Articles
9,226 Documents
Reliability Optimum Design of Spring in the Tools Storage
SUN Kui zhou;
FENG Hu tian;
ZHOU Jin yu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
According to the spring’s failures in the tools storage and mechnical tools locking, the thesis will discuss the reliability optimization design for spring. With the known probability characteristics of basic random parameters, the random perturbation method, the reliability theory and optimal design technology are used to give the spring reliability design problems in locking knife spring in the tools storage and mechanical tools of machining center, to put forward the practical and effective reliability-based optimization design method, which can shorten the design cycle, save the testing cost, improve the design level and the reliability of parts. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1276
A Big Data Security using Data Masking Methods
Archana R A;
Ravindra S Hegadi;
Manjunath T N
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v7.i2.pp449-456
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions
Burhan Ul Islam;
Rashidah Funke Olanrewaju;
Farhat Anwar;
Athaur Rahman Najeeb;
Mashkuri Yaacob
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i2.pp832-842
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on the evolution of MANETs followed by its significance in various fields. Besides, the MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated.
Two-chambers soft actuator bending and rotational properties for underwater application
Muhammad Rusydi Muhammad Razif;
Ahmad Athif Faudzi;
Ili Najaa Aimi Mohd Nordin;
Tariq Rehman;
Dyah Ekashanti Octorina Dewi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp669-677
This paper presents a study on bending and rotational properties of two-chambers soft actuator for underwater application. Previous study demonstrated the actuator characteristics required to optimize the bending performance and its potential to perform underwater because of the actuator material. However, there is less study of the actuator performance underwater as well as how the actuator tips rotating during actuator bending motion. In this paper, three tests have been proposed which are comparisons of bending angle simulation and experiment in air environment, bending angle performance in air and underwater environment as well as rotational angle of actuator tip in air environment. The bending angle of soft actuator is measured based on displacement in horizontal and vertical axis and for rotational angle, gyro sensor has been used. Based on the analysis, it is proven that the fabricated soft actuator performs almost similar trend to the simulation. It is also demonstrated that the actuator performs almost double bending motion underwater environment compared to in air environment at the same pressure, and the actuator is able to rotate 90º in air environment with the supplied pressure 52 kPa.
Test Data Analysis on Voltage Regulation of Proportion Relief Valve
Pei Weichi;
Cao Fukai;
Zhao Shuzhong
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i6.pp4491-4499
The miniature reform design was to improve the voltage regulation of regular valve and proportional valve. LabVIEW was used to develop CAT voltage regulation of proportion relief valve with electro hydraulic proportional control and visual instrument. The content of the pressure adjustment of proportional relief valve was introduced from different angles and the steady-state. Test on voltage regulation of proportion relief valve was analyzed. The sampling data were processed and analyzed on a time domain and frequency domain basis. Related conclusions are made by analysis on current linearity, steady-state pressure, and pressure-adjusting delay. Systematic methods and references are provided for the development of other valves to improve the function and the system of proportional valve. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5488
Design and Simulation of PMSM Feedback Linearization Control System
SONG Xiao-jing
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
With the theory of AC adjustable speed as well as a new control theory research is unceasingly thorough, the permanent magnet synchronous motor control system requires high precision of control and high reliability of the occasion, access to a wide range of applications, in the modern AC motor has play a decisive role position. Based on the deep research on the feedback linearization technique based on, by choosing appropriate state transformation and control transform, PMSM model input output linearization, and the design of the feedback linearization controller, realized PMSM decoupling control based on Matlab, and PMSM feedback linearization control system simulation. The simulation results show that, the system in a certain range of speed than the traditional PI controller has better control performance, but to the parameter variation has strong sensitivity. It also determines the direction for future research. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2192
Usability Analysis of Business Intelligence Tool Based Table Virtualization
Muh Zia ul Haq;
Suharjito Suharjito
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i2.pp431-437
The use of Business Intelligence for Small-Mid Enterprise (SME) no longer impeded by the size of the resources required. The study in this paper provides an overview of how the use of proposed software can be used as an effective and efficient alternative solution in building BI Tools combined with table virtualization utilization in SQL. To know the level of usability and suitability of the developed BI Tool, the researcher conducted evaluation and analyzation using 2 (two) tools (Heuristics Evaluation and UMUX-Lite). The result found the comparison between the output (Business Intelligence Tool) produced by PHP Report Maker has a better level of usability and suitability than its competitors. Although both are in a decent median, the output needs preferences and customizations to achieve maximum functionality like well-known other development software.
Wireless sensor data mining for e-commerce applications
T. Sridevi;
P. Mallikarjuna Rao;
P.V Ramaraju
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i1.pp462-470
Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and the smaller-scale (E.g. banking ATMs, school lunch payment systems). Biometric fraud is also an area of increasing concern, as the number of deployed biometric systems increases and fraudsters become aware of the potential to compromise them. Organizations are increasingly deploying process and technology solutions to stay one step ahead. At present Bankers are using different single Biometric Modalities for different services. All Biometric features are not suitable, for all services because of various artifacts while extracting features from the sensors due to background noise, lighting conditions, ease of access etc. This paper proposes a multi model system that will show a onetime single solution to meet all their security problems. This paper particularly handles how to incorporate cryptography and steganography in biometric applications.
A rectangular CSRR based microstrip UHF reader patch antenna for RFID applications
Syamimi Mohd Norzeli;
Ismarani Ismail;
Norashidah Md Din;
Mohd Tarmizi Ali;
Ali Abd Almisreb;
Ammar Ahmed Alkahtani
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i3.pp1434-1441
This paper presents a compact microstrip ultra-high frequency (UHF) reader patch antenna with complementary split ring resonator (CSRR) for radio frequency identification (RFID). The total size of the antenna is 208 × 208 × 1.6 mm3. The proposed antenna is designed, fabricated and measured in order to verify the proposed concept. The characterization for radiation parameters, like return loss, radiation pattern and antenna gain have been done experimentally. The proposed antenna is operated at 921 MHz for and achieved a gain of 8.285 dBi. All simulations in this work have been carried out by means of the commercial computer simulation technology (CST) software. In compare to the simulated results, the measured outcomes are promised.
Support Vector Machine Optimized by Improved Genetic Algorithm
Xiang Chang Sheng;
Zhou Yu;
Xilong Qu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Parameters of support vector machines (SVM) which is optimized by standard genetic algorithm is easy to trap into the local minimum, in order to get the optimal parameters of support vector machine, this paper proposed a parameters optimization method for support vector machines based on improved genetic algorithm, the simulation experiment is carried out on 5 benchmark datasets. The simulation show that the proposed method not only can assure the classification precision, but also can reduce training time markedly compared with standard genetic algorithm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3182