cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
An Efficient Power Management Algorithm for a Micro Grid B. Sireesha; Y. Nagaraja
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper displays a micro grid comprising of distributed generation (DG) units (DG) units that are joined with the conveyance framework. A vitality administration calculation is actualized to arrange the operations of the various DG units in the micro grid for framework joined during grid connected and islanded operations. The proposed micro grid comprises of a photovoltaic (PV) cluster which works as the essential era unit of the micro grid furthermore a proton-trade layer energy component to supplement the variability in the force produced by the PV show. A lithium-particle capacity battery is joined into the micro grid to alleviate top requests amid lattice associated operation and to adjust for any lack in the created force amid islanded operation.The outline idea is checked through different test situations to exhibit the operational capacity of the proposed micro grid, and the acquired results are talked about. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.7912 
Application of Fault Detection based on Hybrid Intelligent Methods Na Chen; Shaopu Yang; Cunzhi Pan
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

How to collect information optimally by scheduling a limited number of sensors is one of the key technologies of safety monitoring for large mechanical equipment systems. In this paper, an improved model of Pulse Coupled Neural Network is used for the discretization algorithm of continuous features. And based on classificatory error parameter and approximate dependence degree in Variable Precision Rough Sets theory, a VPRS data model is created by utilizing the measured signals from the multi-sensor Bridge Erecting Machine Safety Monitoring System. Then the corresponding relations between time-frequency characteristics and operating condition classifications are analyzed. Finally, while the determinability of decision making analysis is enhanced, the validity order of safety monitoring information of the multi-sensor sampling points is gained, which can direct optimal scheduling of position of sensors in large-scale mechanical equipment systems. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1634
A Review on Back-to-Back Converters in Permanent Magnet Synchronous Generator based Wind Energy Conversion System Karthikrajan Senthilnathan; K. Iyswarya Annapoorani
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i3.pp583-591

Abstract

This paper presents a review on the application of back-to-back converters in the field of Permanent Magnet Synchronous Generator (PMSG) based Wind Energy Conversion Systems (WECS). The wide applications of the back-to-back converters are power conditioning devices, micro grid, High Voltage Direct Current (HVDC), Renewable energy systems. The intention is to present an overview about the design considerations taken by various researchers in back-to-back converters in the field of Wind Energy Conversion Systems (WECS) and recent developments on it. Generally the configuration of back-to-back converters used are 12 pulse Voltage Source Converters (VSC), 12 pulse Current Source Converter (CSC), 9 Pulse Voltage Source Converter.
The design of the MISO Model Predictive Controller for Bioreactor FAN Liping; ZHANG Jun; HUANG Xing; HUANG Dong
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 6: October 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bioprocesses have the inherent characteristics of high nonlinearity, parameter uncertainty and information imperfection. These specific natures may cause some difficulties in control. Jacobian linearization method was used in this paper to linearize the bioreactor model firstly, and then a Multiple-input and single output (MISO) model predictive controller was designed for the reactor. PID controller and fuzzy-PID controller was also introduced to compare with the MPC controller. Simulation results prove that the model predictive control has several advantages over the other controls for bioreactors. DOI: http://dx.doi.org/10.11591/telkomnika.v10i6.1444
Implementation of space vector modulation for two level three-phase inverter using dSPACE DS1104 Ismail Bouyakoub; Rachid Taleb; Hacene Mellah; Abdelaziz Zerglaine
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp744-751

Abstract

With increasing research and advancement in solid-state power electronic devices and microprocessors, various inverter control techniques employing pulse width modulation (PWM) are becoming popular especially in AC motor drive applications. The most commonly used techniques are sinusoidal PWM (SPWM) and space vector modulation PWM (SVPWM). SVPWM is considered to be superior to the SPWM because of better DC bus utilization. In this paper, a real-time digital implementation of SVPWM algorithm for three-phase two level inverter using dSPACE DS1104. The results obtained from the experimentation are closer to that of simulation, which confirms the validity of the implemented algorithm.
Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks Mohammed Ali Hussain
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless sensor network (WSN) consists of a small size sensor nodes depends on battery power. Applications of sensor networks are street lighting, home automation, industrial plant, environmental parameters, health care and military. Security is becoming a major concept in the design of wireless sensor networks. Attacks on sensor networks include attack on confidentiality, integrity and availability. Lack of confidentiality means that the secret information is revealed to attackers. Lack of integrity means that the attacker modifies the contents (data) communicated in the sensor network. Lack of availability means the resources in the network is not available to authorized users. So to avoid these problems we need better security measures. In this paper we are dealing with intrusion detection. Intrusion detection plays an important role in the design of wireless sensor networks. An intruder can perform various attacks like replay, interception, worm hole, sink hole attacks. So our aim in this paper is to find such intrusions as early as possible, when they occurred and to enhance the life tome of the sensor network. This is because sensors nodes depend only on battery power. Our intrusion detection is based on clustering of the sensor network. This makes routing process, medium control and intrusion detection simple. DOI:  http://dx.doi.org/10.11591/telkomnika.v15i1.8072 
Experimental Study on Pedestal’s dynamic amplifying in UHV Electrical Equipment LU Zhi-cheng; CUI Cheng-chen; ZHU Zhu-bing
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Simulation earthquake shaking table tests on the system of ultra high-voltage electrical equipment mounted on pedestals are carried out in order to study the dynamic amplifying effect of the pedestal in the system. The relationship between the dynamic responses of the system and main influence factors is studied by means of changing frequencies or stiffness and masses of the system under the driving function of several different earthquake waves. The studied results show that the dynamic amplifying effect of the pedestal in the system or the pedestal amplifying coefficient has close relationship with the stiffness and masses distributing or the frequencies of the system. Some regular and universal conclusions are obtained, and the suggested scale on the dynamic amplifying coefficient of the pedestal in the system is put forward, which provides reference for future design and engineering application on the ultra high-voltage electrical equipment with pedestal. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1647
Making a Cloud Data Secure and Effective for Better Performance of Services Sangeet Mishra; Asis Kumar Tripathy; Pallavi Joshi
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i3.pp695-702

Abstract

Cloud data security is one of the major and crucial concern in everyday life. Now a days cloud computing is emerging as vast and fastest growing technology depending on the usage. Cloud computing does not allow to keep data at user site and thus a data security is concerned to be a major challenging task regarding data storage. This paper overall describes the monitoring of the cloud data concerning data storage. In this paper we proposed a new methodology that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud. Our proposed technique provides data security by using the third party monitoring system which acts as an interface between the cloud consumer and cloud owner. Basically third party monitors the each and every activity of the cloud consumer and based upon his performance he respond to the cloud owner for taking decision. Our proposed concept provides the security from consumer point of view and owner side of view making the flexibility to the cloud infrastructure. Existing work focus mainly on security from owner side of view that not well fitted into the lifecycle of data security.
Plaintext Related Two-level Secret Key Image Encryption Scheme Yong Zhang; Jiali Xia; Peng Cai; Bin Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 6: October 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist the existing cryptanalytic attacks. DOI: http://dx.doi.org/10.11591/telkomnika.v10i6.1599 
An efficient traffic contention and control mechanism to improve QoS in heterogeneous wireless sensor networks Kavitha Ganesh; P. Latchoumy; A. Sonya
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp968-975

Abstract

Heterogeneous wireless sensor networks (HWSN) gathers information from a cooperative network. In HWSN, the sensor nodes are scattered and the major challenges are topology control, battery optimization, packet loss and link lifetime. The existing techniques do not concentrate on all the mentioned issues. The objective of this work is to provide congestion-free data transfer with higher throughput and increased packet delivery ratio. In the proposed methodology, three protocols are designed and developed, namely, hop by hop rate adjustment protocol (HHRA), energy efficient data transfer protocol (EEDT) and alternative routing congestion control protocol (ARCC). The HHRA protocol senses the traffic in the channel and adjusts the transmission rate accordingly to avoid congestion. Secondly, the EEDT protocol is used to find specific nodes that are more efficient and transfer packets through those nodes to improve throughput. The ARCC protocol is used to redirect the path of transmission during the occurrence of congestion. Thus, the proposed traffic contention and control mechanisms ensures congestion free transmission and increases the packet delivery ratio by 23% and average throughput by 20% compared to the dynamic contention window based congestion control (DCWCC) algorithm. 

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue