cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Modified Vigenère cipher algorithm based on new key generation method Thamer Hassan Hameed; Haval Tariq Sadeeq
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 2: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i2.pp954-961

Abstract

Nowadays, as communication and network technologies evolve in modern life, ensuring the confidentiality of a cryptography system has become a critical requirement. The Vigenère cipher is attracting the attention of cryptography specialists, although the Vigenère cipher algorithm has a problem. The problem is due to a repeating encryption key. As a result of the multiple cryptographic approaches described in the literature, this paper proposes a novel encryption strategy for safe and secure data exchange by utilizing a new key generation process. The proposed encryption approach avoids the issue of repeating keys. Additionally, the classic Vigenère cipher encrypts the plaintext using a 26x26 Vigenère table, the researcher modified the original Vigenère table to 95x95, which adds more potential letters, mathematical symbols, numerals, and punctuation to a standard QWERTY keyboard layout. Additionally, the researcher added case sensitivity. To observe the performance of the proposed method, the index of coincidence and entropy have been calculated. The obtained results confirm the high performance of the proposed algorithm in comparison to the other algorithms used in this paper. The primary goal of this paper is to make cryptanalysis extremely complex and to promote data security.
Rolling stand electric drive model regarding influence of power supply network parameters Druzhinin Valery Mikhailovich; Kalinin Alexey Anatolievich; Sivyakova Galina Alexandrovna
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1213-1223

Abstract

Operation mode of hot rolling mill finishing group stands of ArcelorMittal Temirtau JSC electric drives along with thyristor converter units, intended for the drives supply effect significantly the power network parameters. While being carried out the experimental research on operating modes of power network supplying the rolling mill, some oscillograms were constructed that indicate voltage during the rolling process. Analyzing the oscillograms it appears that there are unacceptable voltage drops throughout the network (more than 10%), that, in its turn, effects negatively the main and auxiliary electric drives functioning. Electric drive simulation model have been constructed with the aim accomplishment to learn more about operating modes features of finishing group stands electric drives as well as power network supplying the hot rolling mill, where the main objective is getting the decreased parameters of their mutual influence. The scientific project purpose is verification of the mathematical model choice correctness, construction of a simulation model of the electric drive control system for the main drives of the hot rolling mill stands, taking into consideration the parameters of the power supply network and checking its adequacy.
An intelligent oil accident predicting and classifying system using deep learning techniques Yasmen Samhan Abd ElWahab; Mona Mohamed Nasr; Fahad Kamal Al Sheref
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp460-471

Abstract

This study discusses the problem of oil and gas faults that lead to spills or explosions that lead to a lot of losses in human life, oil field extraction, and costs. Petrol is an important field in our lives because it controls all aspects of human life and their way of life, so our research focused on petrol and its problems in order to introduce a better way of life. The data used in this research was taken from the 3w database that was prepared by Petrobras, the Brazilian oil holding. The 9 classes classified in that work include the normal state that indicates the factors that will not lead to a problem. Deep learning classification techniques were used in this study. 99% accuracy was obtained in that model, and it refers to a successful prediction and classification of each class. Different results were observed when different hidden layers, optimizers, neurons, epochs, and activation functions were used. 99% was achieved when using Adam's optimizer and Tanh's activation function.
Binary decomposition-based image cipher algorithm with flexible method for key construction Salim Muhsin Wadi; Huda Hussein Abed; Nada Taher Malik; Ahmed Taha Abdullsadah
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp201-208

Abstract

Image security is still one of the important fields in multimedia processing because it’s used in our daily lives. Watermarking, steganography, and ciphering are three directions to keep an image secret. Encryption defined as the process of changing information (which called plaintext) into an unreadable secret format (which called cipher-text). A new ciphering algorithm based on binary decomposition and binary codes conversion is proposed in this paper. The key is constructed in a flexible way based on the size of a secret image using some logical operations to increase the security levels. Three test images in different sizes were used to evaluate the performance of the proposed algorithm. The results of the visual scene and statistical factors proved that the suggested method was ciphering the image with high security. The proposed work was validated to confirm its effectiveness. As conclusions, the uses of decomposition and simple binary operations have given high-level image security. Also, key construction is an important step to face several types of attackers.
Distributed localization using normalized quad lateration in LoRa networks: application for tourist position estimation Musayyanah Musayyanah; Prima Kristalina; Yosefine Triwidyastuti; Pauladie Susanto; Mochammad Zen Samsono Hadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1446-1455

Abstract

The tourism sector has been growing rapidly along with the decline of COVID-19. This sector should pay attention to safety and security, which is by tracking the position of tourists. In this work, we propose a tourist positioning tracking system. A node containing a microcontroller with LoRa wireless communication called unknown node (UN) is assembled as a wearable device. We use the received signal strength indicator (RSSI)-based localization technique with an additional normalization method to correct the error rate in position estimation. This method estimates the distance between the anchor node (AN) and UN to approximate the actual distance value. Three-dimensional position tracking (longitude, latitude, altitude) of five UN surrounded by four AN was performed using the quadlateration method. The estimation process was carried out by the UN whereas receiving information is transmitted from the four AN. The communication between AN and UN used a scheduling algorithm on all AN. The position estimation error of the five UNs was measured using mean square error (MSE) yields 20.73 m, 50.32 m, 32.92 m, 21.40 m, and 16.89 m respectively. The accuracy of the estimated distance obtained by the proposed normalization quadlateration method is increased up to 15.22%.
Integrated approach of brain segmentation using neuro fuzzy k-means Jawwad Sami Ur Rahman; Sathish Kumar Selvaperumal
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp270-276

Abstract

A proposed method using neuro-fuzzy k-means for the segmentation process of brain has been developed successfully, simulated and assessed. The proposed method has been assessed by using clinical brain images of magnetic resonance imaging (MRI) technology, to segment the three main tissues of the brain. The proposed system is able to segment the three important regions of the brain, which are white matter, grey matter and cerebrospinal fluid (CSF) more accurately, as compared to the benchmarked algorithms. Furthermore, the developed method’s misclassification rate (MR) has been significantly minimized by 88%, 27%, 88%; 82%, 71%, 84%; and 82%, 29%, 83%, as compared to k-means, fuzzy logic, and radial basis function (RBF) for white matter, grey matter and CSF, respectively. Also, from the visual interpretation, it is observed that the brain’s edges are well preserved and the tissues are clearly segmented. From these measures, the proposed integrated approach is shown to be accurate in segmenting the MRI brain tissue with reduced misclassified pixels.
A new approach of extremely randomized trees for attacks detection in software defined network Hasan Kamel; Mahmood Zaki Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1613-1620

Abstract

Software defined networking (SDN) is the networking model which has completely changed the network through attempting to make devices of network programmable. SDN enables network engineers to manage networks more quickly, control networks from a centralized location, detect abnormal traffic, and distinguish link failures in efficient way. Aside from the flexibility introduced by SDN, also it is prone to attacks like distributed denial of service attacks (DDoS), that could bring the entire network to a halt. To reduce this threat, the paper introduces machine learning model to distinguish legitimate traffic from DDoS traffic. After preprocessing phase to dataset, the traffic is classified into one of the classes. We achieved an accuracy score of 99.95% by employing an optimized extremely randomized trees (ERT) classifier, as described in the paper. As a result, the goal of traffic flow classification using machine learning techniques was achieved.
Various object detection algorithms and their comparison Debani Prasad Mishra; Kshirod Kumar Rout; Sivkumar Mishra; Surender Reddy Salkuti
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp330-338

Abstract

This paper presents a detailed and comparative analysis of various object detection algorithms. The challenge of object detection is taken care of while studying various algorithms. Throughout the year various methods have been discovered in this field, each having its advantages and drawbacks. This paper aims at providing the systematic study of all the popular algorithms including the conventional ones. Although many methods and techniques come up each year and each of them having superiority other the previous models but at the same time even complexity increases. In this paper, some famous and basic methods of object detection and tracking are discussed. Using these developed techniques good results can be obtained and also the comparison of the efficiency of all the models can be done. Real-time applications and the outcomes are also discussed.
Pedestrian mobility management for heterogeneous networks Mohammed Hicham Hachemi; Sidi Mohammed Hadj Irid; Miloud Benchehima; Mourad Hadjila
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1530-1540

Abstract

Pending the arrival of the next generation of 5G which is not yet deployed insome countries like Algeria, 4G LTE remains one of the main mobile networks to ensure adequate quality services. Mostly, the deployment of femtocells to support the macrocell structure is crucial in the handover decision process. This paper presents a new approach called the epsilon Kalman Filter with normalized least-mean-square (ϵKFNLMS) to realize the handoff triggering in two-tier long-term evolution networks to ensure communication continuity to the pedestrian UE and improve mobility management. ϵKFNLMS uses a two-step process: a tracking process and a prediction process, to produce an optimal future state estimate at ”t+p”, where ”p” is the prediction footstep. The tracking process is performed by the Kalman filter, known for its precision in the state of the signal at time ”t”. It perfectly reduces the estimation error, injected afterward in the variable step-size NLMS algorithm (VSS-NLMS). While the predictionprocess is performed by the VSS-NLMS algorithm, an adaptive filterknown for its prediction of the future state at ”t+p”. Thus, the goal is to achieve a faster convergence with a steady-state. ϵ value provides a precise setting of the handover trigger. Through different numerical simulations in several indoor environments, the results show that the performance and effectiveness of the proposed approach (ϵKFNLMS) provide lower mean square error (MSE), stable physical appearance in the prediction process (convergence with a steady-state), and excellent speed of convergence compared to the classical Normalized LMS (NLMS) and Li-NLMS adaptive filters.
Adaptive Wi-Fi offloading schemes in heterogeneous networks, the survey Ruliyanta Ruliyanta; Mohd Riduan Ahmad; Azmi Awang Md Isa
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp254-268

Abstract

At present, the need for data traffic is experiencing tremendous growth. The growth of smartphones technology offers new applications. On the other hand, the growth in cellular network access infrastructure has not been able to keep up with the increasing demand for data package services. For this reason, Wi-Fi offloading is needed, namely cellular users, using Wi-Fi access for their data needs. In 2016, global data communication traffic growth reached 63%. Many researchers have proposed the adaptive wireless fidelity (Wi-Fi) offloading (AAWO) algorithm to transfer data on heterogeneous networks. In this study, the proposed adaptive incentive scheme is classified, to obtain an adaptive scheme based on cost, energy, service quality, and others. From the survey results shown, there is no proposed adaptive algorithm based on the quality of experience (QoE). This provides an opportunity for further research where the Wi-Fi offloading scheme uses the perspective user or user experient options. In addition, open research uses artificial intelligence and machine learning methods as adaptive methods.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue