cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Clustering method for criminal crime acts using K-means and principal component analysis Ratih Hafsarah Maharrani; Prih Diantono Abda’u; Muhammad Nur Faiz
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 1: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i1.pp224-232

Abstract

Criminality is an act of violating the values and norms of society that causes a lot of harm. Much of the criminal data is often just a collection of data that has no information. Analysis of crime data is key in efforts to reduce crime rates that provide an overview of the incidence of crime, patterns, levels of vulnerability, and the level of security of an area. This research proposes data analysis that provides an understanding of crime using data mining techniques, especially the K-means cluster method, both traditional and with principal component analysis (PCA) dimension reduction. Before the PCA process, the values are transformed first with Z score normalization. From the processing through the davies bouldin index (DBI) performance test with 3 clusters, it is concluded that traditional K-means produces a DBI Index value of 0.019 and K-means PCA of 0.299. Meanwhile, to see the optimal cluster, several iterations were performed and resulted in the most optimal DBI index of 4 clusters in K-means of 0.014 and K-means PCA of 0.172. From the performance test value, it means that in the context of clustering the traditional criminal K-means data is declared more optimal than K-means PCA.
Review on integration of ontology and deep learning in cultural heritage image retrieval Budiman, Fikri; Sugiarto, Edi; Hendriyanto, Novi
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp583-592

Abstract

Image retrieval methods are currently developing towards big data processing. The literature review is focused on image big data extraction with cultural heritage domain as training and testing datasets. The development of image retrieval process starts from content-based using machine algorithms, deep learning to ontology-based. Image recognition research with cultural heritage domain is conducted because of the importance of preserving and appreciating cultural heritage, in this case, cultural heritage images such as Indonesian Batik are discussed. Batik motif images are Indonesian cultural heritage that has thousands of motifs that are grouped into many classes with a non-linear hyperplane. The problem is focused on processing big data that has many classes. Currently research is evolving into knowledge-based image retrieval using ontologies due to semantic gap constraints. The results of this literature study can be the basis for developing research on the application of appropriate deep learning algorithms so as to utilize the hierarchy of classes and subclasses of image ontologies with cultural heritage domains.
Quality of services in software defined networking: challenges and controller placement problems Siham Aouad; Issam El meghrouni; Yassine Sabri; Adil Hilmani; Abderrahim Maizate
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 2: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i2.pp951-959

Abstract

Quality of service (QoS) is pivotal for ensuring effective and reliable network performance, yet achieving end-to-end QoS within current network architectures remains a persistent challenge. The emergence of software defined networking (SDN) addresses limitations in traditional networking by offering a centralized control plane. This allows dynamic resource management and efficient enforcement of QoS policies by network administrators. However, the controller placement problem (CPP) within SDN poses a significant challenge, as identifying the optimal placement of controllers is a non-deterministic polynomial-time hardness (NP-hard) problem. Researchers are actively working on solutions to address this challenge, especially in large-scale networks where deploying controllers becomes complex. Additionally, maintaining QoS in terms of controller management presents another hurdle. This paper explores these challenges, delving into the literature and providing a comprehensive analysis of controller performance metrics related to QoS parameters such as load balancing, reliability, consistency, and scalability. By addressing these challenges, the research aims to enhance QoS within the SDN framework.
Impact blockchain technology on traditional electronic payment system Ahmed AbdulKarim Talib; Mustafa Hashim Abdulkareem; Saja Nasser Selman; sally AbdulKarim Talib
Indonesian Journal of Electrical Engineering and Computer Science Vol 32, No 3: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v32.i3.pp1703-1711

Abstract

Every moment there is a new idea and a new project that creates new technologies to make life easier and faster and to invest resources better. In this research, talk about a new technology that is considered a revolution in the age of the Internet, which in turn is the offspring of the new generation of the internet (5G), which is the blockchain technology, which began to be completed and appear to us from 2017, and it is not like other technologies, but in essence depends on changing many of the concepts that we are accustomed to in Communication, exchange and sharing via the Internet, it will change it in the same way as open-source software and in the same way as the Linux system, which, when it appeared, became the main focus for programmers and the development of software technologies, and this is the case with blockchain technology, this technology depends on the user and the customer only. There is no third party or responsible party. The user is responsible here.
Microstrip antenna system for communication capabilities applications Fredelino A. Galleto Jr.; Aaron Don M. Africa; Alyssa Joie F. Tablada; John Ernesto G. Amadora Jr.; Ira Third L. Burgos; Alliyah Mae K. Borebor; Rocelle Andrea S. Belandres; Rafael Dominic L. Montaño
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i3.pp1643-1653

Abstract

In this comparative study, seven different microstrip antenna shapes, including rectangular, elliptical, triangular, inset fed, H-notch, and E-notch, were observed and analyzed, focusing on their suitability for global positioning system (GPS) application in microsatellites. To enable meaningful comparison, the study utilized the optimal resonant frequency in GPS applications, which is 1.57542 GHz. All the antenna designs have been generated using MATLAB’s Antenna Toolbox and are 100% efficient under ideal conditions with zero polarization loss, which is assumed in the link budget analysis. The results show that each antenna shape has been found to offer distinct advantages and limitations. Along with this, the circular and elliptical patch antenna presented a well-balanced performance, which is suitable for GPS applications. However, the elliptical shape falls behind the circular shape, which was determined to be the most optimal choice for GPS application, providing excellent isotropic antenna gain, return loss, voltage standing wave ratio (VSWR), and strong link budget analysis results.
Comparison of power system flow analysis methods of IEEE 5-bus system Harpreet Kaur Channi; Ramandeep Sandhu; Nimay Chandra Giri; Parminder Singh; Fathy Abdelaziz Syam
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 1: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i1.pp11-18

Abstract

Load flow analysis is a crucial tool used by electrical engineers for simulating the power system. It is aimed at examining the most possible way of operating and controlling a power system and the exchange of power flow within the power system. For the economic and optimal operation of power systems, the most essential task is to find the most feasible solution technique suitable and efficient for the study of power generation, transmission, and distribution. There are various power flow study solution techniques, and for some solution techniques, the simulation of the system can take a long time, which prevents the simulator from attaining a higher accuracy result for the power flow simulation due to the interrupting rise and fall in power demand from the consumer, which also affects the power generation as well. This paper discusses the comparison of various techniques used in load flow studies with the assistance of a small power system with five buses. The numerical solution techniques used are the fast decoupled load flow solution technique, the Gauss-Seidel solution technique, and the Newton-Raphson solution technique for a power flow study solution on an IEEE 5-bus using MATLAB/Simulink.
Defence against adversarial attacks on IoT detection systems using deep belief network Sharipuddin, Sharipuddin; Winanto, Eko Arip
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1073-1081

Abstract

An Adversarial attack is a technique used to deceive machine learning models to make incorrect predictions by providing slightly modified inputs from the original. Intrusion detection system (IDS) is a crucial tool in computer network security for the detection of adversarial attacks. Deep learning is a trending method in both research and industry, and this study proposes the use of a deep belief network (DBN). DBN can recognize data with small differences, but is also vulnerable to adversarial attacks. Therefore, this research suggests an internet of things-intrusion detection system (IoT-IDS) architecture using a DBN that can counter adversarial attacks. The chosen adversarial attack for this study is the fast gradient sign method (FGSM) used to evaluate the IoT IDS using the DBN model. Testing was conducted in two scenarios: first, the model was trained without adversarial attacks; second, the model was trained with adversarial attacks. The test results indicate that the DBN model struggles to detect FGSM attacks, achieving an accuracy of only 46% when it is not trained with adversarial attacks. However, after training with the FGSM dataset, the DBN model successfully detected adversarial attacks with an accuracy of 97%.
An ensemble approach for electrocardiogram and lip features based biometric authentication by using grey wolf optimization Latha Krishnamoorthy; Ammasandra Sadashivaiah Raju
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1524-1535

Abstract

In the pursuit of fortified security measures, the convergence of multimodal biometric authentication and ensemble learning techniques have emerged as a pivotal domain of research. This study explores the integration of multimodal biometric authentication and ensemble learning techniques to enhance security. Focusing on lip movement and electrocardiogram (ECG) data, the research combines their distinct characteristics for advanced authentication. Ensemble learning merges diverse models, achieving increased accuracy and resilience in multimodal fusion. Harmonizing lip and ECG modalities establishes a robust authentication system, countering vulnerabilities in unimodal methods. This approach leverages ECG's robustness against spoofing attacks and lip's fine-grained behavioral cues for comprehensive authentication. Ensemble learning techniques, from majority voting to advanced methods, harness the strengths of individual models, improving accuracy, reliability, and generalization. Moreover, ensemble learning detects anomalies, enhancing security. The study incorporates ECG signal filtering and lip region extraction as preprocessing, uses wavelet transform for ECG features, SIFT for lip image features, and employs greywolf optimization for feature selection. Ultimately, a voting-based ensemble classifier is applied for classification, showcasing the potential of this integrated approach in fortified security measures.
A new conjugate gradient for unconstrained optimization problems and its applications in neural networks Alaa Luqman Ibrahim; Mohammed Guhdar Mohammed
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 1: January 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i1.pp93-100

Abstract

We introduce a novel efficient and effective conjugate gradient approach for large-scale unconstrained optimization problems. The primary goal is to improve the conjugate gradient method's search direction in order to propose a new, more active method based on the modified vector , which is dependent on the step size of Barzilai and Borwein. The suggested algorithm features the following traits: (i) The ability to achieve global convergence; (ii) numerical results for large-scale functions show that the proposed algorithm is superior to other comparable optimization methods according to the number of iterations (NI) and the number of functions evaluated (NF); and (iii) training neural networks is done to improve their performance.
Lifetime (Bx) improvement of PV inverter using Si-SiC H-IGBT/Diode: a reliability approach Ramavath, Muneeshwar; Puvvula Venkata, Rama Krishna
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp704-710

Abstract

Technological advancements have made it possible to harness the power of renewable energy sources. The efficiency of power electronic devices has increased to almost 98%. In order to reduce the risks of failure and maintain the operation of photovoltaic (PV)-based energy converters, reliable devices are needed. Due to the increasing number of wide-bandgap silicon in electronic converters, the need for more efficient and reliable devices has become more prevalent. However, the cost of these devices is a major issue. Hence, in this work extensive analysis of hybrid silicon (Si)-IGBT and silicon carbide (SiC) antiparallel Diode (H-IGBT/Diode) based PV inverter is proposed to improve the lifetime (Bx). A reliability oriented lifetime assessment is performed on a test case of single stage three kilowatt photovoltaic inverter with 600 V/30 A hybrid switch. Long term mission profile for one year is considered for evaluation at B. V. Raju Institute of Technology (BVRIT), Telangana, India. Finally, B10 lifetime is calculated, comparison analysis is presented between conventional Si-IGBT and proposed Si-SiC H-IGBT/Diode. The results of the study revealed that the H-IGBT exhibited a significant increase in PV inverter reliability.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue