cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN : 20893272     EISSN : -     DOI : -
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is a peer reviewed International Journal in English published four issues per year (March, June, September and December). The aim of Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the engineering of Telecommunication and Information Technology, Applied Computing & Computer, Instrumentation & Control, Electrical (Power), Electronics, and Informatics.
Arjuna Subject : -
Articles 22 Documents
Search results for , issue "Vol 11, No 2: June 2023" : 22 Documents clear
Generic Solution Architecture Design of Regulatory Technology (RegTech) Benny Firmansyah; Arry Akhmad Arman
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4533

Abstract

Regulatory Technology, or RegTech, uses new technology that assists the financial industry, such as FinTech and banks, in meeting regulatory compliance. RegTech automates various regulatory compliance activities that were previously manual, such as regulatory interpretation and regulatory reporting, amidst the challenges of the increasing volume of regulations and operational data. Some cutting-edge technologies discovered at RegTech include big data analytics, artificial intelligence, machine learning, robotic process automation, and cloud computing. Although very dominant in the financial industry, RegTech solutions have the potential to be applied in other regulated industries besides finance. Several studies have explored the potential for applying RegTech in industries other than finance, such as charitable organizations, real estate marketplace, pharmaceuticals, and healthcare. Therefore, this study aims to design a generic RegTech solution architecture so that it can be adopted and applied in various regulated industries achieve regulatory compliance more efficiently. Based on the evaluation results, the proposed architecture can be applied in an industrial environment other than financial to be considered generic. Furthermore, an evaluation of the comparison of regulatory compliance business processes without and by implementing RegTech can produce a time efficiency of 95.16%. These results show that RegTech solutions can achieve regulatory compliance more efficiently.
Hardware Security Module Cryptosystem Using Petri Net Billel Guechi; Mohammed Redjimi
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4264

Abstract

An embedded system is a combination of hardware and software designed to perform specific functions. It consists of SoCs (system on chip) that it relies on to do its computing work. A key feature of an embedded system is that it consumes less power and components occupy less space on the IC (integrated circuit) thus, the use of SoCs. Embedded system manufacturers get these SoCs from third-party companies to reduce their time to market. That would increase the possibility of the systems to be compromised. In this paper, we present a novel approach to securing such critical systems. For that, we made a Hardware Security Module (HSM), which consists of secure SoC with encrypt/decrypt engine that use Petri net for algorithm modulation to secure data flow. We ensure that the system uses genuine firmware and data is secured since we use encrypt/decrypt algorithms only known to manufacturers.
Handling Imbalanced Data through Re-sampling: Systematic Review Razan Eltayeb; Abdelrahman Elsharif Karrar; Waleed Ibrahim Osman; Moez Mutasim
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/.v11i2.4471

Abstract

Handling imbalanced data is an important issue that can affect the validity and reliability of the results. One common approach to addressing this issue is through re-sampling the data. Re-sampling is a technique that allows researchers to balance the class distribution of their dataset by either over-sampling the minority class or under-sampling the majority class. Over-sampling involves adding more copies of the minority class examples to the dataset in order to balance out the class distribution. On the other hand, under-sampling involves removing some of the majority class examples from the dataset in order to balance out the class distribution. It's also common to combine both techniques, usually called hybrid sampling. It is important to note that re-sampling techniques can have an impact on the model's performance, and it is essential to evaluate the model using different evaluation metrics and to consider other techniques such as cost-sensitive learning and anomaly detection. In addition, it is important to keep in mind that increasing the sample size is always a good idea to improve the performance of the model. In this systematic review, we aim to provide an overview of existing methods for re-sampling imbalanced data. We will focus on methods that have been proposed in the literature and evaluate their effectiveness through a thorough examination of experimental results. The goal of this review is to provide practitioners with a comprehensive understanding of the different re-sampling methods available, as well as their strengths and weaknesses, to help them make informed decisions when dealing with imbalanced data.
Dance Gesture Recognition Using Laban Movement Analysis with J48 Classification Joko Sutopo; Mohd Khanapi Abd Ghani; M. A. Burhanuddin; Aulia Nur Septiani; Tundo Tundo
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4314

Abstract

This study describes the introduction of classical dance movements using the Laban Movement Analysis (LMA) method which consists of 3 main components, namely Body, Space, and Shape. How to carry out the classical motion recognition process using Kinect which is then read by the screen using the Brekel Kinect and produces dance motion pictures in different formats (. * BVH). After that, it is calculated using the LMA method by obtaining the results obtained in the form of numerical data from each joint from the direction of the axis (xyz), then classification is carried out using the J48 classification method provided at WEKA tools after 50 training data is carried out. 96% truth is recognized, because it guarantees those who meet the requirements, 12 data tests are carried out apart from training data, which can be 92% accurate on average, so it is very possible that this method can be used in dance preparation, especially in classical dance.
Improved Sensor Fault-Tolerant Control Technique Applied to Three-Phase Induction Motor Drive Minh Chau Huu Nguyen; Cuong Dinh Tran
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4274

Abstract

An improved fault-tolerant control (FTC) method using mathematical functions is applied to the induction motor drive (IMD) against current sensors and speed encoder failures, which occur when the sensor is disconnected or completely damaged. The IMD with two current sensors and an encoder is speed controlled based on the field-oriented control (FOC) technique in regular operation. In this paper, an FTC unit is implemented in the FOC controller to detect and solve the sensor fault to increase the reliability of the speed control process. The measured stator currents and the feedback speed signal are integrated into the diagnosis algorithms to create a sensor fault-tolerant control function. Three diagnosis functions operating in a defined sequence are proposed for determining the health status of current and speed sensors. The FTC function performs isolation and replaces the faulty sensor signals with the proper estimated signals; then, the IMD will operate in the corresponding sensorless mode. Simulations will be performed to verify the accuracy and reliability of the proposed method under various sensor faults.
Cloud Computing Adoption in the South African Public Sector Bonginkosi Mkhatshwa; Tendani Mawela
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4464

Abstract

Scholars have touted a variety of benefits for adopting cloud computing solutions in the public sector. However, theĀ  adoption of cloud computing has been low in the South African (SA) government context. This study investigates the factors influencing cloud computing adoption within the SA public sector. The study adopted a case study approach. The research was informed by the Technological Organisational Environmental (TOE) and the Diffusion of Innovation (DOI) theoretical frameworks to understand the trajectory of cloud computing adoption. Primary data was collected using a questionnaire and semi-structured interviews with respondents from government departments. Additionally, secondary data from government Information Technology (IT) policies and strategic documents was analysed. The results highlighted that the enablers that are critical for cloud adoption include cloud computing policy, skills, IT infrastructure and financial support. The barriers that are hindering cloud adoption are related to security risks, network connection, cloud computing policy, costs and budget availability, among others. The identified benefits that may be realised through cloud adoption include enhanced service improvement, cost savings, high system availability, green IT, centralised and shared services and accessibility. The study proposes several guiding principles for cloud computing adoption in the public sector.
Unlocking Doors: A TinyML-Based Approach for Real-Time Face Mask Detection in Door Lock Systems Azzedine El Mrabet; Ayoub Tber; Mohamed Benaly; Laamari Hlou; Rachid El Gouri
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4756

Abstract

In response to the rapid spread of coronaviruses, including COVID-19 and seasonal common cold viruses, this article introduces a proposed system for enhancing door lock systems using TinyML technology for real-time face mask detection. The research project focuses on developing a machine learning model based on the YOLOv5 architecture to classify individuals based on their mask-wearing behavior correctly, incorrectly, or not at all in high-risk spaces prone to the transmission of coronaviruses, such as healthcare facilities, laboratories, and public settings. The study outlines the hardware and software tools utilized, including the Raspberry Pi 4, camera hardware, and the YOLOv5 machine learning model. The model is trained using a dataset containing three different classes and converted to a TFLite format for efficient implementation on the Raspberry Pi. Evaluation results demonstrate a mean Average Precision (mAP) of 0.99 and an inference rate of 10FPS for a 128-frame size input. This proposed system offers practical implications for enhancing door lock systems and promoting public health and safety during outbreaks of coronaviruses, including COVID-19 and other seasonal coronaviruses, providing a valuable approach to decrease the spread of these diseases and mitigate transmission risks in high-risk spaces, thereby contributing to the overall reduction of public health threats.
Optimal Control of Switched Capacitor Banks in Vietnam Distribution Network Using Integer Genetic Algorithm Thanh-Son Tran; Thu-Huyen Dang; Anh-Tung Tran
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4518

Abstract

In distribution network, power and energy losses can be reduced by using switched capacitor banks. The capacitor banks can be switched on or off based on voltage profile or power factor or using timers. Due to variation of load, it is necessary to control the capacitor banks switching in function of load curve. This paper presents the application of an integer genetic algorithm to determine the optimal number of banks corresponding with hourly load to minimize total active power losses of distribution feeders. The problem constraints include voltage profile and heat conditions which are taken into account to the objective function by a penalty function. In this application, the structure of chromosomes is a set of numbers of the capacitor banks hourly connected to the grid. The proposed formulation is validated by a feeder. The result shows that in some cases, the active power losses at maximum compensation are greater than the ones of optimal control compensation, and the voltage reaches a higher level than the maximum voltage limit. The optimal control of switched capacitor banks can reduce power and energy losses as well as ensure maximum voltage profile within the limit.
Smart System Side Slip Tester Results Accuracy Improvement Using Exponential Filter Arief Marwanto; Riky Maulana Firdaus; Muhammad Qomaruddin; Deshinta Arrova Dewi; Tri Basuki Kurniawan; Imam Much Ibnu Subroto
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.3576

Abstract

According to Article 6, Paragraph 1, of Law No. 55 of 2012 Concerning Cars, cars that are not roadworthy are particularly harmful for the safety of passengers and other road users. The front wheel ring, which has a significant impact on the safety of the motorized vehicle, is one of the technical requirements for roadworthiness. The front wheel pins make sure the car can go straight, which is related to the steering system's safety and has an impact on fuel economy. Through routine testing at the motor vehicle testing facility owned by the Transportation Service, the front wheel valve examination is performed using a front wheel blade test tool known as the Side Slip Tester. Previously, a lot of the automobile test equipment used at various test facilities was impractical and inaccurate. The construction of a smart system for evaluating wheel blades on cars is covered in this study, along with the implementation of an exponential filter to improve and lower the noise in sensor readings of ADC signals. By comparing the readings of the manufactured tool with a calibrated dial indicator, tests and calibrations are performed. The graph shows that the response to the input signal is quick and excellent for noise filtering, so based on the results of the exponential filter test, 0.2 is the ideal weight for the ADC reading filter. The 9 mm side slip bench shear test yields a maximum error result of 3% following tool calibration.
Malware Detection Approaches Based on Operation Codes (OpCodes) of Executable Programs: A Review Mohammed A. Saleh
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 11, No 2: June 2023
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v11i2.4454

Abstract

A malicious software, or Malware for a short, poses a threat to computer systems, which need to be analyzed, detected, and eliminated. Generally, malware is analyzed in two ways: dynamic malware analysis and static malware analysis. The former collects features dataset during running of the malware, and involves malware APIs, registry activities, file activities, process activities, and network activities based features. The latter collects features dataset prior and without running the malware, and involves Operational Codes (OpCodes) and text based (Bytecodes) features. However, several previous researchers addressed and reviewed malware detection approaches based on various aspects, but none of them addressed and reviewed the approaches merely based on malware OpCodes. Therefore, this paper aims to review Malware Detection Approaches based on OpCodes. The review explores, demonstrates, and compares the existing approaches for detecting malware according to their OpCodes only, and finally presents a comprehensive comparable envisage about them.

Page 2 of 3 | Total Record : 22