cover
Contact Name
Elizar
Contact Email
jre@unsyiah.ac.id
Phone
+62651-7554336
Journal Mail Official
jre@unsyiah.ac.id
Editorial Address
Jurusan Teknik Elektro dan Komputer Gedung A2 Lt. 2 Fakultas Teknik Jalan Syech Abdul Rauf no. 7 Kopelma Darussalam 23111
Location
Kab. aceh besar,
Aceh
INDONESIA
Jurnal Rekayasa elektrika
ISSN : 14124785     EISSN : 2252620X     DOI : https://doi.org/10.17529/hre.v19i1.15128
The journal publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Electronics: Electronic Materials, Microelectronic System, Design and Implementation of Application Specific Integrated Circuits (ASIC), VLSI Design, System-on-a-Chip (SoC) and Electronic Instrumentation Using CAD Tools, digital signal & data Processing, , Biomedical Transducers and instrumentation, Medical Imaging Equipment and Techniques, Biomedical Imaging and Image Processing, Biomechanics and Rehabilitation Engineering, Biomaterials and Drug Delivery Systems; Electrical: Electrical Engineering Materials, Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements; Telecommunication: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network; Control: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modeling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems; Computer and Informatics: Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems. Signal and System: Detection, estimation and prediction for signals and systems, Pattern recognition and classification, Artificial intelligence and data analytics, Machine learning, Deep learning, Audio and speech signal processing, Image, video, and multimedia signal processing, Sensor signal processing, Biomedical signal processing and systems, Bio-inspired systems, Coding and compression, Cryptography, and information hiding
Articles 14 Documents
Search results for , issue "Vol 10, No 2 (2012)" : 14 Documents clear
Prototype Robot Pemadam Api Beroda Menggunakan Teknik Navigasi Wall Follower Ery Safrianti; Rahyul Amri; Septian Budiman
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (543.464 KB) | DOI: 10.17529/jre.v10i2.134

Abstract

Fire Robot serves to detect and extinguish the fire. The robot is controlled by the microcontroller ATMEGA8535 automatically. This robot contains of several sensors, such as 5 sets of ping parallax as a robot navigator, a set UVTron equipped with fire-detecting driver, DC motor driver L298 with two DC servo motors. The robot was developed from a prototype that has been studied previously with the addition on the hardware side of the sound activation and two sets of line detector. The robot will active if it receives input from the sound activation unit and will start to find the fire with “search the wall” navigation techniques. The line sensor was used as a door and home detector and circle the fire area.To extinguish the fire, this robot uses a fan driven by a BD139 transistor circuit. The overall test results show that the robot can detect the presence of the fire in each room. The robot also can find the fire and extinguish it within 1 minute.
Analisis Kontingensi Sistem Tenaga Listrik dengan Metode Bounding . Syafii; Nurul Rahmawati
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (432.332 KB) | DOI: 10.17529/jre.v10i2.139

Abstract

The bounding method is one of the contingency analysis method for detecting branch flow violations. Three subnetworks in the bounding method namely N1, N2, and N3 will give information regarding those subnetworks that may not go overload and those that may. This research compared the results from contingency analysis that has been done to the 30 bus system using the bounding method and software PowerWorld Simulator 15 GSO. The result by using the bounding method is 12 lines can go overload for the outage of line 1-2. As well as for the outage of line 1-3 and the outage of line 2-5. Meanwhile, the output of using PowerWorld Simulator 15 GSO with DC power flow method, there are three overloads exist for the outage of line 1-2, three overloads exist for the outage of line 1-3, and five overloads exist for the outage of line 2-5. The overload lines are included in the group of lines that can overload from bounding result.
Desain Layout 1-Stage ADC Pipeline 80Msps dengan Mentor Graphics 0,35µm untuk Aplikasi Kamera Kecepatan Tinggi Hamzah Afandi; Erma Triawati Ch.; Atit Pertiwi
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (704.648 KB) | DOI: 10.17529/jre.v10i2.141

Abstract

Design layout 1-stage pipeline is part of the 8-stage pipeline 80 Msps ADC. Layout 1-stage pipeline consists of 3 units : op-amp, switch capacitor, precision comparator with latch. Pipeline ADC works gradually and requires synchronization of digital output 8 stage by using a unit delay circuit (D-FF). Pipeline ADC requires pulse rate (clock) generator to support its work. Units OP-AMP transconductance CMOS components designed with the correct specification ADC applications with capacitive loads, with a large input impedance and minimize noise. The precision comparator has Vos (offset voltage) approximately equal to 0V. The capacitor switch designs use NMOS switch as a switch for the sampling and multiplying. In the sampling phase and multiplying processes, the ADC requires a clock pulse with a non-intersect mode (lapping). The width of non-overlapping period was adjusted to the time of constance in the sampling process and multiplying. The total number of each pulse period equal to 12.5 ns or equal to the frequency of 80MHz. In the 1-stage layout an additional correction capacitor was required to correct residual voltage. The total area of the layout 1-stage pipeline ADC is 1-bit 200 μm x 98μm.
Algoritma Enkripsi Selektif Citra Digital dalam Ranah Frekuensi Berbasis Permutasi Chaos Rinaldi Munir
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v10i2.82

Abstract

This paper presents a selective image encryption in frequency domain. At first, the image is transformed into frequency domain with Discrete Cosine Transform (DCT), and then DCT coefficients are scanned in zigzag, and elements of the low-frequency sub-band are extracted. Encryption is performed only on selected elements by scrambling them using 2D chaos map, namely Arnold Cat Map. Next, IDCT is applied to obtain the encrypted image. The encryption algorithm is included in lossy encryption. Experiments on both grayscale images and color images show that the images can be encrypted succesfully. Histograms of the encrypted images differ significantly from histogram of the original images, and the pixels in the encrypted images are not longer correlated.
Novel Area Optimization in FPGA Implementation Using Efficient VHDL Code Z Zulfikar
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (353.274 KB) | DOI: 10.17529/jre.v10i2.116

Abstract

A new novel method for area efficiency in FPGA implementation is presented. The method is realized through flexibility and wide capability of VHDL coding. This method exposes the arithmetic operations such as addition, subtraction and others. The design technique aim to reduce occupies area for multi stages circuits by selecting suitable range of all value involved in every step of calculations. Conventional and efficient VHDL coding methods are presented and the synthesis result is compared. The VHDL code which limits range of integer values is occupies less area than the one which is not. This VHDL coding method is suitable for multi stage circuits.
Analisis Propagasi Gelombang Radio Menggunakan DLink 624 pada Jurusan Teknik Elektro Universitas Syiah Kuala . Syahrial; Hubbul Walidaini; . Mulyadi
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (347.751 KB) | DOI: 10.17529/jre.v10i2.142

Abstract

Telecommunication technology nowadays tries to implement Personal Communication System (PCS) which has Personal Mobility (PM) and Terminal Mobility (TM). PCS can be define as radio technology that uses Radio Frequency (RF) as a transmission medium, which is small and light, and can be implemented indoor and outdoor. One equipment that implements this technology is called D-Link. The application of D-Link is to communicate among users either indoor or outdoor. Research methodology includes deciding the parameters and calculating the path loss between base station and portable station at the second floor of Electrical Engineering Department Syiah Kuala University. The final result was that the communication between the base station and portable station in the rooms at the second floor could exist but the process is rather slow and can experience discontinuity. Those were happenbecause the receiver’s power was below the threshold of the portable station level, i.e.. -40 dB.
Penggunaan Power of Ethernet untuk Mengalirkan Arus Listrik ke Hardware yang Terhubung dengan Kabel UTP Muhammad Safri Lubis; Mahdi Azis; Franheit Sangapta
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.286 KB) | DOI: 10.17529/jre.v10i2.131

Abstract

Development of a local area network (LAN) needs a network cable such as UTP twisted pair especially for connecting hardware like personal computer with CCTV. The connection should be on the basis of IP address which is connected with switch, and then the data eventually is sent to server. Generally, in the field, a hardware network has two main connection; first, connections to electricity for switching on the software by using an electricity cable which is suitable to the need of electrical capacity; second, connection to UTP twisted network for sending the data to the server. This process can be simplified by using network cable both for sending the data to server and for electrical pathway. Some pairs of network cable which are not used for sending data to server can be occupied to convey electrical wave to switch on and to operate the hardware. In order to use network cable for multiple purposes, it needs electrical configuration such as power of ethernet (PoE). The PoE is a system to utilize the UTP twisted pair cable to transmit unoccupied power for electrical pathway so that it can increase the efficiency of system.
Penggunaan Power of Ethernet untuk Mengalirkan Arus Listrik ke Hardware yang Terhubung dengan Kabel UTP Muhammad Safri Lubis; Mahdi Azis; Franheit Sangapta
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v10i2.131

Abstract

Development of a local area network (LAN) needs a network cable such as UTP twisted pair especially for connecting hardware like personal computer with CCTV. The connection should be on the basis of IP address which is connected with switch, and then the data eventually is sent to server. Generally, in the field, a hardware network has two main connection; first, connections to electricity for switching on the software by using an electricity cable which is suitable to the need of electrical capacity; second, connection to UTP twisted network for sending the data to the server. This process can be simplified by using network cable both for sending the data to server and for electrical pathway. Some pairs of network cable which are not used for sending data to server can be occupied to convey electrical wave to switch on and to operate the hardware. In order to use network cable for multiple purposes, it needs electrical configuration such as power of ethernet (PoE). The PoE is a system to utilize the UTP twisted pair cable to transmit unoccupied power for electrical pathway so that it can increase the efficiency of system.
Prototype Robot Pemadam Api Beroda Menggunakan Teknik Navigasi Wall Follower Ery Safrianti; Rahyul Amri; Septian Budiman
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v10i2.134

Abstract

Fire Robot serves to detect and extinguish the fire. The robot is controlled by the microcontroller ATMEGA8535 automatically. This robot contains of several sensors, such as 5 sets of ping parallax as a robot navigator, a set UVTron equipped with fire-detecting driver, DC motor driver L298 with two DC servo motors. The robot was developed from a prototype that has been studied previously with the addition on the hardware side of the sound activation and two sets of line detector. The robot will active if it receives input from the sound activation unit and will start to find the fire with “search the wall” navigation techniques. The line sensor was used as a door and home detector and circle the fire area.To extinguish the fire, this robot uses a fan driven by a BD139 transistor circuit. The overall test results show that the robot can detect the presence of the fire in each room. The robot also can find the fire and extinguish it within 1 minute.
Analisis Kontingensi Sistem Tenaga Listrik dengan Metode Bounding . Syafii; Nurul Rahmawati
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v10i2.139

Abstract

The bounding method is one of the contingency analysis method for detecting branch flow violations. Three subnetworks in the bounding method namely N1, N2, and N3 will give information regarding those subnetworks that may not go overload and those that may. This research compared the results from contingency analysis that has been done to the 30 bus system using the bounding method and software PowerWorld Simulator 15 GSO. The result by using the bounding method is 12 lines can go overload for the outage of line 1-2. As well as for the outage of line 1-3 and the outage of line 2-5. Meanwhile, the output of using PowerWorld Simulator 15 GSO with DC power flow method, there are three overloads exist for the outage of line 1-2, three overloads exist for the outage of line 1-3, and five overloads exist for the outage of line 2-5. The overload lines are included in the group of lines that can overload from bounding result.

Page 1 of 2 | Total Record : 14