cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
Enhancing advance encryption standard security based on dual dynamic XOR table and MixColumns transformation Adnan Ibrahem Salih; Ashwaq Mahmood Alabaichi; Ammar Yaseen Tuama
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1574-1581

Abstract

An efficient approach to secure information is critically needed at present. Cryptography remains the best approach to achieve security. On this basis, the national institute of standards and technology (NIST) selected Rijndael, which is a symmetric block cipher, as the advanced encryption standard (AES). The MixColumns transformation of this cipher is the most important function within the linear unit and the major source of diffusion. Dynamic MixColumns transformation can be used to enhance the AES security. In this study, a method to enhance the AES security is developed on the basis of two methods. The first method is an extension of a previous study entitled “A novel Approach for Enhancing Security of Advance Encryption Standard using Private XOR Table and 3D chaotic regarding to Software quality Factor.” In the current study, the fixed XOR operation in AES rounds is replaced with a dual dynamic XOR table by using a 3D chaotic map. The dual dynamic XOR table is based on 4 bits; one is used for even rounds, and the other is used for odd rounds. The second method is dynamic MixColumns transformation, where the maximum distance separable (MDS) matrix of the MixColumns transformation, which is fixed and public in every round, is changed with a dynamic MDS matrix, which is private, by using a 3D chaotic map. A 3D chaotic map is used to generate secret keys. These replacements enhance the AES security, particularly the resistance against attacks. Diehard and NIST tests, entropy, correlation coefficient, and histogram are used for security analysis of the proposed method. C++ is used to implement the proposed and original algorithms. MATLAB and LINX are used for the security analysis. Results show that the proposed method is better than the original AES.
A high performance grid connected PV system based on HERIC transformerless inverter Essam Hendawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp602-612

Abstract

This paper presents an effective single phase grid connected photovoltaic PV system based on High Efficiency and Reliable Inverter Concept HERIC transformerless inverter. Dc-dc boost converter controlled by incremental conductance IC maximum power point tracker MPPT is employed to achieve the maximum extraction power of the PV panels. Proportional integral PI controller controls the output voltage of the boost converter to meet the utility grid requirements. LCL filter is utilized to keep the inverter voltage very close to sinusoidal shape. Employing the HERIC transformerless inverter reduces significantly the ground leakage current beyond safe limits. Semiconductors losses are studied to investigate the efficiency of the proposed system at different insolation levels. Simulation results verify the high performance of the proposed system when considering leakage current and system efficiency.
Implementation of a bit permutation-based advanced encryption standard for securing text and image files Heidilyn V Gamido
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1596-1601

Abstract

The paper proposes a modification of the advanced encryption standard (AES) to address its high computational requirement steaming from the complex mathematical operations in the MixColumns Transformation which makes the encryption process slow. Bit Permutation was used instead of the MixColumns Transformation since the use of bit permutation in an encryption algorithm achieves efficiency by providing minimum encryption time and memory requirement. Results of the study showed that the modified AES algorithm exhibited faster encryption by 18.47% and faster decryption by 18.77% for text files. The modified AES algorithm also resulted to 16.53% higher avalanche effect compared with the standard AES thus improving the security performance. Application of the modified AES in encrypting images in Cipher Block Chaining mode showed that the modified algorithm also exhibited 16.88% faster encryption and 11.96% decryption compared with the standard AES. Likewise, modifying the algorithm achieved the ideal result in the histogram analysis, information entropy, the correlation coefficient of adjacent pixels to resist statistical attack.  The ideal value in number of pixels change rate and unified average change intensity were also achieved making the modified algorithm resistant to differential attack. These results show that modifying AES by using bit permutation to replace MixColumns Transformation was able to address the high computational requirement of the algorithm resulting in a faster and more secure encryption algorithm for text files and images.
Adaptive random testing with total cartesian distance for black box circuit under test Arbab Alamgir; Abu Khari A’ain; Norlina Paraman; Usman Ullah Sheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp720-726

Abstract

Testing and verification of digital circuits is of vital importance in electronics industry. Moreover, key designs require preservation of their intellectual property that might restrict access to the internal structure of circuit under test. Random testing is a classical solution to black box testing as it generates test patterns without using the structural implementation of the circuit under test. However, random testing ignores the importance of previously applied test patterns while generating subsequent test patterns. An improvement to random testing is Antirandom that diversifies every subsequent test pattern in the test sequence. Whereas, computational intensive process of distance calculation restricts its scalability for large input circuit under test. Fixed sized candidate set adaptive random testing uses predetermined number of patterns for distance calculations to avoid computational complexity. A combination of max-min distance with previously executed patterns is carried out for each test pattern candidate. However, the reduction in computational complexity reduces the effectiveness of test set in terms of fault coverage. This paper uses a total cartesian distance based approach on fixed sized candidate set to enhance diversity in test sequence. The proposed approach has a two way effect on the test pattern generation as it lowers the computational intensity along with enhancement in the fault coverage. Fault simulation results on ISCAS’85 and ISCAS’89 benchmark circuits show that fault coverage of the proposed method increases up to 20.22% compared to previous method.
Temperature effect of electronic nose sampling for classifying mixture of beef and pork Sinarring Azi Laga; Riyanarto Sarno
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1626-1634

Abstract

Strong demand and strong price of raw foodstuffs like beef was commonly used in conventional markets by beef dealers to commit fraud in order to gain larger income. The fraud has been in the form of combining beef and pork. In Indonesia, this has been a issue of food health in recent years. Via scent, some food safety concerns can be expected. By using electronic nose that is equipped with electrochemical and air sensors  such as temperature sensors, strain, and humidity to find the pure beef or mixed beef. According to its selectivity, the sensor can detect gas to make small icurrents that are the result of chemical sensor and gas interactions with oxygen .In this study, the classification method k-NN, SVM, Naïve Bayes, and random forest was used in 5 different meat variations with a ratio of 0%, 10%, 50%, 90% and 100% with temperatures of -22°C, room temperature, and 55°C. The results showed the effect of temperature on increasing the accuracy, which is at a temperature of -22°C. The lower the temperature, the more stable the value obtained by electronic nose. At a temperature of -22°C, the method that produces the highest accuracy is the Random Forest method.
A smart login system using face detection and recognition by ORB algorithm Mohammad Jahangir Alam; Tanjia Chowdhury; Md. Shahzahan Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp1078-1087

Abstract

We can identify human faces using a web Camera which is known as Face Detection.  This is a very effective technique in computer technology. There are used different types of attendance systems such as log in with the password, punch card, fingerprint, etc. In this research, we have introduced a facial recognition type of biometric system that can identify a specific face by analyzing and comparing patterns of a digital image.  This system is the latest login system based on face detection. Primarily, the device captures the face images and stores the captured images into the specific path of the computer relating the information into a database. When any body tries to enter into any room or premises through this login system, the system captures the image of that particular person and matches the image with the stored image. If this image matches with the stored image then the system allows the person to enter the room or premises, otherwise the system denies entry. This face recognition login system is very effective, reliable and secured. This research has used the Viola and Jones algorithm for face detection and ORB for image matching in face recognition and Java, MySql, OpenCV, and iReport are used for implementation.
Filtering and analyzing normal and abnormal electromyogram signals S. Elouaham; A. Dliou; Mostafa Laaboubi; R. Latif; N. Elkamoun; H. Zougagh
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i1.pp176-184

Abstract

The electromyogram (EMG) is an important measurement to assess the health of muscles and the nerve cells that control them. The appearance of noise in electromyography (EMG) signals may unquestionably minimize the efficiency of the analysis of the signal. The denoising techniques are inevitable for minimizing noise affecting the EMG signals; these methods are complete ensemble empirical mode decompositions with adaptive noise (CEEMDAN) and the ensemble empirical mode decomposition (EEMD). After that, we analyze these signals by time-frequency techniques as Adaptive optimal kernel (AOK) and Choi-Williams. Firstly, the obtained results illustrate the effectiveness of the CEEMDAN that permits reducing noise that interferes with normal and abnormal EMG signals with higher resolution than other techniques used as EEMD. Secondly, they show that the AOK technique is adapted to the detection and classification of these types of normal and abnormal EMG signals by the good localization of the motor unit action potentials (MUAPs) in the time-frequency plan. This paper shows the efficiency of the combination of the AOK and CEEMDAN techniques in analyzing the EMG signals. 
Temperature Control of Liquid Filled Tank System Using Advance State Feedback Controller Kunal Chakraborty; Sankha Subhra Ghosh; Rahul Dev Basak; Indranil Roy
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 2: May 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper modeling of a temperature measuring tank system has been done and then a Advance state Feedback Controller have been used for controlling the step responses of the system. The proposed system extends to a three tank system and each tank has same amount of liquid. The results of computer simulation for the system with Advance state Feedback is shown. DOI: http://dx.doi.org/10.11591/telkomnika.v14i2.7644
A New Collaborative Spectrum Sensing Method Based on SNR Wang Zhenchao; Ma Chao; Wang Zhe
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 7: November 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Collaborative sensing is an important technology in cognitive radio(CR). According to the influence of signal-to-noise ratio(SNR) of sensing signal to the result of the detection, this paper discusses a new collaborative algorithm for the spectrum sensing based on SNR. It groups the cognitive users according to the SNR of the signal, and processes the test results of each group using “OR” guideline and “AND” guideline respectively. Finally, combine the results of each group reusing “OR” guideline. Numerical analysis and computer simulations show that the algorithm can improve the credibility of spectrum detection, because it has the characteristics of the detection conclusion of every cognitive user. Compared with the traditional algorithm, the simulation results prove the algorithm is more effective in improving the detection probability. DOI: http://dx.doi.org/10.11591/telkomnika.v10i7.1567
Design of IMC-PID controller with fractional-order filter for steam distillation essential oil extraction process Siti Nur Hasinah Binti Johari; Mohd Hezri Fazalul Rahiman; Najidah Hambali; Ramli Adnan; Mazidah Tajjudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp801-810

Abstract

Essential oils are one of the industry's major compounds, particularly in the pharmaceutical, perfume and food sectors. They were acquired using several methods such as steam distillation. In this method, heat from the steam will release the aromatic molecule at their specific boiling points. Thus, it is important to regulate the steam temperature at the correct level to get the perfect composition of the yield. Many studies have shown that essential oil is volatile and sensitive to excess heat. In order to maintain the desired steam temperature, this study proposed an internal model control (IMC) based PID with fractional-order filter as a controller for this system. IMC is a model-based control structure that can handle parameter variations and load disturbance very well. With the inverse model imposed in the loop, IMC can gain a perfect tracking control as well. The implementation of a fractional-order filter cascaded to the PID controller may enhance the system robustness to process gain with its iso-damping properties. This study was conducted by simulation using MATLAB R2018. The step response of the closed-loop system has been evaluated with varying filter parameters depending on the desired phase margin of the open-loop reference model.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue