Articles
9,174 Documents
Internet of things based vital signs monitoring system: A prototype validity test
Osman Yakubu;
Emmanuel Wireko
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i2.pp962-972
The advent of the internet of things (IoT) has resulted in an upsurge in the deployment of digital health care systems enabling patients’ health conditions to be remotely monitored. This article presents an intelligent and automated IoT-based vital signs monitoring system to aid in patient care. A the oretical framework was established to guide the development of a prototype. It encompasses the patient, IoT sensors, input and storage unit and data processing, analysis and data transmission. The prototype is equipped with the capability of sensing a patient’s body temperature, heart rate, and respiration rate in real time and transmits the data to a cloud data repository for storage and analysis. Alerts are sent to caregivers using SMS, email and voice calls where urgent attention is required for the patient. The voice call isto ensure a caregiver does not miss the alert since SMS and email may not be checked on time. To ensure privacy of patients, a caregiver has to be biometrically verified by either fingerprint or facial pattern. The experimental results confirmed the accuracy of the data gathered by the prototype, privacy of patients is also guaranteed compared to other benchmark systems.
Squirrel cage induction motor fault diagnosis using lissajous curve of an auxiliary winding voltage: case of broken bars
Jelbaoui Yakout Khadouj;
El Menzhi Lamiaà;
Abdallah Saad
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i3.pp1332-1341
The detection of incipient faults has attracted industrials and researchers specific attention in order to prevent the motor breakdown, improve its reability and increase its lifetime. This paper presents a squirrel cage induction machine broken bar and rings diagnosis approach. This technic uses a new monitored signal as an auxiliary winding voltage related to a small coil inserted between two stator phases. Monitoring behaviors of the Lissajous curve of this auxiliary winding voltage park components under different load levels is the main key of this study. For this purpose, the squirrel cage induction machine modeling and the explicit expressions developed for the inserted winding voltage and its Park components will be presented. Then, an induction machine with different broken cases: one broken bar, two broken bars, broken end ring and broken bars with end ring are investigated. The simulation results confirm the validity of the proposed approach.
Video mosaic watermarking using plasma key
Nidaa Flaih Hassan;
Akbas Ezaldeen Ali;
Teaba Wala Aldeen;
Ayad Al-Adhami
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i2.pp619-628
Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of Gaussian noise, JPEG compression, and rotation process.
Temperature and humidity control system for broiler chicken coops
Ramadiani Ramadiani;
Eko Wiji Setio Budianto;
Dharma Widada;
Masayu Widiastuti;
Muhammad Labib Jundillah
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1327-1333
Stress in chickens due to rising cage temperatures is a problem that is often faced by breeders, especially broiler breeders. Research with the title "temperature and humidity control system for broiler chicken coops", has formulated the research problem as follows; how to make an automatic control system to maintain the temperature and humidity of the ras broiler chicken coop to keep it stable using Arduino Uno ATMega328. In this tool it has been set, if the temperature is ≥ 30º C then the water pump will turn on, and the water pump will turn off when the temperature is ≤ 29º C. Based on the results in this study, the temperature and humidity control system succeeded in helping farmers keep the temperature of the ras broiler chicken coop remained stable, so that farmers' production can be increased. In addition, this system also helps efficiency in terms of time and labor, because this system works automatically.
Performance evaluation of PV penetration at different locations in a LV distribution network connected with an off-load tap changing transformer
Dilini Almeida;
Jagadeesh Pasupuleti;
Janaka Ekanayake
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i2.pp987-993
Solar photovoltaic (PV) power generation has shown a worldwide remarkable growth in recent years. In order to achieve the increasing energy demand, a large number of residential PV units are connected to the low voltage (LV) distribution networks. However, high integration of solar PV could cause negative impacts on distribution grids leading to violations of limits and standards. The voltage rise has been recognized as one of the major implications of increased PV integration, which could significantly restrict the capacity of the distribution network to support higher PV penetration levels. This study addresses the performance of the off-load tap changing transformer under high solar PV penetration and a detailed analysis has been carried out to examine the maximum allowable PV penetration at discrete tap positions of the transformer. The maximum PV penetration has been determined by ensuring that all nodal voltages adhere to grid voltage statutory limits. The simulation results demonstrate that the first two tap positions could be adopted to control the grid voltage under higher PV penetrations thus facilitating further PV influx into the existing network.
The measurement set representation of the body posture based on group theory
Deng, Changjian;
Xie, Xiaona
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 3: March 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v25.i3.pp1297-1307
The foundation of measurement is the representation of measurement set. The paper proposes a body posture measurement set representation method based on concepts of group, fields, and ring. It attempts to explore the intrinsic relationship among numerous different measurement set. The attitude sensor is used to measure the attitude, and the measurement set representation and processing are analyzed based on the lie group theory in the paper. In the paper, the paper maps body posture data into image, and it is easier to identify the error of posture measurement data. Meanwhile, the simulation and test results show that the method can represent body posture data and detect it’s defects easily.
Prediction of student’s performance through educational data mining techniques
Nibras Z. Salih;
Walaa Khalaf
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1708-1715
Many educators have worried about the failures of students through academic education. Thus, a variety of predictions have been applied to general information including culture, social, and economic information which wasn’t related to student performance. We have gathered an actual dataset from three years of academic stages of Mustansiriyah University in Iraq. The dataset consists of academic information without any socioeconomic data, it includes forty-four undergraduate students with thirteen attributes. We have proposed a model that explains the correlation between two main subjects which are, mathematics, and control systems. This study aimed to identify student failure of the control systems subject in the third year depending on the academic features of the mathematics subjects in the first and second years. Three algorithms were applied to the dataset including Naïve Bayes, support vector machine, and multilayer perceptron. Since the dataset was imbalanced, this leads to appear overfitting problem in the results so the synthetic minority oversampling technique was utilized to solve this problem. Our results show that the support vector machine algorithm proves an efficient classification after applied synthetic minority oversampling technique. The accuracy of the classifiers was measured from the confusion matrix using the Waikato environment for knowledge analysis (WEKA) tool and its related metrics.
Optimizing the effect of charging electric vehicles on distribution transformer using demand side management
Swapna Ganapaneni;
Srinivasa Varma Pinni
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v25.i1.pp25-34
This paper mainly aims to present the demand side management (DSM) of electric vehicles (EVs) by considering distribution transformer capacity at a residential area. The objective functions are formulated to obtain charging schedule for individual owner by i) minimizing the load variance and ii) price indicated charging mechanism. Both the objective functions profit the owner in the following ways: i) fulfilling their needs, ii) minimizing overall charging cost, iii) lessening the peak load, and iv) avoiding the overloading of distribution transformer. The proposed objective functions were worked on a residential area with 8 houses each house with an EV connected to a 20 kVA distribution transformer. The formulations were tested in LINGO platform optimization modeling software for linear, nonlinear, and integer programming. The results obtained were compared which gives good insight of EV load scheduling without actual price prediction.
Multi-agent class timetabling for higher educational institutions using prometheus platform
Angelita D. Guia;
Melvin A. Ballera
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i3.pp1679-1687
A in a university setting, class scheduling is vital for teaching and learning process. Academic institutions rely on time tables in their day to day activities. University Course Timeframe problem can be resolved by using multi-agent systems-based method which may increase the independence of each department's class scheduling, adaptability in a distributed environment and prevents conflicts between events or resources, and unforeseen allocation through intervention between agents in a dispersed environment. Class timing is performed manually in most of the higher educational institutions, which is a very challenging and time-consuming process. The main objective of the study is to build a multi-agent class timing system that automates the process of class scheduling of higher education institutions (HEIs) using the Prometheus methodology. The implementation of the Prometheus approach in the development of a multi-agent framework has resulted in a complete and comprehensive system covering all phases of software development as applied to the agent systems.
Adaptive security approach for wireless sensor network using RSA algorithm
Maha Salah Asaad;
Muayad Sadik Croock
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v22.i1.pp361-368
A type of distributed and self-regulating network is the wireless sensor network (WSN). The sensor nodes have limited computing capabilities, memory, battery power are needed to ensure a strong security design. In this paper, an adaptive cryptographic scheme for WSN that is operating on routing ad hoc on-demand vector routing (AODV) protocol. The adaptive term refers to the adopted mechanism between heavy and light asymmetric cryptography techniques of RSA. The heavy technique adopts the complete version of RSA algorithm, while the light one considers a reduced complexity version. This is to control the security operation over the included nodes even with low power ratio. In various case studies, the proposed scheme is checked and the result obtained shows the high efficiency of results in terms of protection guarantee.