cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN : 20893272     EISSN : -     DOI : -
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is a peer reviewed International Journal in English published four issues per year (March, June, September and December). The aim of Indonesian Journal of Electrical Engineering and Informatics (IJEEI) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the engineering of Telecommunication and Information Technology, Applied Computing & Computer, Instrumentation & Control, Electrical (Power), Electronics, and Informatics.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 4, No 3: September 2016" : 9 Documents clear
Notice of Retraction Privacy Preserving Similarity Based Text Retrieval through Blind Storage Pinki Kumari; S. Jancy
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v4i3.227

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting ijeei.iaes@gmail.com.-----------------------------------------------------------------------Cloud computing is improving rapidly due to their more advantage and more data owners give interest to outsource their data into cloud storage for centralize their data. As huge files stored in the cloud storage, there is need to implement the keyword based search process to data user. At the same time to protect the privacy of data, encryption techniques are used for sensitive data, that encryption is done before outsourcing data to cloud server. But it is critical to search results in encryption data. In this system we propose similarity text retrieval from the blind storage blocks with encryption format. This system provides more security because of blind storage system. In blind storage system data is stored randomly on cloud storage.  In Existing Data Owner cannot encrypt the document data as it was done only at server end. Everyone can access the data as there was no private key concept applied to maintained privacy of the data. But In our proposed system, Data Owner can encrypt the data himself using RSA algorithm.  RSA is a public key-cryptosystem and it is widely used for sensitive data storage over Internet. In our system we use Text mining process for identifying the index files of user documents. Before encryption we also use NLP (Nature Language Processing) technique to identify the keyword synonyms of data owner document. Here text mining process examines text word by word and collect literal meaning beyond the words group that composes the sentence. Those words are examined in API of word net so that only equivalent words can be identified for index file use. Our proposed system provides more secure and authorized way of recover the text in cloud storage with access control. Finally, our experimental result shows that our system is better than existing.
Optimized Aircraft Electric Control System Based on Adaptive Tabu Search Algorithm and Fuzzy Logic Control Saifullah Khalid
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1298.153 KB) | DOI: 10.52549/ijeei.v4i3.221

Abstract

Three conventional control constant instantaneous power control, sinusoidal current control, and synchronous reference frame techniques for extracting reference currents for shunt active power filters have been optimized using Fuzzy Logic control and Adaptive Tabu search Algorithm and their performances have been compared. Critical analysis of Comparison of the compensation ability of different control strategies based on THD and speed will be done, and suggestions will be given for the selection of technique to be used. The simulated results using MATLAB model are presented, and they will clearly prove the value of the proposed control method of aircraft shunt APF. The waveforms observed after the application of filter will be having the harmonics within the limits and the power quality will be improved.
Blackfish Optimization Algorithm for Solving Reactive Power Problem K. Lenin; B. Ravindhranath Reddy; M. Surya Kalavathi
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (135.41 KB) | DOI: 10.52549/ijeei.v4i3.222

Abstract

In this paper Blackfish Algorithm (BA) has been utilized to solve the optimal reactive power problem. BA is inspired from bubble net hunting strategy of the black fish. In this algorithm roulette wheel selection method has been used to improve the convergence rate. The proposed BA has been tested in standard IEEE 30 bus test system and simulation results show clearly about the better performance of the proposed algorithm in reducing the real power loss with control variables within the limits.
Notice of Retraction Intermittently Connected Cloudlet System to Obtain an Optimal Offloading Policy Nadim Akhtar; N. Srinivasan
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v4i3.226

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting ijeei.iaes@gmail.com.-----------------------------------------------------------------------The great potential has been shown over the performance enhancement for offloading the mobile devices within intensive parts of computation within mobile cloud application. The complete realization for the potential which being mismatch within the particular mobile devices on the resource computing demand and that provide an offer. The request over offloading is connecting the variable network where cloud services are always being in the required process within infrequent, variable connectivity of network and quick response time for relatively incurring the times for long setup and quanta for long time are may be indifferent for the connectivity of network. The requirement over the mobile application is needed more resources for executing the single device task within the fact of mobile devices enhanced capabilities. The problems have been addressed for several computation of offloading the remote cloud services and resources which is locating the computing resources in the cloudlets. The proposed concept is proposing an experimental approach for highlighting the tradeoff of offloading. The proposed architecture of the generic algorithm is performing an integration of mobile cloud computing for automatic offloading to improve the application response time when minimizing the consumption of energy for mobile device. Offloading task within a remote machine is not better than performing task particularly. The particular performance of the task is always better than remote machine. The proposed system is developing an algorithm of optimal offloading for mobile user which considering over the cloudlets availability and local load of user’s. The solution and formulation of the MDP (Markov Decision Process) model is for obtaining a policy to the user mobile and minimizing the objective of offloading cost and computation cost.
A Study on IP Network Recovery through Routing Protocols K. Karthik; T. Gunasekhar; D. Meenu; M. Anusha
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (81.313 KB) | DOI: 10.52549/ijeei.v4i3.223

Abstract

Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.
Notice of Retraction Anonymising the Sparse Dataset: A New Privacy Preservation Approach while Predicting Diseases V. Shyamala Susan; T. Christopher
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v4i3.229

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting ijeei.iaes@gmail.com.-----------------------------------------------------------------------Data mining techniques analyze the medical dataset with the intention of enhancing patient’s health and privacy. Most of the existing techniques are properly suited for low dimensional medical dataset. The proposed methodology designs a model for the representation of sparse high dimensional medical dataset with the attitude of protecting the patient’s privacy from an adversary and additionally to predict the disease’s threat degree. In a sparse data set many non-zero values are randomly spread in the entire data space. Hence, the challenge is to cluster the correlated patient’s record to predict the risk degree of the disease earlier than they occur in patients and to keep privacy. The first phase converts the sparse dataset right into a band matrix through the Genetic algorithm along with Cuckoo Search (GCS).This groups the correlated patient’s record together and arranges them close to the diagonal. The next segment dissociates the patient’s disease, which is a sensitive value (SA) with the parameters that determine the disease normally Quasi Identifier (QI).Finally, density based clustering technique is used over the underlying data to  create anonymized groups to maintain privacy and to predict the risk level of disease. Empirical assessments on actual health care data corresponding to V.A.Medical Centre heart disease dataset reveal the efficiency of this model pertaining to information loss, utility and privacy.
Notice of Retraction Simulation of Feedforward-Feedback Control of Dissolved Oxygen of Microbial Repeated Fed-batch Culture Ling Gao; Huibin Lin
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v4i3.233

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting ijeei.iaes@gmail.com.-----------------------------------------------------------------------Fed-batch culture is often used in industry, and dissolved oxygen (DO) concentration control is important in fermentation process control. DO control is often applied by using feedback (FB) control strategy. But, feedforward-feedback (FF-FB) control has the advantage in dealing with the time-varying characteristics resulted from the cell growth during the fermentation process. Mathematical modeling and computer simulation is a useful tool in analysis of the control system.  In this research, the FF-FB DO control and FB substrate control of repeated fed-batch culture process is modeled and simulated. The results showed the feasibility of the control strategy. These results are useful for control system development and process analyses and optimization.
A Secured Cloud Data Storage with Access Privilages Naresh Vurukonda; B.Thirumala Rao
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (120.731 KB) | DOI: 10.52549/ijeei.v4i3.231

Abstract

In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. A configuration and instrument FADE, and a safe overlay distributed storage framework that achieve fine-grained, strategy based methodology control and document guaranteed erasure. It partners outsourced records with document association approaches, and without a doubt erases records to make them unrecoverable to endless supply of document access arrangements, To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. By behavior broad true studies, and confirm that FADE gives security insurance to source information, while presenting just insignificant behavior and financial cost overhead. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration.
K Coverage Probability of 5G Wireless Cognitive Radio Network under Shadow Fading Effects Ankur S. Kang; Renu Vig
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 4, No 3: September 2016
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (458.81 KB) | DOI: 10.52549/ijeei.v4i3.235

Abstract

Land mobile communication is burdened with typical propagation constraints due to the channel characteristics in radio systems.Also,the propagation characteristics vary form place to place and also as the mobile unit moves,from time to time.Hence,the tramsmission path between transmitter and receiver varies from simple direct LOS to the one which is severely obstructed by buildings,foliage and terrain.Multipath propagation and shadow fading effects affect the signal strength of an arbitrary Transmitter-Receiver due to the rapid fluctuations in the phase and amplitude of signal which also determines the average power over an area of tens or hundreds of meters.Shadowing introduces additional fluctuations,so the received local mean power varies around the area –mean.The present section deals with the performance analysis of fifth generation wireless cognitive radio network on the basis of signal and interference level based k coverage probability under the shadow fading effects.

Page 1 of 1 | Total Record : 9