cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced Huda Adibah Mohd Ramli; Ani Liza Asnawi; Farah Nadia Mohd Isa; Amelia Wong Azman; Mohamad ‘Ismat Hafizi Mansor
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp330-336

Abstract

Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Self-select target neighboring base station assisted handover for natural disaster in LTE-A network Azita Laily Yusof; Ainnur Eiza Azhar; Norsuzila Ya’acob
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i1.pp309-316

Abstract

This paper presents Self-Select Target Neighboring Base Station Assisted Handover for Natural Disaster in LTE-A Network. In this study, two parameters have been introduced which are known as received signal strength of user (RSS) and left over power of base station (LoP) in order to maintained good QoS of UE and prolong battery life of base station when there is power outage. A distance fraction coefficient (α) with value 0.2 has been introduced to RSS expression to improve the signal strength by reducing the area that the UE’s covered. Both parameters are used to calculate weighted-average score (WAS) for selection of potential target base station to avoid more users to connect to the affected base station. From the results, sRSS=0.8 gave the highest WAS with value of WAS=0.84 for users from 1 to 100 compares to other value of sRSS. Moreover, by using no natural disaster condition as reference, Condition 1 (wRSS=80%, wLoP=20% ) with the lowest percentage of improvement (3.75%.) will be chosen as handover condition as it near to base station, avoid overloaded users to the affected base station, hence prolong battery life as it only use 20% of battery usage.
Underground Image Denoising Zhang Ye; Jia Meng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A Mixed Window Shrink and BayesShrink Image Denoising Algorithm Based on Curve let Transform is proposed in this paper. Curve let transform is effective in presenting line and surface property of image. In the proposed algorithm, Curvelet transform is employed for the first stage, then according the theory of image demising method based on Wavelet transform, we combine Window Shrink and BayesShrink denoising algorithm to perform noise reduction. Experiment results show that the proposed algorithm is competitive to Wavelet transform in terms of Peak Signal to Noise Ratio (PSNR) and denoising image quality.  DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5479
Hybrid Renewable Energy Power System Model Based on Electrification Requirements of One Fathom Bank Malaysia S. Sarip; C. G. Abdullah; N. Shafie; N. A. N. Mahadzir; F. Yakob; M. Z. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp513-520

Abstract

Renewable energy resources are becoming inexorably in the field of generating electrical power due to the fast development of technology, given to its advantages over non-renewable energy resources. Though the source is available in enormous amount, energy produced from single renewable energy resources such as tidal current may fluctuate with the time and the hour of the day or month, depending on the tides. Thus, by having a hybrid power system consisting two or more renewable energy resources coming into play at the same time would be more reliable to support the targeted area. However, the availability of renewable energies depends on the climate change, therefore having a storage battery or backup power is often essential. In this case, the main purpose of this research is to develop an off-grid hybrid tidal current and solar power system along with backup power to support One Fathom Bank Lighthouse in Malaysia with the intention to reduce the dependency on diesel generators. Having the ability to evaluate economic and technical feasibility of power system, HOMER software is used to run simulation and analyze the best combination of components to form a hybrid power system for the lighthouse. The results are based on the best components and sizing in compliance with the load demand and diesel fuel consumption to provide a reliable and cost-effective system.
Outlier detection in WSN by entropy based machine learning approach Manmohan Singh Yadav; Shish Ahamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1435-1443

Abstract

Environmental disasters like flooding, earthquake, epidemics etc. cause’s significant catastrophic effects on population of all over the world. Wireless sensor network (WSN) based techniques have become significantly popular in susceptibility modelling of such challenging disaster due to their greater strength and efficiency in the prediction of such threats occurring enormously day by day. This paper demonstrates the multiple machine learning-based approach to predict outlier in sensor data records with the use of bagging, boosting, random subspace, SVM and KNN based frameworks for outlier prediction using a Wireless sensor network data records. First of all the algorithm follows the pre processing of the database taken from records of 14 sensor motes with presence of outlier due to intrusion. Subsequently the segmented database is created from sensor pairs. Finally, the data entropy is calculated and used as a feature to determine the presence of outlier used different approach. Results show that the KNN model has the highest prediction capability for outlier assessment.
Exploring the Design Space of HEVC Inverse Transforms with Dataflow Programming Khoo Zhi Yion; Ab Al-Hadi Ab Rahman
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 1: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v6.i1.pp104-109

Abstract

This paper presents the design space exploration of the hardware-based inverse fixed-point integer transform for High Efficiency Video Coding (HEVC). The designs are specified at high-level using CAL dataflow language and automatically synthesized to HDL for FPGA implementation. Several parallel design alternatives are proposed with trade-off between performance and resource. The HEVC transform consists of several independent components from 4x4 to 32x32 discrete cosine transform and 4x4 discrete sine transform. This work explores the strategies to efficiently compute the transforms by applying data parallelism on the different components. Results show that an intermediate version of parallelism, whereby the 4x4 and 8x8 are merged together, and the 16x16 and 32x32 merged together gives the best trade-off between performance and resource. The results presented in this work also give an insight on how the HEVC transform can be designed efficiently in parallel for hardware implementation.
Projective synchronization for a cass of 6-D hyperchaotic lorenz system Ahmed S. Al-Obeidi; Saad Fawzi AL-Azzawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp692-700

Abstract

This paper is concerned with the projective synchronization problem for a class of 6-D nonlinear dynamical system which is called hyperchaotic Lorenz system when the parameters of this system are unknown. Based on scaling factor  which belong to above strategy, four controller are proposed to achieve projective synchronization between two identical systems via using Lyapunov's direct method and nonlinear control strategy.  These scaling factor taken the values, and 2 for each control respectively. A numerical simulations are used to demonstrate the efficiency of the proposed controller.
Analysis of Brownian Particles for finding the shortest path in networks Bin Hu; jia li xu; huan yan qian
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, we propose a method to analyze the shortest path finding between two nodes in complex networks. In this method, we first find that single Brownian particle follows the shortest path between source node and destination node in the probability of where denotes the shortest path steps between two nodes. To be compared with single particle utilization, then we specially analyze the multiple particles. We compute the probability of particles’ taking the shortest path between and when particles starts simultaneously from the source and head to the destination as . It’s very clear that there must be particles taking the shortest path to arrive at the destination in the multiple particles environment. And with the number of increasing, the arriving probability first arise and then drop down rapidly until to zero. In the end, we make the experiments and confirm our theoretical analysis. Our results would provide valuable usage for some applications such as finding the optimal routing in wireless sensor networks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3071
Changing the Electrical Safety Culture Benjamin Franklin A; Sasilatha T
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp93-96

Abstract

Electrical wellbeing - Where were we yesterday? Where are we today? Where will we be later on? The wellbeing society is proceeding to advance to give a more secure workplace to individuals working around electrical hardware. To enhance electrical security, it takes sense of duty regarding consistent change of the electrical wellbeing society. New musings and thoughts to enhance electrical wellbeing are basic. This paper addresses how function hones have changed after some time and prescribes thoughts to overhaul the current electrical culture. To change the current security culture new thoughts should be produced to cause higher execution in electrical wellbeing for all individuals presented to electrical risks. New circuit testers take in great and unfortunate propensities from more experienced circuit testers. Human execution depends on a mix of information, abilities, and educated practices. Convictions can be affected through perceptions and collaborations with different experts. The estimation of value mentorship conveys a high level of obligation to guarantee legitimate wellbeing rehearses is taken after. Almost no exertion has been given to preparing the nonelectrical labourers that are presented to electrical risks. Preparing for non-electrical labourers is a missing component in the present electrical security culture. A principal contention in this paper is that culture speaks to the entirety of what is regularly adequate without examination. The way of life is likewise determined by regular perception and experience. With a specific end goal to change the way of life there must be a redefinition of what is satisfactory, trailed by noticeable changes that everybody can understanding and watch. Administration possesses culture since it sets what is passable and satisfactory. Accordingly, the fate of electrical wellbeing will rely upon how well administration comprehends the hazard and results of electrical work and their duty in moulding and owning electrical security strategies. Enter components tended to in this paper incorporate human execution, innovation changes, adjusting to change, actualizing new thoughts to enhance security and how staff changes inside an enterprise can influence wellbeing execution. 
Two-level hiding an encrypted image Faten H. MohammedSediq Al-Kadei
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i2.pp961-969

Abstract

Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue