cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
Channel characterization and modeling for wireless communication link planning and design in the tropics Oluwole John Famoriji; Thokozani Shongwe
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1433-1441

Abstract

Channel model provides basis in the link budgetary for planning and design of low margin systems of communication links. This paper proposed a simple and efficient channel model for wireless channel path loss characterization and modeling. Free space channel was characterized and modelled to account for both static and dynamic changes of signal that propagates through it. Correction factors in the model account for the losses due to refraction effects, as a result of abnormal refractivity condition frequent in tropical regions. The model was validated via measurement data from experiment conducted in a tropical region and a high level of agreement was observed. The proposed model can be deployed during link planning and budgetary for ultra high frequency (UHF) wireless radio services.
G-code converter using interface system for a STEP file (ISO 10303) Zammeri Abd Rahman; Saiful Bahri Mohamed; Mohamad Minhat; Alias Mohd; Zulkifli Abd Rahman; Roslan Awang
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1362-1371

Abstract

The STEP file is the “standard for the exchange of product model data,” which is usually used to exchange geometric data in boundary representation (B-rep) between different computer-aided design (CAD) platforms. These data can be fully utilized and integrated into a larger manufacturing organization, such as a computer-aided manufacturing (CAM) environment for computer numerical control (CNC) machining applications based on ISO 6983. The 3D models of 2D machining profiles were created in CAD software and saved as STEP files. The data structure was analyzed by comparing the geometric entities of the CAD model and the STEP file. The algorithm was created using the hypertext preprocessor (PHP) programming language and produced a computer interface system to convert STEP files into G-code format. The machining blocks with profile machining features were simulated using a CNC simulator and PC-based open architecture control (OAC) software. The G-code was validated on a three-axis CNC milling machine, and the result was compared to the CAD model to confirm the machining profile. The integrated interface system I2S demonstrates its ability to interpret all 2D profiles and generate machining tool paths and G-code, allowing data flow between CAD and CAM environments and shortening product development cycles.
Predictive source management for low power domestic direct current grids Satish B. Ashwath Narayan; Pasumarthi Usha
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1578-1588

Abstract

The decrease in the price of solar photo voltaic (PV) panels has led to the widespread adoption of the solar power as a renewable energy source, not only at the grid level but also on the roof tops of the residential buildings. The solar PV panels produce direct current (DC) and can be readily used to drive DC powered loads or charge batteries. Direct powering of the loads from the solar panels is hindered by the highly variant nature of solar power generation which depends on a number of external as well as internal factors. The paper proposes a prediction based direct connection between PV panel and DC loads, only when the panel will be able to supply the required power to the load. The loads have been categorized based on how they need to be powered and their priority levels. The data specific to the rooftop was collected over two years using which the prediction of the panel output was carried out. Combining the load categorization and the power prediction a smart management system was designed which was able to decide on how the loads need to be powered and hence were connected to the appropriate source.
Arabic text steganography using lunar and solar diacritics Rawaa Hamza Ali; Ban Nadeem Dhannoon; Mohamed Iedan Hamel
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1559-1567

Abstract

The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important information using text steganography. This work-study takes advantage of the possibility of concealing data in all diacritics after the two letters ال)) in the cover text. In the presented study, we propose a new algorithm in steganography in Arabic text as a cover text. After pre-processing the cover text, the algorithm hides the elements of secret messages inside the Arabic letters by adding appropriate diacritics (like Hamzah Al-Wasl) on the extracted words beginning with (ال) according to its third letter type (solar or lunar). In the proposed algorithm, the length of the secret message is determined so that the intended recipient can extract the hidden message accurately. The proposed algorithm is robust against the attack because the change in the cover text is small and imperceptible. On the other hand, since Arabic is used as a cover text, the breadth of the inclusion depends on the number of words beginning with (ال) definition.
Evaluation of CHB MLI based shunt APF using low pass filter and self-tuning filter Musa Yusup Lada; Mohd Amran Mohd Radzi; Jasronita Jasni; Hashim Hizam; Auzani Jidin; Syahrul Hisham Mohamad
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1274-1285

Abstract

The increasing demand for high-rating power supply in the distribution system causes the conventional inverter topology, six step voltage source inverter (SSVSI) unsuitable for being applied as active power filter (APF). Multilevel inverter (MLI) is generally the best suitable inverter for APF, but not all types of MLI can be used for high-voltage applications. Among the MLIs topology, cascaded H-bridge (CHB) is the best choice since it can produce output voltage more than twice the amount of DC source. Moreover, CHB MLI topology uses fewer power devices and is simple in design. Low pass filter (LPF) is a common method used for harmonic extraction in this controller. However, this method faces various problems, such as an additional need for phase lock loop (PLL) algorithm and slow transient and steady-state responses. Therefore, self-tuning filter (STF) is introduced as a new filtering method to overcome this problem. This paper evaluates CHB MLI's performance for APF using STF as a harmonic extraction. The model was developed and verified in MATLAB/Simulink. The results show that harmonic extraction using STF performs better total harmonic distortion (THD) than conventional LPF. Nevertheless, both algorithms produce THD below 5%, defined as the permissible value stated in IEEE 519.
Identification and categorization of diseases in arecanut: a machine learning approach Ajit Hegde; Vijaya Shetty Sadanand; Chinmay Ganapati Hegde; Krishnamurthy Manjunath Naik; Kanaad Deepak Shastri
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1803-1810

Abstract

Arecanut is one of the prominent commercial crops that are grown worldwide for traditional medicines, furniture, cosmetics, food, veterinary preparations, and textile industries. It experiences a variety of diseases during its existence, from the bottom to the tip. The conventional method for detection of diseases is through visual inspection and it is also necessary to have properly designed laboratories to check these harvests. It is a time consuming and tedious task to inspect these crops across wide acres of plantations. The proposed system has been developed that uses convolutional neural network (CNN) to identify and categorize diseases in arecanuts, trunks and leaves also suggesting effective preventative measures. Proprietary dataset consists of 1,100 photos of healthy and diseased arecas. The ratio between the train and test data is 80:20. Binary cross entropy is employed as the loss function for model construction, with accuracy serving as the metrics and Adam serving as the optimizing function. In identification and categorization of arecanut diseases, the suggested approach was shown to be efficient with 93.05% accuracy.
Enterprise information security risks: a systematic review of the literature Jenner Lavalle Sandoval; Domingo Hernández Celis; Michael Cabanillas-Carbonell; Laberiano Andrade-Arenas
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1589-1604

Abstract

Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment and improvement of information technology (IT) infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets.
Design thermohygrometer based on internet of things in clinical laboratory I Made Agus Mahardiananta; Putu Vierda Lya Suandari; I Gusti Agung Ngurah Devasya Putra Pratama
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1311-1318

Abstract

Clinical laboratory units must meet safety requirements such as temperature stability and room humidity because the materials and substances used are sensitive to changes in temperature and environmental conditions, so it is important to carry out routine monitoring. The purpose of this research is to design an internet of things (IoT)-based thermohygrometer that can make it easier for users to monitor temperature and humidity even though the user is outside the laboratory. This tool can also store the results of temperature and humidity measurements making it easier for the user to monitor changes in temperature and humidity that occur. The method used is descriptive exploratory with a prototype system, namely the system development process, users and the required data and results obtained through a tool that has been designed. The results of research conducted using an IoT-based thermohygrometer prototype after statistical testing, there was no significant difference between the reference thermohygrometer and the IoT-based thermohygrometer prototype and the readings from the thinkspeak web. For temperature and humidity measurements that have been carried out at the X clinical laboratory in Denpasar, it still does not meet the standards.
Non-contact evaluation of pigs’ body temperature under various infrared sources Hoc Thai Nguyen; Tien Xuan Dao; Duong Tri Ngo
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1382-1391

Abstract

The purpose of this study is to verify the feasibility of using an infrared camera to measure the surface temperature and then estimate the core body temperature of pigs under various infrared sources. We first conducted experiments with pig-body temperature measurement by an infrared camera. Then we have tried to increase the accuracy rate in estimating the core body temperature of pigs by measuring the temperature of moving pixels. We concluded that the relation between the core body temperature and the estimated pig-body temperature was y = 1.0392x−0.6621 with no static infrared source in the field view of infrared camera. With the existence of heat lamps in the field of view of the infrared camera, the relation was y = 1.0248x − 0.0921. With both the root mean square error and the mean absolute error lower than 1.12 ◦C, the experimental simulation results show that the proposed method is feasible and effective in fast and non-contact evaluation of pigbody temperature under various infrared sources.
Airport traffic optimisation and airdrome analysis using mathematical modelling Douae Zbakh; Marwane Benhadou; Abderrahmane Benkacem; Abdelouahid Lyhyaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1744-1753

Abstract

An airport is considered to be a complex system, so managers nowadays are looking for verifiable solutions that could be tested and virtually simulated, in order to optimize safety, improve regularity, and reduce delays and risks of collision. To respond to this dilemma, many solutions were tested using safe simulation methods. The specific problem tackled in this paper refers to aerodrome capacity optimization, and specialy arcrafts mouvements. For this purpose, we introduce a mathematical model that was applied to Mohamed V Casablanca Airport, and the corresponding event actualization and graph was constructed taking into account uncertainty in flight schedules, aircraft types and their stand. Finally, the airdrome model was simulated using a special parameter in Arena tool.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue