cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN : 20893272     EISSN : -     DOI : -
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is a peer reviewed International Journal in English published four issues per year (March, June, September and December). The aim of Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the engineering of Telecommunication and Information Technology, Applied Computing & Computer, Instrumentation & Control, Electrical (Power), Electronics, and Informatics.
Arjuna Subject : -
Articles 783 Documents
Leveraging Ensemble Learning Models for Human Activity Recognition Janaki, M.; Balakrishnan, Sarojini
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 1: March 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i1.6140

Abstract

This paper presents a novel method for categorizing human activities by processing sensor data obtained from IoT devices, focusing on improving accuracy. The proposed approach leverages an ensemble learning framework with majority voting, integrating hyperparameter-optimized classifiers to enhance predictive performance.The ensemble approach minimizes individual biases and errors, effectively handling the variability inherent in sensor data. Adequate preprocessing techniques refine data quality before feeding it into the model. A diverse set of base classifiers, such as KNN, Decision Tree, and Random Forests, are considered for classification. Hyperparameter-optimized KNN Grid Search, Gradient-Boosted Decision Trees, and Random Forests with Optimal Trees are ensembled. Extensive experiments were conducted on Human Activity Recognition datasets, WISDM, HAPT, HAR, and KU-HAR.The model performance was rigorously evaluated using classification metrics such as accuracy, precision, recall, and F1-score. Empirical results demonstrate that the proposed ensemble method significantly enhances classification accuracy. Future research will investigate applying deep learning techniques to capture complex feature interactions within sensor data better.
Dual Band Circular Polarized Design of Rectangular Microstrip Antenna For GPS L-band and Galileo E-band Applications Deshmukh, Amit A.; Page, Tejal P.; Chavali, Venkata A. P.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 1: March 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i1.6211

Abstract

Design of rectangular microstrip antenna employing three rectangular slots of unequal lengths on one of the patch edges, is presented to achieve dual band and dual sense circular polarized characteristics. Circular polarized response in the two bands is attributed to the optimum inter-spacing in between the rectangular patch’s TM10, TM11 and TM12 resonant modes. For axial ratio less than 3 dB, an optimum design offers axial ratio bandwidth of 26 MHz (2.05%) and 73 MHz (4.59%) in the dual bands, bearing frequency ratio of 1.25. This circular polarized bandwidth lies inside the VSWR < 2 bandwidth of 665 MHz (49.83%). Antenna offers radiation pattern maximum in the broadside direction across axial ratio and VSWR bandwidth, with a gain of more than 6 dBic. For the obtained antenna characteristics, the three rectangular slot cut design is suitable in variety of applications like, GPS L1 & L2 bands, and Galileo E1 & E6 bands. The experimental verification has been carried out for the proposed configuration that shows close agreement against the simulated results.
Systematic Literature Review: Security Challenges of IoT-based Smart Home Systems Ben-Nakhi, Abdullah Ali; Abd El-barr, Mostafa; Qureshi, Kalim Uddin
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 1: March 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i1.6103

Abstract

Internet of things has a wide range of applications such as healthcare, agriculture, transportation, and industrial manufacturing. Smart homes automation occupies a large segment of applications. Due to the proliferation of IoT-based smart homes systems, the attack vector on these devices expanded and became a target for attackers. Although these devices are improving constantly, security is still a challenge for them. The lack of security standardizations and hardware limitations resulted in a slow or lack of security practices in these devices. In this study, we conduct a systematic literature review to identify the exposed threats in the last five years in these devices and introduce novel countermeasures to mitigate the security issues. IEEE, ACM, Scopus, Science Direct, Springer, and MDPI databases were selected for the systematic review. The result of the systematic review were 731 articles collected. Based on reading the abstract, 605 articles were excluded, and 41 articles were excluded based on reading the full text. The result 70 articles were filtered using quality assessment criteria which resulted in 35 articles related to our search domain and answering the research questions. Additionally, a survey is conducted to elicit experts in the field knowledge to enhance our findings. We were able to identify 22 unique threats that endanger smart homes systems and the proposed countermeasures classified into 5 classes.
Trainer Kit for Aroma Classification Using Artificial Intelligence Istiyanto, Jazi Eko; Lelono, Danang; Natan, Oskar; Khamila, Shafa; Adhiyant, Hafizha; Abda’i, Ikhlasul Amal; Adzaqi, Ilyaz Raukhillah
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6146

Abstract

This research focused on the development and evaluation of machine learning algorithms for aroma classification using sensor data, implemented within the e-Trainose system. Various algorithms, including Neural Network, Support Vector Machines, and Random Forest, were tested to determine their effectiveness in distinguishing between different aroma samples, namely alcohol, coffee, and tea. The study utilized an array of metal oxide semiconductor sensors to capture the volatile organic compounds associated with each aroma. The features tested included sensor responses such as resistance changes and Gaussian smoothing of sensor data. Among the algorithms tested, Neural Network demonstrated the highest accuracy (98.89%), precision (99.10%), recall (99.10%), and F1 score (99.10%), making it the most reliable model for this task. These results highlight the potential of using machine learning with e-Trainose for real-time aroma detection and classification. The research paves the way for future advancements in the field, including the development of hybrid models and further optimization of sensor-based classification systems.
A New Fault Tolerant Scheme for Switch Failures in LLC Resonant Converter Lili, Xu; Hidayat, Muhamad Nabil; Nik Ali, Nik Hakimi; Umair, Muhamad
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6288

Abstract

The LLC (Inductance Inductance capacitance) resonant converter offers advantages such as high power density, high efficiency, and compact size, making it widely used in photovoltaic power generation systems. Its operational reliability is crucial for the continuous performance of these systems. However, complex operating conditions and variable climates can adversely affect power equipment. Switch fault diagnosis and remedial measures are essential aspects of designing isolated full-bridge DC-DC converters, significantly enhancing overall system reliability. When a switching component fails, the resonant converter cannot operate near its resonant point, leading to substantial reductions in efficiency and output power. To improve system fault tolerance and reduce maintenance costs, this paper proposes an improved LLC topology and a rapid switch short-circuit fault diagnosis method for phase-shift full-bridge converters. By real-time monitoring of the average voltage of the resonant capacitor, the method quickly identifies switch short-circuit faults within a single switching cycle, enabling topological control of faulty and redundant components. The modified topology ensures stable output voltage and power while allowing the converter to operate near the resonant frequency. The paper discusses the working principle, design considerations, and implementation of this approach. Simulation results verify the effectiveness of the proposed method.
Fractional Order Sliding Mode Control to Mitigate Power Quality Issues using Dynamic Voltage Restorer in Distribution Network Yaqub, Muhammad Haroon; Hanif, Aamir; Anwar, Naveed; Ullah, Mian Farhan; Shah, Muhammad Shahzaib; Hussein, Aziza I.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6031

Abstract

Power quality (PQ) issues lead industrial customers to suffer significant financial losses. These PQ issues are garnering more attention from electricity suppliers and consumers in the modern day. This study addresses prevalent PQ issues, namely voltage sag and swell, stemming from a decrease in RMS voltage within electrical networks, particularly impacting sensitive loads. The solution proposed involves employing a series connected custom power device (CPD) named as dynamic voltage restorer (DVR) with an integrated DC battery for energy storage, to consistently maintain the requisite voltage magnitude. To effectively combat voltage sag and swell, the study introduces a novel control strategy known as fractional order sliding mode control (FOSMC). Noteworthy features of the FOSMC methodology include its capacity to autonomously and dynamically address sag and swell issues. The Simscape toolbox of MATLAB®/Simulink® is used to perform simulations to showcase the efficacy of the FOSMC technique. The results demonstrate that this strategy ensures total harmonic distortion remains below 5% and achieves sag/swell mitigation in less than 2 milliseconds, aligning with SEMI-F-47 and IEEE voltage standard 1159-2019. In summary, the study introduces and validates a robust control strategy implemented in a DVR system to autonomously alleviate voltage sag and swell issues, with simulation results supporting its effectiveness in upholding PQ standards. The FOSMC scheme with DVR is also compared with FOSMC scheme with DSTATCOM as well as with super twisting sliding mode control (STSMC) algorithm and classical sliding mode controller (SMC) to show the effectiveness of the proposed scheme. The FOSMC technique with DVR is more effective in restoring voltage sag/swell and PQ issues.
Efficient Strategies for a Medium Voltage Loop Powered by an Infinite Source Mahmoud, Ethmane Isselem Arbih; Abbou, Ahmed; Mahmoud, Abdel Kader; Eida, Né Dah
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6114

Abstract

This paper analyzes and examines the potential of an infinite generation system to support the domestic load growth of the 33 kV loop network from 2025 to the year 2040. The study assesses the current state of the network, focusing on voltage levels, line loadings, and transformer capacities to ensure that all components operate within the system's allowable loading limits. It is assumed that the loop is powered by an infinite source. A numerical model, utilizing the Gauss-Seidel method, is developed and run using the PSS/E simulator and ETAP. The voltage profile is expected to remain within the range of 0.95 to 1.05 pu. An analysis of the simulation results demonstrates the potential for increasing active power transfer and controlling reactive power in the system by the year 2040.Furthermore, solutions are proposed to address identified critical issues in order to meet the projected demand. These include doubling the capacity of existing transformers and implementing protection against short-circuit currents. The proposed system is expected to provide industrial consumers with reduced load imbalances and improved control over voltage fluctuations caused by rapid changes in reactive power demand.
Deep Learning-Driven Intrusion Detection System for Distributed Denial of Service Mitigation ben Rhouma, Wala; Hayouni, Haythem
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6013

Abstract

DDoS attacks continue to pose a serious risk to digital infrastructures, as they can render online services inaccessible without altering system files or gaining direct control over the target. Traditional security mechanisms often fall short in identifying these attacks promptly due to their massive scale and the subtlety with which they blend into regular traffic. With the advancement of artificial intelligence, especially in the realm of deep learning, new solutions are emerging to enhance the detection and classification of such threats. In this work, we focus on strengthening Intrusion Detection Systems (IDS) by leveraging deep learning methods to improve accuracy and responsiveness in detecting DDoS attacks. Using the comprehensive CIC-DDoS-2019 dataset, we experimented with several deep learning architectures including Feedforward Neural Networks (MLP), Convolutional Neural Networks (CNN), and Recurrent models incorporating Long Short-Term Memory (LSTM). These models were evaluated for their ability to analyze complex traffic behaviors and identify malicious activity within diverse network environments. his study contributes to the ongoing research on intelligent cybersecurity solutions by proposing deep learning-based IDS frameworks that not only detect threats with higher accuracy but also adapt to dynamic attack patterns. Our findings suggest that such models can serve as a critical component in modern security infrastructures, offering scalable and resilient defense mechanisms against increasingly sophisticated cyberattacks like DDoS. Our empirical results demonstrate that the MLP model yielded the most reliable performance, achieving an outstanding classification precision of 99.62% across various traffic categories. This highlights its effectiveness in isolating harmful flows from legitimate ones, thereby reducing the risk of false alarms and improving detection reliability.
Closed-Form Solution for Energy Efficiency Maximization in Uplink IRS-Assisted Multi-User NOMA Network Meftah, El-Hadi; Benmahmoud, Slimane
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6209

Abstract

Given the growing concerns about energy consumption and its negative impact on the ecosystem, energy efficiency (EE) has become one of the most important key performance indicators in current and future wireless communication tech nologies. In this paper, we address the EE maximization problem in an uplink intelligent reflective surface (IRS)-assisted multi-user non-orthogonal multiple access (NOMA) network. This problem is formulated as a trade-off between the spectral efficiency (SE) and total power consumption, and it appears to be non convex. To avoid the complexity associated with the traditional iteration-based Dinkelbach method, we opt for an alternative closed-form solution for the users’ transmit power based on partial derivative analysis and Lambert function. Simulation results with a realistic power consumption models confirm the accuracy of our theoretical findings.
Mitigating Wormhole Attacks’ Risks within Wearable Body Network Goumidi, Mohammed Abdessamad; Zigh, Ehlem; Ali-Pacha, Adda Belkacem
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 2: June 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i2.6216

Abstract

In this research, we sought to develop a trust and secure routing protocol based on the Ad-hoc On-Demand Distance Vector (AODV) routing to combat wormhole attacks in Wearable Body Networks (WBNs), which integrates a routing strategy that leverages the path-checking method to detect and isolate paths affected by wormhole attacks effectively, it employs a routing technique that prioritizes nodes with the most heightened remaining energy during data transmission, along with a mixed cryptographic algorithm that combines the modified One Pad Time with the modified Affine ciphers to ensure safe transmission against malicious biosensor threats. Experimental findings indicate that our proposed protocol transcends the classic AODV routing protocol across all evaluation parameters, including packet delivery ratio, throughput, and energy consumption. Its primary advantage lies in considering multiple factors, like detecting unauthorized biomedical biosensors, efficient energy utilization in the network, and secure data transmission—differentiating it from other safe routing protocols. Moreover, the mixed encryption algorithm enhances efficacy and bolsters sensitive data security compared to classic cipher methods like the One Pad Time and Affine ciphers.