cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
A novel UWB reconfigurable filtering antenna design with triple band-notched characteristics by using u-shaped coppers I.D. Saiful Bahri; Z. Zakaria; N. A. Shairi; N. Edward
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp267-275

Abstract

This paper proposed an UWB antenna with triple reconfigurable notch filters. By presenting there U-shaped coppers in the design, the potential triple interference in UWB applications can be rejected. Six PIN diodes are putted on the coppers to represent the OFF and ON tunable status in order to add reconfigurable characteristics to the UWB antenna. By using this ON and OFF tunable method, the current distribution of the proposed design changes and enables the antenna to have eight operation modes. The results prove that the proposed design can operate over the entire UWB frequency range (3.1 GHz to 10.6 GHz) and can filter out the target signals from the WLAN upper band (5.725 to 5.825 GHz), WLAN lower band (5.15 to 5.35 GHz) and X band frequency system (7.9 to 8.4 GHz) in one of the tunable configurations.
Control Strategy Analysis on Preventive Maintenance Hong sheng Su; Yong qiang Kang; Juan di Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 9: September 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i9.pp6711-6724

Abstract

ABSTRACTIn view of the limitations that the optimal examining item do not have dynamic real-time speciality and can’t reflect the actual state of devices in the traditional preventive maintenance(PM) model of repairable devices, in this paper a real-time control project on the checking rate of PM is proposed based on the state of devices. The differential equations used to describe the dynamic behavior of the system are established, and some performance indexes of maintenance systems including the steady-state availability, and the mean time to failure (MTTF), and as well as the average time of staying in each state are calculated. The control strategy on the checking rate is then proposed and the adaptability and the stability of the corresponding control system are analyzed. The essence of the method is to achieve the expected steady-state behavior by controlling the dynamic behavior of the system, which will ensure reliable completion of the task and reduce the maintenance cost meantime. Researches indicate that the proposed method is very effective to improve the utilization of devices and provide theoretical support for the practical applications.
The Planning and Digital Design for Welding Production Line of the Car Rear Floor Zhang Chun-Yan; Qiao Yin-Hu; Li Feng; Chen Jie-Ping
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The last two sub-assembly welding production line of the car rear floor is designed in this paper. Firstly, the welding production line of the car rear floor is complete planned and designed from global aspect by analysis the structure of body-in-white and the car rear floor; Secondly, each working position fixture are designed and the location of all fixture are arranged according to location and spot welding requirements with the CATIA software. Finally, the conveying appliance of welding production line for the car rear floor are detailed planed, according to the production program, the economic requirements to complete a three-dimensional design of delivery devices, ergonomic simulation and dynamic interference checking in the process of material transportation are realized in virtual simulation platform DELMIA software, to ensure the production line design is reasonable and feasible from theory. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2685
Stand-alone backup power system for electrical appliances with solar PV and grid options A. H. Sabre; Wan Zuha Wan Hasan; Farah Hani Nordin; Mohd Zainal Abidin Ab-Kadir
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp689-699

Abstract

For a portable backup power system, there is an essential need to contribute to increasing the energy conversion efficiency between the source and the electrical household appliances to overcome the recent issues of global warming. This paper proposes a Backup power system (BPS) compatible with the capability to match with two primary power sources; Grid-Connected power as an AC and solar-PV as a DC power source. This system composes of a rechargeable battery bank of about 300V, while the voltage matching concept keeps maintaining the battery fully charged as long as the source power is available. Matlab-based simulation has performed to prove the concept of the adopted voltage-matching. A relay switch circuit controlled by the main power source is used to change-over the load/appliances between direct link through bypassing the main power and the storage battery power when both options of main power are unavailable. The result shows the excellent utilization of the traditional BPS losses, the proposed topology can achieve about 99% power efficiency as compared with the traditional one.
Cognitive Radio Channel Selection Strategy Based on Experience-Weighted Attraction Learning Sun Yong; Qian Jiansheng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, an innovative proposed channel selection algorithm based on Experience-Weighted Attraction (EWA) learning allows Cognitive Radio (CR) to learn radio environment communication channel characteristics online. By accumulating the history channel experience, it can predict, select and change the current optimal communication channel, dynamic ensure the quality of communication links and finally reduce system communication outage probability. Validation and reliability have been strictly verified by Matlab simulations. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3900 
A Power Sharing Method for Parallel Inverters with Virtual Synchronous Generator Control Strategy Sara Yahia Altahir Mohamed; Xiangwu Yan
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 2: November 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i2.pp317-324

Abstract

A new power sharing method of a virtual sychronous generator control based inverters is introduced in this paper. Since virtual synchronous generator has virtual inertia and damping properties, it significantly enhances the grid stability. However, its output power considerably affects by the line impedance. Thus, in this paper, the relation between the droop control and the line impedance is analyzed at first. Then, by appling an improved droop control strategy to an inverter based on the virtual sychronous generator control, achieving proportional active and reactive power sharing unaffected by the line impedance is realized. The result shows that a smooth response is achieved. As well as, the voltage drop caused by the line impedance is totally compensated. As a result, the system stability is furtherly improved. At last, the effectiveness of the proposed method is verified through MATLAB/Simulink.
Microinverter Topology based Single-stage Grid-connected Photovoltaic System: A Review A. Razi; M. Nabil Hidayat; M. N. Seroji
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp645-651

Abstract

This paper discussed the topology development of a single-stage microinverter in grid-connected PV system. In general, the microinverter topologies can be categorized into four type of topologies:          1) Flyback inverter, 2) Double-boost inverter, 3) Derived zeta-cuk configuration and 4) Buck-boost inverter. Flyback configuration is widely used for single-stage microinverter which offers protection between solar panel and utility grid. However due to the bulkiness of the transformer, new arrangement circuit employ the Half-Bridge topology with film capacitor and microcontroller provide a good room for research and future developments to obtain greater efficiency and compact design of single-stage microinverter grid-connected PV system. Plus, there are several characteristics need to be taken care for future development of the microinverter technology.
Fast and robust approach for data security in communication channel using pascal matrix Oday Kamil Hamid; Riyadh Bassil Abduljabbar; Nazar Jabbar Alhyani
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp248-256

Abstract

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.
Fuzzy Rough Set Conditional Entropy Attribute Reduction Algorithm Jinsheng Ren; Haitao Jia
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Modern science is increasingly data-driven and collaborative in nature. Comparing to ordinary data processing, big data processing that is mixed with great missing date must be processed rapidly. The Rough Set was generated to deal with the large data. The QuickReduct is a popular attribute algorithm as the attribute reduction of big database. But less effort has been put on fuzziness and vagueness data. Considering this requirement this paper proposes an improved attribute reduction based on condition entropy of fuzzy rough sets (FRCE) which can deal with the continuous and fuzzy data. This algorithm rewrites the expression of condition entropy by using the information theory. Last this paper takes the UCI database to simulate the efficiency of this algorithm. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4795
Light weight authentication protocol for WSN using ECC and hexagonal numbers Noel Toy; Senthilnathan T
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i1.pp443-450

Abstract

Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue