Articles
9,226 Documents
Impact of rain weather over free space optic communication transmission
A.K Rahman;
N Julai;
M. Jusoh;
C.B.M Rashidi;
S.A Aljunid;
Anuar M.S;
M.F Talib;
Nurdiani Zamhari;
S.K Sahari;
K.F. Tamrin;
Rudiyanto P. Jong;
D.N.A Zaidel;
N.A.A Mohtadzar;
M.R.M Sharip;
Y.S Samat
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i1.pp303-310
This paper focuses the rain effect over FSO link medium in Malaysia environment. In this work, a rain data samples that collected from Malaysian Meteorological Department (MMD) to determine the scattering coefficient, atmospheric attenuation and total attenuation. From the analysis, the precipitation rate give different impact over FSO link which can cause the attenuation and bit error rate increase. The results also show the comparison parameter for optimal geometrical loss such as beam divergence, aperture size and receiver sensitivity.
Energy Efficiency of a Building Using Capacitors Optimization
Amirul Asyraf Mohd Kamaruzaman;
Muhammad Murtadha Othman;
Aainaa Mohd Arriffin;
Ismail Musirin;
Muhd Azri Abdul Razak;
Zilaila Zakaria
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i2.pp343-349
This paper presents the optimal location and sizing of capacitors to reduce the total power losses as well as its investment cost for a distribution system in a building. The capacitors location and sizing will be randomly chosen repetitively, via Stochasitic optimization method using MATLAB® and SIMULINK® software. The optimal capacitors location and sizing will be picked via analysis and comparisons between the results. The result shows improvement in power losses with minimal investment cost whilst providing optimal sizing and location of capacitors to be installed in a building.
Enhancement transient stability of power system using UPFC with M-PSO
Rashid H. AL-Rubayi;
Luay G. Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i1.pp61-69
During the last few decades, electrical power demand enlarged significantly whereas power production and transmission expansions have been brutally restricted because of restricted resources as well as ecological constraints. Consequently, many transmission lines have been profoundly loading, so the stability of power system became a Limiting factor for transferring electrical power. Therefore, maintaining a secure and stable operation of electric power networks is deemed an important and challenging issue. Transient stability of a power system has been gained considerable attention from researchers due to its importance. The FACTs devices that provide opportunities to control the power and damping oscillations are used. Therefore, this paper sheds light on the modified particle swarm optimization (M-PSO) algorithm is used such in the paper to discover the design optimal the Proportional Integral controller (PI-C) parameters that improve the stability the Multi-Machine Power System (MMPS) with Unified Power Flow Controller (UPFC). Performance the power system under event of fault is investigating by utilizes the proposed two strategies to simulate the operational characteristics of power system by the UPFC using: first, the conventional (PI-C) based on Particle Swarm Optimization (PI-C-PSO); secondly, (PI-C) based on modified Particle Swarm Optimization (PI-C-M-PSO) algorithm. The simulation results show the behavior of power system with and without UPFC, that the proposed (PI-C-M-PSO) technicality has enhanced response the system compared for other techniques, that since it gives undershoot and over-shoot previously existence minimized in the transitions, it has a ripple lower. Matlab package has been employed to implement this study. The simulation results show that the transient stability of the respective system enhanced considerably with this technique.
A New Anti-Windup PI Controller for Direct Torque Control System
Li Qi Meng;
Miao Jing Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 7: July 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i7.pp5268-5274
Speed controller in induction motor direct torque control (DTC) system usually adopts the traditional PI controller. But the traditional PI controller has characteristic of nonlinear saturation, what will make the control performance of actual system become worse. In order to improve system control performance, this paper adopts a new type Anti-Windup PI controller, This method separately control the integral state by feed backing the output of the integrator to the input port of the integrator according to whether the controller output is saturated or not, which can make the system leaving saturation as soon as possible. As a result, the overshoot and settling time of the system are reduced. Simulation and experimental results show that this method can significantly suppress the integral windup phenomenon as well as reduce the overshoot and shorten the settling time. The new Anti-Windup PI controller has a better performance than the traditional PI controller.
Energy management system for PV-battery microgrid based on model predictive control
M. Reyasudin Basir Khan;
Jagadeesh Pasupuleti;
Jabbar Al-Fattah;
Mehrdad Tahmasebi
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i1.pp20-26
There had been increase of the usage of renewable energy sources to supply electricity in remote areas. However, microgrid consists of renewable sources such as solar Photovoltaic (PV) poses challenges for a reliable energy supply due to its intermittent nature. This paper presents a microgrid model with Energy Management System based on Model Predictive Control (MPC). The microgrid comprises of PV, and battery storage system. The goal of the EMS is to deliver a reliable and optimal generation from multiple sources in the microgrid. Moreover, the MPC will also provide controls for the battery charging for a smooth PV output. The model simulated based on actual load profile and renewable resource such as solar radiation. Several disturbances such as variation of load, generation and PV shading has been simulated to measure the performance of the EMS. The results illustrate the system ability to exhibits robust performance in variety of conditions.
Cyber Threat Intelligence – Issue and Challenges
Md Sahrom Abu;
Siti Rahayu Selamat;
Aswami Ariffin;
Robiah Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i1.pp371-379
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
An Algorithm to construct nondominated k-coteries
Rikip Ginanjar;
Nur Hadisukmana
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i2.pp953-960
One of the solution in solving k mutual exclusion problem is the concept of k-coterie. A k-coterie under a set S is a set of subsets of S or quorums such that any k + 1 quorums, there are at least two quorums intersect each other. The k mutual exclusion problern is the problem of managing processes in such a way that at most k processes can enter their critical sections simultaneously. Nondominated k-coteries are more resilient to network and site failures than doninated k-coteries; that is the availability and reliability of a distributed system is better if nondominated k-coteries are used. Algorithms to construct k-coteries have been proposed, unfortunately they have some restrictions, especially in constructing nondominated k-coteries. The restrictions are due to the combination of N, the number of nodes in a distributed system, and k, the number of processes allowed to enter their critical sections simultaneously. To solve this problem, this paper proposes an algorithm to construct nondominated k-coteries for all combination of N and k.
Research on Application of Sintering Basicity of Based on Various Intelligent Algorithms
Song Qiang;
Zhang Hai-Feng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 11: November 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i11.pp7728-7737
Prediction of alkalinity in sintering process is difficult. Whether the level of the alkalinity of sintering process is successful or not is directly related to the quality of sinter. There is no good method, prediction of alkalinity by high complexity, the present nonlinear, strong coupling, high time delay, so the recent new technology, grey least square support vector machine have been introduced. In this paper, The weight of evaluation objectives has not given the corresponding consideration when solving the correlation degree by taking traditional grey relation analysis and it is with a lot of subjective factors, easily lead to mistakes in decision-making on program. What is more,a kind of alkaline grey support vector machine model, enables us to develop new formulations and algorithms to predict the alkalinity. In the model,
Speech Enhancement based on Wiener Filter and Compressive Sensing
Amart Sulong;
Teddy Surya Gunawan;
Othman O. Khalifa;
Mira Kartiwi;
Eliathamby Ambikairajah
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v2.i2.pp367-379
In the last few decades, many advanced technologies have been proposed, in which communications played a great role as well as telecommunications applications. The noise elimination in various environments became the most concerned as it greatly hindered the speech communication applications. The improvement of noisy speech interms of quality and intelligibility are taken into account without introducingany additional noise. Many speech enhancement algorithms have been proposed. Wiener filter is one of the classical algorithm that improve the noisy speech by reducing its noise components through selectively chosen Wiener gain. In this paper, compressive sensing method by randomize measurement matrix is combined with the Wiener filter to reduce the noisy speech signal to produce high signal to noise ratio. The PESQ is used to measure the quality of the proposed algorithm design. Experimental results showthe effectiveness of our proposed algorithm to enhance noisy signals corrupted by various noises compared to other traditional algorithms, in which high PESQ scores were achieved across various noises and different SNRs.
Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing
Kunhua Zhu;
Guohong Zhu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3147