cover
Contact Name
Elizar
Contact Email
jre@unsyiah.ac.id
Phone
+62651-7554336
Journal Mail Official
jre@unsyiah.ac.id
Editorial Address
Jurusan Teknik Elektro dan Komputer Gedung A2 Lt. 2 Fakultas Teknik Jalan Syech Abdul Rauf no. 7 Kopelma Darussalam 23111
Location
Kab. aceh besar,
Aceh
INDONESIA
Jurnal Rekayasa elektrika
ISSN : 14124785     EISSN : 2252620X     DOI : https://doi.org/10.17529/hre.v19i1.15128
The journal publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Electronics: Electronic Materials, Microelectronic System, Design and Implementation of Application Specific Integrated Circuits (ASIC), VLSI Design, System-on-a-Chip (SoC) and Electronic Instrumentation Using CAD Tools, digital signal & data Processing, , Biomedical Transducers and instrumentation, Medical Imaging Equipment and Techniques, Biomedical Imaging and Image Processing, Biomechanics and Rehabilitation Engineering, Biomaterials and Drug Delivery Systems; Electrical: Electrical Engineering Materials, Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements; Telecommunication: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network; Control: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modeling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems; Computer and Informatics: Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems. Signal and System: Detection, estimation and prediction for signals and systems, Pattern recognition and classification, Artificial intelligence and data analytics, Machine learning, Deep learning, Audio and speech signal processing, Image, video, and multimedia signal processing, Sensor signal processing, Biomedical signal processing and systems, Bio-inspired systems, Coding and compression, Cryptography, and information hiding
Articles 10 Documents
Search results for , issue "Vol 12, No 3 (2016)" : 10 Documents clear
Penerapan Deskriptor Warna Dominan untuk Temu Kembali Citra Busana pada Peranti Bergerak Yustina Dhyanti; Khairul Munadi; Fitri Arnia
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1062.094 KB) | DOI: 10.17529/jre.v12i3.5701

Abstract

Nowadays, clothes with various designs and color combinations are available for purchasing through an online shop, which is mostly equipped with keyword-based item retrieval. Here, the object in the online database is retrieved based on the keyword inputted by the potential buyers. The keyword-based search may bring potential customers on difficulties to describe the clothes they want to buy. This paper presents a new searching approach, using an image instead of text, as the query into an online shop. This method is known as content-based image retrieval (CBIR).  Particularly, we focused on using color as the feature in our Muslimah clothes image retrieval. The dominant color descriptor (DCD) extracts the wardrobe's color. Then, image matching is accomplished by calculating the Euclidean distance between the query and image in the database, and the last step is to evaluate the performance of the DWD by calculating precision and recall. To determine the performance of the DCD in extracting color features, the DCD is compared with another color descriptor, that is dominant color correlogram descriptor (DCCD). The values of precision and recall of DCD ranged from 0.7 to 0.9 while the precision and recall of DCCD ranged from 0.7 to 0.8. These results showed that the DCD produce a superior performance compared to DCCD in retrieving a set of clothing image, either plain or patterned colored clothes.
Sistem Proteksi Arus Bocor Menggunakan Earth Leakage Circuit Breaker Berbasis Arduino Syukriyadin Syukriyadin
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1299.959 KB) | DOI: 10.17529/jre.v12i3.5673

Abstract

Touching a live part of electrical equipment either intentionally or unintentionally can cause an electric shock. The touch can occur directly or indirectly and results in the flow of electric current through the human body to the ground. This electric current is known as the leakage current and can have fatal effects on the human body such as burns, cramps, faint and death. This paper aims to design a prototype protection model of the earth leakage circuit breaker device based on Arduino (ELCBA) to protect the human body from the electrical hazards. The performance of the ELCBA is investigated by detecting the earth leakage current to the grounding system (TN).  The prototype is designed and simulated by using Proteus software. Based on the response test carried out on the prototype, it can be concluded that the ELCBA can operate properly to disconnect the electric circuit if the leakage current is detected greater than or equal to 30 mA with a time delay of 15 ms and to reclose the circuit again after 5 minutes.
Analisa Masuknya Gardu Induk Anggrek dan Rekonfigurasi Jaringan Terhadap Kualitas Tegangan dan Rugi-rugi Daya (Studi Kasus PLN Rayon Kwandang Area Gorontalo) Muammar Zainuddin; Luthfi Wiraputra
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1114.654 KB) | DOI: 10.17529/jre.v12i3.4234

Abstract

The quality of the overhead distribution voltage with a length of ± 190,57 kms, in the North Gorontalo district has not met the National Standard for the distribution voltage yet. This causes a voltage drop along the distribution line at 21% during the peak load and the power loss at 219 kW. This paper aims to find the best solution for improving the voltage quality of the distribution line to meet the standard operation voltage for the medium distribution line. The Newton-Raphson method is used to analyze the power flowing along the distribution line and the voltage at their buses. There are three scenarios purposed in this study. The first scenario is to uprate the conductor size (in LK. 01 feeder), the second scenario is to reconfigure the distribution network after the Anggrek Substation was connected to the system and the third scenario is to combine the first and the second scenarios, i.e. uprating conductors and reconfiguring the network. From the three scenarios, the results show that the first scenario has a voltage drop of 19,8%,  the second scenario causes a voltage drop of 8,8% and the third scenario produces the voltage drop of  4,8%. Based on this results, it can be concluded that the third scenario can improve the line voltage much better than the other two scenarios with the power loss of up to 52,4 kW. The Entry of Anggrek Substation must accompany by conductor uprating in line distribution to reach limit voltage standard operation.
Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis) Yeni Yanti; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2303.152 KB) | DOI: 10.17529/jre.v12i3.3271

Abstract

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the file owner, designer, and manager of the information systems pay less attention to the security issues. One way to anticipate this is by using a cryptographic method, which is the science and art to keep the message security. This study aimed to evaluate the performance analysis and building a security system prototype of medical record files using the 4DES algorithm. The 4DES algorithm is a variant of the 3DES algorithm that is more robust and capable of protecting information properly. The 4DES security system has four keys; each key has a key length of 64 bits so that the total length of four keys is 256 bits and K1≠K2≠K3≠K4. The encrypted / decrypted files (Word, Excel, and Image)  using an external key of minimum eight characters (64 bits). During encryption, there was an addition of padding bytes in each of data block size to minimalized attack from the attacker using a CBC operation mode process. Results showed that the processing speed of the encrypted files using the 4DES was 1 second faster than that of using the 3DES algorithm. Also, the 4DES algorithm has superiority regarding of file safety, which has time enduring 3.45 x1056years longer to brute force attack technique which able to discover text file and the secret key.
Penerapan Metode Monte-Carlo untuk Analisis Toleransi Perubahan Nilai Komponen Terhadap Kinerja Osilator Frekuensi 2,3 GHz Teguh Firmansyah; Gunawan Wibisono
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2108.439 KB) | DOI: 10.17529/jre.v12i3.5564

Abstract

In telecommunications equipment, an oscillator has a function to generate a carrier signal. As the carrier signal, a high stability performance is required. The frequency shift caused by component tolerances. In this research, a Monte-Carlo method was used to analyze a component tolerance on the performance of the oscillator at a frequency 2.3 GHz. A simulation was performed by software Advance Design System (ADS). In this research, the iterations were carried out as many as 212 times with tolerance component values by 10%. The analyzed performance consists of a fundamental frequency shift, a phase noise, the value of power fundamental, and a harmonic power. Meanwhile, the oscillator has a structure of bias BJT common base-bias BFR183 with Vcc = 20 V, Vce = 8.2 V and Ic = 15 mA and a dielectric resonator as a resonator. The oscillator has a fundamental frequency 2.3 GHz, phase noise -135.6 dBc / Hz, power fundamental 10.8 dBm, and harmonic power -11.2 dBm. The simulation results showed that the oscillator has a good performance with a high degree of stability on a fundamental frequency by 73%, stability phase noise 100%, stability power fundamental 64%, and stability harmonic power 61%. This simulation has a confidence level of 95.4%, an error ± 3%, and the estimation accuracy 95%.
Penerapan Metode Monte-Carlo untuk Analisis Toleransi Perubahan Nilai Komponen Terhadap Kinerja Osilator Frekuensi 2,3 GHz Teguh Firmansyah; Gunawan Wibisono
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.5564

Abstract

In telecommunications equipment, an oscillator has a function to generate a carrier signal. As the carrier signal, a high stability performance is required. The frequency shift caused by component tolerances. In this research, a Monte-Carlo method was used to analyze a component tolerance on the performance of the oscillator at a frequency 2.3 GHz. A simulation was performed by software Advance Design System (ADS). In this research, the iterations were carried out as many as 212 times with tolerance component values by 10%. The analyzed performance consists of a fundamental frequency shift, a phase noise, the value of power fundamental, and a harmonic power. Meanwhile, the oscillator has a structure of bias BJT common base-bias BFR183 with Vcc = 20 V, Vce = 8.2 V and Ic = 15 mA and a dielectric resonator as a resonator. The oscillator has a fundamental frequency 2.3 GHz, phase noise -135.6 dBc / Hz, power fundamental 10.8 dBm, and harmonic power -11.2 dBm. The simulation results showed that the oscillator has a good performance with a high degree of stability on a fundamental frequency by 73%, stability phase noise 100%, stability power fundamental 64%, and stability harmonic power 61%. This simulation has a confidence level of 95.4%, an error ± 3%, and the estimation accuracy 95%.
Penerapan Deskriptor Warna Dominan untuk Temu Kembali Citra Busana pada Peranti Bergerak Yustina Dhyanti; Khairul Munadi; Fitri Arnia
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.5701

Abstract

Nowadays, clothes with various designs and color combinations are available for purchasing through an online shop, which is mostly equipped with keyword-based item retrieval. Here, the object in the online database is retrieved based on the keyword inputted by the potential buyers. The keyword-based search may bring potential customers on difficulties to describe the clothes they want to buy. This paper presents a new searching approach, using an image instead of text, as the query into an online shop. This method is known as content-based image retrieval (CBIR).  Particularly, we focused on using color as the feature in our Muslimah clothes image retrieval. The dominant color descriptor (DCD) extracts the wardrobe's color. Then, image matching is accomplished by calculating the Euclidean distance between the query and image in the database, and the last step is to evaluate the performance of the DWD by calculating precision and recall. To determine the performance of the DCD in extracting color features, the DCD is compared with another color descriptor, that is dominant color correlogram descriptor (DCCD). The values of precision and recall of DCD ranged from 0.7 to 0.9 while the precision and recall of DCCD ranged from 0.7 to 0.8. These results showed that the DCD produce a superior performance compared to DCCD in retrieving a set of clothing image, either plain or patterned colored clothes.
Sistem Proteksi Arus Bocor Menggunakan Earth Leakage Circuit Breaker Berbasis Arduino Syukriyadin Syukriyadin
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.5673

Abstract

Touching a live part of electrical equipment either intentionally or unintentionally can cause an electric shock. The touch can occur directly or indirectly and results in the flow of electric current through the human body to the ground. This electric current is known as the leakage current and can have fatal effects on the human body such as burns, cramps, faint and death. This paper aims to design a prototype protection model of the earth leakage circuit breaker device based on Arduino (ELCBA) to protect the human body from the electrical hazards. The performance of the ELCBA is investigated by detecting the earth leakage current to the grounding system (TN).  The prototype is designed and simulated by using Proteus software. Based on the response test carried out on the prototype, it can be concluded that the ELCBA can operate properly to disconnect the electric circuit if the leakage current is detected greater than or equal to 30 mA with a time delay of 15 ms and to reclose the circuit again after 5 minutes.
Analisa Masuknya Gardu Induk Anggrek dan Rekonfigurasi Jaringan Terhadap Kualitas Tegangan dan Rugi-rugi Daya (Studi Kasus PLN Rayon Kwandang Area Gorontalo) Muammar Zainuddin; Luthfi Wiraputra
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.4234

Abstract

The quality of the overhead distribution voltage with a length of ± 190,57 kms, in the North Gorontalo district has not met the National Standard for the distribution voltage yet. This causes a voltage drop along the distribution line at 21% during the peak load and the power loss at 219 kW. This paper aims to find the best solution for improving the voltage quality of the distribution line to meet the standard operation voltage for the medium distribution line. The Newton-Raphson method is used to analyze the power flowing along the distribution line and the voltage at their buses. There are three scenarios purposed in this study. The first scenario is to uprate the conductor size (in LK. 01 feeder), the second scenario is to reconfigure the distribution network after the Anggrek Substation was connected to the system and the third scenario is to combine the first and the second scenarios, i.e. uprating conductors and reconfiguring the network. From the three scenarios, the results show that the first scenario has a voltage drop of 19,8%,  the second scenario causes a voltage drop of 8,8% and the third scenario produces the voltage drop of  4,8%. Based on this results, it can be concluded that the third scenario can improve the line voltage much better than the other two scenarios with the power loss of up to 52,4 kW. The Entry of Anggrek Substation must accompany by conductor uprating in line distribution to reach limit voltage standard operation.
Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis) Yeni Yanti; Teuku Yuliar Arif; Rizal Munadi
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v12i3.3271

Abstract

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the file owner, designer, and manager of the information systems pay less attention to the security issues. One way to anticipate this is by using a cryptographic method, which is the science and art to keep the message security. This study aimed to evaluate the performance analysis and building a security system prototype of medical record files using the 4DES algorithm. The 4DES algorithm is a variant of the 3DES algorithm that is more robust and capable of protecting information properly. The 4DES security system has four keys; each key has a key length of 64 bits so that the total length of four keys is 256 bits and K1≠K2≠K3≠K4. The encrypted / decrypted files (Word, Excel, and Image)  using an external key of minimum eight characters (64 bits). During encryption, there was an addition of padding bytes in each of data block size to minimalized attack from the attacker using a CBC operation mode process. Results showed that the processing speed of the encrypted files using the 4DES was 1 second faster than that of using the 3DES algorithm. Also, the 4DES algorithm has superiority regarding of file safety, which has time enduring 3.45 x1056years longer to brute force attack technique which able to discover text file and the secret key.

Page 1 of 1 | Total Record : 10