cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Spectral coding performance under free space optical medium A.K Rahman; N Julai; M. Jusoh; C.B.M Rashidi; S.A Aljunid; Anuar M.S; M.F Talib; Nurdiani Zamhari; S.K Sahari; K.F. Tamrin; Rudiyanto P. Jong; D.N.A Zaidel; N.A.A Mohtadzar; M.R.M Sharip; Y.S Samat
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i1.pp290-294

Abstract

 This paper focus on performance of code Zero Correlation-Correlation (ZCC) in free space optical communication. The ZCC code has a superior characteristic which eliminate the overlapping code between any users. Due to this high class characteristic, the code improves the performance of the conventional code in free space optical environment. In this paper the analysis performance of bit error rate is considering the avalanche (APD) noise, thermal noise and multiuser interference. The result shows that ZCC code improve the performance of conventional code in term of number of users, power received and data bit rate.
Types of Circuit Breaker and its Application in Substation Protection Hui Hwang Goh; Sy yi Sim; Nur Iskandar bin Hamzah; Sulaiman bin Mazlan; Chin Wan Ling; Qing Shi Chua; Kai Chen Goh
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i1.pp213-220

Abstract

Power system consists of the generation, transmission, distribution, and substation. All the power system component requires suitable protection devices as the protection system to protect the system during fault occur. In this paper, the circuit breaker has been selected as one of the protection devices in several applications. The types of circuit breaker that has been reviewed in this paper are oil circuit breaker (OCB), air circuit breaker (ACB), sulphur hexafluoride (SF6) circuit breaker, vacuum circuit breaker, and DC breaker which are hybrid DC breaker and solid-state DC breaker. Normally, the systems or the circuits disrupted or damaged by the fault. To implement the protection system in the system or circuit, the type of faults and cause of faults should be known to overcome the fault. To provide the suitable voltage for the consumer, the substation is needed to control the voltage transmitted at high voltage from the generating station. Protection system is also required in a substation.
A Novel M-SEPIC DC-DC Converter for BLDC Pumping System with Active PFC using ANFIS Controller Vamshi Krishna Varma Kshatriya; Ram Kumar A
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i1.pp386-399

Abstract

An exigent consumer related concerns confronted due to utilization of massive front-end AC-DC rectifier in a grid-tied BLDC pumping system. Harmonic distortions are acquired, which prompts the disruption of power quality at utility grid system due to AC-DC conversion. Several factors for enhancing power-quality concerns are ameliorate the grid power-factor along with reduction of harmonic distortions, tightened regulation of DC output voltage. In this way, the DC-DC boost converter plays a unique role; operated in Continuous Conduction Mode. Based on summarizing advantages & disadvantages of classical DC-DC converters, a single switch high voltage gain M-SEPIC DC-DC converter is more suggestive for water pumping system due to non-existence of coupled inductors, low switching loss, low di/dt stress, high efficiency, compact structure, low cost, etc. This work proposes the novel M-SEPIC DC-DC converter fed brushless-DC motor drive is controlled by voltage source inverter and powered by single-phase grid system with improved power-quality features. Moreover, Adaptive Neuro-Fuzzy Inference System is recommended for prediction of optimal switching states to amplify the BLDC motor speed and torque-ripple depreciation. The effectiveness of the proposed scheme is validated under constant speed situations by real-time operating conditions which are evaluated by Matlab /Simulink tool; and simulation results are conferred with attractive comparisons.
Three Phase Trinary Source MLI Using Multicarrier SPWM Strategies T. Sengolrajan; B. Shanthi; M. Arumugam
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper presents a comprehensive analysis of various bipolar Multicarrier Pulse Width Modulation (MCPWM) strategies with Sinusoidal reference for three phase Nine level Trinary Source cascaded  inverter.  A new approach of nine levels is for medium voltage applications. The proposed topology uses reduced number of switching devices and thus reducing losses and low THD in comparison with the conventional topology. The configuration of the circuit is simple and easy to control. Performance factors such as %THD, VRMS where measured and Crest Factor (CF), Distortion Factor (DF), Form Factor (FF) of output voltage were calculated for different modulation indices and the results were compared. VFPWM strategies provides minimum THD and COPWM strategy provides higher fundamental VRMS output voltage. DOI: http://dx.doi.org/10.11591/telkomnika.v13i3.7181 
Improvement of cluster-based WSN protocol using fuzzy logic Jong-Yong Lee; Daesung Lee
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 3: September 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i3.pp1540-1547

Abstract

A wireless sensor network is a collection of wireless nodes with sensor devices that can collect data from the real world. This is because sensor nodes usually use limited-powered batteries. Therefore, if the battery on the sensor node is exhausted, the node will no longer be available. If the battery on some nodes is discharged, the sensor network will not work properly. To maintain sensor network system, there are many wireless sensor network protocols to increase energy efficiency of nodes. One of the energy-efficient methods is cluster-based protocols. These protocols divide the sensor fields into clusters and send and receive data between nodes. Thus, depending on how the cluster is constructed, the network's lifetime may be reduced or increased. Cluster-based protocols cannot always be optimal cluster configurations. These problems have been improved using fuzzy logic. In general, fuzzy logic is used to elect cluster heads based on node residual energy, node concentration and node centrality. However, it is possible that nodes close to each other at a high density area are elected as cluster heads. In this paper, we propose a method to consider the number of adjacent cluster heads instead of Node Concentration to improve the problem.
Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks Teddy Surya Gunawan; Muhammad Kasim Lim; Mira Kartiwi; Noreha Abdul Malik; Nanang Ismail
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp729-737

Abstract

Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
Real Time Application of Fourier Transforms S. S.Shenbaga Ezhil
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp574-577

Abstract

In recent days increasing the use of Fourier transform in various applications. The Fourier transform is the simplest among the other transformation method. It is less time consuming, used in power distribution system, mechanical system, industry and wireless network. Mainly in power distribution system the mitigation of power quality disturbance require fast, accuracy and high noise immune method. In the Fourier Transform (FT) area, the advancements of oversampling, computerized sifting and clamor molding are generally received for smothering the quantization commotion. The powerful quantize bits of an ADC are enhanced in view of these techniques. In any case, when preparing the wideband signs for example, linear frequency modulation flag, these strategies can't get viable results, and need high testing rate.
Encryption Techniques and Wireless Power Transfer Schemes Nur Hazwani Hussin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp183-190

Abstract

Wireless power transfer (WPT) is one of the most useful ways to transfer power. Based on power transfer distances, the WPT system can be divided into three categories, namely, near, medium, and far fields. Inductive coupling and capacitive coupling contactless techniques are used in the near-field WPT. Magnetic resonant coupling technique is used in the medium-field WPT. Electromagnetic radiation is used in the far-field WPT. This paper reviews the techniques used in WPT. In addition, energy encryption plays a major role in ensuring that power is transferred to the true receiver. Therefore, this paper reviews the energy encryption techniques in WPT. A comparison between different techniques shows that the distance, efficiency, and number of receivers are the main factors in selecting the suitable energy encryption technique.
Optimisation of zinc oxide surge arrester design using gravitational search algorithm and imperialist competitive algorithm Syahirah Abd Halim; Azah Mohamed; Nor Azwan Mohamed Kamari; Afida Ayob; Ab Halim Abu Bakar; Hazlee Azil Illias
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i3.pp853-860

Abstract

Reducing electric field stress near the energised end of surge arresters is very important because it may increase the lifetime of the highly stressed ZnO column in vicinity of the high voltage electrode. Most of previous works were based on manufacturers’ procedures and trial and error method to improve the surge arrester designs. In this work, optimisation of ZnO surge arrester design models using Gravitational Search Algorithm (GSA) and Imperialist Competitive Algorithm (ICA) is proposed. The surge arrester models were developed using finite element analysis (FEA) and used to determine the electric field distribution. The optimisation methods were used to determine the arrester design parameters which yield the minimum electric field stress surrounding the energized end of the surge arresters. GSA is less complex since it requires only two parameters to be adjusted i.e. mass and velocity while ICA demonstrates faster convergence and better achievement of global optimum. The performance of the proposed methods was then compared with the manufacturer’s test data and previously developed methods.
Android-Based 3D Visualization of Indonesia Medicinal Plants Lita Karlitasari; Ismanto Ismanto; Agung Prajuhana Putra
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp229-233

Abstract

3D visualization of medicinal plants is the result of the transformation that resembles the original image and are dynamic, so it can be viewed in detail from all sides. Image capture is performed with a level of clarity must be at least 70% so it would be easy when designing a 3D visualization. The medicinal plants collected came from Bogor Botanical Gardens of 11 plants, Ciapus - Bogor of 16 plants, and Cibodas Botanical Gardens of 37 plants. The image capture was done by using the comparison scale of human height, stem, flowers, fruits, and leaves both look forward and backward. Application development was done through the objects collection, object segmentation, object texture creation and 3D object creation. The application of 3D visualization medicinal plants can be enlarged and reduced, and rotated well to the right, left, up, and down. The medicinal plants that appears in the application was in Indonesian and Latin names, taxon and the descriptions. Therefore the general public, students, and researchers can utilize the plant objects much better.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue