cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
Robust operation of microgrid energy system under uncertainties and demand response program Sahar Seyyedeh Barhagh; Amin Mohammadpour Shotorbani; Behnam Mohammadi-Ivatloo; Kazem Zare; Ali Farzamnia
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp1005-1013

Abstract

Microgrid energy systems are one of suitable solutions to the available problems in power systems such as energy losses, and resiliency issues. Local generation by these energy systems can reduce the role of the upstream network, which is a challenge in risky conditions. Also, uncertain behavior of electricity consumers and generating units can make the optimization problems sophisticated. So, uncertainty modeling seems to be necessary. In this paper, in order to model the uncertainty of generation of photovoltaic systems, a scenario-based model is used, while the robust optimization method is used to study the uncertainty of load. Moreover, the stochastic scheduling is performed to model the uncertain nature of renewable generation units. Time-of–use rates of demand response program (DRP) is also utilized to improve the system economic performance in different operating conditions. Studied problem is modeled using a mixed-integer linear programming (MILP). The general algebraic modeling system (GAMS) package is used to solve the proposed problem. A sample microgrid is studied and the results with DRP and without DRP are compared. It is shown that same robustness is achieved with a lower increase in the operation cost using DRP.
A Formal Model of Trust Chain based on Multi-level Security Policy Kong Xiangying; Zhuang Yi; Wang Xiaoxing
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3192
Theory of the Solution of Inventive Problems for Flexure Design in Micro-Electro-Mechanical Systems Huiling Yu; Shanshan Cui
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7202-7208

Abstract

In this paper detail of the optimization of a flexure design which is used in many MEMS devices will be presented. Due to a difference in thermal expansion coefficients between the flip-chip bonded MEMS device and the substrate, cooling after bonding can cause the MEMS to buckle; It is necessary to decrease the influence of distortion by using the correct material selection, welding method, weld design, fixture design, temperature control and TRIZ. We can seek out principles that can solve the problem. It can be concluded that an optimal flexure design will include the longest fold length and smallest fold spacing possible. By solving the deformation problem of MEMS devices can promote the development of flip chip technology, and make for the further application of the TRIZ theory in the study of forestry equipment.
New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission Mohamed Krim; Adda Ali-Pacha; Naima Hadj-Said
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp166-180

Abstract

While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.
Kinect-Based Physiotherapy and Assessment: A Comprehensive Review Fadilla ‘Atyka Nor Rashid; Nor Surayahani Suriani; Ain Nazari
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i3.pp1176-1187

Abstract

Kinect-based physical rehabilitation grows significantly as a mechanism for clinical assessment and rehabilitation due to its flexibility, low-cost and markerless system for human action capture. It is also an approach to provide convenience for for patients’ exercises continuation at home.  In this paper, we discuss a review of the present Kinect-based physiotherapy and assessment for rehabilitation patients to provide an outline of the state of art, limitation and issues of concern as well as suggestion for future work in this approach. The paper is constructed into three main parts. The introduction was discussed on physiotherapy exercises and the limitation of current Kinect-based applications. Next, we also discuss on Kinect Skeleton Joint and Kinect Depth Map features that being used widely nowadays. A concise summary with significant findings of each paper had been tabulate for each feature; Skeleton Joints and Depth Map. Afterwards, we assemble a quite number of classification method that being implemented for activity recognition in past few years.
Voltage sag compensation using direct converter based DVR by modulating the error signal S. Abdul Rahman; Estifanos Dagnew
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i2.pp608-616

Abstract

The aim of this paper is to present a modulation technique to achieve highest voltage sag compensation using direct converter based dynamic voltage restorer (DVR). The DVR topology proposed in this paper, has a direct converter and a series transformer. The direct converter is fabricated using only two bi-directional switches. The DVR is designed to compensate the sag in a phase by taking power from the same phase. The direct converter is connected between the series transformer and the line in which sag compensation is to be achieved. Conventionally, the PWM pulses for the direct converters are produced by comparing the error signal with the carrier signal. The error signal is obtained by comparing the amplitude of voltage in the line with the amplitude of the reference voltage. If the amplitude of the carrier signal is kept constant and the actual amplitude of error signal is used for PWM generation, it is possible to achieve only 22% of voltage sag compensation. But if the error signal amplitude is modulated according to the amplitude of existing voltage sag in the line, 52% of the voltage sag can be compensated with the THD less than 5%. Simulation results are presented for validating the analysis. 
K-means algorithm with level set for brain tumor segmentation Samah Abdelaziz; Songfeng Lu
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i2.pp991-1000

Abstract

Brain is a complicated structure consisting of millions of millions cells so that, it’s difficult to identify any diseases without using any computerized technology. Magnetic resonance imaging (mri) is one of the main assessments of brain tumors. One of the most important steps on medical image processing is segmentation. Segmenting brain mri images, which provide accurate information for the diagnosis and therapy decisions of brain tumors. We proposed to segment brain tumor mri images into three parts (wm (white matter), gm (gray matter), and background). The first algorithm is for applying median filtering on brain mri image for removing the noise from the image for achieving accurate results. The second algorithm is for applying k-means algorithm for accuracy in time consuming and for clustering into regions and  the third algorithm indicate the detecting the boundary of the image with the use of level set. By comparison, our proposed method, its efficiency to segment perfectly more than other previous used algorithms especially on time consuming.
Sufficient Authentication for Energy Consumption in Wireless Sensor Networks SK. Riaz; V. Srirammanoj
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp316-322

Abstract

Given the understanding of the prospective WSN programs and because of source restrictions, key management emerges as a complicated problem for WSNs. One of the main issues when developing a key management scheme is the system scalability. Indeed, the method should assistance a huge number of nodes to allow a large range implementation of the system. In this paper we implemented a performance trade-off research of power intake vs. We urbanized a novel probability style to evaluate the best redundancy stage in terms of direction redundancy (mp) and resource redundancy (ms), as well as the best attack identification configurations with regards to the number of voters (m) and the attack incantation interval under which the life-time of a heterogeneous wireless sensor network is optimized while fulfilling the stability, timeliness and protection specifications of question processing applications in the existence of untrustworthy wireless communication and harmful nodes. Lastly, we used our analysis outcomes to the style of powerful redundancy management criteria to recognize and implement the best design parameter configurations at playback in reaction to environment changes to extend the program life-time.
Mechanical Performance of Cup-spherical-shaped and Straight Form Braided Esophageal Stent Haixia Zhao; Ying Liu; Xiaoyu Ni; Fengming Xia; Xiao Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article introduces the application background and research overview of esophageal stent. The finite element models of two different forms of braided esophageal stent, such as cup-spherical-shaped and straight shaped, are created. Based on the configuration of material model selection and boundary condition, the stress and axial elongation of the stent with different wire numbers, different wire diameters and different leads are compared. The analysis results show that the maximum stress increases with the increase of the wire diameter and head, but decreases with the increase of the lead in straight stent while the maximal stress has a positive relationship with the wire diameter in cup-spherical-shaped stent. In the case the other parameters are the same, it is shown that the cup-spherical-shaped stent has the minimal stress when the crown number is 24. Meanwhile, the analysis results show that the lead has a great impact on the axial elongation of braided stent. In the case all parameters are the same, the axial elongation of cup-spherical-shaped stent is less than that of straight stent, which conclusively proves that the performance of cup-spherical-shaped stent is superior to that of the straight stent. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3512
Demand Forecasting Model of Port Critical Spare Parts Zhijie Song; Zan Fu; Han Wang; Guibin Hou
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 5: May 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Demand forecasting for port critical spare parts (CSP) is notoriously difficult as it is expensive, lumpy and intermittent with high variability. In this paper, some influential factors which have an effect on CSP consumption were proposed according to port CSP characteristics and historical data. And analytic hierarchy process (AHP) is used to sieve out the more influential factors. Combined with the influential factors, a least squares support vector machines (LS-SVM) model optimized by particle swarm optimization (PSO) was developed to forecast the demand. And the effectiveness of the model is demonstrated through a real case study, which shows that the proposed model can forecast the demand of port CSP more accurately, and effectively reduce inventory backlog. DOI : http://dx.doi.org/10.11591/telkomnika.v12i5.3238

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue