cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 112 Documents
Search results for , issue "Vol 10, No 1: February 2020" : 112 Documents clear
A comparative study of three validities computation methods for multimodel approach Samia Talmoudi Ben Aoun; Abdennacer Ben Messaoud; Moufida Lahmari Ksouri
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.292 KB) | DOI: 10.11591/ijece.v10i1.pp881-890

Abstract

The multimodel approach offers a very satisfactory results in modelling, diagnose and control of complex systems. In the modelling case, this approach passes by three steps: the determination of the model’s library, the validities computation and the establishment of the final model. In this context, this paper focuses on the elaboration of a comparative study between three recent methods of validities computation. Thus, it highlight the method that offers the best performances in term of precision. To achieve this goal, we apply, these three methods on two simulation examples in order to compare their performances.
Optimal design of adaptive power scheduling using modified ant colony optimization algorithm Vijo M Joy; S. Krishnakumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.505 KB) | DOI: 10.11591/ijece.v10i1.pp738-745

Abstract

For generating and distributing an economic load scheduling approach, artificial neural network (ANN) has been introduced, because power generation and power consumption are economically non-identical. An efficient load scheduling method is suggested in this paper. Normally the power generation system fails due to its instability at peak load time. Traditionally, load shedding process is used in which low priority loads are disconnected from sources. The proposed method handles this problem by scheduling the load based on the power requirements. In many countries the power systems are facing limitations of energy. An efficient optimization algorithm is used to periodically schedule the load demand and the generation. Ant colony optimization (ACO) based ANN is used for this optimal load scheduling process. The present work analyse the technical economical and time-dependent limitations. Also the works meets the demanded load with minimum cost of energy. Inorder to train ANN back propagation (BP) technics is used. A hybrid training process is described in this work. Global optimization algorithms are used to provide back propagation with good initial connection weights.
Voltage collapse point evaluation considering the load dependence in a power system stability problem Zaid Garcia Sanchez; Jose Antonio González; Gustavo Crespo; Hernan Hernandez Herrera; Jorge Iván Silva
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (621.696 KB) | DOI: 10.11591/ijece.v10i1.pp61-71

Abstract

Voltage Stability has emerged in recent decades as one of the most common phenomena, occurrence in Electrical Power Systems. Prior researches focused on the development of algorithm indices to solve the stability problem and in the determination of factors with most influence in voltage collapse to solve the stability problem. This paper evaluates the influence that the load dependence has with the voltage on the phenomenon of the voltage stability and especially on the characteristics the collapse point or instability point. Load modeling used is detailed and comparisons of the results obtained are made with those described in the bibliography and those obtained with commercial software. The results of the load margin are also compared when a constant load or a voltage-dependent load is considered as well as the values obtained at the maximum load point and the point of voltage instability.
IoT–smart contracts in data trusted exchange supplied chain based on block chain S. Ganesh Kumar; A. Murugan; B. Muruganantham; B. Sriman
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (456.991 KB) | DOI: 10.11591/ijece.v10i1.pp438-446

Abstract

Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Analysis and implementation of the impact of change: application to heterogeneity algorithms in enterprise architecture Jihane Lakhrouit; Karim Baïna
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (996.413 KB) | DOI: 10.11591/ijece.v10i1.pp377-386

Abstract

Measurements play an important role in many scientific fields in general and intheanalysisofenterprisearchitectureinparticular.In software engineering, the measures are used to control the quality of the software product and better manage development projects to control the cost of production.In this article we proposed firstly models and measures to evaluate and analyze the complexity of the enterprise architecture and especially the heterogeneity of components and relationships, and secondely we developed a model to automatically detect the change of measures and their impact on enterprise architecture.
A survey of big data and machine learning Surender Reddy Salkuti
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (204.908 KB) | DOI: 10.11591/ijece.v10i1.pp575-580

Abstract

This paper presents a detailed analysis of big data and machine learning (ML) in the electrical power and energy sector. Big data analytics for smart energy operations, applications, impact, measurement and control, and challenges are presented in this paper. Big data and machine learning approaches need to be applied after analyzing the power system problem carefully. Determining the match between the strengths of big data and machine learning for solving the power system problem is of utmost important. They can be of great help to plan and operate the traditional grid/smart grid (SG). The basics of big data and machine learning are described in detailed manner along with their applications in various fields such as electrical power and energy, health care and life sciences, government, telecommunications, web and digital media, retailers, finance, e-commerce and customer service, etc. Finally, the challenges and opportunities of big data and machine learning are presented in this paper.
Parameter estimation of three-phase linear induction motor by a DSP-based electric-drives system Nicolás Toro García; Yeison Alberto Garcés Gómez; Fredy Edimer Hoyos Velasco
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (971.922 KB) | DOI: 10.11591/ijece.v10i1.pp626-636

Abstract

This work describes a method to characterize a three-phase linear induction motor in order to determine the various parameters used in its per-phase equivalent circuit by a DSP-based electric-drives system. In LIM (Linear Induction Motor), the air gap is very large compared with the RIMs (Rotary Induction Motors). Further, the secondary part normally does not have slotted structure. It is just made of aluminum and steel plates. Therefore, the effective air gap is larger than the physical air gap. High air gap makes a larger leakage inductance. It leads to lower efficiency and lower power factor. DC resistance test will be done to determine the value of Rs. The primary Inductance Ls will be calculated by running the LIM at synchronous speed. The secondary parameters i.e. Llr and Rr′ will be calculated by blocked-mover test. The experiment for no load test is shown and include a DC motor coupled to the LIM under test. Two methods to calculate the secondary parameters are described.
The conceptual model of information confrontation of virtual communities in social networking services Kateryna Molodetska; Yuriy Tymonin; Ihor Melnychuk
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.886 KB) | DOI: 10.11591/ijece.v10i1.pp1043-1052

Abstract

Social networking services are one of the most popular mass media and are used as an effective tool for information confrontation due to their functional characteristics. Existing models of information confrontation take into account the redistribution between conflict parties of only one kind of resource, although in the social networking services there is a need to consider additional factors that determine the effectiveness of virtual communities’ opposition. A conceptual model of information confrontation of virtual communities in social networking services has been developed, and it includes three-layer dynamics of the number of actors, growth of information resources of virtual communities and dynamics of spending resources for the confrontation conduct. The model also takes into account the peculiarities of the antagonistic conflict of virtual communities’ actors through the choice of a differential equation that corresponds to the type of its dynamics. The offered conceptual model formalizes the behavior of virtual communities’ actors in the conditions of antagonistic conflict. At the same time, it allows to investigate the peculiarities of using different strategies to carry out the information fight of virtual communities in social networking services, to choose optimal strategies, to predict the development of conflicts in the information space and to develop effective measures to counter threats to the state’s information security.
Security framework for cloud based electronic health record (EHR) system Raghavendra Ganiga; Radhika M. Pai; Manohara Pai M. M.; Rajesh Kumar Sinha
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (662.468 KB) | DOI: 10.11591/ijece.v10i1.pp455-466

Abstract

Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper charts have now become easier to organize and maintain, thereby increasing the efficiency of medical staff. The Electronic Health Records (EHR) System is becoming a high-tech medical management technology developed for the economic or emerging economic countries like India. In a national health system, the EHR integrates the Electronic Medical Records (EMR) in all collaborating hospitals through different networks. EHR gives healthcare professionals a way to share and manage patient data quickly and effectively. Due to the mass storage of confidential patient data, healthcare organizations are considered as one of the most targeted sectors by intruders. This paper proposes a security framework for EHR system, which takes into consideration the integrity, availability, and confidentiality of health records. The threats posed to the EHR system are modeled by STRIDE modeling tool, and the amount of risk is calculated using DREAD. The paper also suggests the security mechanism and countermeasures based on security standards, which can be utilized in an EHR environment. The paper shows that the utilization of the proposed methods effectively addresses security concerns such as breach of sensitive medical information.
Node clone detection using a stable overlay network Balika J. Chelliah; M. S. Antony Vigil; M. S. Bennet Praba
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (453.113 KB) | DOI: 10.11591/ijece.v10i1.pp316-322

Abstract

Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.

Page 11 of 12 | Total Record : 112


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue