Articles
9,174 Documents
Illuminance levels based on different sky conditions by considering daylight harvesting
Nik Sahidah Nik Ahmad;
N. H. Radzi;
Mohd Noor Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i3.pp1219-1225
Daylight harvesting systems (DHS) offer the most effective and significant to reduce energy consumption. In the lighting system, there are various problems which include waste of energy consumption, inappropriate lighting and increasing greenhouse effect. Therefore, the waste of energy consumption should be reduced by controlling the dimming levels of artificial lighting according to the standard thus reducing the greenhouse effect. Hence, this paper considered the daylight adaptive for the lighting system to determine the dimming level and illuminance level for the office room. The simulation has been carried out using DIALux simulation lighting software to simulate the average daylight and average illuminance level with different conditions sky, which is clear, average, and overcast sky. Based on the result, the illuminance level has complied with the European Standard EN12464-1. Furthermore, the presence of daylight and weather conditions plays an essential role in the lighting system. The illuminance and dimming levels are different depending on the time and type of sky condition at that time. Therefore, the daylight adaptive in the lighting system can reduce the use of artificial light in the room.
Flexibility of Indonesian text pre-processing library
Dian Sa'adillah Maylawati;
Hilmi Aulawi;
Muhammad Ali Ramdhani
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v13.i1.pp420-426
This study aimed to achieve and measure flexibility as a software quality factor of text pre-processing libraries with Indonesian text from social media. Library was built based on a review of some text mining applications that did not yet have a special pre-process for Indonesian text. Text pre-processing libraries were designed and built using an object-oriented approach that was modular to achieve flexibility. Flexibility was measured by the Mc Call Cyclomatic Complexity (CC) metric. Flexibility of library was tested by implementing the library into text mining applications. The results of experiment showed that text pre-processing libraries could be flexible and easy to use without much configuration in text mining applications. It was proved by the value of CC of 2.51 which meant the library or software was not too complex, simple enough, and also flexible to use.
Data Innovation Resource, Information Administration Capacity, and Aggressive Benefit: The Judicious Part of Reserve Assurance
Archenaa J;
E. A. Mary Anitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i3.pp690-694
The part of data innovation in information administration has dependably been a begging to be proven wrong subject in writing and practice. In spite of existing documentation with respect to the connection between IT asset what's more, information administration, restricted data is accessible on the diverse sorts of IT assets portraying this relationship. We coordinate two research streams rising in information administration what's more, broaden the writing on IT knowledge administration linkage by examining the directing part of asset sense of duty regarding conjure an unexpected asset point of view. Information from 168 associations in China give exact proof that three sorts of IT assets emphatically influence information administration capacity (IAC), which is decidedly related to upper hand. Moreover, this examination distinguishes two positive semi directing impacts of asset responsibility on the IT resource–IAC relationship. In particular, asset duty straightforwardly what's more, emphatically upgrades IAC, and reinforces the impacts of IT human and IT relationship assets on IAC. We talk about the hypothetical and viable ramifications of the outcomes.
A Cross Slot Coupling to Enhance Bandwidth of Dual-Layer SIW Structure
M. N. Hafiz;
M. H. Jamaluddin;
R. Selvaraju
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 2: May 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v10.i2.pp617-622
In this paper, design characteristics of cross slot coupling have been explored and realized in a proposed dual-layer SIW prototype for bandwidth enhancement at 10.0 GHz. The assembled prototype consists of two SMA-microstrip input/output interface with low-loss microstrip-taper via transition and two manually stacked SIW structures electrically connected via a small cross slot coupling design. The proposed dual-layer SIW structure is designed using CST software and fabricated using conventional Printed Circuit Board (PCB) manufacturing process on Rogers 4003 C with = 3.38 and = 0.813 mm. The close agreement between simulated and measured results is observed within a frequency range studied of 9.2 GHz to 11.2 GHz with 19.0 % bandwidth performance. The used of cross slot coupling design in the assembled dual-layer SIW structure indicated 9.0 % bandwidth enhancement compared to the conventional multilayer design with rectangular slot coupling. The assembled dual-layer SIW structure with cross slot coupling design shows potential in several RF applications such as radar and satellite communication.
Duty Cylcing Stratagems for Network Permanency in Wireless Sensor Network
Muhammad Toufique;
Hongbo Jiang;
Alaa Rahhoom Hadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 3: September 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v3.i3.pp534-539
Wireless Sensor Networks (WSNs) having Sensor Nodes (SNs) deployed in the field, is penetrating in all fields of life. Commonly used and appreciated by the research community and general user especially. The energy delinquent in WSNs are the main barricades averting whole manipulation expertise. However, their energy embarrassed nature requires the use of energy effective stratagems to maximize network lifetime. Emerging such a Medium Access Control (MAC) code of behavior is burning topic zone in this field. For evade deteriorating imperfect power, redeemable functions proposed in MAC code of behavior. Features are to save energy and thus extend the lifespan of the network. We exploit especially the duty cycle and present this as an energy minimizing tool in MAC protocols.
Creating Model with System Breakdown Structure for System Dynamics
Feldiansyah Bin Bakri Nasution;
Nor Erne Nazira Bazin
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 2: May 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v6.i2.pp447-456
A system is developed as a set of components and subsystems. A subsystem is a smaller system inside the main system and consists of its constituent components. The continual improvement process concept is adopted in System Dynamics’s model creation. New components or subsystems are identified in each cycle of the process. The interrelation between components could be changed as the time is running. The continual improvement process is an ongoing effort in identifying an ideal model. In this paper, the system is explained as the set theory for better understanding. It is emphasized that by breaking down the system into smaller entity such as components and subsystems will make the analytics process more systematic and scalable. It is called as System Breakdown Structure (SBS). At the end of this paper, the model before and after SBS are evaluated by comparing the output and the state of system.
Developing an Userfriendly Online Shopping Web-Site
G saibaba;
prasanth vaidya
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i3.pp1126-1131
In this era of internet, e-commerce is growing by leaps and bounds keeping the growth of brick-and-mortar businesses in the dust. In many cases, brick-and-mortar businesses are resorting to having a counterpart which is internet or e-commerce driven. People in the developed world and a growing number of people in the developing world now use ecommerce websites on a daily basis to make their everyday purchases. Still the proliferation of e-commerce in the underdeveloped world is not that great and there is a lot to desire for It consists of the planning process, which starts with determining the use case, domain modeling and architectural pattern of the web application. The entire development process is primarily divided into two parts: the front-end development and the back end development. The database design is also discussed with an emphasis on its relational connectivity.
Optimum partition in flight route anomaly detection
Mohammad Yazdi Pusadan;
Joko Lianto Buliali;
Raden Venantius Hari Ginardi
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i3.pp1315-1329
Anomaly detection of flight route can be analyzed with the availability of flight data set. Automatic Dependent Surveillance (ADS-B) is the data set used. The parameters used are timestamp, latitude, longitude, and speed. The purpose of the research is to determine the optimum area for anomaly detection through real time approach. The methods used are: a) clustering and cluster validity analysis; and b) False Identification Rate (FIR). The results archieved are four steps, i.e: a) Build segments based on waypoints; b) Partition area based on 3-Dimension features P1 and P2; c) grouping; and d) Measurement of cluster validity. The optimum partition is generated by calculating the minimum percentage of FIR. The results achieved are: i) there are five partitions, i.e: (n/2, n/3, n/4, n/5) and ii) optimal partition of each 3D, that is: for P1 was five partitions and the P2 feature was four partitions
An Non Destructive Test for the Detection of Weld Defects Using Image Processing
Kalaiselvi V;
John Aravindhar D
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i3.pp764-770
Welding is a fabrication of joining materials into one component. Defects are unavoidable during the welding process, and hence the inspection of welds is a most important task in many industries. In this work, a Computer Aided Detection (CAD) system is designed to detect weld defects based on image processing techniques. It is a non-destructive testing which uses X-ray images. The proposed system mainly consists of three stages; gradient image formation, filtration by Gaussian pyramidal filters algorithm and segmentation by Expectation and Maximization (EM) algorithm. In this study, GD X-ray weld image database is used to evaluate the proposed system. The performance analysis of the proposed system is done by measuring the sensitivity, specificity, and accuracy of the segmented image with the help of its corresponding ground truth images.
Analysis Review on Public Key Cryptography Algorithms
Jasmin Ilyani Ahmad;
Roshidi Din;
Mazida Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i2.pp447-454
This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers’ effort since it was invented in the last four decades. The categories of the algorithms had been analyzed which are Discrete Logarithm, Integer Factorization, Coding Theory, Elliptic Curve, Lattices, Digital Signature and Hybrid algorithms. This paper reviewed the previous schemes in different PKC algorithms. The aim of this paper is to present the comparative trends of PKC algorithms based on number of research for each algorithm in last four decades, the roadmap of PKC algorithms since they were invented and the most chosen algorithms among previous researchers. Finally, the strength and drawback of proposed schemes and algorithms also presented in this paper.