Jurnal Rekayasa elektrika
The journal publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Electronics: Electronic Materials, Microelectronic System, Design and Implementation of Application Specific Integrated Circuits (ASIC), VLSI Design, System-on-a-Chip (SoC) and Electronic Instrumentation Using CAD Tools, digital signal & data Processing, , Biomedical Transducers and instrumentation, Medical Imaging Equipment and Techniques, Biomedical Imaging and Image Processing, Biomechanics and Rehabilitation Engineering, Biomaterials and Drug Delivery Systems; Electrical: Electrical Engineering Materials, Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements; Telecommunication: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network; Control: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modeling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems; Computer and Informatics: Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems. Signal and System: Detection, estimation and prediction for signals and systems, Pattern recognition and classification, Artificial intelligence and data analytics, Machine learning, Deep learning, Audio and speech signal processing, Image, video, and multimedia signal processing, Sensor signal processing, Biomedical signal processing and systems, Bio-inspired systems, Coding and compression, Cryptography, and information hiding
Articles
600 Documents
Analisis Kontingensi Sistem Tenaga Listrik dengan Metode Bounding
. Syafii;
Nurul Rahmawati
Jurnal Rekayasa Elektrika Vol 10, No 2 (2012)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (432.332 KB)
|
DOI: 10.17529/jre.v10i2.139
The bounding method is one of the contingency analysis method for detecting branch flow violations. Three subnetworks in the bounding method namely N1, N2, and N3 will give information regarding those subnetworks that may not go overload and those that may. This research compared the results from contingency analysis that has been done to the 30 bus system using the bounding method and software PowerWorld Simulator 15 GSO. The result by using the bounding method is 12 lines can go overload for the outage of line 1-2. As well as for the outage of line 1-3 and the outage of line 2-5. Meanwhile, the output of using PowerWorld Simulator 15 GSO with DC power flow method, there are three overloads exist for the outage of line 1-2, three overloads exist for the outage of line 1-3, and five overloads exist for the outage of line 2-5. The overload lines are included in the group of lines that can overload from bounding result.
Desain Robot Holonomic berbasis Roda Mecanum dengan Arm Manipulator
Budi Bayu Murti;
Tirza Sarwono;
Esa Apriaskar;
Fahmizal Fahmizal
Jurnal Rekayasa Elektrika Vol 16, No 3 (2020)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2061.561 KB)
|
DOI: 10.17529/jre.v16i3.17365
Movement systems of a mobile robot in an industry generally use the concept of differential drive or ackerman steering. However, both methods tend to have low mobility. This paper proposes an industrial mobile robot design with a holonomic concept using mecanum wheels to maneuver in all directions with better mobility. As a commonly used robot in the industrial field, an arm manipulator is combined with a mobile robot. The mobile robot and arm manipulator's mechanical design is made using software inventor and utilizing acrylic as its base material. The electronic design of the robot is created using Eagle software. After the robot manufacturing is complete, then a user interface is made using the processing IDE. Several robot tests are conducted to ensure that the designed robot runs appropriately. From the functional test results, parts of the robot can run well. The smallest error obtained is 5 cm for the robot heading test, and the most significant error is 20 cm. The testing of a servo motor, which is the arm manipulator's primary actuator, showed the highest error of only 2 degrees. Besides, the gripper of the arm manipulator can also hold objects properly.
Rancang Bangun Smart Energy Meter Berbasis UNO dan Raspberry Pi
Agung Budi Muljono;
I Made Ari Nrartha;
I Made Ginarsa;
I Made Budi Suksmadana
Jurnal Rekayasa Elektrika Vol 14, No 1 (2018)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (4194.488 KB)
|
DOI: 10.17529/jre.v14i1.8718
Smart energy meter (SEM) is developed to the transparency goal of energy consumption by consumers for tariff strategy. The tariff strategy is designed based on the type of consumer load that per-kWh energy price difference for linear and nonlinear loads. Energy conscious awareness is built by displaying all load power consumption information from consumer loads such as voltage, current, power factor, load properties, load type, power, volt-ampere distortion, power factor distortion, THD, current and voltage waveforms, and harmonic frequency spectrum. The SEM is designed using ZMCT103C and ZMPT101B for current and voltage sensors, respectively. The SEM security function uses the SW420 vibrating sensor, open/close bolt sensor on the chasing and electronic lock. The results show that error measurement of the voltage sensor, current sensor, and power factor are 0.8%, 1.5%, and 1.0% respectively. The SEM security works well as the information on maintenance and criminal actions are informed on screen and buzzer sound for criminal acts. The tariff strategy for linear and nonlinear loads is used to calculate the energy cost per-kWh. The details of load energy consumption are stored in a database.
Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani
Rahmad Hidayat
Jurnal Rekayasa Elektrika Vol 11, No 3 (2015)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1250.902 KB)
|
DOI: 10.17529/jre.v11i3.2238
Bit-Plane Complexity Segmentation (BPCS) is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not) is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.
Substraksi Latar Menggunakan Nilai Mean Untuk Klasifikasi Kendaraan Bergerak Berbasis Deep Learning
Ilal Mahdi;
Kahlil Muchtar;
Fitri Arnia;
Tia Ernita
Jurnal Rekayasa Elektrika Vol 18, No 2 (2022)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1626.433 KB)
|
DOI: 10.17529/jre.v18i2.25224
Moving object detection systems have been widely used in everyday life. Currently, research in the field of background subtraction is still being carried out to achieve maximum accuracy results. This study aims to model the background subtraction of an image using the mean value with the concept of non-overlapping block. Furthermore, the background abstraction results will be used in deep learning-based moving object detection. Specifically, the input image will be divided into several blocks, then the mean value of each block will be calculated to later produce a binary block (binary map). The binary blocks that have been generated will be used as input for background modeling. The background model aims to separate moving objects from the background in the input image. The resulting moving object (object localization) will be sent to the object classification stage using deep learning. The dataset used in this study is CDNet 2014. The results of the study were able to produce a more accurate moving object detection system. Quantitative tests carried out resulted in an accuracy of above 90%.
Perancangan Struktur Kontrol Penggilingan Batubara pada Sistem Pembakaran Batubara
Stefanus Yudi Irwan;
Awang Noor Indra Wardana;
Ester Wijayanti
Jurnal Rekayasa Elektrika Vol 15, No 3 (2019)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1861.587 KB)
|
DOI: 10.17529/jre.v15i3.14605
The inability of the coal mill control structure to monitor and control pulverized coal flow causes operational and environmental problems. The research was done to design the new control structure for coal mill in coal firing system to achieve an improvement on control system performance compared to the existing control structure. Cascade control, blend station, and feedback control was used to control the flow of coal, the flow of primary air, and temperature of the pulverized coal. The result of the evaluation shows that the new control structure capable of fulfilling all the control objectives applied to it. Implementation of the new control structure capable to make the step response of the coal mill to have an average settling time at 161.75 seconds with 0% overshoot. The new control structure also capable to make the pulverized coal fineness at the range of 70% to 75% and moisture content at the range of 2.18% to 2.28%. The result of the evaluation makes the control performance of the new control structure is better than the previous coal mill control structure.
Sistem Proteksi Arus Bocor Menggunakan Earth Leakage Circuit Breaker Berbasis Arduino
Syukriyadin Syukriyadin
Jurnal Rekayasa Elektrika Vol 12, No 3 (2016)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1299.959 KB)
|
DOI: 10.17529/jre.v12i3.5673
Touching a live part of electrical equipment either intentionally or unintentionally can cause an electric shock. The touch can occur directly or indirectly and results in the flow of electric current through the human body to the ground. This electric current is known as the leakage current and can have fatal effects on the human body such as burns, cramps, faint and death. This paper aims to design a prototype protection model of the earth leakage circuit breaker device based on Arduino (ELCBA) to protect the human body from the electrical hazards. The performance of the ELCBA is investigated by detecting the earth leakage current to the grounding system (TN). The prototype is designed and simulated by using Proteus software. Based on the response test carried out on the prototype, it can be concluded that the ELCBA can operate properly to disconnect the electric circuit if the leakage current is detected greater than or equal to 30 mA with a time delay of 15 ms and to reclose the circuit again after 5 minutes.
Desain Sistem Kontrol Sudut Penyalaan ThyristorKomutasi Jaringan Berbasis Mikrokontroler PIC 16F877
Tarmizi Tarmizi
Jurnal Rekayasa Elektrika Vol 9, No 1 (2010)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1620.086 KB)
|
DOI: 10.17529/jre.v9i1.172
Thyristordigunakan untuk pengontrolan tegangan ac pada rangkaian penyearah terkendali dan rangkaian pengontrol tegangan ac karena dapat diatur tegangankeluaran dengan pengaturan sudut penyalaan dari sinyal trigger. Pada penelitian dihasilkan sebuah prototaip rangkaian kontrol sudut penyalaan Thyristor untuk aplikasi penyearah gelombang penuh satu fasa, tiga fasa dan rangkaian pengontrol tegangan ac satu.Rangkaian kontrol ini terdiri dari mikrokontroler PIC 16F877 dan rangkaian zero crossing detector yang menggunakan gerbang inverting. Desain diawali dengan simulasi menggunakan PSIM 6.0. sebagai referensi untuk rangkaian eksperimen. Sinyal triggerpada rangkaian penyearah terkendali satu fasa gelombang penuh, dan rangkaian pengontrol tegangan ac satu fasa sudut penyalaannya dapat diatur dari 0 derjat – 180 derjat. Sinyal triggerrangkaian penyearah terkendali tiga fasa gelombangpenuh sudut penyalaannya dapat diatur dari 0 derjat – 60 derjat. Hasil yang diperoleh melalui eksperimen ini sama dengan hasil simulasi.
Comparison of Neural Network Methods for Classification of Banana Varieties (Musa paradiasaca)
Zilvanhisna Emka Fitri;
Wildan Bakti Nugroho;
Abdul Madjid;
Arizal Mujibtamala Nanda Imron
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (411.849 KB)
|
DOI: 10.17529/jre.v17i2.20806
Every region in Indonesia has a very large diversity of banana species, but no system records information about the characteristics of banana varieties. The purpose of this research is to make an encyclopedia of banana types that can be used for learning by classifying banana varieties using banana images. This banana variety classification system uses image processing techniques and artificial neural network methods as classification methods.The varieties of bananas used are pisang merah, pisang pisang mas kirana, pisang klutuk, pisang raja and pisang cavendis. The parameters used are color features (Red, Green, and Blue) and shape features (area, perimeter, diameter, and length of fruit). The intelligent system used is the Backpropagation method and the Radial Basis Function Neural Network. The results showed that both methods were able to classify banana varieties with an accuracy rate of 98% for Backpropagation and 100% for the Radial Basis Function Neural Network.
Sistem Minimum Berbasis Mikrokontroler ATmega2560 sebagai Sistem Pengaman pada Analogi Lemari Penyimpanan Brankas
Muchammad Takdir Sholehati;
Arief Goeritno
Jurnal Rekayasa Elektrika Vol 14, No 3 (2018)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1026.601 KB)
|
DOI: 10.17529/jre.v14i3.11649
A minimum system based on ATmega2560 microcontroller has been created that functioned as a safety system in the analogy of the cupboard for storage of the safes. Making the minimum system is done through a number of phases, namely integrating the system, programming against the microcontroller system, and validation test in the form of system performance measurement through giving the forced state. System integration is in the form of installing a device on two lines in the input port and two lines in the output port of the microcontroller. Programming is based on algorithms and the syntax of Arduino IDE-based through 6 (six) stages, namely pins configuration, variable and constants declaration, initialization, main program, retrieved and send data, and output. The validation test is carried out in the form of 4 (four) conditions, namely a) when the RFID module is not detected, b) when the card is detected by the RFID module, c) when the door is opened, and the buzzer is "on", the card is not detected when tagged on the antenna, and d) when the door is forcibly opened, and the buzzer is "on", while the card is detected when tagged on the antenna. Maximizing the security against the door of analogy the cupboard for storage of the safes is detected by the limit switch condition when the door is opened forcefully and the buzzer sounds. For neutralizing conditions for buzzer conditions, it is done through tagging an RFID card through the antenna. The buzzer still sounds, if the blank data is unreadable by the RFID module, while the buzzer can be neutralized if the card was tagged, the data card stored is read by the RFID module.