cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
New design of Network on Chip Based on Virtual Routers Mohamed Fehmi Chatmen; Adel Baganne; Rached Tourki
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 1: April 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i1.pp115-131

Abstract

Network is considered the most convenient way to communicate between different IP integrated into the same chip. Studies have been developed to propose networks with improved performance in terms of latency, power consumption, throughput and quality of service. Most of these networks have been designed based on the 2-dimensional network structure. Recently, with the introduction of the new structure of 3D integrated circuits (3D IC), new works have used this type of circuit to design 3 dimensions on-chip networks. The advantage brought by this new structure is to reduce the average number of hops crossed from the source to the destination, which improves the throughput and the average latency of the network.
Cryptosystems using an improving hiding technique based on latin square and magic square Sahab Dheyaa Mohammed; Taha Mohammed Hasan
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i1.pp510-520

Abstract

Hackers should be prevented from disclosing sensitive data when sent from one device to another over the network. Therefore, the proposed method was established to prevent the attackers from exploiting the vulnerabilities of the redundancy in the ciphertext and enhances the substitution and permutation operations of the encryption process .the solution was performed by eliminates these duplicates by hiding the ciphertext into a submatrix 4 x4 that chooses randomly from magic square 16x16 in each ciphering process. Two techniques of encrypted and hiding were executed in the encryption stage by using a magic square size 3 × 3   and Latin square size 3 × 3 to providing more permutation and also to ensure an inverse matrix of decryption operation be available. In the hiding stage, the ciphertext was hidden into a 16×16 matrix that includes 16 sub-magic squares to eliminate the duplicates in the ciphertext. Where all elements that uses were polynomial numbers of a finite field of degree Galois Fields GF ( ).  The proposed technique is robust against disclosing the repetition encrypted data based on the result of Avalanche Effect in an accepted ratio (62%) and the results of the output of the proposed encryption method have acceptable randomness based on the results of the p-values (0.629515) of the National Institute of Standards and Technology (NIST) randomness tests. The work can be considered significant in the field of encrypting databases because the repetition of encrypted data inside databases is considered an important vulnerability that helps to guess the plaintext from the encrypted text.
Image Encryption on Mobile Phone Using Super Encryption Algorithm Emy Setyaningsih; Catur Iswahyudi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 4: August 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to obtain the digital image encryption algorithm with a simple but secure process, fast and efficient computing resources. The algorithms developed in this study were super-encryption algorithm that combines two of cipher called Playfair cipher and the Vigenere cipher. To improve security, a keystream generator was used to randomize the order of the next key in Vigenere cipher. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests were implemented with Matlab included visual test and histogram analysis, information entropy, encryption quality, correlation analysis, and also time analysis. The test results show that cipher  image looks visually random.The image histogram of the plain image and cipher image also seen a significant difference between the two of them. Testing was also performed on mobile phones with Symbian and BADA operating system based on Java Micro Edition Programming. Trial results show that the algorithm was require less computational resources; with average time for image encryption is 3.76 seconds, and the average time  for image decryption is 0.97 seconds. The new proposed image encryption scheme has satisfactory security which makes it a potential candidate for encryption of image data. Keywords:  Image encryption, Vigenere cipher, Playfair cipher, Security test DOI: http://dx.doi.org/10.11591/telkomnika.v10i4.875
Performance Study of IEEE 802.15.4 under OPNET Modeler for Wireless Sensor Networks Rania Khadim; Mohammed Erritali; Abdelhakim Maaden
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp98-105

Abstract

The IEEE 802.15.4 protocol has recently been adopted as a communication standard for low-rate wireless personal area networks (LR-WPANs) due to its low data rate, low power consumption and low cost of Wireless Personal Area Networks. This protocol is quite flexible for a wide range of applications if appropriate tuning of its parameters is carried out. Importantly, the protocol also provides real-time guarantees by using the Guaranteed Time Slot (GTS) mechanism. Indeed, the GTS mechanism is quite attractive for Wireless Sensor Network (WSN) applications. The main objective of this paper is to investigate the performance of BPSK (Binary phase shift keying) and QPSK (Quadrature phase shift keying) modulation techniques. Investigations have been reported to compare the performance of the two modulation schemes. Here modulation schemes have been identified which gives significant performance improvement over the other based on network output load, energy consumption and power reception at the WPAN devices. The results have been presented Pan_Coordinator, GTS and Non GTS End Device (CAP device) of Wireless Sensor Network (WSN).
Parameter Designing for Heave Compensation Hydraulic System Installed in Deepwater GU Lei; Tan Jiawan; Zhao Teng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: January 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The function diagram of active heave compensation hydraulic system has been given, besides, the mathematics model for the principal hydraulic components of the compensation system has been built, and the input-output relation between components has been made clear. Aimed at compensating work capacity for the system, design and research on parameters as the bearing pressure, the initial state and the maximum flow of hydraulic cylinder, accumulator and other principal components have been made separately, and standardized design has been accomplished in accordance with relevant standards. Furthermore, calculus and verification for the capacity of the hydraulic system in different working stages have been made in order to calculate the pressure lose of the system and provide objective data for the hardware system design of the hydraulic components of the heave compensation system. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1902
U-slot Circular Patch Antenna for WLAN Application Arshad Wahab; Jiadong Xu
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 2: May 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A dual-frequency microstrip patch antennas has been presented and used for 802.11WLAN applications. The antennas had been designed, simulated and parametrically studied in CST Microwave studio. By introducing u-slot, dual-band operation with its operating mode centered at frequency 2.4GHz, 3.65GHz and 5.2GHz had been obtained. The gain and directivity had been improved by adjusting the parameters of the antennas. The gain of the proposed designs was 6.019dBi, 4.04dBi and 6.22dBi and directivity was 6.02dBi, 4.05dBi and 6.22dBi at resonant frequencies 2.4GHz, 3.6GHz and 5.2GHz respectively. The patch antennas had been proposed to be used in portable devices that require miniaturized constituent parts. DOI: http://dx.doi.org/10.11591/telkomnika.v14i2.7479 
An Approach to Detect Malicious Behaviors by Evading Stalling Code Chao You; Jianmin Pang; Yichi Zhang; Chao Dai; Xiaonan Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 7: November 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since malwares contain stalling codes, malicious behaviors can’t be detected in emulated analysis environment. This paper proposes an approach to detect malicious behaviors by evade stalling codes. First, we executed a malware in the emulated analysis environment, and saved every executed instruction in a trace file; Second, we began to detect stalling codes with the trace file, and constructed stalling code evasive points; At last, we executed the malware again and evade stalling codes with the evasive points, and then the malicious behaviors detected. It has been proven by experiments that the approach can evade stalling codes to detect the later malware behaviors effectively, and improve the performance of detecting the malicious behaviors in the emulated analysis environment. DOI: http://dx.doi.org/10.11591/telkomnika.v10i7.1573
1 Slash 100%: gamification of mathematics with hybrid QR-based card game Ong C. Yung; Syahrul N. Junaini; Ahmad A. Kamal; Laili F. Md Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1453-1459

Abstract

Mathematics is vital in our life and society. However, gamification of mathematics is rare for topics such as fractions and decimals. This paper presents the development of an educational mathematics game called one slash one hundred percent (1 Slash 100%). It is the hybridization of the conventional card game and quick response (QR). This research aims to study how the respondents explore the card game to master decimal, fraction and percentage. The testing was conducted among secondary school students in Kuching, Sarawak, Malaysia (n=12; age=14). The respondents were asked to answer a set of questions in pre-test and post-test question. The results are promising where the analysis showed a significant difference between pre-test (M=14.3, SD=2.103) and post-test scores (M=17.6, SD=2.234). Thus, gamification of mathematics using the hybrid card game increases their mastery of decimal, fraction and percentage.
Arithmatic Coding Based Approach for Power System Parameter Data Compression Subhra J. Sarkar; Nabendu Kr. Sarkar; Trishayan Dutta; Panchalika Dey; Aindrila Mukherjee
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp268-274

Abstract

For stable power system operation, various system parameters like voltage, current, frequency, active and reactive power etc. are monitored at a regular basis. These data are either stored in the database of the system or transmitted to the monitoring station through SCADA. If these data can be compressed by suitable data compression techniques, there will be reduced memory requirement as well as lower energy consumption for transmitting the data. In this paper, an algorithm based on Arithmetic Coding is developed for compressing and decompressing such parameters in MATLAB environment. The compression ratio of the algorithm clearly indicates the effectiveness of the algorithm.
Reliable data transmission: An IoT health-based paradiam Dalal Abdulmohsin Hammood; Mahmoud Shuker Mahmoud; Ahmed Alkhayyat; Hasliza A. Rahim; R. Badlishah Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp924-931

Abstract

A WBAN can be spread over a person's body, so; posing, dressing, moving of muscles, degree of heat of bodies as well as weather changes in general affect connections among sensors as well as desired point. Secondly, information collected via every sensor can be connected to a person's course of life; so, it can be considered as significant to guarantee that the collected information ought to be given to desired point competently. In this work, a critical cooperating communicating protocol to WBAN established on information has been suggested, called critical data transmission using transmission mode selection (CD-TMS) method established for the architecture of star topology. In the beginning, we performed a studying, also we established a system model can be looked at according to channel los of path, effective transmitting possibility, as well as the out of work time possibility. Thirdly, relaying selecting can be used accompanied by CD-TMS, that lets just the most successful relaying take part in cooperating in a spread manner. Simulating as well as numeral outcomes illustrate that CD-TMS has the ability to develop the performing of a network under common terms comparing with direct transmission mode (DTM) IEEE 802.15.6 CSMA as well as benchmark.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue