cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,138 Documents
Support vector regression-based state of charge estimation for batteries: cloud vs non-cloud Mohamed Ben Youssef; Imen Jarraya; Mohamed Ali Zdiri; Fatma Ben Salem
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 2: May 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i2.pp697-710

Abstract

Embracing the potential of cloud technology in the field of electric vehicle advancements, this paper explores the application of support vector regression (SVR) for accurate state of charge (SOC) estimation of lithium-ion batteries in various computational landscapes. This study aims to scrutinize and compare the performance of SOC estimation, with a specific focus on precision, computational efficiency, and execution speed. The investigation is conducted across diverse environments, including a traditional non-cloud setup and two cloud-based platforms-a standard cloud environment employing Amazon web services (AWS) EC2 servers and an enhanced configuration utilizing the MATLAB production server. The investigation not only emphasizes the effectiveness of cloud integration but also provides valuable insights into the strengths and weaknesses of the proposed methodology. The experimental results contribute to a nuanced understanding of the methodology’s performance, shedding light on its potential implications for advancing electric vehicle technologies. This study thus extends its significance beyond technical considerations, providing a broader perspective on its relevance to global electrification initiatives.
A relational background knowledge boosting based topic model for Chinese poems Peng, Lei; Porntrakoon, Paitoon
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 2: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i2.pp1227-1243

Abstract

Classical Chinese poetry has been increasingly popular in recent years, and modeling its topic is quite a promising area of research. Chinese poems have the characteristic of short in length, but traditional topic models perform poorly when faced with short texts due to the text sparsity. Therefore, topic model should be improved to satisfy the scenario of classical Chinese poems. In this paper, a relational background knowledge boosting based topic model (RBKBTM) was proposed to overcome the text sparsity of Chinese poems. We incorporated background information into the model, which expanded the text content from the semantic perspective. The background knowledge was combined using word embedding and TextRank and was then fed into the core computing process. Subsequently, a new sampling formula was derived. Our proposed model was tested on three different tasks using three different datasets. The results demonstrate that the incorporated background knowledge can effectively overcomes text sparsity, improving the performance and effectiveness of the topic model.
IoT driven joint compressed sensing and shallow learning approach for ECG signal-reconstruction Khadri, Shruthi; K Bhoganna, Naveen; Aravind Kumar, Madam

Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i1.pp666-676

Abstract

Because biological signal transmission in real time might be very demanding, cloud and internet of things (IoT) infrastructure are required. To do this, the main component of the signal serves as the focal point of a reconstruction strategy that has been developed. The input is transferred to the intended destination once it has been encoded. Security is an important consideration that must not be disregarded. For long-term healthcare monitoring via lightweight wireless networks, electrocardiogram (ECG) compression is a major difficulty. Reducing energy consumption in wireless data transmission and precisely calculating error rates for data reconstruction are two essential components of compressed sensing. The application of effective encoding methods is crucial for these considerations. We present multi-task compressed sensing (MT-CS), a unique method for compressing ECG data. When used to wireless network systems with several embedded sensors, this technique is quite effective. From the ECG data, the model learns the fundamental adaptive properties needed for correlation. We use the multiparameter intelligent monitoring in intensive care (MIMIC-II) dataset to investigate the performance of the suggested MT-CS reconstruction technique in order to assess its strength and application. In comparison to current compressed sensing methods, the simulation results demonstrate that the suggested reconstruction methodology utilizing MT-CS generates high-quality reconstruction signals with fewer observations.
Morphological features of lung white spots based on the Otsu and Phansalkar thresholding method Retno Supriyanti; Syadzwina Luke Dzihniza; Muhammad Alqaaf; Muhammad Rifqi Kurniawan; Yogi Ramadhani; Haris Budi Widodo
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 1: January 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i1.pp530-539

Abstract

COVID-19 is a disease that causes respiratory system disorders, so various tests are needed. One of them uses a chest X-ray or thorax. A chest X-ray will depict the lungs as a whole so that patches like white shadows will be visible. In this study, the number of lung areas and white spots can be observed and detected using segmentation techniques in image processing. But before entering the segmentation stage, the image will go through the preprocessing stage using the tri-threshold fuzzy intensification operators (fuzzy IO) method. It then segmented the lungs using the Otsu method by changing the digital image from grey to black and white based on comparing the threshold value with the pixel colour value of the digital image. Then, further segmentation was carried out using the Phansalkar method to detect and simultaneously count the number of white spots. Referring to the experiments we have carried out, Otsu Phansalkar's segmentation performance promises to be developed further.
Performance analysis of the proxy-based and collusion-resistant revocable CPABE framework Chawla, Shobha; Gupta, Neha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp378-387

Abstract

An efficient revocation of access rights in ciphertext policy attribute-based encryption (CPABE) schemes has multiple challenges, particularly for lightweight devices. Thus, extensive research on the existing studies enforcing and governing access control has been conducted. The methodologies used in the existing CPABE (bilinear pairing cryptography based) schemes to revoke users at the system and attribute levels have been focused on in the current study. The existing studies have been examined on the basis of the following parameters for revocation: type of revocation addressed, level of collusion resistance, dynamicity achieved, scalability of revocation, and computational cost incurred. It has been observed in the study that no single scheme achieves all the revocation properties and addresses both types of revocation. The module proposed in proxy-based and collusion-resistant multi-authority revocable CPABE (PCMR-CPABE) efficiently addresses both types of revocation and is fully collusion-resistant, dynamic, and scalable. The present paper extends the study on PCMRCPABE and presents a performance analysis of the module in terms of functional specifications and computational cost. The presented analysis has compared the performance of the existing cutting-edge schemes with the PCMR-CPABE module and has proved that the proposed module is better in terms of functionality and is computationally inexpensive.
Development of deep reinforcement learning for maximum power point tracking of photovoltaic systems Thi Thom Hoang; Thi Huong Le
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 2: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i2.pp707-714

Abstract

The use of renewable energy systems, specifically photovoltaic (PV) systems (PVs) that convert solar energy into electricity, has become a popular solution to address global environmental concerns by reducing the utilization of non-renewable energy sources, which contribute to pollution. Efforts to increase the power transfer effectiveness of PV systems include the advancement of controllers for maximizing power point tracking (MPPT). These controllers guarantee optimal system operation at the maximum power point (MPP) in diverse environmental conditions. The paper proposes an improved deep reinforcement learning (DRL) method, namely deep deterministic policy gradient (DDPG), to capture the MPP in PV systems, particularly when dealing with partial shading conditions (PSCs). Unlike reinforcement learning methods that only work with discrete state and action spaces, the proposed DDPG method can handle continuous action state spaces. Feasibility analysis is conducted using MATLAB/Simulink simulations, and the findings demonstrate the efficiency and superior performance of the suggested solutions, highlighting their potential for future use.
Grain size effects on the behavior of silicone rubber high voltage power cables using seagull optimization algorithm Shaymaa Ahmed Qenwy; Saud Abdulaziz Aldossari; Kareem AboRas; Loai Saad Eldeen Nasrat; Ahmed Hossam-Eldin
Indonesian Journal of Electrical Engineering and Computer Science Vol 32, No 3: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v32.i3.pp1246-1256

Abstract

High voltage insulation is one of the most important components of electrical power systems. Polymeric materials have lately supplanted ceramic materials as insulating materials due to their low weight, straightforward structure, high mechanical strength, good performance in the presence of pollution, ease of transportation, and ability to enhance voltage. The purpose of this thesis is to add micro and nano-sized aluminum oxide (Al2O3) fillers to silicone rubber (SIR) to enhance its electrical characteristics. Micro Al2O3filler with contents of 10wt%, 20wt%, 30wt%, and 40wt% was combined with nano Al2O3with contents of 1wt%, 3wt%, 5wt%, and 7wt% to create samples of SIRcomposites. The composites’dielectric strength is evaluated in a variety of environments, including dry, wet, low-salt wet, and high-salt wet circumstances. In order to boost the insulator’s dielectric strength under diverse environmental conditions, this research aims to develop a weight ratio composition for such a composite. The ideal concentration of nano or micro Al2O3fillers has been calculated using the whale optimization algorithm (WOA) and seagull optimization algorithm (SOA).
The synergistic effect of QR decomposition with t-SNE Mohsin Ali; Jitendra Choudhary
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 2: May 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i2.pp1159-1169

Abstract

The study utilized non-parametric tests, specifically, the Mann-Whitney U test, to evaluate the performance of a proposed model called QRPCA-t-SNE, along with two other models, MDS and UMAP. The study compared these three models with two datasets on performance metrics such as model accuracy, training accuracy, testing accuracy, mean square error, AUC scores, precision, recall, and F1 scores. Once the model's performance was conducted, the Anderson-Darling test was to check for data normality before applying the hypothesis for model proof. The analysis revealed that Model 1 (QRPCA-t-SNE) significantly outperformed Model 2 (UMAP) and Model 3 (MDS) in terms of accuracy, with p-values of 0.0027 and 0.0003, respectively. This finding suggests that Model 1 (QRPCA-t-SNE) is suitable for high-accuracy and reliability applications, providing valuable insights into predictive analytics with a 95% confidence interval (confidence level α= 0.05).
Fractional-order PID controller tuned by particle swarm optimization algorithm for a planar CDPR control Hemama Aboud; Ammar Amouri; Abdelhakim Cherfia; Abdelaziz Mahmoud Bouchelaghem
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1500-1510

Abstract

The use of cable-driven parallel robots (CDPRs) has been steadily increasing across various sectors due to their expansive workspaces, impressive payload-to-mass ratios, and cost-effective designs. Controlling these robots, particularly those with substantial actuation redundancy, can present challenges. This research paper proposes the implementation of a fractionalorder proportional-integral-derivative (FOPID) controller to effectively regulate the end-effector of a planar CDPR with four actuation cables. The parameters of the controller are fine-tuned using the particle swarm optimization (PSO) algorithm to ensure optimal performance. The proposed controller's performance is evaluated through two numerical experiments: target tracking and trajectory tracking using a point-to-point approach. Furthermore, a comparative study is conducted to highlight the controller's performance, comparing the proposed FOPID controller with both the classical PID controller and an optimized PID controller. The achieved results demonstrate that the proposed controller exhibits superior performance in terms of tracking accuracy and smoothness of control signals when compared to the other controllers under investigation. As a result, the proposed controller design represents a substantial advancement in control performance and can be regarded as a promising control strategy for CDPRs.
Harnessing the power of blockchain to strengthen cybersecurity measures: a review Turab, Nidal; Owida, Hamza Abu; Al-Nabulsi, Jamal I.
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp593-600

Abstract

As the digital environment continues to evolve with the increasing frequency and complexity of cybersecurity threats, there is growing interest in using blockchain (BC) technology. BC is a technology with desirable properties such as decentralization, integrity, and transparency. The decentralized nature of BC eliminates single points of failure, reducing the vulnerability of critical systems to targeted attacks. The complex and rapidly evolving nature of cyber threats requires an earlier and adaptive approach. This review paper examined several papers collected from official websites. Focusing on using BC technology to improve cybersecurity, the main keywords of the review paper were BC technology, supply chain management, proof of work, and proof of stake. This review paper aims to investigate the security components through a threat assessment that compares the security of BC in different classes and real attack environments. It highlights the potential of BC to strengthen cybersecurity measures, citing unique features. The review paper also points out that there is a lack of focus on addressing security challenges related to computer data and digital systems and calling for a deeper discussion on problem-solving.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue