proposed method has an enhanced performance in tracking a maneuvering target. DOI:http://dx.doi.org/10.11591/telkomnika.v11i8.3089
Assessment of Crowdsourcing Task Multidimensional Relationship Model through Application Prototype Nurhayati Zakaria; Siti Salwa Salleh; Norjansalika Janom; Syaripah Ruzaini Syed Aris
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp378-385

Abstract

Crowdsourcing is a process where a company outsources a task to a large group of the digital worker through an online platform. In Malaysia, the crowdsourcing ecosystem comprises of three key role players which are job providers, platforms and digital workers. The cycle starts when a job issued by the job providers. Then the platform advertises it to the digital workers who registered themselves in the system. The digital worker is an individual having different skills, knowledge, experiences and education level. Those who are interested and has the capabilities to complete it will pull the job based on the first come first serve basis. Basically, the aim of the platform is to ensure that the tasks are taken immediately and completed within a given time by the right skill of the digital worker. However, the platform does not have a structured mechanism to classify the type of task that would confirm the task match to the digital worker. Tasks are given based on digital worker skills and knowledge. A comprehensive mechanism to define and describe the task properties is important. Apart from enabling the determination of the remuneration value, it will also specify skill required and their level of competency. To solve that issues, this paper present the flow and process development and measured the relationships between the types of tasks and the digital workers in alluvial chart apps prototype. 76% of respondents agreed that the alluvial chart shows a comprehensive relationship.  As a conclusion, this study defined the comprehensive relationships among the variables will facilitate a platform to match between digital workers to the tasks.
Self-Healing Properties of Silicone Rubber Against Relative Humidity and Nanofiller Izzah Hazirah Zakaria; Muhammad Taufik Kamaruddin; Yanuar Z. Arief; Mohd Hafizi Ahmad; Noor Azlinda Ahmad; Nor Asiah Muhamad; Zuraimy Adzis
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 1: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v6.i1.pp166-171

Abstract

A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 150 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
Dynamic bifurcation analysis and mitigation of SSR in SMIB system Shruthi Ramachandra; Mala R.C.; H. V. Gururaja Rao
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i3.pp1128-1137

Abstract

This paper presents a detailed study on Sub-synchronous resonance in a Single machine connected to an infinite bus system by employing Bifurcation Theory. The synchronous machine model considered is a two-axis model, the turbine system is a six mass system. A comparative study of Sub-synchronous resonance for the two-axis synchronous machine models 1.1, 2.1 and 2.2 under constant excitation is presented in this paper. The effect of adding an exciter, power system stabilizer and Static Synchronous Series Compensator to the SMIB system, incorporated with a 2.2 synchronous machine model on the bifurcations of SSR is also investigated. The results obtained on replacing the fixed series compensation of the line by Static Synchronous Series Compensator resulted in the mitigation of Sub-synchronous Resonance. The results obtained for all the above-considered cases are compared with eigenvalue analysis and validated using transient analysis.
Fault-Tolerant Method for Detecting Coverage Holes of Wireless Sensor Networks Xiang-yi Chen; Fei Li; Liang-min Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 4: August 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Coverage is one of the fundamental problems in Wireless Sensor Networks (WSNs) since it is an important measure of Quality of Service (QoS) for the network’s applications. However, due to random development, power exhausting, intrusion and attacking of other malice nodes, coverage holes often appear and undermine the networks. In order to solve this problem, we present a decentralized, coordinate-free, and fault-tolerant algorithm for detecting coverage holes, which can be run on a single node. It only needs the connectivity information gathered from one-hop neighbors of the running node. During the detection process, maximal simplicial complex of the local area is required to determine whether the node is at the boundary of a hole or not. After the information of sensors around the coverage hole will be processed by the base station, and the size of coverage holes will be obtained. Simulation results show the fault tolerance of the proposed method. Meanwhile the detection accuracy, error-detection and missed-detection are compared with some related methods reported recently. The results also show that our method is effective, robust, and especially suitable for large scale networks. DOI: http://dx.doi.org/10.11591/telkomnika.v10i4.873
Game Analysis of Cooperative Probability between Alliance Partners Zhao Guo Yun
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 12: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aiming at the cooperation between the alliance partners, this paper takes advantage of the game theory to establish two models of the single game and repetitive game. Through the analysis of these two types of models, it is concluded that the decision of choosing to keep faith or break one’s promise is related to the winning probability and litigation costs in the every stage of a single game. Meanwhile, the choice that both sides will select trustworthiness or dishonesty in the transaction and the chances of cooperation later are concerned with the marketing discount factors as well as the income and the loss of a cooperation in a repetitive game. The basic conclusion of this paper can provide a foundation for alliance partners to make decisions in their cooperative process. DOI: http://dx.doi.org/10.11591/telkomnika.v11i12.3595
Analysis of DFIG Wind Turbine During Steady-State and Transient Operation Omer Elfaki Elbashir; Wang Zezhong; Liu Qihui
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In recent years, there has been a worldwide growth in the exploitation of wind energy. In the wind power industry, the majority of grid-connected wind turbines are equipped with doubly fed induction generators (DFIGs) because of their advantages over other wind turbine generator (WTG) systems. Therefore, much research effort has gone into the issues of modeling, analysis, control and grid integration of DFIG wind turbines. This paper deals with the modeling, analysis, and simulation of a DFIG driven by a wind turbine. The grid connected wind energy conversion system (WECS) is composed of DFIG and two back to back PWM voltage source converters (VSCs) in the rotor circuit. A machine model is derived in an appropriate reference frame. The grid voltage oriented vector control is used for the grid side converter (GSC) in order to maintain a constant DC bus voltage, while the stator voltage oriented vector control is adopted in the rotor side converter (RSC) to control the active and reactive powers. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5205
Deviation Control Theory and Strategy in Aluminum Hot Rolling Fu Zhuo; Liu Yilun; Ma Liyong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Real-time detection and tracking of moving pedestrians in image sequences is a fundamental task in many computation vision applications such as automated visual surveillance system. In this paper we propose a human detection method based on foreground segmentation, and the detection speed is satisfying for the application of video surveillance. During detection, unlike the exhaustive scan typically used in general human detection systems, in order to avoid scanning regions like the sky, the foreground segmentation stage is firstly implemented in the video surveillance sequences by utilizing Gaussian mixture model algorithm, and then, human detection stage is executed on the regions of interest (ROI) extracted from the video surveillance sequence frame. In contrast with the exhaustive scan without explicit segmentation, our proposed approach can meet the real-time requirement. Carefully designed experiments demonstrate the superiority of our proposed approach. DOI: http://dx.doi.org/10.11591/telkomnika.v11i2.2053
Data Spread among Vehicular Networks with Minimal Cost and Privacy Atul Kulkarni; Debajyoti Mukhopadhyay
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp111-114

Abstract

Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) analyze the migration cost, (iii) when a hacker enters the network, the details of the hacker is send to the GPS to identify hackers location, (iv) provides the user requested packets back to the user without any modification. GPS work is to identify the hacker location in which node they are trying to access the files and that information has been sent to the user where hacker enters the network. Each packet sent by the service provider via router to end-user, the router intimates service provider with a confirmation message. Finally, VAN router provides security to the end-user by avoiding hackers to access the file and minimizes traffic cost, finds shortest path.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue