cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Quadratic Programming Thrust Allocation and Management for Dynamic Positioning Ships Yushi Wei; Mingyu Fu; Jipeng Ning; Xingyan Sun
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To solve the complex thrust allocation problems of dynamic positioning ship with azimuth thrusters, the quadratic programming thrust allocation and management system was built. The power optimal thrust allocation was formulated as a quadratic programming problem by the linear treatments of inequality constraints and the optimal solution could be found in a finite amount of time. And some influence factors of thruster allocation were separated from algorithms and treated as a superstratum management module. In this system, online adjustment of input constraints and singularity avoidance could be realized, and the reliability and adaptability of thrust allocation were improved consequently. Finally, the validity and excellent performance of this method was proved by the simulation. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2318
Comparison of malware detection techniques using machine learning algorithm Nur Syuhada Selamat; Fakariah Hani Mohd Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 1: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i1.pp435-440

Abstract

Currently, the volume of malware grows faster each year and poses a thoughtful global security threat. The number of malware developed increases as computers became interconnected, at an alarming rate in the 1990s. This scenario resulted the increment of malware. It also caused many protections are built to fight the malware. Unfortunately, the current technology is no longer effective to handle more advanced malware. Malware authors have created them to become more difficult to be evaded from anti-virus detection. In the current research, Machine Learning (ML) algorithm techniques became more popular to the researchers to analyze malware detection. In this paper, researchers proposed a defense system which uses three ML algorithm techniques comparison and select them based on the high accuracy malware detection. The result indicates that Decision Tree algorithm is the best detection accuracy compares to others classifier with 99% and 0.021% False Positive Rate (FPR) on a relatively small dataset.
Cooperative and fresher encounter algorithm for reducing delay in MANET Noor Alleema; D. Siva Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1258-1265

Abstract

In Mobile Ad-hoc Networks (MANET), the route discovery is the chief problem for the nodes. In this paper Cooperative and Fresher Encounter Algorithm (CFEA) for Reducing Delay in MANET is proposed. The route discovery problem has been overcome by FResher Encounter algorithm. It is a simple algorithm for discovery the routes in efficient manner in the MANET. The node has the memory of past route details that communicate with remaining nodes. The node prefers to find the intermediate node instead of finding the destination node, that intermediate node keeps the knowledge of recently encounter the destination node. Then the intermediate node communicates with the node which is encountered the destination node recently, and the process is continued until the destination is attained. The main advantage of the scheme is reducing the process time.
Architecting Virality: Information Sharing from Government FB Page to Netizens Afdallyna Fathiyah Harun; Siti Nuradzarul Aqmaar Adzman; Fauzi Mohd Saman; Saiful Izwan Suliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp660-666

Abstract

In accordance with e-government initiatives, many ministries in Malaysia have engaged content to public using social media for better two-way communications. However, creating an online presence is not necessarily easy as digital content consumers are often bombarded with information and those that fail to capture information will be rendered uninteresting and irrelevant. This is imperative as for most part, users are in control of where they allocate attention and what they share. Using virality as a context, it is opined that information content that are well-designed will trigger specific information and propel the sharing of that information over the Internet. A study employing FB post categorization and sharing motivations survey was carried out in the context of Ministry of Health Malaysia Facebook page. The findings show that users are inclined towards Infographics with various sharing motivations. The results can be used by Malaysian ministries on how best to design and disseminate information for the benefit of the netizens on social media sites.
Gap analysis business process model by using structural similarity Afrianda Cahyapratama; Kelly Rosa Sungkono; Riyanarto Sarno
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i1.pp124-134

Abstract

Gap analysis process model is a study that can help an institution to determine differences between business process models, such as a model of Standard Operating Procedure and a model of activities in an event log. Gap analysis is used for finding incomplete processes and can be obtained by using structural similarity. Structural similarity measures the similarity of activities and relationships depicting in the models.  This research introduces a graph-matching algorithm as the structural similarity algorithm and compares it with dice coefficient algorithms. Graph-matching algorithm notices parallel relationships and invisible tasks, on the contrary dice coefficient algorithms only measure closeness between activities and relationships. The evaluation shows that the graph-matching algorithm produces 76.76 percent similarity between an SOP model and a process model generating from an event log; while, dice coefficient algorithms produces 70 percent similarity. The ability in detecting parallel relationships and invisible tasks causes the graph-matching algorithm produces a higher similarity value than dice coefficient algorithms.
Study of Economical-Technical Impacts of Distributed Generation on Medium-Voltage Grid Thi Dieu Thuy Nguyen; Jiangjun Ruan; Quan Nhu Nguyen; Ngoc Giang Le; Dan Tan; Longfei Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of Science and Technology has spurred the development of distributed generation, as well as the application of new renewable energy sources. DG connected to the grid can alter the power flow on the grid, reduce voltage loss and grid capacity loss; and also enhance the incident and reliability of grid power supply. When the number of DG connected to the grid increases, capacity direction varies depending on the distribution and consumption at specific time. Consequently, capacity losses in the grid can be reduced. Besides, DG connected to the grid is closely linked to the matters of environmental pollution and degradation, economic growth and living standard. This paper will discuss the impacts of grid-distributed generation on economic and technical indicators, which mainly focus on the relationship between degree of penetration and location of DG connection to the grid, regarding voltage and capacity losses in the line. The proposed model is calculated and tested via a 56-bus radial distribution system in the DELPHI7 programming language. DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.3796
Bidirectional Luo Converter Fed Switched Reluctance Motor R. Balamurugan; M. Vishvanath
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 12: December 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The present work aims at designing and modelling of a bidirectional DC-DC LUO converter for driving a Switched Reluctance Motor. LUO converters are new series of DC/DC Converters that have very low ripple of voltage and current and have output wave with high quality, high power density and high transfer voltage gain and don’t have circuit elements parasitic limits of traditional converters. LUO converters have very high voltage transfer gains in geometric progression on stage by-stage. A C- Dump converter is used to drive the SRM drive. The present design aims at improving the efficiency of the Switched Reluctance Motor drive system by the incorporation of the bidirectional DC-DC LUO converter between the electrical source and the drive system.  http://dx.doi.org/10.11591/telkomnika.v12i12.6883 
IR and Multi Scale Retinex image Enhancement for Concealed Weapon Detection Nashwan Jasim Hussein; Fei Hu; Hao Hu; Abdalrazak Tareq Rahem
Indonesian Journal of Electrical Engineering and Computer Science Vol 1, No 2: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v1.i2.pp399-405

Abstract

A Concealed Weapon Detection (CWD) had been developed by a large number of researchers and technologies. As a result of the weakness of the infrared images in unique altogether graphic items, infrared and MMW images become inaccurate and insufficient to obviously detectand deal withweaponry objectsin an invisible setting. This article uses Multi Scale Retinex and contrast stretching image processing enhancement techniques to improve the recognition of weapons concealed below attire. Specifically, the focus of the study is on detecting weapons and ammos by enhancing the IR pictures based on image processing techniques. Evaluation techniques were empirically proved to be able to show the enhancement percentage progress.
State Estimation for Electrolytic Capacitor with Parameter Fitting Wang Lei; Xu Chunmei; Du Huiqing; Meng Linghui
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 8: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Metro supply system composed of PWM rectifier, i.e. supply system with bi-directional power flow, contributes much to improve supply quality. However, the electrolytic capacitors, working as DC-side supporting capacitor, are relatively weakest in the whole system, so that state estimation for electrolytic capacitor should be taken into consideration. In view of the difficulty in application of conventional capacitor estimation approach with voltage and current ripples into PWM rectifier, this paper proposes a novel approach, which first searches into capacitor’s aging mechanism, presents approximate relation between capacitance and equivalent serial resistance of electrolytic capacitor through mathematical fitting, and then derives the discrete iterative equations of  capacitance and equivalent serial resistance from the analytical model of PWM rectifier. Finally, capacitor state estimation is combined with Miner criterion, which implies digital accumulated damage principle. DOI: http://dx.doi.org/10.11591/telkomnika.v11i8.3049 
Faults Signature Extraction in Wind Farm Integrated Transmission Line Topology Osaji Emmanuel; Mohammad Lutfi Othman; Hashim Hizam; Muhammad M. Othman; Elhad Akar E.; Okeke Chidiebere A.; Nwagbara Samuel O.
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp246-253

Abstract

The integration of Renewable Green Energy Sources (RGES) like Wind Farm Generators (WFG), and Photo Voltaic (PV) systems into convention power system as a future solution to the increase in global energy demands, generation cost reduction, and limited climate impact. The innovation introduced protection compromise challenges in power system due to in-feeds fault current penetration from RGES on existing system, leading to an undesired trip of the healthy section of TL, equipment damages, and safety failure. A comparison study of extracted faults signature from two proposed Transmission Line (TL) network topologies with and without WFG integration, for onward fault identification, and classification model design. Descrete wavelet multiresolution Analysis (DWMRA) of extracted one-cycle fault signal signatures from 11 faults type’s scenarios in Matlab. Result demonstrated a unique fault signatures across all simulated faults scenarios harness for future work of an adaptive unit protection model for this new area of DG integration.

Page 52 of 918 | Total Record : 9174


Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue