cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,226 Documents
A New Statistical Model to Estimate Information System Contingency Budget Junwei Zeng; Fajie Wei; Haitao Xiong; Anying Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Development of an information system is a complex process, which expose to a great number of risks.Hence, the high failure rates long associated with information system projects, despite advances in techniques for information technology development, suggest that organizations need to improve their ability to identify and to manage associated risks. To improve the risk management in information system development projects, a pragmatic procedure is suggested to determine the size of a project's contingency plan budget at any specified level of certainty. Considering the interaction among risk factors, a method based on common risk factors and copula functions is used to model and quantify positive dependence between risks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5438
Temperature Rise Comparison of Switchgear in SF6, N2, and Air Feng Hao; Zhang Junmin
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Based on the heat conduction equation, fluid flow governing equation and radiation heat transfer equation, a multi-physics coupled mathematical model is established, the convection heat transfer problem between solid and fluid is solved by wall function. The three dimensional thermal field in a type of switchgear filled respectively with SF6, N2, and air are calculated and analyzed to discuss the feasibility of using air or N2 as the substitution of SF6 by the finite volume method. The results show that the temperature field in three gases are similar in the switchgear. The temperature rise of current-carrying loop is the highest in SF6 and is the lowest in the air. So the conclusion could be made that air or N2 can replace SF6 as the insulating gas of switchgear on the perspective of temperature rise. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2217
Systematic review of aspects of DDoS attacks detection Silvia Bravo; David Mauricio
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp155-168

Abstract

Distributed Denial of Service attacks (DDoS) are one of the biggest problems facing the Internet. To eliminate this type of attack, the number of which has increased in the period under study, various methods of defense have been proposed. However a detection mechanism that is able to completely counteract the attacks has not yet been found. Therefore, detection and defense against DDoS attacks is of great importance for specialists engaged in computer security. This paper presents a systematic review of the scientific literature on methods of detecting DDoS attacks. From the literature the main aspects related to detection have been formulated. Six aspects for analysis in this investigation were identified: techniques, variables, tools, deployment location, point in time and detection accuracy. It was found that each technique used for the detection of attacks exploits certain characteristics of the network traffic, user requests and specific tools. Finally, it managed to identify the mechanisms that have the highest detection accuracy, such as the datasets they use. It has been concluded that an adequate analysis of the above aspects of detection of DDoS attacks can make a useful contribution to designing an appropriate strategy for neutralizing the attacks.
Improving Medical Adherence using Smart Medicine Cabinet Monitoring System S. A. Ishak; H. Zainol Abidin; M. Muhamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp164-169

Abstract

Patients at home may forget to take their medicines on time, miss doses or even take overdoses. This particularly applies to the elderly at home. Hence, this paper presents a monitoring system to improve the medical adherence which is based on Internet of Things (IoT) concept known as smart medicine cabinet monitoring system.  The system is proposed to remind the elderly to take their medicines on time, to ensure that the elderly have taken their medicines and to notify the family member of the elderly about their medication intake. This paper presents a method of monitoring the medication intake of the elderly which is based on IoT concept to display the data on the web database. The system uses an Arduino microcontroller, a toggle switch, LCD Display, limit switch, alarm system and a Wi-Fi module. The developed system is seen to be another alternative that would help the elderly especially who are living alone for their medication adherence to home-based treatment.
Glaucoma detection of retinal images based on boundary segmentation Noraina Alia Zainudin; Ain Nazari; Mohd Marzuki Mustafa; Wan NurShazwani Wan Zakaria; Nor Surayahani Suriani; Wan Nur Hafsha Wan Kairuddin
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i1.pp377-384

Abstract

The rapid growth of technology makes it possible to implement in immediate diagnosis for patients using image processing. By using morphological processing and adaptive thresholding method for segmentation of optic disc and optic cup, various sizes of retinal fundus images captured through fundus camera from online databases can be processed. This paper explains the use of color channel separation method for pre-processing to remove noise for better optic disc and optic cup segmentation. Noise removal will improve image quality and in return help to increase segmentation standard. Then, morphological processing and adaptive thresholding method is used to extract out optic disc and optic cup from fundus image. The proposed method is tested on two publicly available online databases: RIM-ONE and DRIONS-DB. On RIM-ONE database, the average PSNR value acquired is 0.01891 and MSE is 65.62625. Meanwhile, for DRIONS-DB database, the best PSNR is 64.0928 and the MSE is 0.02647. In conclusion, the proposed method can successfully filter out any unwanted noise in the image and are able to help clearer optic disc and optic cup segmentation to be performed.
A New Naive Bayes Text Classification Algorithm Duan Li-guo; Di Peng; Li Ai-ping
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aiming at the phenomenon that in text classification the calculation of prior probability is time-consuming and has little effect on the classification results and the error propagation of posterior probability affects the accuracy of classification, this paper improves the classical naïve bayes algorithm and proposes a new text classification algorithm which accelerates the speed by removing the calculation of prior probability and reduces the accuracy loss of error propagation by adding an amplification factor .The experiments prove that removing the calculation of prior probability can accelerate the classification speed obviously and has little effect on the classification accuracy, and adding an amplification factor in the calculation of posterior probability can reduce the effect of error propagation and improve the classification accuracy. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4180 
On the Security of a Dynamic and Secure Key Management Model for Hierarchical Heterogeneous Sensor Networks Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7459-7462

Abstract

With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the crucial important building block for all security goals in WSNs. Recently, Alagheband and Aref proposed a signcryption scheme and used it to construct a dynamic key management model for hierarchical heterogeneous sensor networks. They also proved that their signcryption scheme is provably secure if the elliptic curve discrete logarithm problem is infeasible. Unfortunately, by giving concrete attacks, we indicate that Alagheband and Aref’s signcryption scheme is not secure in their secure model. The analysis also shows that their key management model is not secure. To solve those weaknesses, we also proposed an improved signcryption scheme.
Distance Relay Impedance Measuring Problems in Presence of Wind Farms Farhad Namdari; Fatemeh Soleimani; Esmaeel Rokrok
Indonesian Journal of Electrical Engineering and Computer Science Vol 1, No 3: March 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v1.i3.pp464-479

Abstract

Environmental concerns along with the increasing demand on electrical power, have led to power generation of renewable sources like wind. Connecting wind turbines in large scale powers with transmission network makes new challenges like the impact of these renewable sources on power system protection. This paper studies the impact of fault resistance and its location on voltage and current fundamental frequencies of faulted lines connected to DFIG based wind farms and it will be demonstrated that because of the large differences between these frequencies, impedance measuring of distance relays is inefficient. Hence in these power systems using conventional impedance measurements is not suitable anymore and new impedance measuring approaches are required in distance relays.
Non-certainty Equivalent Adaptive Exciting Control of Multi-machine Power Systems Xiujuan Dong; Shengtao Li; Nan Jiang; Yuanwei Jing
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 7: July 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Transient stability problem for multi-machine infinite bus system with the generator excitation was addressed via the non-certainty equivalent nonlinear re-parameterization method. The system need not to be linearized. The damping coefficient uncertainty was considered. A non-certainty equivalent excitation controller and a novel parameter updating law were obtained simultaneously via adaptive backstepping and Lyapunov methods to achieve stability of the error systems. Simulation results showed that the proposed controller had good transient performance. DOI: http://dx.doi.org/10.11591/telkomnika.v11i7.2859 
Hadoop Security Challenges and Its Solution Using KNOX Sirisha N; Kiran K V D; R Karthik
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp107-116

Abstract

Big Data is a new technology and architecture. It can work on a very large volume of a variety of data with high-velocity, discovery, and/or analysis. Big Data is about the fast-growing sources of data such as web logics, Sensor networks, Social media, Internet text and documents, Internet pages, Search Index data, scientific research. Big data also formally introduces a complex range of analysis. Big data can evaluate mixed data (structured and unstructured) from multiple sources. As there are some security issues in big data which are no longer solved using the hashing techniques on large amount of data, this paper shows an idea of new approach of designing a Knox’ified Hadoop cluster.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 42, No 1: April 2026 Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue