cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
Reliability Optimum Design of Spring in the Tools Storage SUN Kui zhou; FENG Hu tian; ZHOU Jin yu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

According to the spring’s failures in the tools storage and mechnical tools locking, the thesis will discuss the reliability optimization design for spring. With the known probability characteristics of basic random parameters, the random perturbation method, the reliability theory and optimal design technology are used to give the spring reliability design problems in locking knife spring in the tools storage and mechanical tools of machining center, to put forward the practical and effective reliability-based optimization design method, which can shorten the design cycle, save the testing cost, improve the design level and the reliability of parts. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1276
A Big Data Security using Data Masking Methods Archana R A; Ravindra S Hegadi; Manjunath T N
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i2.pp449-456

Abstract

Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions Burhan Ul Islam; Rashidah Funke Olanrewaju; Farhat Anwar; Athaur Rahman Najeeb; Mashkuri Yaacob
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp832-842

Abstract

Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on the evolution of MANETs followed by its significance in various fields. Besides, the MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated.
Two-chambers soft actuator bending and rotational properties for underwater application Muhammad Rusydi Muhammad Razif; Ahmad Athif Faudzi; Ili Najaa Aimi Mohd Nordin; Tariq Rehman; Dyah Ekashanti Octorina Dewi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp669-677

Abstract

This paper presents a study on bending and rotational properties of two-chambers soft actuator for underwater application. Previous study demonstrated the actuator characteristics required to optimize the bending performance and its potential to perform underwater because of the actuator material. However, there is less study of the actuator performance underwater as well as how the actuator tips rotating during actuator bending motion. In this paper, three tests have been proposed which are comparisons of bending angle simulation and experiment in air environment, bending angle performance in air and underwater environment as well as rotational angle of actuator tip in air environment. The bending angle of soft actuator is measured based on displacement in horizontal and vertical axis and for rotational angle, gyro sensor has been used. Based on the analysis, it is proven that the fabricated soft actuator performs almost similar trend to the simulation. It is also demonstrated that the actuator performs almost double bending motion underwater environment compared to in air environment at the same pressure, and the actuator is able to rotate 90º in air environment with the supplied pressure 52 kPa.
Test Data Analysis on Voltage Regulation of Proportion Relief Valve Pei Weichi; Cao Fukai; Zhao Shuzhong
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i6.pp4491-4499

Abstract

The miniature reform design was to improve the voltage regulation of regular valve and proportional valve. LabVIEW was used to develop CAT voltage regulation of proportion relief valve with electro hydraulic proportional control and visual instrument. The content of the pressure adjustment of proportional relief valve was introduced from different angles and the steady-state. Test on voltage regulation of proportion relief valve was analyzed. The sampling data were processed and analyzed on a time domain and frequency domain basis. Related conclusions are made by analysis on current linearity, steady-state pressure, and pressure-adjusting delay. Systematic methods and references are provided for the development of other valves to improve the function and the system of proportional valve. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5488
Design and Simulation of PMSM Feedback Linearization Control System SONG Xiao-jing
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the theory of AC adjustable speed as well as a new control theory research is unceasingly thorough, the permanent magnet synchronous motor control system requires high precision of control and high reliability of the occasion, access to a wide range of applications, in the modern AC motor has play a decisive role position. Based on the deep research on the feedback linearization technique based on, by choosing appropriate state transformation and control transform, PMSM model input output linearization, and the design of the feedback linearization controller, realized PMSM decoupling control based on Matlab, and PMSM feedback linearization control system simulation. The simulation results show that, the system in a certain range of speed than the traditional PI controller has better control performance, but to the parameter variation has strong sensitivity. It also determines the direction for future research. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2192 
Usability Analysis of Business Intelligence Tool Based Table Virtualization Muh Zia ul Haq; Suharjito Suharjito
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp431-437

Abstract

The use of Business Intelligence for Small-Mid Enterprise (SME) no longer impeded by the size of the resources required. The study in this paper provides an overview of how the use of proposed software can be used as an effective and efficient alternative solution in building BI Tools combined with table virtualization utilization in SQL. To know the level of usability and suitability of the developed BI Tool, the researcher conducted evaluation and analyzation using 2 (two) tools (Heuristics Evaluation and UMUX-Lite). The result found the comparison between the output (Business Intelligence Tool) produced by PHP Report Maker has a better level of usability and suitability than its competitors. Although both are in a decent median, the output needs preferences and customizations to achieve maximum functionality like well-known other development software. 
Wireless sensor data mining for e-commerce applications T. Sridevi; P. Mallikarjuna Rao; P.V Ramaraju
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp462-470

Abstract

Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and the smaller-scale (E.g. banking ATMs, school lunch payment systems). Biometric fraud is also an area of increasing concern, as the number of deployed biometric systems increases and fraudsters become aware of the potential to compromise them. Organizations are increasingly deploying process and technology solutions to stay one step ahead. At present Bankers are using different single Biometric Modalities for different services. All Biometric features are not suitable, for all services because of various artifacts while extracting features from the sensors due to background noise, lighting conditions, ease of access etc. This paper proposes a multi model system that will show a onetime single solution to meet all their security problems. This paper particularly handles how to incorporate cryptography and steganography in biometric applications.
A rectangular CSRR based microstrip UHF reader patch antenna for RFID applications Syamimi Mohd Norzeli; Ismarani Ismail; Norashidah Md Din; Mohd Tarmizi Ali; Ali Abd Almisreb; Ammar Ahmed Alkahtani
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i3.pp1434-1441

Abstract

This paper presents a compact microstrip ultra-high frequency (UHF) reader patch antenna with complementary split ring resonator (CSRR) for radio frequency identification (RFID). The total size of the antenna is 208 × 208 × 1.6 mm3. The proposed antenna is designed, fabricated and measured in order to verify the proposed concept. The characterization for radiation parameters, like return loss, radiation pattern and antenna gain have been done experimentally. The proposed antenna is operated at 921 MHz for and achieved a gain of 8.285 dBi. All simulations in this work have been carried out by means of the commercial computer simulation technology (CST) software. In compare to the simulated results, the measured outcomes are promised.
Support Vector Machine Optimized by Improved Genetic Algorithm Xiang Chang Sheng; Zhou Yu; Xilong Qu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Parameters of support vector machines (SVM) which is optimized by standard genetic algorithm is easy to trap into the local minimum, in order to get the optimal parameters of support vector machine, this paper proposed a parameters optimization method for support vector machines based on improved genetic algorithm, the simulation experiment is carried out on 5 benchmark datasets. The simulation show that the proposed method not only can assure the classification precision, but also can reduce training time markedly compared with standard genetic algorithm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3182

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue