cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
A note on complex fuzzy subfield Muhammad Gulzar; Fareeha Dilawar; Dilshad Alghazzawi; M. Haris Mateen
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1048-1056

Abstract

In this paper, we introduce idea of complex fuzzy subfield and discuss its various algebraic aspects. We prove that every complex fuzzy subfield generate two fuzzy fields and shows that intersection of two complex fuzzy subfields is also complex fuzzy subfields. We also present the concept of level subsets of complex fuzzy subfield and shows that level subset of complex fuzzy subfield form subfield.  Furthermore, we extend this idea to define the notion of the direct product of two complex fuzzy subfields and also investigate the homomorphic image and inverse image of complex fuzzy subfield.
Smart agriculture monitoring system for outdoor and hydroponic environments Edwin, Bijolin; Veemaraj, Ebenezer; Parthiban, Pradeepa; Devarajan, Joseph Pushparaj; Mariadhas, Vargheese; Nainar, Ahila Arumuga; Reddy, Maheshwar
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 3: March 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i3.pp1679-1687

Abstract

Agriculture plays an important role in economic aspects in most countries like India. Numerous problems associated with farming are continuously affecting the actions that are happening in the country. A potential resolution for such issues to be eradicated, one should combine the technological advancements with current ongoing agricultural practices. Good agricultural practice will increase crop productivity and reduce unwanted water usage. Many authors have done research on temperature, nutrition, and pH-controlled systems. But no one concentrated on alert messages sent to the mobile phone. The main objective of the proposed system measures various natural aspects that use a global system for mobile communication (GSM) module that is connected to an Arduino to transfer the data that is obtained by the sensors to an internet of things (IoT) application programming interface (API) which is a kind of cloud computing of obtained data, this data can be analyzed if needed, and an alert short message service (SMS) is sent to the cell phone/mobile phone. The alert message can be done through conversational artificial intelligence (CAI). It is the collection of technologies behind triggering the message that will be sent automatically to the mobile as an SMS if any of the sensor values that are generating are not under already specified threshold values.
Payload and quality augmentation using steganographic optimization technique based on edge detection Mafaz Alanezi; Iman Subhi Mohammed Altaay; Saja Younis Hamid Malla'aloo
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp529-539

Abstract

Information security is one of the most significant processes that must be taken into account when confidentially transferring information. This paper introduces a steganography technique using the edge detection method. It focused on three basic and important aspects’ payload, quality and security. Well-known edge detectors were used to generate as many edge pixels as possible to hide data and achieve the highest payload. The least significant bit (LSB) algorithm has been improved by extending the bits used to embed between 2-4 bits in smooth and sharp areas. To increase security, the transaction between the two parties is based on dividing the key and the cover image into several parts and agreeing on the type of edge detection.The experiments achieved the maximum load, for instance with a fuzzy edge detector, at first, embedding in 4 bitplanes if edge pixel and in 2 bitplanes if non-edge pixel, the peak signal-to-noise ratio (PSNR) increased from 43.580to 45.790. At second, embedding in 2 bitplanes if edge pixel, and in 4 bitplanes if non-edge pixel, the PSNR decreased between 38.433-41.593. The suggested scheme achieved a high pay load to embed in the cover image and according to human perception, it preserved the nature of the original image.
A new remote monitoring device to track magnetic resonance imaging machine cooling system failures Oussama Elallam; Mohamed Hamlich
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i1.pp298-306

Abstract

The magnetic resonance imaging (MRI) machine cooling system has a vital role in the conduct of MRI examinations because a shutdown of the MRI cooling system in the absence of the manipulators can lead to grave consequences over time, like quench, which is the vaporization of helium liquid in the MRI tank, and it's the most expensive MRI failure. To limit the risks of this problem, several companies have tried to develop a monitoring system to track MRI cooling system failures but all solutions proposed are complicated and demand many connections with MRI. The proposed solution is simple, easy, and efficient requires only one joint with the helium compressor, and it has a humidity and temperature sensor to detect quench incident, it works using an advanced monitoring algorithm that evaluates the status of the cooling system and identifies breakdowns, in case of failure our system will send short message service (SMS) notifications and emails to the customer service team. The proposed solution shows the potential for starting the research to understand the relationship between the behavior of the MRI cooling system and the quench using machine learning algorithms.
Improved grey wolf algorithm for optimization problems Hafiz Maaz Asgher; Yana Mazwin Mohmad Hassim; Rozaida Ghazali; Muhammad Aamir
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1573-1579

Abstract

The grey wolf optimization (GWO) is a nature inspired and meta-heuristic algorithm, it has successfully solved many optimization problems and give better solution as compare to other algorithms. However, due to its poor exploration capability, it has imbalance relation between exploration and exploitation. Therefore, in this research work, the poor exploration part of GWO was improved through hybrid with whale optimization algorithm (WOA) exploration. The proposed grey wolf whale optimization algorithm (GWWOA) was evaluated on five unimodal and five multimodal benchmark functions. The results shows that GWWOA offered better exploration ability and able to solve the optimization problem and give better solution in search space. Additionally, GWWOA results were well balanced and gave the most optimal in search space as compare to the standard GWO and WOA algorithms.
Recently employed engineering techniques to reduce the spread of COVID-19 (corona virus disease 2019): a review study Bander Saman; Mahmoud M. A. Eid; Marwa M. Eid
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp277-286

Abstract

The main challenges of today’s global health care system are to reach to strong healthcare system, to provide effective methods to eliminate the increase in the number of dead and infected with virus of COVID-19. Therefore, during the last few months, the great importance and efficacy of a variety of engineering techniques that have greatly contributed in curbing the spread of the COVID-19, and evenly help to eliminate it according to recent scientific studies was highly prominent. Among these promising technologies in this field we mention, but not limited to, the use of ultraviolet (UV) rays to disinfection of air and surfaces. In addition, thermal imaging technology, which was employed using infrared radiation for monitoring people in crowded areas and human groups to determine who have abnormal temperatures, so that all preventive measures are taken. Robots have also been used and harnessed to perform many tasks that limit the spread of the virus and maintain the integrity of the human element. Last but not least, facial recognition techniques have also been used to limit the spread of this pandemic. Ultraviolet radiation is one of physical therapy modalities that can be used to increase the efficiency of human immune system to fight the virus. In conclusion UV radiation, infrared thermal imaging, robotics, AFR technologies are now widely used to reduce the spread of this virus and manage the outbreak.
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks Baban Ahmed Mahmood; Aso Ahmed Majeed; Ahmed Chalak Shakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1193-1200

Abstract

The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.
Adopting the cybersecurity concepts into curriculum: the potential effects on students’ cybersecurity knowledge Azzeh, Mohammad; Mousa Altamimi, Ahmad; Albashayreh, Mahmood; AL-Oudat, Mohammad A
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 3: March 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i3.pp1749-1758

Abstract

This study examines the effect of adopting cybersecurity concepts on the information and technology (IT) curriculum and determines the potential effect on students' knowledge of cybersecurity practices and level of awareness. To this end, a pilot study was first conducted to measure the current level of cybersecurity awareness. The results revealed that students do not have much knowledge of cybersecurity. Thus, a four-step approach was proposed to infuse the relevant cybersecurity topics in five matched courses based on the latest cybersecurity curricular guidelines (CSEC2017). A sample of 42 students was selected purposively without prior knowledge of cybersecurity and divided identically into experimental and control groups. Students in the experimental group were asked to take five consecutive courses over five semesters. In each course, groups went through a pre-test for the infused topics. Then, the experimental group taught the corresponding infused topics. A post-test was administered to both groups at the end of each course, and the t-test was conducted. The results found significant differences between marks of prior and post-tests for 11 out of 14 infused topics. These satisfactory results would encourage universities to infuse cybersecurity concepts into their curriculum.
Hybrid model for movie recommendation system using content K-nearest neighbors and restricted Boltzmann machine Dayal Kumar Behera; Madhabananda Das; Subhra Swetanisha; Prabira Kumar Sethy
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp445-452

Abstract

One of the most commonly used techniques in the recommendation framework is collaborative filtering (CF). It performs better with sufficient records of user rating but is not good in sparse data. Content-based filtering works well in the sparse dataset as it finds the similarity between movies by using attributes of the movies. RBM is an energy-based model serving as a backbone of deep learning and performs well in rating prediction. However, the rating prediction is not preferable by a single model. The hybrid model achieves better results by integrating the results of more than one model. This paper analyses the weighted hybrid CF system by integrating content K-nearest neighbors (KNN) with restricted Boltzmann machine (RBM). Movies are recommended to the active user in the proposed system by integrating the effects of both content-based and collaborative filtering. Model efficacy was tested with MovieLens benchmark datasets.
An analytical approach for LQR design for improving damping performance of multi-machine power system Sreenivas Uravakonda; Vijaya Kumar Mallapu; Venkateswara Reddy Annapu Reddy
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i1.pp51-58

Abstract

In a multi-machine environment, the inter-area low-frequency oscillations induced due to small perturbation(s) has a significant adverse effect on the maximum limit of power transfer capacity of power system. Conventionally, to address this issue, power systems were equipped with lead-lag power system stabilizers (CPSS) for damping oscillations of low-frequency. In recent years the research was directed towards optimal control theory to design an optimal linear-quadratic-regultor (LQR) for stabilizing power system against the small perturbation(s). The optimal control theory provides a systematic way to design an optimal LQR with sufficient stability margins. Hence, LQR provides an improved level of performance than CPSS over broad-range of operating conditions. The process of designing of optimal LQR involves optimization of associated state (Q) and control (R) weights. This paper presents an analytical approach (AA) to design an optimal LQR by deriving algebraic equations for evaluating optimal elements for weight matrix ‘Q’. The performance of the proposed LQR is studied on an IEEE test system comprising 4-generators and 10-busbars.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue