Articles
9,174 Documents
Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced
Huda Adibah Mohd Ramli;
Ani Liza Asnawi;
Farah Nadia Mohd Isa;
Amelia Wong Azman;
Mohamad ‘Ismat Hafizi Mansor
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i1.pp330-336
Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Self-select target neighboring base station assisted handover for natural disaster in LTE-A network
Azita Laily Yusof;
Ainnur Eiza Azhar;
Norsuzila Ya’acob
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 1: July 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i1.pp309-316
This paper presents Self-Select Target Neighboring Base Station Assisted Handover for Natural Disaster in LTE-A Network. In this study, two parameters have been introduced which are known as received signal strength of user (RSS) and left over power of base station (LoP) in order to maintained good QoS of UE and prolong battery life of base station when there is power outage. A distance fraction coefficient (α) with value 0.2 has been introduced to RSS expression to improve the signal strength by reducing the area that the UE’s covered. Both parameters are used to calculate weighted-average score (WAS) for selection of potential target base station to avoid more users to connect to the affected base station. From the results, sRSS=0.8 gave the highest WAS with value of WAS=0.84 for users from 1 to 100 compares to other value of sRSS. Moreover, by using no natural disaster condition as reference, Condition 1 (wRSS=80%, wLoP=20% ) with the lowest percentage of improvement (3.75%.) will be chosen as handover condition as it near to base station, avoid overloaded users to the affected base station, hence prolong battery life as it only use 20% of battery usage.
Underground Image Denoising
Zhang Ye;
Jia Meng
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 6: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
A Mixed Window Shrink and BayesShrink Image Denoising Algorithm Based on Curve let Transform is proposed in this paper. Curve let transform is effective in presenting line and surface property of image. In the proposed algorithm, Curvelet transform is employed for the first stage, then according the theory of image demising method based on Wavelet transform, we combine Window Shrink and BayesShrink denoising algorithm to perform noise reduction. Experiment results show that the proposed algorithm is competitive to Wavelet transform in terms of Peak Signal to Noise Ratio (PSNR) and denoising image quality. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5479
Hybrid Renewable Energy Power System Model Based on Electrification Requirements of One Fathom Bank Malaysia
S. Sarip;
C. G. Abdullah;
N. Shafie;
N. A. N. Mahadzir;
F. Yakob;
M. Z. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i2.pp513-520
Renewable energy resources are becoming inexorably in the field of generating electrical power due to the fast development of technology, given to its advantages over non-renewable energy resources. Though the source is available in enormous amount, energy produced from single renewable energy resources such as tidal current may fluctuate with the time and the hour of the day or month, depending on the tides. Thus, by having a hybrid power system consisting two or more renewable energy resources coming into play at the same time would be more reliable to support the targeted area. However, the availability of renewable energies depends on the climate change, therefore having a storage battery or backup power is often essential. In this case, the main purpose of this research is to develop an off-grid hybrid tidal current and solar power system along with backup power to support One Fathom Bank Lighthouse in Malaysia with the intention to reduce the dependency on diesel generators. Having the ability to evaluate economic and technical feasibility of power system, HOMER software is used to run simulation and analyze the best combination of components to form a hybrid power system for the lighthouse. The results are based on the best components and sizing in compliance with the load demand and diesel fuel consumption to provide a reliable and cost-effective system.
Outlier detection in WSN by entropy based machine learning approach
Manmohan Singh Yadav;
Shish Ahamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1435-1443
Environmental disasters like flooding, earthquake, epidemics etc. cause’s significant catastrophic effects on population of all over the world. Wireless sensor network (WSN) based techniques have become significantly popular in susceptibility modelling of such challenging disaster due to their greater strength and efficiency in the prediction of such threats occurring enormously day by day. This paper demonstrates the multiple machine learning-based approach to predict outlier in sensor data records with the use of bagging, boosting, random subspace, SVM and KNN based frameworks for outlier prediction using a Wireless sensor network data records. First of all the algorithm follows the pre processing of the database taken from records of 14 sensor motes with presence of outlier due to intrusion. Subsequently the segmented database is created from sensor pairs. Finally, the data entropy is calculated and used as a feature to determine the presence of outlier used different approach. Results show that the KNN model has the highest prediction capability for outlier assessment.
Exploring the Design Space of HEVC Inverse Transforms with Dataflow Programming
Khoo Zhi Yion;
Ab Al-Hadi Ab Rahman
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 1: April 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v6.i1.pp104-109
This paper presents the design space exploration of the hardware-based inverse fixed-point integer transform for High Efficiency Video Coding (HEVC). The designs are specified at high-level using CAL dataflow language and automatically synthesized to HDL for FPGA implementation. Several parallel design alternatives are proposed with trade-off between performance and resource. The HEVC transform consists of several independent components from 4x4 to 32x32 discrete cosine transform and 4x4 discrete sine transform. This work explores the strategies to efficiently compute the transforms by applying data parallelism on the different components. Results show that an intermediate version of parallelism, whereby the 4x4 and 8x8 are merged together, and the 16x16 and 32x32 merged together gives the best trade-off between performance and resource. The results presented in this work also give an insight on how the HEVC transform can be designed efficiently in parallel for hardware implementation.
Projective synchronization for a cass of 6-D hyperchaotic lorenz system
Ahmed S. Al-Obeidi;
Saad Fawzi AL-Azzawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp692-700
This paper is concerned with the projective synchronization problem for a class of 6-D nonlinear dynamical system which is called hyperchaotic Lorenz system when the parameters of this system are unknown. Based on scaling factor which belong to above strategy, four controller are proposed to achieve projective synchronization between two identical systems via using Lyapunov's direct method and nonlinear control strategy. These scaling factor taken the values, and 2 for each control respectively. A numerical simulations are used to demonstrate the efficiency of the proposed controller.
Analysis of Brownian Particles for finding the shortest path in networks
Bin Hu;
jia li xu;
huan yan qian
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this paper, we propose a method to analyze the shortest path finding between two nodes in complex networks. In this method, we first find that single Brownian particle follows the shortest path between source node and destination node in the probability of where denotes the shortest path steps between two nodes. To be compared with single particle utilization, then we specially analyze the multiple particles. We compute the probability of particles’ taking the shortest path between and when particles starts simultaneously from the source and head to the destination as . It’s very clear that there must be particles taking the shortest path to arrive at the destination in the multiple particles environment. And with the number of increasing, the arriving probability first arise and then drop down rapidly until to zero. In the end, we make the experiments and confirm our theoretical analysis. Our results would provide valuable usage for some applications such as finding the optimal routing in wireless sensor networks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3071
Changing the Electrical Safety Culture
Benjamin Franklin A;
Sasilatha T
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp93-96
Electrical wellbeing - Where were we yesterday? Where are we today? Where will we be later on? The wellbeing society is proceeding to advance to give a more secure workplace to individuals working around electrical hardware. To enhance electrical security, it takes sense of duty regarding consistent change of the electrical wellbeing society. New musings and thoughts to enhance electrical wellbeing are basic. This paper addresses how function hones have changed after some time and prescribes thoughts to overhaul the current electrical culture. To change the current security culture new thoughts should be produced to cause higher execution in electrical wellbeing for all individuals presented to electrical risks. New circuit testers take in great and unfortunate propensities from more experienced circuit testers. Human execution depends on a mix of information, abilities, and educated practices. Convictions can be affected through perceptions and collaborations with different experts. The estimation of value mentorship conveys a high level of obligation to guarantee legitimate wellbeing rehearses is taken after. Almost no exertion has been given to preparing the nonelectrical labourers that are presented to electrical risks. Preparing for non-electrical labourers is a missing component in the present electrical security culture. A principal contention in this paper is that culture speaks to the entirety of what is regularly adequate without examination. The way of life is likewise determined by regular perception and experience. With a specific end goal to change the way of life there must be a redefinition of what is satisfactory, trailed by noticeable changes that everybody can understanding and watch. Administration possesses culture since it sets what is passable and satisfactory. Accordingly, the fate of electrical wellbeing will rely upon how well administration comprehends the hazard and results of electrical work and their duty in moulding and owning electrical security strategies. Enter components tended to in this paper incorporate human execution, innovation changes, adjusting to change, actualizing new thoughts to enhance security and how staff changes inside an enterprise can influence wellbeing execution.
Two-level hiding an encrypted image
Faten H. MohammedSediq Al-Kadei
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i2.pp961-969
Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation