cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Analysis of IPv6 jumbogram packages transmission using jumbo frame in mikrotik-based tunneling Yahya Hidayatullah; Arief Marwanto; Imam Much Ibnu Subroto
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp329-337

Abstract

The validation and accuracy of internet protocol version 6 (IPv6) performance using jumbo frames is still not perfect, due to peer-to-peer connections testing within the same operating system and between operating systems. Therefore, inaccurate data test results. To mitigated, testing with a wider platform is recommended, a medium-scale network connection is proposed such as metropolitan area networks. In this works, a connection between computer devices connected by three proxy routers are made, with different IPv6 segments on each port. Then each computer device sends traffic data to each other using a traffic-generator application. The first test through three routers without tunnel connection is carried out as the first scenario to compare performance with tunnel-based testing. Three parameters have been used in this test, such as maximum transfer unit (MTU) 1500 bytes, MTU 400 bytes and MTU 9000 bytes. The results of the tests conducted show that the use of jumbo frames using a proxy is less effective, even though it produces a larger throughput when using the MTU 4000, but there is fragmentation in the packet passing through the proxy because the packet passing through the proxy is split into 1500 byte sizes.
Linear equation for text cryptography using letters' coordinates Thamir A. Jarjis; Yahya Q. I. Al-Fadhili
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp548-553

Abstract

The linear encryption such as Caesar, mono-alphabetic are used to solve the encryption problem in different fields. This module usually encrypts any letter to exact and one corresponding letter. With advanced technologies in computers, these algorithms seem not to be high level secure. This paper proposed a secure encryption algorithm using modified linear encryption by considering the letters’ positions of the plaintext body. Two advantages the proposed algorithm has against traditional ones. First, the cryptography procedures are simple and secure. Secondly, it has higher security because of the non- ingrained nature of poly-alphabetic for substitution. Consequently, the plaintext body is considered as a 2-D matrix, such that, each letter has two coordinates, the ith and jth. These procedures depend on substituting the coordinates of the letter into a linear equation to provide a different substitution letter. The performance of these procedures showed better and robust results by applying the frequency analysis test for this proposed algorithm evaluating.
Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix Adityas Widjajarto; Muharman Lubis; Vreseliana Ayuningtyas
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1643-1653

Abstract

The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.
Identification of optimum segment in single channel EEG biometric system Muhammad Afif Hendrawan; Pramana Yoga Saputra; Cahya Rahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1847-1854

Abstract

Nowadays, biometric modalities have gained popularity in security systems. Nevertheless, the conventional commercial-grade biometric system addresses some issues. The biggest problem is that they can be imposed by artificial biometrics. The electroencephalogram (EEG) is a possible solution. It is nearly impossible to replicate because it is dependent on human mental activity. Several studies have already demonstrated a high level of accuracy. However, it requires a large number of sensors and time to collect the signal. This study proposed a biometric system using single-channel EEG recorded during resting eyes open (EO) conditions. A total of 45 EEG signals from 9 subjects were collected. The EEG signal was segmented into 5 second lengths. The alpha band was used in this study. Discrete wavelet transform (DWT) with Daubechies type 4 (db4) was employed to extract the alpha band. Power spectral density (PSD) was extracted from each segment as the main feature. Linear discriminant analysis (LDA) and support vector machine (SVM) were used to classify the EEG signal. The proposed method achieved 86% accuracy using LDA only from the third segment. Therefore, this study showed that it is possible to utilize single-channel EEG during a resting EO state in a biometric system.
Load shedding scheme based metaheuristic technique for power system controlled islanding N. Z. Saharuddin; I. Zainal Abidin; H. Mokhlis; E. F. Shair
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1306-1314

Abstract

Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. The implementation of controlled islanding will lead to the formation of few islands, that can operate as a stand-alone island. However, some of these islands may not be balanced in terms of generation and load after the islanding execution. Therefore, a good load shedding scheme is required to meet the power balance criterion so that it can operate as a balanced stand-alone island. Thus, this paper developed a load shedding scheme-based metaheuristics technique namely modified discrete evolutionary programming (MDEP) technique to determine the optimal amount of load to be shed in order to produce balanced stand-alone islands. The developed load shedding scheme is evaluated and validated with two other load shedding techniques which are conventional EP and exhaustive search techniques. The IEEE 30-bus and 39-bus test systems were utilized for this purpose. The results proves that the load shedding based MDEP technique produces the optimal amount of loads to be shed with shortest computational time as compared with the conventional EP and exhaustive search techniques.
An analysis of manual and autoanalysis for submicrosecond parameters in the typical first lightning return stroke Muhammad Akmal Bahari; Zikri Abadi Baharudin; Tole Sutikno; Ahmad Idil Abdul Rahman; Mohd Ariff Mat Hanafiah; Mazree Ibrahim
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1451-1457

Abstract

The mechanism on how lightning detection system (LDS) operated never been exposed by manufacturer since it was confidential. This scenario motivated the authors to explore the issue above by using MATLAB to develop autoanalysis software based on the feature extraction. This extraction is intended for recognizing the parameters in the first return stroke, and compare the measurement between the autoanalysis software and the manual analysis. This paper is a modification based on a previous work regarding autoanalysis of zero-crossing time and initial peak of return stroke using features extraction programming technique. Further, the parameter on rising time of initial peak is added in this autoanalysis programming technique. Finally, the manual analysis using WaveStudio (LeCroy product) of those two lightning parameters is compared with autoanalysis software. This study found that the autoanalysis produce similar result with the manual analysis, hence proved the reliability of this software.
Internet of things based attendance system design and development in a smart classroom Dania Eridani; Eko Didik Widianto; Ike Pertiwi Windasari; Wildan Budi Bawono; Nadia Febrianita Gunarto
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1432-1439

Abstract

Attendance records are one of the main administrative roles on campuses. Therefore, several technologies can be used on an attendance system, including barcode, radio frequency identification (RFID), fingerprint, and faceprint. The main functions of attendance systems on campuses are mainly focused on how to obtain the attendee data list, store on the database, and display the list on the information system. This research proposes an attendance system in the smart classroom which supports the system’s previous activities as well as its integration with security and classroom management. In this system, the NodeMCU which was connected to the Wi-Fi router served as the controller, while the fingerspot revo FF-153BNC functioned as the system input. In addition, the database server was used to allocate attendee and classroom management data. This system is connected with the information system and classroom display unit, and component and system testing were applied in this research. The results showed that each system unit successfully integrated and managed the attendance, security, and classroom schedule.
New application of non-binary Galois fields Fourier transform: digital analog of convolution theorem Elizaveta S. Vitulyova; Dinara K. Matrassulova; Ibragim E. Suleimenov
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1718-1726

Abstract

It is shown that the use of the representation of digital signals varying in the restricted amplitude range through elements of Galois fields and the Galois field Fourier transform makes it possible to obtain an analogue of the convolution theorem. It is shown that the theorem makes it possible to analyze digital linear systems in same way that is used to analyze linear systems described by functions that take real or complex values (analog signals). In particular, it is possibile to construct a digital analogue of the transfer function for any linear system that has the property of invariance with respect to the time shift. It is shown that the result obtained has a fairly wide application, in particular, it is of interest for systems in which signal processing methods are combined with the use of neural networks.
Density-based classification with the DENCLUE algorithm Mouhcine El Hassani; Noureddine Falih; Belaid Bouikhalene
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp269-278

Abstract

Classification of information is a vague and difficult to explore area of research, hence the emergence of grouping techniques, often referred to Clustering. It is necessary to differentiate between an unsupervised and a supervised classification. Clustering methods are numerous. Data partitioning and hierarchization push to use them in parametric form or not. Also, their use is influenced by algorithms of a probabilistic nature during the partitioning of data. The choice of a method depends on the result of the Clustering that we want to have. This work focuses on classification using the density-based spatial clustering of applications with noise (DBSCAN) and DENsity-based CLUstEring (DENCLUE) algorithm through an application made in csharp. Through the use of three databases which are the IRIS database, breast cancer wisconsin (diagnostic) data set and bank marketing data set, we show experimentally that the choice of the initial data parameters is important to accelerate the processing and can minimize the number of iterations to reduce the execution time of the application.
Active tremor control in human-like hand tremor using fuzzy logic Hafiz Bin Jamaludin; Azizan As'arry; R. Musab; Khairil Anas Md Rezali; Raja Mohd Kamil Bin Raja Ahmad; Mohd Zarhamdy Bin Md. Zain
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp108-115

Abstract

Tremoris the vibration in sinusoidal orientation that is experienced regularly by a person with Parkinson’s disease (PD), which disturbs their daily activities. One solution that may be used to counter this tremor effect is by developing an active tremor control system in LabVIEW for linear voice coil actuator (LVCA), where the system uses proportional (P) controller and various types of fuzzy logic controller (FLC) as a hybrid controller to reduce tremor vibration. From this research, it can be concluded that the best controller for tremor reduction is the P+FLC 1st set of rules, compared to P+FLC 2nd set of rules, and P controller only, with the highest percentage of 88.39% of tremor reduction with the actual tremor vibration of PD patients as the reference result. The P+FLC 2nd set of rules has the highest percentage of tremor reduction with a value of 86.81%, whereas P controller only has the highest tremor reduction percentage of 67.10%. This percentage of tremor reduction is based on the power spectral density (PSD) values, in which it represents the intensity of the tremor vibration. This experimental study can be used as an initial step for researchers and engineers to design and develop an anti-tremor device in the future.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue