cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Internal mode control based coordinated controller for brushless doubly fed induction generator in wind turbines during fault conditions Ahsanullah Memon; Mohd Wazir Mustafa; Attaullah Khidrani; Farrukh Hafeez; Shadi Khan Baloach; Touqer Ahmed Jumani
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp650-656

Abstract

Brushless double fed induction generator (BDFIG) based machines have gained popularity in wind turbine applications because of their easily accessible design. Low voltage ride through (LVRT) is critical for the reliable integration of renewable energy with the power grid. The refore, LVRT capability of brushless DFIGs makes them an attractive choice for maintaining voltage stability in grid. The existing works on BDFIG control suffer from two major drawbacks. Firstly, the methodology does not consider LVRT as a design metric, and secondly, these techniques do not have any means for coordinating between a machine side inverter (MSI) and grid side inverter (GSI). This results in sub-optimal controller design and eventually result in the violation of grid code requirements. To solve these issues, this paper proposes the use of brushless DFIGs in wind turbines using a control technique based on analytical modeling. Moreover, employing internal model control (IMC), the proposed technique can effectively coordinate the control between the MSI and GSI resulting in reduced oscillations, overshoots and improved stability under fault conditions. Furthermore, the simulation results for wind turbine generators show that the proposed scheme significantly improves the stability and compliance of grid codes ascompared to the existing hardware techniques.
Lion optimization algorithm for team orienteering problem with time window Esam Taha Yassen; Alaa Abdulkhar Jihad; Sudad H. Abed
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp538-545

Abstract

Over the last decade, many nature-inspired algorithms have been received considerable attention among practitioners and researchers to handle several optimization problems. Lion optimization algorithm (LA) is inspired by a distinctive lifestyle of lions and their collective behavior in their social groups. LA has been presented as a powerful optimization algorithm to solve various optimization problems. In this paper, the LA is proposed to investigate its performance in solving one of the most popular and widespread real-life optimization problems called team orienteering problem with time windows (TOPTW). However, as any population-based metaheuristic, the LA is very efficient in exploring the search space, but inefficient in exploiting it. So, this paper proposes enhancing LA to tackle the TOPTW by utilizing its strong ability to explore the search space and improving its exploitation ability. This enhancement is achieved via improving a process of territorial defense to generate a trespass strong nomadic lion to prevail a pride by fighting its males. As a result of this improving process, an enhanced LA (ILA) emerged. The obtained solutions have been compared with the best known and standard results obtained in the former studies. The conducted experimental test verifies the effectiveness of the ILA in solving the TOPTW as it obtained a very competitive results compared to the LA and the state-of-the-art methods across all tested instances.
Feature extraction to predict quality of segregating sweet tamarind using image processing Panana Tangwannawit; Sakchai Tangwannawit
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i1.pp339-346

Abstract

In this modern age, several new methods have been developed, especially in image processing for agriculture business, which consists of technologies derived from artificial intelligence (AI) capabilities called machine learning. Classify is a widely used method to analyze patterns, trends, as well as the body of knowledge from the data visualization. Image classification application improves discrimination and prediction efficiency. The objective of this research was to feature extraction of sweet tamarind and compare the algorithm for classification. This research used images from golden sweet tamarind species with the use of MATLAB and Python language. The steps of this research consisted of 1) preprocessing step for finding the distance to appropriate of the image quality, 2) feature extracting for finding the number of black pixels and the number of white pixels, perimeter, diameter, and centroid, and 3) classifying for algorithms' comparison. The results showed that the camera's distance to the image was 60 cm. The coefficient of determination was at 0.9956, and the Standard Error of Estimate was 7,424.736 pixels. The conclusion of classification found that the random forest had the highest accuracy at 92.00%, SD. = 8.06, precision = 90.12, recall = 92.86, and F1-score = 91.36.
Evaluation of a wireless low-energy mote with fuzzy algorithms and neural networks for remote environmental monitoring Ricardo Yauri; Jinmi Lezama; Milton Rios
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp717-724

Abstract

The devices developed for applications in the internet of things have evolved technologically in the improvement of hardware and software components, in the area of optimization of the life time and to increase the capacity to save energy. This paper shows the development of a fuzzy logic algorithm and a power propagation neural network algorithm in a wireless mote (IoT end device). The fuzzy algorithm changes the transmission frequency according to the battery voltage and solar cell voltage. Moreover,the implementation of algorithms based on neural networks, implied a challenge in the evaluation and study of the energy commitment for the implementation of the algorithm, memory space optimization and low energy consumption.
Enhancement of digital chest images using a modified Sobel edge detection algorithm Archana J. N.; Aishwarya P.; Hanson Joseph
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1718-1726

Abstract

Computed tomography (CT) images are an essential factor in the diagnosing procedure for various diseases affecting the internal organs. Edge detection can be used for the appropriate enhancement of the lung CT scan images for the diagnosis of the various interstitial lung diseases (ILD). In order to solve the issues of edge detection provided by the traditional Sobel operator, the paper proposes a Sobel 12D edge detection algorithm which uses the additional direction templates for the better identification of the edge details. First, the vertical and horizontal directions available in the traditional Sobel operator are extended to few more directions (a total of 12 directions) which enhances the edge extraction ability. Next part, compute the edge detected image using the Sobel 12D, Laplace, Prewitt, Robert’s Cross and Scharr operators for edge detection separately. It is followed by image fusion method which optimizes the edge detection by combining the edge detected images obtained using the Sobel 12D approach and the Laplace operator. The experimental results shows that the proposed algorithms generates a better detection of the edges than the other edge detection operators.
ISODATA SOPC-FPGA implementation of image segmentation using NIOS-II processor Radjah Fayçal; Ziet Lahcene; Benoudjit Nabil
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp818-825

Abstract

This paper presents an FPGA image segmentation-binarization system based on Iterative Self Organizing DATA (ISODATA) threshold using histogram analysis for embedded systems. The histogram module computes pixels levels statistics which are used by the ISODATA algorithm module to determine the segmentation threshold. In our case, this threshold binarizes a gray-scale image into two values 0 or 255. The prototype of the complete system uses an ALTERA CYCLONE-II DE2 kit with a lot of component and interfaces, such as the SD-CARD reader or a camera to read the image to be segmented, the FPGA which will implement the intellectual property (IP) core calculation with the NIOS processor, the VGA interface to view the results, and possibly of the ETHERNET interface for data transfer via internet. The use of FPGA contains the ISODATA, histogram, NIOS processor and others custom altera IPs hardware modules greatly improves processing speed and allows the binarization application to be embedded on a single chip. For the project elaboration, we have used QUARTUS-II software for the hardware development part with VHDL description, SOPC-builder or QSYS for the integration of NIOS-system, and NIOS-II-STB-ECLIPSE for the software program with eclipse c++ langage. 
Measuring information security policy compliance: content validity of questionnaire Angraini Angraini; Rose Alinda Alias; Okfalisa Okfalisa
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp469-475

Abstract

Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative research. This study aims to validate the questionnaire will be used to measure user compliance with policies of information security. This study began by designing a questionnaire and conducting content validation using content ratio validation (CVR) and content index validation (CVI). As many as eight experts from the university assessed the items given. The results of 72 items submitted a questionnaire, as many as 22 items eliminated, and only 50 items that have CVR and CVI values above 0.75. Also, Kappa statistical calculations show that items have excellent reliability among assessors at the item level. This study revealed that this instrument had obtained an appropriate level of validity to measure compliance with information security policies. 
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Noor Syahirah Nordin; Mohd Arfian Ismail; Tole Sutikno; Shahreen Kasim; Rohayanti Hassan; Zalmiyah Zakaria; Mohd Saberi Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1146-1158

Abstract

Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed and four metrics including accuracy, recall, precision, and f-measure. 
Most severe risk factors in software development projects in Kuwait Abdullah J. Al-Shehab; Thalaya Alfozan; Hesham Gadelrab
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp591-600

Abstract

Software development projects are famous of high rate failure, this made an encouragement for researcher to investigate reasons of failure. However, literature covering under developed countries is uncommon. This research investigates the most severe risk factors in software development project in the country of Kuwait. A face-to-face questionnaire with 109 IT practitioners in Kuwait from government and private organizations was conducted. The findings reveal and identify risk factors that have a high impact on the budget, quality, and schedule. The aim of this study is to validate risk factor taxonomy through quantitative methods by experts in the field of IT. Another purpose of this research is to provide a comprehensive and updated review of risk factors from Kuwait to be presented for IT practitioners and researchers.
Improving the design of super-lift Luo converter using hybrid switching capacitor-inductor cell for PV system Hussein Abdul-Khuder Hussein; Hassan Jassim Motlak
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp710-720

Abstract

In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between Continuous Conduction Mode (CCM) and Discontinuous Conduction Mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue