cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Analysis and evaluation of symmetrical key ciphers for internet of things smart home Lujain S. Abdulla; Musaria K. Mahmood; Abbas F. Salih; Sulaiman M. Karim
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp1191-1198

Abstract

A large number of sensors and intelligent devices are interconnected via the internet to collect data as part of the internet of things (IoT) applications. Data security is one of the important challenges for these applications due to vulnerability of the internet. IoT devices limiting factors, such as delay-sensitivity, restricted memory, and low computing capability, make choosing the appropriate data encryption standard extremely important. The current research focuses on evaluating four data security, block cipher standards for the IoT smart home application. Considering the encryption/decryption speed, DES, TDES, AES, and SAFER+ standards are evaluated by implementing the algorithms with MATLAB to determine the best security solution. The simulation of the four standards shows the superiority of SAFER+ standard in term of encryption speed compared to others added to its capabilities on security, and software implementation opportunity. The use of classical symmetric key standards for real time data security in the IoT application can be validated through the selection of SAFER+.
A novel image encryption scheme based on DCT transform and DNA sequence Ali A. Yassin; Abdullah Mohammed Rashid; Abdulla J. Yassin; Hamid Alasadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 3: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i3.pp1455-1464

Abstract

Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.
Development of a new system to detect denial of service attack using machine learning classification Mohammad M. Rasheed; Alaa K. Faieq; Ahmed A. Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i2.pp1068-1072

Abstract

Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The objective of this research is to introduce a new algorithm to distinguish normal service requests from the denial of service attacks. Our proposed approach can detect the denial of service attacks by the analysis of the packets sent from the client to the server, which depend on machine learning. Our algorithm collects different datasets of benign network traffic and different types of denial of service attacks, such as DDoS, DoS Hulk, DoS GoldenEye, DoS Slowhttptest and DoS Slowloris, that were used for training. Moreover, our algorithm monitors the network every specific time to find denial of service attack. Our results show that the algorithm can detect the benign cases and distinguish the types of denial of service attack. Furthermore, the results could achieve 99 percentage of correct classification of all selected cases.
Spatial optical transmitter based on on/off keying line coding modulation scheme for optimum performance of telecommunication systems Hazem M. El-Hageen; Aadel M. Alatwi; Ahmed Nabih Zaki Rashed
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp305-312

Abstract

This study has presented a spatial optical transmitter based on on off keying line coding modulation scheme for the optimum performance of telecommunication systems. The encircled flux versus fiber core radius, the 3D graph for fiber mode versus core radius, and the signal power level in dBm versus wavelength through coarse wavelength division multiplexing with a fiber length of 20 km are presented and discussed in detail. The total power measured in W and dBm as well as the signal power amplitude level obtained through the infinite impulse response (IIR) filter based on both Z domain and pole/zero coefficient filter types are illustrated clearly. Signal gain, noise figure, maximum Q factor, and received power are also clarified against bit rates for various modulation line coding schemes.
A new smart approach of an efficient energy consumption management by using a machine-learning technique Maha Yousif Hasan; Dheyaa Jasim Kadhim
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 1: January 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i1.pp68-78

Abstract

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is satisfied. It divides the measured data for actual power (A_p ) of the electrical model into two portions: the training portion is selected for different maximum actual powers, and the validation portion is determined based on the minimum output power consumption and then used for comparison with the actual required input power. Simulation results show the energy expenditure problem can be solved with good accuracy in energy consumption by reducing the maximum rate (A_p ) in a given time (24) hours for a single house, as well as electricity’s bill cost, is reduced.
An analysis of CRM practices in the telecommunication industry in Iraq Hosam Alden Riyadh; Salsabila Aisyah Alfaiza; Abdulsatar Abduljabbar Sultan; Munadil K. Faaeq; Radyan Dananjoyo
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp453-462

Abstract

Today, concerning the capacityto react straight for wardly to client demands and offer the client a profound experience that is customized and interactive, organizations in the telecommunication industry must have the capacity toset up, support and continue the connections toward long-term clients. This study attempts to analyze and observe the customer relationship management (CRM) practices that affectfirm performance telecommunication corporations. Thus, the study employed a qualitative method, the primary data were obtained using the questionnaire and the respondents consisted of 100 people. The results propose that customer relationships' management factors included the gathering of information, the processing of data, the management of information, the loyalty of customers, and the retention of customers with significantly related to the performance of a firm in the industry of telecommunication in Iraq.
A new conjugate gradient algorithms using conjugacy condition for solving unconstrained optimization Aseel M. Qasim; Zinah F. Salih; Basim A. Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1647-1653

Abstract

The primarily objective of this paper which is indicated in the field of conjugate gradient algorithms for unconstrained optimization problems and algorithms is to show the advantage of the new proposed algorithm in comparison with the standard method which is denoted as. Hestenes Stiefel method, as we know the coefficient conjugate parameter is very crucial for this reason, we proposed a simple modification of the coefficient conjugate gradient which is used to derived the new formula for the conjugate gradient update parameter described in this paper. Our new modification is based on the conjugacy situation for nonlinear conjugate gradient methods which is given by the conjugacy condition for nonlinear conjugate gradient methods and added a nonnegative parameter to suggest the new extension of the method. Under mild Wolfe conditions, the global convergence theorem and lemmas are also defined and proved. The proposed method's efficiency is programming and demonstrated by the numerical instances, which were very encouraging.
On active anti-islanding techniques: survey Yasser Ahmed Elshrief; Sameh Abd-Elhaleem; Belal Abo Zalam; Amin D. Asham
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp609-618

Abstract

The phenomenon of feeding loads from any distributed generators (DGs) with a total disconnection of utility grid at the point of common coupling is called Islanding. The DGs are usually independently controlled. Hence, when the islanding problem occurs, the electric utility loses the control and supervision over that section of the power grid. Furthermore, prolonged islanding can prevent reconnection to the power grid and may cause damage due to voltage and frequency excursions. Therefore, the islanding detection, which is also called anti-islanding (AI), is one of the most critical aspects of the integration of DG sources into the power grid. In this paper, a comprehensive survey on the local AI techniques is illustrated, especially active type which is used for improving the performance regarding the size of the non-detection zone and detection speed. Extensive comparisons are provided to demonstrate the effectiveness of each technique.
Accident vehicle types classification: a comparative study between different deep learning models Mardin A. Anwer; Shareef M. Shareef; Abbas M. Ali
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 3: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i3.pp1474-1484

Abstract

Classifying and finding type of individual vehicles within an accident image are considered difficult problems. This research concentrates on accurately classifying and recognizing vehicle accidents in question. The aim to provide a comparative analysis of vehicle accidents. A number of network topologies are tested to arrive at convincing results and a variety of matrices are used in the evaluation process to identify the best networks. The best two networks are used with faster recurrent convolution neural network (Faster RCNN) and you only look once (YOLO) to determine which network will identifiably detect the location and type of the vehicle. In addition, two datasets are used in this research. In consequence, experiment results show that MobileNetV2 and ResNet50 have accomplished higher accuracy compared to the rest of the models, with 89.11% and 88.45% for the GAI dataset as well as 88.72% and 89.69% for KAI dataset, respectively. The findings reveal that the ResNet50 base network for YOLO achieved higher accuracy than MobileNetV2 for YOLO, ResNet50 for Faster RCNN with 83%, 81%, and 79% for GAI dataset and 79%, 78% and 74% for KAI dataset.
Performance enhancement of wireless sensor network by using non-orthogonal multiple access and sensor node selection schemes Duy-Hung Ha; Duy-Binh Ha; Van-Truong Truong; Van-Duc Phan; Q. S. Vu
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp886-894

Abstract

In this paper, we investigate a relaying wireless sensor network (WSN) with the non-orthogonal multiple access (NOMA) and sensor node selection schemes over Rayleigh fading. Precisely, the system consists of two sensor clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors applying the NOMA and sensor node selection schemes transmit the sensing data from the sensor clusters via the relay to the sink. We derived the expressions of outage probability and throughput for two sensor nodes. We also provide numerical results to examine the behavior of the system. Finally, we verify the validity of our analysis by using the Monte-Carlo simulation.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue