cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Artificial-neural-network based unified power flow controller for mitigation of power oscillations Vireshkumar Mathad; Gururaj Kulkarni
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1323-1331

Abstract

The series and shunt control scheme of unified power flow controller (UPFC) impacts the performance and stability of the power system during power swing. UPFC is the most versatile and voltage source converter device as it can control the real and reactive power of the transmission system simultaneously or selectively. When any system is subjected to any disturbance or fault, there are many challenges in damping power oscillation using conventional methods. This paper presents the neural network-based controller that replaces the proportional-integral (PI) controller to minimize the power oscillations. The performance of the artificial neural network (ANN) controller is evaluated on IEEE 9 bus system and compared with a conventional PI controller.
Predicting temperature of Erbil City applying deep learning and neural network Sardar M. R. K. Al- Jumur; Shahab Wahhab Kareem; Raghad Z. Yousif
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp944-952

Abstract

One of the most significant and daunting activities in today's world is temperature prediction. The meteorologists traditionally predict temperature via some statistical models aimed to forecast the fluctuations that might have happened to atmospheric parameters such as temperature, humidity, etc. The main objective of this paper is to build an intelligent temperature prediction model of Erbil city in KRG/ Iraq based on a historical dataset from 1992 to 2016 in each year there are twelve months’ average temperature readings from (January to December). Hence to resolve this prediction problem an up-to-date deep learning neural network has been used, the network model is based on long short-term memory (LSTM) as an artificial recurrent neural network (RNN) architecture which employed to estimate the future average temperature. The implementing model uses the dataset from real-time 30 weather stations deployed in the area of the city. The prediction performance of the proposed recurrent neural network model has been compared with some state of art algorithms like Adeline neural network, Autoregressive neural network (NAR), and  generalized regression neural network (GRNN). The results show that the proposed model based on deep learning gives minimum prediction error.
The trends of supervisory control and data acquisition security challenges in heterogeneous networks M. Agus Syamsul Arifin; Susanto Susanto; Deris Stiawan; Mohd Yazid Idris; Rahmat Budiarto
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp874-883

Abstract

Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.
Categorizing and measurement satellite image processing of fire in the forest greece using remote sensing Ali Abdul Wahhab Mohammed; Hussein Thary Khamees
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp846-853

Abstract

This paper has been utilized satellite Sentinel-2A imagery, this satellite is a polar-orbiting, multispectral high-resolution to cover Athens city, Greece that located at latitude (37° 58′ 46″) N, (23° 42′ 58″) E.,the work aims to measurement and study the wildfires natural resourcesbefore and after fire break out that happenedin forests of Athens city in Greece for a year (2007, 2018) and analysis the damage caused by these wildfiresand their impact on environment  and soil  by categorize the satellite images for the interested region before and after wildfires for a year (2007) and  a year (2018) and Discuss techniques that compute the area covered of each class and lessen  or limit the rapidly spreading wildfires damage.The categorizing utilizing the moments with (K-Means) grouping algorithm in RS (remote sensing). And the categorizing results show five unique classes (water, trees, buildings without tree, buildings with tree, bare lands) where, it can be notice that the region secured by each class before and after wildfires and the changed pixels for all classes.The experimental resulted of categorizing technique shows that the good performance exactness with a good categorizing and result analysisa bout the harms resulted from the fires in the forest Greece for a years (2007 and 2018).
Evaluation quality of service for internet of things based on fuzzy logic: a smart home case study Lairedj Aboubaker Saddik; Ben Ahmed Khalifa; Bounaama Fateh
Indonesian Journal of Electrical Engineering and Computer Science Vol 25, No 2: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v25.i2.pp825-839

Abstract

The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
A hybrid deep learning model for air quality time series prediction Samit Bhanja; Abhisek Das
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1611-1618

Abstract

Air quality (mainly PM2.5) forecasting plays an important role in the early detection and control of air pollution. In recent times, numerous deep learning-based models have been proposed to forecast air quality more accurately. The success of these deep learning models heavily depends on the two key factors viz. proper representation of the input data and preservation of temporal order of the input data during the feature’s extraction phase. Here we propose a hybrid deep neural network (HDNN) framework to forecast the PM2.5 by integrating two popular deep learning architectures, viz. Convolutional neural network (CNN) and bidirectional long short-term memory (BDLSTM) network. Here we build a 3D input tensor so that CNN can extract the trends and spatial features more accurately within the input window. Here we also introduce a linking layer between CNN and BDLSTM to maintain the temporal ordering of feature vectors. In the end, our proposed HDNN framework is compared with the state-of-the-art models, and we show that HDNN outruns other models in terms of prediction accuracy.
Implementation of wheelchair controller using mouth and tongue gesture Rafia Hassani; Mohamed Boumehraz; Maroua Hamzi
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i3.pp1663-1671

Abstract

In this paper, a simple human-machine interface allowing people with severe disabilities to control a motorized wheelchair using mouth and tongue gesture is presented. The development of the proposed system consists of three principal phases: the first phase is mouth detection which performed by using haar cascade to detect the face area and template matching to detect mouth and tongue gestures from the lower face region. The second phase is command extraction; it is carried by determining the mouth and tongue gesture commands according to the detected gesture, the time taken to execute the gestures, and the previous command which is stored in each frame. Finally, the gesture commands are sent to the wheelchair as instruction using the Bluetooth serial port. The hardware used for this project were; laptop with universal serial bus (USB) webcam as a vision-based control unit, Bluetooth module to receive instructions comes from the vision control unit, standard joystick used in case of emergency, joystick emulator which delivers to the control board signals similar to the signals that are usually generated by the standard joystick, and ultrasonic sensors to provide safe navigation. The experimental results showed the success of the proposed control system based on mouth and tongue gestures.
An improved vigener algorithm based on circular-left-shift key and MSB binary for data security Aso Ahmed Majeed; Banaz Anwer Qader
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp431-437

Abstract

Cryptography is a significant study area at present since it can be vital to protect exceedingly sensitive and secret information from illegal fraud during network transmission. One of the basic cryptographic algorithms is the Vigenere cipher, which is a very easy encryption method to be used as an alternative to Caesar cipher for encrypting the text of the message. In this paper, we enhance the Vigenere algorithm and propose a new method by shifting the key in each message to prevent repeating the messages. Also, it converts the messages into binary form rather than an alphabet. Furthermore, it adds a few bits of random padding to each block of outputs to send a series of bits. The proposed algorithm is named “Circular-Left-Shift Key-based Vigener Algorithm using MSB Binary (CLS-V-MSB)”. Finally, this technique slightly raises the size of the ciphertext, but substantially increases the cipher's protection, achieves the security objectives (authentication, confidentiality, integrity, freshness, and non-repudiation), and avoids Kasiski and Friedman.
K-means method for clustering learning classes A. D. Indriyanti; D. R. Prehanto; T. Z. Vitadiar
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp835-841

Abstract

Learning class is a collection of several students in an educational institution. Every beginning of the school year the educational institution conducts a grouping class test. However, sometimes class grouping is not in accordance with the ability of students. For this reason, a system is needed to be able to see the ability of students according to the desired parameters. Determination of the weight of test scores is done using the K-Means method as a grouping method. Iteration or repetition process in the K-Means method is very important because the weight value is still very possible to change. Therefore, the repetition process is carried out to produce a value that does not change and is used to determine the ability level of students. The results of the class grouping test scores affect the ability of students. Application of K-Means method is used in building an information system grouping student admissions in an educational institution. Acceptance of students will be grouped into 3 groups of learning classes. The results of testing the system that applies K-Means method and based on data on the admission of prospective students from educational institutions have very high accuracy with an error rate of 0.074. 
Design of high scalability multi-subcarrier rof hybrid system based on optical CDMA/TDM Ahmed Ghanim Wadday Ghanim Wadday; Faris Mohammed Ali; Hayder Jawad Mohammed Albattat
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp927-937

Abstract

The technology of radio over fiber (RoF) regard a crucial point to solve problems in wireless communication system. As well as, the growth of internet applications also reveals a tremendous increase in bandwidth for different applications. Therefore, the development of optical networks is very important that have maximum bandwidth by using different multiple access techniques. Optical code division multiple access (OCDMA) technique has considered as a good solution for high bandwidth network. Hybrid optical systems of OCDMA and time division multiplexing (OTDM) has been proposed in this paper to increase the number of simultaneous users. The results of hybrid OCDMA and OTDM system demonstrate that this system can make a considerable increase in the network scalability while ensuring sufficient data rate and an acceptable bit error rate. Where M-user OCDMA signals can be transmitted in different channels of an OTDM system. Due to its wide band facility compared with other access techniques, OCDMA used here. In addition to its high scalability for our radio network, the OTDM and SCM utilized. The combination of these efficient access technique and powerful time-sharing media are lead to increase the framework system scalability.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue