cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks Muhammad Abul Hassan; Syed Irfan Ullah; Abdus Salam; Arbab Wajid Ullah; Muhammad Imad; Farhat Ullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp465-471

Abstract

Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its resources in path selection process and data routing from source to destination. Selecting of efficient routing protocol to utilize all available resources played vital role in extending network life time. In this article fisheye state routing (FSR) protocol is implemented in FANET and compare networks performance in term of channel utilization, link utilization vs throughput and packet delivery ratio (PDR) with distance sequence distance vector (DSDV), optimized link state routing (OLSR), adhoc on demand distance vector (AODV), dynamic source routing (DSR) and temperary ordered routing protocol (TORA). Experimental analysis slows that FSR is good in term of PDR (16438 packets delivered), channel utilization (89%) and link vs throughput from the rest of routing protocols after addressing of these problems UAVs resources are efficiently utilized (energy).
Information system for monitoring of urban air pollution by heavy metals Zhanar Oralbekova; Zarına Khassenova; Bakhyt Mynbayeva; Makpal Zhartybayeva; Kazizat Iskakov
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1590-1600

Abstract

The authors of the article formulated the information monitoring system of Almaty city (The Republic of Kazakhstan). One of the urgent problems of the modern world is the ecological safety of the urban environment. The well-known unfavorable natural and anthropogenic factors of the Almaty city include the following: geographical and climatic features of the area, the lack of technologies for monitoring atmospheric air and traffic jams. All of the above factors increase the emissions of pollutants into the atmosphere, in particular, toxic heavy metals. A promising direction for solving this problem is the development of real-time monitoring using a mathematical model of data assimilation and the creation of software that allows you to assess the state of the system in real time. In this regard, this article describes the developed information system for the algorithm of data assimilation that optimizes the process of monitoring atmospheric air pollution with heavy metals.
Single phase multifunctional integrated converter for electric vehicles Kondreddy Sreekanth Reddy; Sreenivasappa B. Veeranna
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1342-1353

Abstract

In this paper, a single phase multifunctional integrated converter is proposed for electric vehicles (EVs) with single stage power conversion. The main objective of the proposed topology is to reduce the weight, size, and cost of the power electronic converter system used in EVs compared to the existing topologies that are already available in the industries. The novelty of the proposed topology includes: (i) single converter for charging, propulsion and regenerative braking; (ii) reduction of number of switches to reduce the switching and conduction losses; (iii) improving the efficiency by reducing the value of inductor; (iv) power factor correction for AC grid; and (v) improving the total harmonic distortion of the grid current. The complete analysis of the various modes of operation of the proposed topology is analyzed and implemented through MATLAB/Simulink software simulation and a power factor of 0.9999 and a current total harmonic distortion (THD) of 2.16% is achieved. The proposed topology is also compared with the existing topologies in terms of number of switches, diodes, inductors and capacitors used.
Particle swarm optimization for airlines fleet assignment Abdallah A. Abouzeid; Mostafa Mohei Eldin; Mohammed Abdel Razek
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp427-434

Abstract

Airline fleet assignment is the process of assigning aircraft types to scheduled flight legs in order to minimize operating cost and achieve maximize revenue, while satisfying a set of constraints. This paper formulate the fleet assignment problem for airlines that optimization goal is to minimize the total assignment cost. Particle swarm optimization proposed to solve this model. The model successfully applied to Egyptair airline dataset using the particle swarm optimization and mixed integer programming. The proposed method compared with mixed integer programming and current Egyptair assignment methodology. The results showed that the particle swarm optimization is the best method for the Egyptair fleet assignment process. The solution quality is better than mixed integer programming and Egyptair assignment methodology where we saw a daily cost reduction with a percentage of 14.6% and 19.3% respectively.
Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system Hussam J. Ali; Talib M. Jawad; Hiba Zuhair
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1018-1029

Abstract

In the present time, dam management is considered one of the important challenges for e-government in Iraq, becuase it needs information technology infrastructure, data integrity and protection of user privacy against Internet threats that render such vital infrastructure ineffective. This struggle between the proposed dam management system (DMS) and a multi-tier secure model specifically for the Fallujah dam (and generally for all dams) which is addressed in this paper as a case study. To do this, a relational database design will discuss the development of a multi-tier secure model for integration of the dam management framework with its functions. This paper will discusse encryption and decryption of the dam data using the advanced encryption standard (AES) algorithm with derived keys via PBKDF2 and RNG sequences generator and Slave key for salting protection. The experimental results and analysis on the speed of encryption/decryption process, entropy value, plain text sensitivity, key sensitivity, keyspaceanalysis and histogram analysis will prove the the proposed scheme can impede the known attacks like brute force attacks, statistical and differential.Thus, the encryption scheme can be implemented on the proposed DMS and any other information system, as the implementation which will be presented in the results.
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers Mohammed Boukabous; Mostafa Azizi
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp1131-1139

Abstract

Sentiment analysis (SA) is widely used today in many areas such as crime detection (security intelligence) to detect potential security threats in realtime using social media platforms such as Twitter. The most promising techniques in sentiment analysis are those of deep learning (DL), particularly bidirectional encoder representations from transformers (BERT) in the field of natural language processing (NLP). However, employing the BERT algorithm to detect crimes requires a crime dataset labeled by the lexiconbased approach. In this paper, we used a hybrid approach that combines both lexicon-based and deep learning, with BERT as the DL model. We employed the lexicon-based approach to label our Twitter dataset with a set of normal and crime-related lexicons; then, we used the obtained labeled dataset to train our BERT model. The experimental results show that our hybrid technique outperforms existing approaches in several metrics, with 94.91% and 94.92% in accuracy and F1-score respectively.
Optimal PID controller design using artificial bee colony algorithm for robot arm Ghassan A. Sultan; Muhammed K. Jarjes
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp84-91

Abstract

Proportional integral derivation (PID) controller is used in this paper for optimal design, and tuning by zeigler and nichol (ZN) with artificial bee colony algorithm. The best parameter were found using these algorithms for best performance of a robot arm. The advantage of using ABC were highlighted. The controller using the new algorithm was tested for valid control process. Different colony size has been performed for tuning process, settling time, from time domain performance, rise time, overshot, and steady state error with ABC tuning give better dynamic performance than controller using the (ZN).
Internal pilot insertion for polar codes Walled K. Abdulwahab; Abdulkareem A. Kadhim
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1495-1504

Abstract

Two internal pilot insertion methods are proposed for polar codes to improve their error correction performance. The presented methods are based on a study of the weight distribution of the given polar code. The insertion of pilot bits provided a new way to control the coding rate of the modified polar code on the basis of the Hamming weight properties without sacrificing the code construction and the related channel condition. Rate control is highly demanded by 5G channel coding schemes. Two short-length polar codes were considered in the work with successive cancellation list decoding. The results showed that advantages in the range of 0.1 to 0.75 dB were obtained in the relative tolerance of the modified coded signal to the additive white Gaussian noise and fading channels at a bit error rate of 10−4. The simulation results also revealed that the performance improvements were possible with a careful insertion of the pilots. The modified polar code with pilot insertion provided performance improvement and offered the control of the coding rate without any added complexity at both the encoder and the decoder.
Real-time performance evaluation of BGSLibrary algorithms for intelligent surveillance Imane Benraya; Nadjia Benblidia; Yasmine Amara
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1491-1498

Abstract

Background subtraction is the first and basic stage in video analysis and smart surveillance to extract moving objects. In fact, the background subtraction library (BGSLibrary) was created by Andrews Sobral in 2012, which currently combines 43 background subtraction algorithms from the most popular and widely used in the field of video analysis. Each algorithm has its own characteristics, strengths and weaknesses in extracting moving objects. The evaluation allows the identification of these characteristics and helps researchers to design the best methods. Unfortunately, the literature lacks a comprehensive evaluation of the algorithms included in the library. Accordingly, the present work will evaluate these algorithms in the BGSLibrary through the segmentation performance, execution time and processor, so as to, achieve a perfect, comprehensive, real-time evaluation of the system. Indeed, a background modeling challenge (BMC) dataset was selected using the synthetic video with the presence of noise. Results are presented in tables, columns and foreground masks.
Isolated Arabic handwritten words recognition using EHD and HOG methods Mamoun Jassim Mohammed; Suphian Mohammed Tariq; Hayder Ayad
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp801-808

Abstract

Handwriting recognition is a growing field of study in computer vision, artificial intelligence and pattern recognition technology aimed to recognizing texts and handwritings of hefty amount of produced official documents and paper works by institutes or governments. Using computer to distinguish and make these documents accessible and approachable is the goal of these efforts. Moreover, recognition of text has accomplished practically a major progress in many domains such as security sector and e-government structure and more. A system for recognition text’s handwriting was presented here relied on edge histogram descriptor (EHD), histogram of orientated gradients (HOG) features extraction and support vector machine (SVM) as a classifier is proposed in this paper. HOG and EHD give an optimal features of the Arabic hand-written text by extracting the directional properties of the text. Besides that, SVM is a most common machine learning classifier that obtaining an essential classification results within various kernel functions. The experimental evaluation is carried out for Arabic handwritten images from IESK-ArDB database using HOG, EHD features and proposed work provides 85% recognition rate.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue