Articles
9,226 Documents
Numerical Simulation of 1-D and 2-D Continuous Geo-electrical Magnetotelluric Forward
Cao Chuang Hua;
Liu Jian Xin;
Tong Xiao Zhong;
Gao Da Wei
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Finite element technology in one-dimensional layered media of the continuous electro-media and the two-dimensional continuous electrical is displayed in ways of the special matrix equations in the variation formula and split technical conditions. To achieve a one-dimensional layered continuous electrical finite element numerical simulation of the media, the introduction of the secondary triangulation rectangular subdivision has been used to the two-dimensional numerical simulation, and using the rectangular center to set up the virtual point method to reduce the computational workload in calculation. Then design a meaningful manner electric model, the base power model analysis of electromagnetic waves in the rock, they all provide the guidance for the actual production. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2717
Solving assembly line balancing problem using heuristic: a case study of power transformer in electrical industry
Nurhanani Abu Bakar;
Mohammad Fadzli Ramli;
Mohd Zakimi Zakaria;
Tan Chan Sin;
Hafiz Masran
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i2.pp850-857
Currently, problem in assembly line has created so much attention, particularly in manufacturing area. Similar to this case study as they faced with problems regarding workstation in production line of electrical industry. There exist some cases where workstations in assembly line are experienced with bottleneck and suffered from high idle time. Thus, four heuristic methods are used for minimizing number or workstations and improve the bottleneck problems at the same time. In this case study, LCR, RPW and LPT have successfully minimized the number of workstations from 19 to 16. This solution has affected the layout of assembly line. Different from SPT that manage to improve the bottleneck among workstations by reducing number of workstations from 19 to 17 without changing the line layout. Therefore, both solution has brought an option for an engineer to choose which decision to be used in this assembly line in order to increase the line efficiency.
An ECG Compressed Sensing Method of Low Power Body Area Network
Xiangdong Peng;
Hua Zhang;
Jizhong Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Aimed at low power problem in body area network, an ECG compressed sensing method of low power body area network based on the compressed sensing theory was proposed. Random binary matrices were used as the sensing matrix to measure ECG signals on the sensor nodes. After measured value is transmitted to remote monitoring center, ECG signal sparse representation under the discrete cosine transform and block sparse Bayesian learning reconstruction algorithm is used to reconstruct the ECG signals. The simulation results show that the 30% of overall signal can get reconstruction signal which’s SNR is more than 60dB, each numbers in each rank of sensing matrix can be controlled below 5, which reduces the power of sensor node sampling, calculation and transmission. The method has the advantages of low power, high accuracy of signal reconstruction and easy to hardware implementation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3995
Clustering Techniques for Software Engineering
Shohag Barman;
Hira Lal Gope;
M M Manjurul Islam;
Md Mehedi Hasan;
Umme Salma
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 2: November 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i2.pp465-472
Software industries face a common problem which is the maintenance cost of industrial software systems. There are lots of reasons behind this problem. One of the possible reasons is the high maintenance cost due to lack of knowledge about understanding the software systems that are too large, and complex. Software clustering is an efficient technique to deal with such kind of problems that arise from the sheer size and complexity of large software systems. Day by day the size and complexity of industrial software systems are rapidly increasing. So, it will be a challenging task for managing software systems. Software clustering can be very helpful to understand the larger software system, decompose them into smaller and easy to maintenance. In this paper, we want to give research direction in the area of software clustering in order to develop efficient clustering techniques for software engineering. Besides, we want to describe the most recent clustering techniques and their strength as well as weakness. In addition, we propose genetic algorithm based software modularization clustering method. The result section demonstrated that proposed method can effectively produce good module structure and it outperforms the state of the art methods.
Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography
Raihan Sabirah Sabri;
Roshidi Din;
Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i2.pp761-767
In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The effectiveness of evaluation itself is mainly determined by the performance aspect or critera such as capacity, imperceptibility or security. The aim of this paper is to present a review on trends for existing performance metrics used in extraction schemes from a data hiding framework. This review is hoped to help future research in evaluating the performance of data hiding framework in general and the proposed extraction schemes in specific.
Hybrid control strategies of SVC for reactive power compensation
Mothanna Sh. Aziz;
Ahmed G. Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i2.pp563-571
This article shows a prospective utilizations of flexible AC transmission system (FACTS) controls, like the static VAR compensator (SVC). One of the major motives for setting up an SVC is to recover dynamic voltage controller and thus increase system load aptitude. Static VAR compensator system proposed in this work consists of thyristor switched capacitor and thyristor controlled reactor sets, this style of SVC modelled using MATLAB simulink toolbox. A hybrid genetic algorithm with PI and fuzzy logic controls that used to control and expand the grid performance of the power system. The model results reveal that the Static Var Compensation contribute a decent result in upholding bus voltage after the power network is in an active and steady moment, besides it has a capability of the constancy control. It can totally work as a significant plan of reactive power recompense in power networks.
Research of the Real-time Database in Embedded Configuration Software
Wang Xiujuan;
Li Xiaobing;
Cheng Meng;
Chen Yutang;
Zhang Zhongxin;
Cai Xiuyun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 4: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In recent years, the application of embedded technology and configuration technology in industrial control is more and more widely. The embedded configuration software which is combined of embedded and configuration has become the inevitable trend in industrial control field. Real-time database system as the core of embedded configuration software, the organizational structure whether reasonable and effective is directly related to the performance of the whole system, affecting field devices real-time communication and data transmission in graphic display interface. Based on a large number of configuration-related papers, this paper deeply researched the real-time database and using three layer storage structures which consist of shared memory, file system and general database. It improves the access efficiency of real-time database and data reliability in a timely manner. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4778
Using infrared radiation in preparation of feed for farm livestock
T Senthilkumar;
Ekaterina I. Reshetnik;
Vyacheslav G. Evdokimov;
Lyubov I. Perepelkina;
Zoya F. Krivuca;
Yulia R. Samarina;
Evgeniy E. Kuznetsov;
Natalia A. Kuznetsov
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i1.pp148-154
The article in hand describes a processing line for preparation of feed for farm livestock and the design of an infrared drying unit integrated into this line. The main objective of this study is to find ways to provide a full-value feeding of farm animals throughout the calendar year. At present, there are various methods for preserving feed proposed with the aim of providing a full-fledged diet. However, following the recommendations for feed storage according to the recommended conditions, as a rule, results in high losses of its total weight and nutritional properties due to a long winter period with low-temperature regimes, typical of the Amur Region of Russia. This article presents the results of the study of a prospective processing line for the preparation of feed for long-term storage, which ensures the preservation of their basic nutritional properties, with an integrated infrared drying unit.
Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi
Albert Sagala;
Deni Parlindungan Lumbantoruan;
Epelin Manurung;
Iroma Situmorang;
Adi Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp526-532
In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.
A Prioritized Test Generation Method For Pair-wise Testing
Yu Wang;
Hao Wu;
Zhenyu Sheng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: January 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The most sufficient test methods are based on a test case set which covers all combinations of parameters. However, the scale of test cases is always too large and their cost cannot be accepted. People will first consider the implementation of critical test cases. Even if the test is terminated suddenly, the test cases of high importance will have been executed. It improves the testing efficiency while securing the detection rate of defect. The contribution of this paper is how to generate pair-wise testing cases with a priority. Firstly, We design formulas to compute the weights of priorities. Secondly, we adopt a greed algorithm to solve the combined testing problems. Furthermore, we integrate the greed strategy into a genetic algorithm which makes the most efficient testing in critical parameters and their sets, and ensures its detection rate of defect under limited resources. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1880