cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Modeling frequency response of transformer winding to investigate the influence of RLC S Al-Ameri; M. F. M. Yousof; Norhafiz Azis; S. Avinash; M. A. Talib; Ali. A. Salem
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp219-229

Abstract

Frequency response measurements are used for power transformer winding failures detection. The variation between frequency responses indicate mechanical changes in the transformer winding. One method to investigate winding failures in transformer is to develop a reliable circuit model which can simulate the frequency response of an actual winding. The main reason to use the model is because it is expensive to create damages on an actual winding. This paper proposes n-stages circuit ladder network to simulate the response of a winding which has unique design. It presents a new technique to calculate the resistance, inductance and capacitance of the winding. Then, the relationship between the RLC parameters and the frequency response is studied. The winding chosen in this investigation is a single phase 33kV transformer winding. The simulated frequency response was compared with the measured response to verify the proposed model. The model can give a comprehensive understanding about the effect of RLC parameters on the frequency response.
Ensemble Method for Indonesian Twitter Hate Speech Detection M. Ali Fauzi; Anny Yuniarti
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i1.pp294-299

Abstract

Due to the massive increase of user-generated web content, in particular on social media networks where anyone can give a statement freely without any limitations, the amount of hateful activities is also increasing. Social media and microblogging web services, such as Twitter, allowing to read and analyze user tweets in near real time. Twitter is a logical source of data for hate speech analysis since users of twitter are more likely to express their emotions of an event by posting some tweet. This analysis can help for early identification of hate speech so it can be prevented to be spread widely. The manual way of classifying out hateful contents in twitter is costly and not scalable. Therefore, the automatic way of hate speech detection is needed to be developed for tweets in Indonesian language. In this study, we used ensemble method for hate speech detection in Indonesian language. We employed five stand-alone classification algorithms, including Naïve Bayes, K-Nearest Neighbours, Maximum Entropy, Random Forest, and Support Vector Machines, and two ensemble methods, hard voting and soft voting, on Twitter hate speech dataset. The experiment results showed that using ensemble method can improve the classification performance. The best result is achieved when using soft voting with F1 measure 79.8% on unbalance dataset and 84.7% on balanced dataset. Although the improvement is not truly remarkable, using ensemble method can reduce the jeopardy of choosing a poor classifier to be used for detecting new tweets as hate speech or not.
Modeling Singular Value Decomposition and K-Means of Core Image in Clasification of Potential Nickel Agung Prajuhana Putra; Agus Buono; Bib Paruhum Silalahi
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Exploration is a main process in the nickel mining activities. One of the most important steps in exploration is obtain soil samples (cores) to determine the potential of nickel in the soil. Laboratory testing is a way to know how much the nickel content on the core. This research aims to utilize the core image of the statistical characteristics of color and texture, Biplot analysis using SVD, K-Means and identification using SVM method with RBF kernel and polynomial to determine the potential of nickel.DOI: http://dx.doi.org/10.11591/telkomnika.v13i3.7197
New multi-step three-term conjugate gradient algorithms with inexact line searches Abbas Younis Al-Bayati; Muna M. M. Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1564-1573

Abstract

This work suggests several multi-step three-term conjugate gradient (CG)-algorithms that satisfies their sufficient descent property and conjugacy conditions. First, we have  considered a number of well-known three-term CG-method, and we have, therefore, suggested two new classes of this type of algorithms which was based on hestenes and stiefel (HS) and polak-ribière (PR) formulas with four different versions. Both descent and conjugacy conditions for all the proposed algorithms are satisfied, at each iteration by using the strong Wolfe line search condition and it's accelerated version. These new suggested algorithms are some sort of modifications to the original  HS and PR  methods. These CG-algorithms are considered as a sort of the  memoryless BFGS update.  All of our new suggested methods are proved to be a  global convergent and numerically, more efficient than the similar methods in same area based on our selected set of used numerical problems.
Software Aging Forecasting Using Time Series Model I M Umesh; G N Srinivasan; Matheus Torquato
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 3: September 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i3.pp839-845

Abstract

With the emergence of virtualization and cloud computing technologies, several services are housed on virtualization platform. Virtualization is the technology that many cloud service providers rely on for efficient management and coordination of the resource pool. As essential services are also housed on cloud platform, it is necessary to ensure continuous availability by implementing all necessary measures.  Windows Active Directory is one such service that Microsoft developed for Windows domain networks. It is included in Windows Server  operating systems as a set of processes and services for authentication and authorization of users and computers in a Windows domain type network. The service is required to run continuously without downtime. As a result, there are chances of accumulation of errors or garbage leading to software aging which in turn may lead to system failure and associated consequences. This results in software aging. In this work, software aging patterns of Windows active directory service is studied. Software aging of active directory needs to be predicted properly so that rejuvenation can be triggered to ensure continuous service delivery. In order to predict the accurate time, a model that uses time series forecasting technique is built.
Developing audio data hiding scheme using random sample bits with logical operators Mohammed Hatem Ali Al-Hooti; Tohari Ahmad; Supeno Djanali
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i1.pp147-154

Abstract

Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods which have been proposed, however, are not yet optimal concerning the amount of the secret and the quality of the resulted stego data. In this paper, we explore an audio file as the medium to carry the secret data which has been extracted into binary. Before the process begins, the cover is converted to binary and each sample’s bits are divided into two groups, one is used as the location of the embedded 4 bits whereas the second part locates the two bits that are randomly selected as the key. The experimental results have validated that the capacity is high and there is no much impact on the quality. Moreover, compared to the current LSB methods the security is exceedingly enhanced.
RF Energy Harvesting with Multiple Sources in Wireless Mesh Network K.N Puniran; Ahmad Robiah; Rudzidatul Akmam Dziyauddin
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i2.pp606-616

Abstract

Energy harvesting (EH) module for wireless sensor network has become a promising feature to prolong the conventional battery inside the devices. This emerging technology is gaining interest from sensor manufacturers as well as academicians across the globe. The concept of employing EH module must be cost effective and practical. In such, the use of EH module type besides RF is more realistic due to the size of the scavenger module, the availability of the resources and conversion efficiency. Most of the oil and gas plants have some drawbacks in scavenging RF from surrounding (i.e. router, Wi-Fi, base station, cell phone) due to its placement in remote area and thus limited energy sources could be a threat in this application. Multiple sources, including co-channel interference (CCI) in any constraint nodes is a feasible way of scavenging several wastes from ambient RF energy via wireless mesh topology. In this paper, a 3-node decode-and-forward (DF) model is proposed where the relay node is subject to an energy constraint. Multiple primary sources and CCI are added in the system model known as Multiple-Source and Single-Relay (MSSR). A mathematical model is derived in Time Switching Relaying (TSR) and Power Splitting Relaying (PSR) schemes to obtain an average system throughput at a destination. Numerical simulation with respect to the average throughput and EH ratio was performed and compared with the Single-Source and Single-Relay (SSSR) and ideal receiver. By applying multiple sources and CCI as an energy enhancement at the constraint node, the optimal value of EH ratio for TSR can be reduced significantly by 10% as compared to the ideal receiver whereas the optimal value of EH ratio for PSR is outweigh TSR in terms of overall system throughput.
Design and Analysis of Lagrangian Algorithm for Power Flow System using Renewable Energy Resources Subramani Rajamanickam; Vijayalakshmi C
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i2.pp348-355

Abstract

This paper mainly deals with the implementation of an Lagrangian Relaxation (LR) technique through a Supervisory Control and Data Acquisition (SCADA) system. Maintaining Power Station is not an easy task which to achieve its demand such as regulating inputs monitoring energy losses. In this paper we have introduced novel SCADA based decentralized approach to minimize the loss of the system and optimize the total generation cost. Due to the nonlinearities of Electricity demand and scheduling time, the problem is not solvable with the usual optimization techniques. For getting appropriate solution LR technique has been formulated as a nonlinear programming problem with respect to optimal energy constraints. Based on the numerical calculations and graphical representations the renewable energy sources are optimally allocated in individual and hybrid configurations, which leads to effective production.
The Information System Project Profiles among Universities in Indonesia A'ang Subiyakto; Abd. Rahman Ahlan; Mira Kartiwi; Nashrul Hakiem; Muhammad Qomarul Huda; Aries Susanto
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp865-872

Abstract

Information system (IS) utilizations may have been one of the determinant factors for the survival requirement of the higher education sector in Indonesia. Despite the IS projects have been conducted since the 1980s in this country, but many studies indicated that success of the projects seems like in the low level. This survey study was purposed to know the status of the IS project success among universities by involving the internal stakeholders. The higher education database of the Ministry of Research, Technology, and Higher Education (MRTHE) and the Association of Computing and Informatics Institutions Indonesia (ASCII-I) in the year 2015 were used for selecting around 1.230 respondents based on a purposive random sampling. The blended questionnaires were then distributed with almost 298 (±24%) responses. This paper presents five project profiles, including the aim, IS strategic plan availability, internal team involvement, budget allocation, and the success level of the projects.
System performance analysis of hybrid time-power switching protocol of EH bidirectional relaying network in amplify-and-forward mode Phu Tran Tin; Minh Tran; Tan N. Nguyen; Thanh-Long Nguyen
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp118-126

Abstract

In this paper, we investigate system performance in term of throughput and ergodic capacity of the hybrid time-power switching protocol of energy harvesting bidirectional relaying network. In the first stage, the analytical expression of the system throughput and ergodic capacity of the model system is proposed and derived. In this analysis, both delay-limited and delay-tolerant transmission modes are presented and considered. After that, the effect of various system parameters on the proposed system is investigated and demonstrated by Monte-Carlo simulation. Finally, the results show that the analytical mathematical and simulated results match for all possible parameter values for both schemes.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue