cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
Impact of rain weather over free space optic communication transmission A.K Rahman; N Julai; M. Jusoh; C.B.M Rashidi; S.A Aljunid; Anuar M.S; M.F Talib; Nurdiani Zamhari; S.K Sahari; K.F. Tamrin; Rudiyanto P. Jong; D.N.A Zaidel; N.A.A Mohtadzar; M.R.M Sharip; Y.S Samat
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp303-310

Abstract

This paper focuses the rain effect over FSO link medium in Malaysia environment. In this work, a rain data samples that collected from Malaysian Meteorological Department (MMD) to determine the scattering coefficient, atmospheric attenuation and total attenuation. From the analysis, the precipitation rate give different impact over FSO link which can cause the attenuation and bit error rate increase. The results also show the comparison parameter for optimal geometrical loss such as beam divergence, aperture size and receiver sensitivity.
Energy Efficiency of a Building Using Capacitors Optimization Amirul Asyraf Mohd Kamaruzaman; Muhammad Murtadha Othman; Aainaa Mohd Arriffin; Ismail Musirin; Muhd Azri Abdul Razak; Zilaila Zakaria
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp343-349

Abstract

This paper presents the optimal location and sizing of capacitors to reduce the total power losses as well as its investment cost for a distribution system in a building. The capacitors location and sizing will be randomly chosen repetitively, via Stochasitic optimization method using MATLAB® and SIMULINK® software. The optimal capacitors location and sizing will be picked via analysis and comparisons between the results. The result shows improvement in power losses with minimal investment cost whilst providing optimal sizing and location of capacitors to be installed in a building.
Enhancement transient stability of power system using UPFC with M-PSO Rashid H. AL-Rubayi; Luay G. Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp61-69

Abstract

During the last few decades, electrical power demand enlarged significantly whereas power production and transmission expansions have been brutally restricted because of restricted resources as well as ecological constraints. Consequently, many transmission lines have been profoundly loading, so the stability of power system became a Limiting factor for transferring electrical power. Therefore, maintaining a secure and stable operation of electric power networks is deemed an important and challenging issue. Transient stability of a power system has been gained considerable attention from researchers due to its importance. The FACTs devices that provide opportunities to control the power and damping oscillations are used. Therefore, this paper sheds light on the modified particle swarm optimization (M-PSO) algorithm is used such in the paper to discover the design optimal the Proportional Integral controller (PI-C) parameters that improve the stability the Multi-Machine Power System (MMPS) with Unified Power Flow Controller (UPFC). Performance the power system under event of fault is investigating by utilizes the proposed two strategies to simulate the operational characteristics of power system by the UPFC using: first, the conventional (PI-C) based on Particle Swarm Optimization (PI-C-PSO); secondly, (PI-C) based on modified Particle Swarm Optimization (PI-C-M-PSO) algorithm. The simulation results show the behavior of power system with and without UPFC, that the proposed (PI-C-M-PSO) technicality has enhanced response the system compared for other techniques, that since it gives undershoot and over-shoot previously existence minimized in the transitions, it has a ripple lower. Matlab package has been employed to implement this study. The simulation results show that the transient stability of the respective system enhanced considerably with this technique.
A New Anti-Windup PI Controller for Direct Torque Control System Li Qi Meng; Miao Jing Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 7: July 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i7.pp5268-5274

Abstract

Speed controller in induction motor direct torque control (DTC) system usually adopts the traditional PI controller. But the traditional PI controller has characteristic of nonlinear saturation, what will make the control performance of actual system become worse. In order to improve system control performance, this paper adopts a new type Anti-Windup PI controller, This method separately control the integral state by feed backing the output of the integrator to the input port of the integrator according to whether the controller output is saturated or not, which can make the system leaving saturation as soon as possible. As a result, the overshoot and settling time of the system are reduced. Simulation and experimental results show that this method can significantly suppress the integral windup phenomenon as well as reduce the overshoot and shorten the settling time. The new Anti-Windup PI controller has a better performance than the traditional PI controller.
Energy management system for PV-battery microgrid based on model predictive control M. Reyasudin Basir Khan; Jagadeesh Pasupuleti; Jabbar Al-Fattah; Mehrdad Tahmasebi
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i1.pp20-26

Abstract

There had been increase of the usage of renewable energy sources to supply electricity in remote areas. However, microgrid consists of renewable sources such as solar Photovoltaic (PV) poses challenges for a reliable energy supply due to its intermittent nature. This paper presents a microgrid model with Energy Management System based on Model Predictive Control (MPC). The microgrid comprises of PV, and battery storage system. The goal of the EMS is to deliver a reliable and optimal generation from multiple sources in the microgrid. Moreover, the MPC will also provide controls for the battery charging for a smooth PV output. The model simulated based on actual load profile and renewable resource such as solar radiation. Several disturbances such as variation of load, generation and PV shading has been simulated to measure the performance of the EMS. The results illustrate the system ability to exhibits robust performance in variety of conditions.
Cyber Threat Intelligence – Issue and Challenges Md Sahrom Abu; Siti Rahayu Selamat; Aswami Ariffin; Robiah Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp371-379

Abstract

Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
An Algorithm to construct nondominated k-coteries Rikip Ginanjar; Nur Hadisukmana
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i2.pp953-960

Abstract

One of the solution in solving k mutual exclusion problem is the concept of k-coterie. A k-coterie under a set S is a set of subsets of S or quorums such that any k + 1 quorums, there are at least two quorums intersect each other. The k mutual exclusion problern is the problem of managing processes in such a way that at most k processes can enter their critical sections simultaneously. Nondominated k-coteries are more resilient to network and site failures than doninated k-coteries; that is the availability and reliability of a distributed system is better if nondominated k-coteries are used. Algorithms to construct k-coteries have been proposed, unfortunately they have some restrictions, especially in constructing nondominated k-coteries. The restrictions are due to the combination of N, the number of nodes in a distributed system, and k, the number of processes allowed to enter their critical sections simultaneously. To solve this problem, this paper proposes an algorithm to construct nondominated k-coteries for all combination of N and k.
Research on Application of Sintering Basicity of Based on Various Intelligent Algorithms Song Qiang; Zhang Hai-Feng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 11: November 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i11.pp7728-7737

Abstract

Prediction of alkalinity in sintering process is difficult. Whether the level of the alkalinity of sintering process is successful or not is directly related to the quality of sinter. There is no good method, prediction of alkalinity by high complexity, the present nonlinear, strong coupling, high time delay, so the recent new technology, grey least square support vector machine have been introduced. In this paper, The weight of evaluation objectives has not given the corresponding consideration when solving the correlation degree by taking traditional grey relation analysis and it is with a lot of subjective factors, easily lead to mistakes in decision-making on program. What is more,a kind of alkaline grey support vector machine model, enables us to develop new formulations and algorithms to predict the alkalinity. In the model,
Speech Enhancement based on Wiener Filter and Compressive Sensing Amart Sulong; Teddy Surya Gunawan; Othman O. Khalifa; Mira Kartiwi; Eliathamby Ambikairajah
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp367-379

Abstract

In the last few decades, many advanced technologies have been proposed, in which communications played a great role as well as telecommunications applications. The noise elimination in various environments became the most concerned as it greatly hindered the speech communication applications. The improvement of noisy speech interms of quality and intelligibility are taken into account without introducingany additional noise. Many speech enhancement algorithms have been proposed. Wiener filter is one of the classical algorithm that improve the noisy speech by reducing its noise components through selectively chosen Wiener gain. In this paper, compressive sensing method by randomize measurement matrix is combined with the Wiener filter to reduce the noisy speech signal to produce high signal to noise ratio. The PESQ is used to measure the quality of the proposed algorithm design. Experimental results showthe effectiveness of our proposed algorithm to enhance noisy signals corrupted by various noises compared to other traditional algorithms, in which high PESQ scores were achieved across various noises and different SNRs.
Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing Kunhua Zhu; Guohong Zhu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3147 

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue