cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 6,800 Documents
A new methodology for technical losses estimation of radial distribution feeder Khairul Anwar Ibrahim; Mau Teng Au; Chin Kim Gan
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1126-1135

Abstract

Power distribution feeders is one of the key contributors of technical losses (TL) as it is typically large in numbers and scattered over large geographic areas. Traditional approach using classical formulation or time series load flow simulations to determine TL in each and every feeder and feeder sections in all distribution network require is an expensive exercise as it requires extensive modelling of the feeders and voluminous data. This paper presents a simple analytical approach to estimate monthly TL of a radial distribution feeder using analytical approach. TL for each feeder sections are evaluated on a monthly basis based on estimation of the load profile of the load points, peak power loss characteristics and loss factor. Total feeder TL are then estimated as the sum of all TL contributed by each feeder section. The developed models and procedure have been demonstrated through case studies performed on three (3) typical and representative feeders characterized by the different area served, number of feeder sections, load distribution and feeder length. The results shows close agreement (less than 5% differences) when compared with time series load flow simulations. With this model, the approach could be extended and applied to estimate TL of any radial distribution feeders of different configurations and characteristics
An Edge Exposure using Caliber Fuzzy C-means With Canny Algorithm Gowri Jeyaraman; Janakiraman Subbiah
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i1.pp59-68

Abstract

Edge exposure or edge detection is an important and classical study of the medical field and computer vision.  Caliber Fuzzy C-means (CFCM) clustering Algorithm for edge detection depends on the selection of initial cluster center value. This endeavor to put in order a collection of pixels into a cluster, such that a pixel within the cluster must be more comparable to every other pixel. Using CFCM techniques first cluster the BSDS image, next the clustered image is given as an input to the basic canny edge detection algorithm. The application of new parameters with fewer operations for CFCM is fruitful. According to the calculation, a result acquired by using CFCM clustering function divides the image into four clusters in common. The proposed method is evidently robust into the modification of fuzzy c-means and canny algorithm. The convergence of this algorithm is very speedy compare to the entire edge detection algorithms. The consequences of this proposed algorithm make enhanced edge detection and better result than any other traditional image edge detection techniques.
Multimodal verge for scale and pose variant real time face tracking and recognition Ramkumar Govindaraj; E. Logashanmugam
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i2.pp665-670

Abstract

In recent times face tracking and face recognition have turned out to be increasingly dynamic research field in image processing. This work proposed the framework DEtecting Contiguous Outliers in the LOw-rank Representation for face tracking, in this algorithm the background is assessed by a low-rank network and foreground articles can be distinguished as anomalies. This is suitable for non-rigid foreground motion and moving camera. The face of a foreground person is caught from the frame and then it is contrasted and the speculated pictures stored in the dataset. Here we used Viola-Jones algorithm for face recognition. This approach outperforms the traditional algorithms on multimodal video methodologies and it works adequately on extensive variety of security and surveillance purposes. Results on the continuous demonstrate that the proposed calculation can correctly obtain facial features points. The algorithm is relegate on the continuous camera input and under ongoing ecological conditions.
Yard Bay Allocation Method for Twin 40ft Container Terminal-Oriented Daofang Chang; Youfang Huang; Wei Yan; Yu Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The efficiency of container handling has got greatimprovement with the usage of the 40ft quay crane and the twin 40ft yardcrane.Reasonable bay planning strategies is necessary to reach the high handing efficiency by the twin 40ft yard crane. This paper studies both bay planning and row planning for yard bay allocation. The models of bay planning and row planning are created, and the discrete particle swarm optimization algorithm is used to obtain the optimum solution of the models. Finally, the numerical experiments show that the proposed approach can solve the yard bay allocation effectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3428  
Analysis on Seismic Response of UHV Electric Equipment-Support Structure System Cui Cheng-chen; Lu Zhi-cheng; Zhu Zhu-bing
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

  To analyze the influence of the equipment and support structure on the system seismic response, two-particle model for UHV electric equipment-support structure system was established. The seismic response of the system was calculated by mode-superposition response spectrum method. The case study on the typical 1000kV electric equipment-support structure system verified the availability of the two-particle model. Based on the structure characteristics of UHV equipment and support structure, the effect of support structure on the system seismic response was obtained by parametric analysis about stiffness and mass of support structure. It was showed that suitable support structure could reduce earthquake load of equipment and improve seismic resistance of system. Conclusions provide reference for the design of support structure. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1648
Model Identification of Traveling Wave Ultrasonic Motor Using Step Response Shi Jingzhuo; Zhang Caixia
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 9: September 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i9.pp6742-6749

Abstract

Ultrasonic motor’s model adapting to control application is the foundation of the motor’s high performance control. Ultrasonic motor’s frequency-speed control model gives a signification to improve speed control performance. This paper shows the design of stepping response experiments, and also explains the model identification of USM by the way of characteristic point method. Considering its time-varying characteristic, model parameters can be fitted using functions with the independent variable is frequency or speed. Consequently, non-linearity can reflect in speed control model appropriately.
Data cryptography based on musical notes on a fingerboard along with a dice Asis Kumar Tripathy; Tapan Kumar Das; Navaneethan C
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1286-1290

Abstract

The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.
RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security Meenakshi R. K; A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp709-711

Abstract

The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is designed by using RTL modeling and also the minimum numbers of logical elements are used for implementation. 
Design of Interference Measurement System with Crystal Shuyan Ren; Yonggang Yang; Hailong Duan
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: March 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A kind of interference measurement system with crystal is designed, which is not influenced much by other factors such as vibration for the property of common path. For the distance measurement, the phase of fringes is calculated on the oblique incident holography to avoid effects of fringe curvature, backup and light fluctuation. But the measurement result is affected by the uniformity of the crystal, and another method of adjusting position based on normal incident holography is also discussed. B-splines function is used to calculate zero position in normal incident holography, which is fitted over the patch image around gray extreme points of the stripes obtained by gray projection. Experiment results show that combining the normal and oblique incident holography reduce the repeatability error of the system and improve the measurement precision effectively. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2303
Battery charging and discharging control of a hybrid energy system using microcontroller Triyanto Pangaribowo; Wahyu Mulyo Utomo; Afarulrazi Abu Bakar; Deni Shidqi Khaerudini
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp575-582

Abstract

This study aims to control charging and discharging the battery for hybrid energy systems. The control system works by selecting the right energy source to supply voltage to the load. And also this control system can regulate charging and discharging the battery automatically. The voltage source consists of two energy, namely from the battery and DC source. The control system that has been designed has the ability to choose the right DC source when the battery capacity is less than 80%. This system also has a good ability to choose a battery source when the battery reaches 100% capacity and the DC source has a voltage drop of more than 20%. This control system is equipped with excessive electric current protection so that the security level is high.

Page 1 of 680 | Total Record : 6800


Filter by Year

2011 2022


Filter By Issues
All Issue Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue