cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
Optimization Design of a Real-time Embedded Operating System Based on ISO17356 Jiang Chun-mao; Qu Ming-Cheng; Wu Xiang-hu Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper distinguishes the differences between dynamic and static operating system from the design target, and discusses the resulting different technologies used when system is implemented. Based on this theory, according to ISO17356 OS specification and using the hardware abstraction layer idea, a simple and efficient static real-time operating system is implemented for ARM architecture, and the kernel contains no more than 3000 lines C codes. With the idea of separating mechanisms and strategies, the internal resources are used as a mechanism to implement different scheduling policies; proposes a priority-based packet scheduling algorithm, which achieves a good performance both in time and space. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3405 
Security assessment of four open source software systems Faraz Idris Khan; Yasir Javed; Mamdouh Alenezi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp860-881

Abstract

Incorporating Open Source Software (OSS) tools in software development is increasing day by day due to their accessibility on the internet. With the advantages of OSS comes disadvantages in terms of security vulnerabilities. Therefore, in this paper, we analyzed four famous open source software tools (i.e. Moodle, Joomla, Flask and VLC media player) which are used by software developers nowadays. For the analysis of each system, security vulnerabilities and weakness were identified, threat models were modeled,and code inspection was performed. The findings are discussed in more details.
The Ball Mill Driving Device Fault and the Main Bearing Lubrication Analysis Tong Junfeng; Hou Honghai; Zhao Hongxia
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 4: April 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article from the analysis of the power consumption of the ball mill and the work characteristic of the motor, analyzes the fault reason of ball mill transmission equipment. The paper mainly deals with a side-transmission ball mill. The main fault is about the breakdown in the elastic rubber coupling of the transmission system. It is found from the analysis of the real cases and data that the actual power consumption is increased and it is caused by the overload. The main parameters which influence the ball mill power consumption are load of the mill, feed material mass, ball mill rotational speed and friction. The main part of power consumption for ball mill is used to elevating grinding body and material, a portion is used to overcome the friction force between the main bearing. Under the conditions in which the load of the mill and feed material mass are kept the same, the parameters which influence the ball mill power consumption are rotational speed and friction status. When the ball mill voltage decreased, according to the motor characteristics, its rotation speed will decrease, which will disrupt the hydrodynamic lubrication state of the hollow shaft and spherical surface, so that the power consumption of the ball mill increase. The larger power leads to the transmission fault. This paper also put forward to make sure kept the ball mill main bearing lubrication status. DOI: http://dx.doi.org/10.11591/telkomnika.v11i4.2386
Optimization of Ship’s Route Scheduling Using Genetic Algorithm Vivi Nur Wijayaningrum; Wayan Firdaus Mahmudy
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 1: April 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i1.pp180-186

Abstract

Route scheduling is a quite complicated process because it involves some determinant factors. Several methods have been used to help resolve the NP-hard problems. This research uses genetic algorithm to assist in optimizing ship scheduling, that where there are several ports to be visited by some ships. The goal is to divide the ship to go to a specific port so that each port is only visited by one ship to minimize the total distance of all ships. The computational experiment produces optimal parameters such as the number of popsize is 30, the number of generations is 100, crossover rate value is 0.3 and mutation rate values is 0.7. The final results is an optimal ship route by minimizing the distance of each ship.
The monochrome LCD Driver Design and Implementation Based on Framebuffer Li Zhi-hui; Xian Jinlong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 9: September 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recently, the LCD applications have developed very rapidly, especially the application of the monochrome LCD in certain areas. This paper, on hardware, introduced the connection between monochrome LCD HEM160160-07C2 and ARM9-based AT91SAM9261; on software, respectively introduced monochrome LCD driver implementation based on GPIO and based on Framebuffer. By the two mode analysis, the mode based on Framebuffer is better, ultimately has been validated in the project experiment. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.2868 
Image encryption scheme in public key cryptography based on cubic pells quadratic case Raghunandan K. R.; Ganesh Aithal; Surendra Shetty; Bhavya K.
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i1.pp385-394

Abstract

Cryptography systems face new threats with the transformation of time and technology. Each innovation tries to contest challenges posed by the previous system by analyzing approaches that are able to provide impressive outcomes. The prime aim of this work is to urge ways in which the concept of Pell’s equation can be used in Public key Cryptography techniques.The main aim of this approach is secure and can be computed very fast. Using Cubic Pell’s equation defined in Quadratic Case, a secure public key technique for Key generation process is showcased. The paper highlights that a key generation time of proposed scheme using Pell’s Quadratic case equation is fast compared to existing methods.The strength and quality  of the proposed method is proved and analyzed by obtaining the results of entropy, differential analysis, correlation analysis and avalanche effect. The superiority of the proposed method over the conventional AES and DES is confirmed by a 50% increase in the execution speed and shows that Standard diviation and Entropy analysis of proposed scheme gives immunity to guess the encryption key and also it is hard to deduce the private key from public key using  Diffrential analysis.
Distribution Grid Fault Location Applying Transient Zero-mode Current Hongsheng Su; Yunchuan Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 5: September 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To aim at the puzzles on faults location in distribution grids, the paper analyzed the distributing characteristics of transient zero-mode currents as the faults occurred, with the aid of correlation theory, a new fault circuit-selection and fault-location method was proposed based on transient zero model current for power distribution grid faults. The method is based on such a fact that the RMS was maximum of fault line transient zero-mode current, and the inner products between it and other line transient zero-mode current were less than zero, in addition, the transient zero-model currents at two sides of the fault point possessed opposite polarity and diverse waveform, and as well as small correlation coefficient closer to zero. In the end, the simulation results show that the proposed method on circuit-selection and fault-location for power distribution grids fault based on transient zero- mode current is correct and effective, and not affected by voltage epoch angle, and grounding resistance, and as well as neutral-point grounding modes. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1289 
Information Extraction from Research Papers based on Conditional Random Field Model Zhu Shuxin; Xie Zhonghong; Chen Yuehong
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the increasing use of CiteSeer academic search engines, the accuracy of such systems has become more and more important. The paper adopts the improved particle swarm optimization algorithm for training conditional random field model and applies it into the research papers’ title and citation retrieval. The improved particl swarm optimization algorithm  brings the particle swarm aggregation to prevent particle swarm from being plunged into local convergence too early, and uses the linear inertia factor and learning factor to update particle rate. It can control algorithm in infinite iteration by the iteration between particle relative position change rate. The results of which using the standard research papers’ heads and references to evaluate the trained conditional random field model shows that compared with traditionally conditional random field model and Hidden Markov Model, the conditional random field model ,optimized and trained by improved particle swarm, has been better ameliorated in the aspect of F1 mean error and word error rate. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2188
The Study of Selection of Coal-Fired Supplier in Thermal Power Enterprise Based on the Extension Analysis Method Tiejun Ci; Xiyang Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 7: July 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Electric power market competition is intense. The competition between the various power plants will is the contest of economic efficiency as the core. Fuel cost is the center link of production management and economic accounting in thermal power plant, so selection management of the coal-fired supplier has great significance for the development of thermal power enterprise and improvement of the economic benefits. The paper constructs evaluation index system of coal-fired supplier, using the AHP method to determine the weight of evaluation index, and comprehensively evaluating to the coal-fired supplier with correlation functions in the extenics. The result indicates that it applies combination of the AHP and the extension analysis method to the selection of coal-fired supplier, which can accurately reflect relative importance of evaluation index, and directly reflect the detailed situation of supplier. This method is scientific, reliable and practical, which is applicable for various comprehensive evaluations. DOI: http://dx.doi.org/10.11591/telkomnika.v11i7.2837 
Contribution to the Security of the Information System A. Ben Charke; M. Chabi; M. Fakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp154-166

Abstract

Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue