cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,199 Documents
Pet dog disease pre-diagnosis system for caregiver with possibilistic C-means clustering and disease database Kwang Baek Kim; Doo Heon Song
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i1.pp300-305

Abstract

While the population of pet dogs and veterinary clinics are increasing, there is no reliable and useful software for pet owners/caregivers who have limited knowledge on the pet diseases. In this paper, we propose a pre-diagnosis system working on the mobile platform that the pet owner can take a pre-diagnosis from his/her observation of pet dog’s abnormality. Technically, the system needs a reliable databases for disease-symptom association thus we provide it based on the textbook and encyclopedia. Then, we apply Possibilistic C-Means algorithm that is an unsupervised machine learning algorithm to form the connections between disease and symptoms from database. The system outputs five most probable diseases from the observed symptoms of pet dog. The utility of this system is to alert the owner’s attention on the pet dog’s abnormal behavior and try to find the diseases as soon as possible.
Biogeography Based Optimization Tuned Fuzzy Logic Controller to Adjust Speed of Electric Vehicle Salam Waley; Chengxiong Mao; Nasseer K. Bachache
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp509-519

Abstract

There are many power electronic converters and motor drives connected together to form the electrical system of an Electric Vehicle. In this paper, we have presented a modeling tool that has the advantages of utilizing capabilities of the PMSM software in detailed simulations of converters, motor drives, and electric machines. In addition, equivalent electrical models of Electric Vehicle drive system. This paper also gives a brief idea of PMSM validity as an Electric Vehicle simulation tool. PMSM drive system is described and analyzed due to its importance in many applications especially in Electric Vehicle applications. Applications due to their high efficiency, low inertia and high torque to volume ratio. In this paper we embody the simulation of Fuzzy Logic Controller. The controller govern the speed control of Electrical Vehicle EV using permanent magnet synchronous motor PMSM. This work characterizes to obtain the optimal parameters of FLC. Biogeography Based Optimization (BBO) is a new intelligent technique for optimization; it can be used to tune the parameters in different fields. The main contribution of this work efforts the ability of BBO to design the parameters of FLC by determining the shapes of triangle memberships of the inputs and output. The results of optimal controller (BBO-FLC) compared with the other controllers designed by Genetic Algorithm GA which it is a powerful method has been found to solve the optimization problem. The implementation of BBO algorithm has been done by M-file/Matlab, this program linked with SIMULINK to calculate the finesses function which has the complete mathematical system model has implemented using. The results show the excellent performance of BBO-FLC compared with GA-FLC and PI controller, also the proposed method was very fast and need a few number of iterations. These results also confirmed that the transient torque and current never exceed the maximum permissible value.
SOC Estimation of LiFePO4 Battery based on Improved Ah Integral Method Zheng ZHU; Chongyang LIU; Dan LIU; Jinwei SUN
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 12: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

State of charge (SOC) is the most important status parameters of energy storage system, which is able to predict the available mileage of electric vehicle. In fact, the accuracy of SOC estimation plays a vital role in the usability and security of the battery. To fully consider the practical demands, a novel method to predict SOC of LiFePO4 battery is presented in this paper, which defines the correct coefficient separately under two working conditions of charging and discharging. Based on effective factors such as coulombic efficiency, charge and discharge current, and temperature, an Ah integral SOC estimation method with two kinds of efficiency correct coefficients is established by performing massive experimental study. Experiments prove that the estimated error of SOC is less than 5%. Compared with the original Ah method, the improved Ah method is more advantageous in the accuracy and reliability. DOI: http://dx.doi.org/10.11591/telkomnika.v11i12.3016
Desynchronization Attacks on RFID Security Protocols Miaolei Deng; Weijun Zhu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: February 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.  DOI:http://dx.doi.org/10.11591/telkomnika.v11i2.1993 
The Intelligent Control System of the Freezing Station in Coal Mine Freezing Shaft Sinking Xiaoliang Zheng; Yelin Hu; Zhaoquan Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 8: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i8.pp5743-5750

Abstract

In order to address the issue of low degree of automation and huge waste of electric energy of the equipment in drilling engineering freezing station which adopts the freezing method of coal mine, we need to design an intelligent control system to control both the brine pump and double stage ammonia screw compressor. According to the actual cooling need in freezing project, this new system is able to adjust the working condition of the equipment so as to optimize the supply as needed. Also, the temperature and flow of the brine are controlled by fuzzy decoupling controller, and variable frequency controller is adopted in the brine pump to change the motor drive speed and finally adjust the flow of the brine appropriately, besides, the reasonable start-stop unit is used in the compressor to control the temperature of the brine. It has turned out that this intelligent control system features a better control performance, and thus has increased the automation level and prolonged the using life of the whole system as well as saved a large amount of electric energy and decreased the electricity cost of construction enterprises. 
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study Husamuldeen K. Hameed; W. Z. Wan Hasan; Suhaidi Shafie; Siti Anom Ahmad; Haslina Jaafar
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp583-593

Abstract

The amplitude dependent muscle activity detection algorithms of the surface electromyography (sEMG) signals are very sensitive to the changes in the background noise levels and the performance of these amplitude-based methods is highly deteriorated when the Signal to Noise ratio (SNR) of the sEMG signal is low. sEMG signals of deep and small muscles as well as sEMG signals recorded from patients that have neuromuscular diseases may not meet this SNR requirement which motivates the need for amplitude independent algorithms that can detect weak muscle activities. Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. The results have showed that the performance of the amplitude independent algorithm outperformed the performance of the amplitude dependent algorithms for detecting weak muscle activities and for robustness against false alarms.
Lag Synchronization of a Class of Time-delayed Chaotic Neural Networks by Impulsive Control Jing Wan; Jianliang Ai
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 6: June 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The paper studies the exponential lag synchronization of a class of delayed chaotic neural networks with impulsive effects via the unidirectional linear coupling. Some sufficient conditions are derived by establishing impulsive differential delay inequality and using M-matrix theory. An illustrative example is also provided to show the effectiveness and feasibility of the impulsive control method. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2692
A Compressed Sensing Signal Processing Research Guojun Qin; Jingfang Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 1: July 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v3.i1.pp119-125

Abstract

The classical Shannon/Nyquist sampling theorem tells us that in order to not lose information when uniformly sampling a signal we must sample at least two times faster than its bandwidth. Nowadays in many applications, because of the restriction of the Nyquist rate, we end up with too many samples and it becomes a great challenge for further transmission and storage. In recent years, an emerging theory of signal acquirement, compressed sensing(CS), is a ground-breaking idea compared with the conventional framework of Nyquist sampling theorem. It considers the sampling in an novel way, and open up a brand new field for signal sampling process. It also reveals a promising future of application. In this paper, we review the background of compressed sensing development. We introduce the framework of CS and the key technique and illustrate some naïve application on image process.
Construction of E-commerce Recommendation System based on Semantic Annotation of Ontology and User Preference Hongsheng Xu; Ruiling Zhang; Chunjie Lin; Wenli Gan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: March 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ontology is an explicit formal specification of the shared conceptual model. Domain ontology can accurately describe the contents of the e-commerce site in the stage of built domain ontology. Web domain ontology can effectively improve the quality of the recommended use of the e-commerce personalized recommendation. The paper presents construction of e-commerce recommendation system based on semantic annotation of ontology and user preference.  In this paper domain ontology semantic annotation for the project is established, and this ontology takes advantage of semantic similarity measure to calculate the semantic similarity between the projects, and it can predict the score of unbranded items based on user ratings. The experimental results show that the algorithm recommended more effective than traditional algorithms, to improve the quality of the recommended. DOI : http://dx.doi.org/10.11591/telkomnika.v12i3.4132  
Intelligent security system detects the hidden objects in the smart grid Ammar Wisam Altaher; Abdullah Hasan Hussein
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp188-195

Abstract

Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 3: March 2026 Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue