cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
Train Schedule Adjustment Strategies for Train Dispatch Huaqing Mao; Zhu Li
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 5: May 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Train schedule adjustment is the identity of key components of Train Dispatch System. Manually arranging the time table is a time-consuming and error-prone process. In this work, we mainly discuss three strategies of train schedule adjustment in train dispatch. First, we propose a new algorithm to calculate the maximum traffic capacity of freight-train in Beijing-Shanghai railway. We use a VMM (Vacancy Maximum Matching) grid to find the vacancy time table of freight-train base on the passenger train schedule, and solve the possible time sequence of freight-train by searching the bottleneck of freight-train traffic capacity. Second, we study the special circumstances in China when the spring transport or the Golden Week comes. It is necessary to put on extra passenger trains, and in order to arrange the extra passenger trains, we set up a double objective model, and the experiment shows that all the extra passenger trains arrive at the terminus within 20 hours. Finally, for the speed raising adjustment or train reschedule, we propose the SIA (Schedule inherited adjustment) algorithm to reschedule the freight-train time table. We compare the results of the SIA algorithm with that of the regular method, and find that the SIA leads to better results. DOI: http://dx.doi.org/10.11591/telkomnika.v11i5.2483
Research of IOTs Complex Event for Supply Chain Application Li Juntao; Cheng Xiaolin; Lin Gang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to solve the logic fault of Internet of things technology applied in the supply chain system, this paper presents processing framework which is based on the context of complex event processing technology.At first, paper analysis the hierarchy of processing framework oriented supply chain applications, and then put forward the situation model of event flow based on complex event, including the establishment of the model, the definition of the event as well as the event description language.The context-aware framework based on complex event processing technology can solve the problem that the underlying data cannot be used efficiently bythe upper, which is proved bya typical case existingin the supply chain.As a result, it can improve the reaction speed of the supply chain system, reduce supply chain inventory as well as bullwhip effect.  DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3028
A Framework of Concurrent Mechanism Based on Java Multithread Wuxue Jiang; Qi Li; Zhiming Wang; Jianfeng Luo
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 9: September 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The continuously increased demand for paralleling multitask in domains such as grid computing and cloud computing has significantly promoted research on concurrent mechanism and concurrent programming. The Java programming language supports multithread mechanism for developing paralleling programs, however, it is difficult to apply Java concurrent primitives to specific problems. Thus, for the development of high reliable and qualitative Java concurrent programs, this paper analyses Java multithread mechanism and it’s realization, studies the concurrent mechanism based on Java synchronization and interactive communication mechanism , compares the concurrent structure based on operating system and based on Java multithread, sums up some concurrent programming rules and strategies to prevent deadlock. A frame instance based on entire synchronization is presented, which can help to develop concurrent programs quickly. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.3296
A Low Cost C8051F006 SoC-Based Quasi-Static C-V Meter for Characterizing Semiconductor Devices Endah Rahmawati; Riska Ekawita; Maman Budiman; Mikrajuddin Abdullah; Khairurrijal Khairurrijal
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 6: October 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Based on a C8051F006 SoC (system on-a-chip), a simple and low cost quasi-static capacitance-voltage (C-V) meter was designed and developed to obtain C-V characteristics of semiconductor devices. The developed C-V meter consists of a capacitance meter, a programmable voltage source, a C8051F006 SoC-based slave controller, and a personal computer (PC) as a master controller. The communication between the master and slave controllers is facilitated by the RS 232 serial communication. The accuracy of the C-V meter was guaranteed by the calibration functions, which are employed by the program in the PC and obtained through the calibration processes of analog to digital converter (ADC), digital to analog converters (DACs) of the C8051F006 SoC, and the programmable voltage source.  Examining 33-pF and 1000-pF capacitors as well three different p-n junction diodes, it was found that the capacitances of common capacitors are in the range of specified values and typical C-V curves of p-n junction diodes are achieved. DOI: http://dx.doi.org/10.11591/telkomnika.v10i6.1182
Robustness metrics for optical networks Noor Aishah Zainiar; Farabi Iqbal; ASM Supa’at; Adam Wong Yoon Khang
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp845-853

Abstract

Telecommunication networks are vulnerable towards single or simultaneous nodes/links failures, which may lead to the disruption of network areas. The failures may cause performance degradation, reduced quality of services, reduced nodes/links survivability, stability, and reliability. Therefore, it is important to measure and enhance the network robustness, via the use of robustness metrics. This paper gives an overview of several robustness metrics that are commonly used for optical networks, from the structural, centrality and functional perspectives.
Controllable Alternating Magnetic Technology Research for Inducing Plants Breeding on Ground Guo-wen HU; Li-sheng ZHANG; Lin WANG; Yin-jie WANG
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 4: April 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Controllable alternating induction magnetic field generation technology which induces plant seeds to breed on floor space has been developed. The incentive ferrite induction coil is used in the device to produce induced magnetic field. The common AC-DC-AC topology was adopted for the variable frequency power supply, realizing the VF. AC-DC-AC AC power inverter circuit adopts SPWM inverter frequency modulation and voltage regulation mode, realizing the effect of sinusoidal variable. In order to improve the conversion efficiency of the system electrical energy to magnetic energy, the RLC series resonant circuit is chosen in the circuit of output magnetic field. The induction magnetic field in the air gap is the work area for seeds experiment. Its adjustable frequency range: 20~200Hz, adjustable field range: 0~500Gs. The experimental study of rice seeds shows that different magnetic environment has a significant impact on the biological characteristics of rice seeds. DOI: http://dx.doi.org/10.11591/telkomnika.v11i4.2326
Modeling and Simulation of MPPT-SEPIC Combined Bidirectional Control Inverse KY Converter Using ANFIS in Microgrid System Soedibyo Soedibyo; Farid Dwi Murdianto; Suyanto Suyanto; Mochamad Ashari; Ontoseno Penangsang
Indonesian Journal of Electrical Engineering and Computer Science Vol 1, No 2: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v1.i2.pp264-272

Abstract

Photovoltaic system (PV) is widely used in various renewable energy application. The main problem of PV system is how to get the maximum output power which is integrated in microgrid system. Furthermore, the redundancy output power generated by on a distribution system should also be considered. This study utilizes the excess power for energy storage using bidirectional of KY inverse converter. Since the DC voltage which generated by PV and the energy storage will be converted into AC voltage using inverter toward load. This paper proposes ANFIS as search optimization method using SEPIC converter with a maximum efficiency of 99.95% to impact to power generation performance  in microgrid system.
Color Distortion of Digital Image and its Detection Xia Yanhui; Wang Zhengyou; Wang Wan; Wang Jin; Wan Zheng
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To solve the problem of color distortion in the communication and reproduction process, the paper firstly analyzes the causes of the color distortion phenomenon. Then, the paper proposes the corresponding image color distortion detection algorithm based on the HSI color model. In the proposed method, the color image is transformed from RGB space to HSI space firstly; in HSI space, the reference image and the distortion image’s hue differences and saturation differences are calculated. Experimental results on LIVE images show that the measured results of the model with subjective scoring after the nonlinear fit the correlation coefficient up to 0.95.DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3080
Genetic algorithm for intrusion detection system in computer network Hamizan Suhaimi; Saiful Izwan Suliman; Afdallyna Fathiyah Harun; Roslina Mohamad; Yuslinda Wati Mohamad Yusof; Murizah Kassim c
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1670-1676

Abstract

Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In network intrusion detection system (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of genetic algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   
Water Inrush Mode and Its Evolution Characteristics with Roadway Excavation Approaching to the Fault Shuren Wang; Hu Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 3: July 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Water inrush disaster is an important factor in restricting safe production of the coal mine. Taking the roadway in seam in Danhou Coal Mine, as the engineering background, according to the spatial relationship of the roadway, the impermeable layer, the fault and the loading conditions, the fault activation mechanical model under the roadway excavation disturbance was built, and the fault activation conditions, roadway water inrush criterion and water inrush three modes were put forward. A three-dimensional numerical calculation models were built by using FLAC3D. Through fluid-solid coupling calculation, the surrounding rock damage and failure, the water inrush channel formation, and the evolution process of water inrush of the roadway excavation approaching the fault were analyzed, moreover, the displacement field, the stress field and the surrounding rock plastic failure characteristics of the roadway were revealed. Furthermore, under the conditions of different water pressure, impermeable rock thickness, fault displacement, and fault dip angles, the roadway water inrush modes and their evolution characteristics were comparatively analyzed. DOI: http://dx.doi.org/10.11591/telkomnika.v10i3.611

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue