cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Malicious attacks modelling: a prevention approach for ad hoc network security Hasanien Ali Talib; Raya Basil Alothman; Mazin S. Mohammed
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1856-1865

Abstract

As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.
Gaussian kernelized feature selection and improved multilayer perceptive deep learning classifier for software fault prediction Sureka Sivavelu; Venkatesh Palanisamy
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1534-1547

Abstract

Software fault prediction is the significant process of identifying the errors or defects or faults in a software product. But, accurate and timely detection is the major challenging issue in different existing approaches to predicting software defects. A novel Gaussian linear feature embedding-based statistical test piecewise multilayer perceptive deep learning classifier (GLFE-STPMPDLC) is introduced to improve software fault prediction accuracy and minimize time consumption. First, the input data are collected from the dataset. Next, the software metrics selection is carried out to select the significant metrics using Gaussian kernelized locally linear embedding with lesser software fault prediction. Then classification is carried out by Kaiser Meyer piecewise multilayer perceptive deep learning classifier for software fault prediction. The novelty of Kaiser–Meyer–Olkin (KMO) correlation test analyzes testing and training instances. The innovation of the Heaviside step activation function is applied for analyzing the KMO correlation test results and providing the final software fault prediction results. Finally, accurate fault prediction outcomes are achieved at the output layer with lesser error. Simulation of proposed GLFE-STPMPDLC technique achieves better 5%, 3%, 3% and 3% enhancement of fault prediction accuracy, precision, recall, and f-measure and 13% faster prediction time compared to conventional methods.
Design of a optimization algorithm for binary classification Miguel Angel Cano Lengua; Erik Alex Papa Quiroz; Marco Antonio Alvarado Cifuentes; Carlos Antonio Alvarado Cifuentes
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1596-1608

Abstract

In the present work, the design of a system to classify data is carried out, using the Scrum methodology. The validation was carried out by expert judgment, having favorable results in terms of different criteria such as; integrity, ease of use, innovation, and scalability. Regarding the development of the functional elements of the system, it was obtained; he developed the architecture of the system, the database, and the prototypes, among other points considered. From the implementation of the system, the equation of a classifying plane in three-dimensional space will be obtained, as well as the number of internal iterations that the algorithm develops, the estimated execution time, and the graph of the plane. This system is based on a recently introduced symmetric cone proximal multiplier algorithm to solve separable optimization problems, this algorithm made an application for classification-related support vector machines.
Cloud computing virtual learning environment: issues and challenges Aminah Rezqallah Malkawi; Muhamad Shahbani Abu Bakar; Zulkhairi Bin Md Dahlin
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1707-1712

Abstract

Cloud computing (CC) is a popular technology that has demonstrated its usefulness and effectiveness across industries and sectors worldwide. As a result, several educational institutions have recently integrated CC into their platforms and systems, including their virtual learning environment (VLE). In order to highlight the issues, challenges, and requirements to be taken into account before implementing CC technology within educational institutions, it is imperative to conduct a study to investigate the level of awareness, knowledge, and acceptance of the targeted users, who are educators, learners, and administrators of higher education institutions (HE). The result of the study highlighted some concerns facing users from 35 different institutions around the kingdom of Saudi Arabia. In addition, results highlighted the users' training, awareness, technology infrastructure, and cultural influences as factors to consider before adopting a sustainable and usable CC-VLE.
Optimal sensor location for adaptive control system in tropical smart greenhouse Folkes Eduard Laumal; Herry Suhardiyanto; Mohamad Solahudin; Slamet Widodo
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1449-1457

Abstract

The uniform control in greenhouse with technology capabilities is seemingly still difficult to be obtained due to the accuracy uncertainty of the data in certain locations. Considering this case, it is highly necessary to choose the right location for the sensor installation. This study aimed to determine sensor placement locations to support precision control activities, using an arch-type smart greenhouse measuring 8×24 m2 as the research location. Air temperature was calculated from 12 locations and analyzed for all possible combinations to designate the best sensor point according to the number of sensors. The analysis was conducted using the error-based method to ascertain the number and location of sensors that represent the smart greenhouse. The best location and number of sensors are identified with performance value under 10% and recommended for developing an adaptive control system.
A comparison of the performance of the ad hoc on-demand distance vector protocol in the urban and highway environment Ahmed Eskander Mezher; Atheer Akram AbdulRazzaq; Rajaa Kadhom Hasoun
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1509-1515

Abstract

In recent years, the vehicular ad hoc network (VANET) has received great attention, as it is involved in the design of the intelligent transportation system (ITS). The VANET network includes message flows from vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) where the network is propped by wireless communication technology, such as IEEE 1609 WAVE and IEEE 802.11P. The VANET network implementation faces challenges, and one of these challenges is the design of routing protocols that transfer reliable and efficient packets from vehicle to vehicle. In VANET, steering is a challenging task in the highway and urban environment. Therefore, this paper presents an assessment of ad hoc on-demand distance vector protocol (AODV) performance in the highway and urban environment and to study the effect of vehicle density on protocol performance. The AODV protocol was simulated by MATLAB. In this study, the performance of AODV protocol was evaluated through four measures, namely, packet delivery ratio (PDR), overhead, end-to-end (E2E) delay, and dropped packets. The study in our paper showed that the best performance of the AODV protocol is in an environment where vehicle speed and vehicle density are low.
Detection of occupancy status from internet connectivity for non-intrusive load monitoring Manjula Wickramathilaka; Md Pauzi Abdullah; Mohammad Yusri Hassan; Hayati Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1678-1688

Abstract

Non-intrusive load monitoring (NILM) methods are widely used for appliance level energy disaggregation in residential buildings. These methods mostly depend on electrical features, and they have not been much successful in applying for commercial buildings. However, recent research has indicated that the accuracy of existing NILM methods can be improved by associating with occupancy data. Therefore, in this paper a novel occupancy detection algorithm is proposed which can detect occupancy status of individuals using the connectivity of their information technology (IT) devices to the local area network of the building. The model is validated using data collected at a university building, with mean errors of 01:23 and 04:02 minutes for the detection of arrival and departure. The occupancy profiles developed by the proposed model can be used to disaggregate energy consumption in a commercial building to appliance and occupant level.
Estimation of coverage and energy in bio inspired wireless sensors using Harris hawk algorithm Hakeem Abdul Wasay; Kavipriya Periyasamy
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1813-1820

Abstract

Wireless sensor networks have various sensors which are wide spread and also equipped with supplies. For the deployment sensor nodes are used for capturing the information, the region of interest is selected and the nodes are deployed. Lower sensing power degrades the DC supply reducing the life of wireless sensor networks, this can also be due to improper sensor deployment. Based on the above various wireless sensor network algorithms are available to compute and implement the required optimal figures. Harris hawk is among the one such algorithm used in wireless sensors. It works on the principle of the bird Harris hawk which catches the prey from a very high altitude, resemblance to this and many other features it is implemented in wireless sensors. Various wireless sensor characteristics can be found, figured and tabulated which are essential in this domain. The characteristics like coverage, connectivity, location, energy, and can be estimated. In the work the coverage and energy fitness is estimated using Harris hawk algorithm and its results are being illustrated.
Optimal sliding mode controller for lower limb rehabilitation exoskeleton in constrained environments Mohammad A. Faraj; Boutheina Maalej; Nabil Derbel
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1458-1469

Abstract

In this article, a lower limb exoskeleton (LLE) under contacting constrained motion has been modelled using augmented Lagrange equations which include Lagrange multiplier and Jacobian vectors. A sliding mode Controller optimized by the grey Wolf optimization algorithm has been used for controlling (LLE) in the case of constrained motion with uncertainties and outside perturbation. The grey wolf optimization algorithm has been used as an optimization algorithm for finding the optimal controllers’ parameters in order to improve the performance of the system. The stability analysis of the closed-loop system has been performed using Lyapunov theory of stability. To validate the effectiveness of the proposed controller structure grey wolf optimization algorithm controller (GW-SMC), a series of comparative simulations have been carried out with other types of recently existing sliding mode control (SMC). The results of numerical simulations indicate the superiority of the sliding mode optimized by the GW-SMC over other types of recently existing controller in terms of tracking errors and robustness towards uncertainties and external disturbances.
Assessment of a single-phase single-stage grid-connected photovoltaic system Nurhazwani Anang; Wan Mariam Wan Muda; Muhamad Zalani Daud
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1339-1347

Abstract

A grid-connected photovoltaic (GCPV) system plays an important role in the development of green technology. However, generated photovoltaic (PV) power that is injected into the grid causes instability in the grid system. Previous studies have shown that power quality for a three-phase system is thoroughly being discussed, but not for a single-phase system. Single-phase system also contribute to instability in low-voltage grid networks during high power penetration as majority of the single-phase GCPV nowadays are installed on rooftops. Thus, in this study, the power quality of a single-phase single-stage GCPV system is investigated based on the total harmonic distortion (THD), power factor (PF), and the generated active (P) and reactive (Q) power during different solar irradiance and varying loads conditions. A model of the GCPV system was developed in MATLAB/Simulink, so that certain variables can be varied to observe their effect towards the power quality. The results show that the current and voltage of generated PV power are synchronized and having low current THD which is less than 1% for all cases. PF values are also in the acceptable range in compliance to IEC 61727 standard which is 0.9971, and the generated PQ is in accordance to the connected load.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue