cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 112 Documents
Search results for , issue "Vol 10, No 1: February 2020" : 112 Documents clear
Powerplan : The alternative software for presentations at local area network using virtualtreeview and omnithread Daniel Silli Bataona; Rinaldi Munir; Tutun Juhana; Gloria Christiana Manulangga; Jemsrado Sine
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9.29 KB) | DOI: 10.11591/ijece.v10i1.pp947-961

Abstract

The need for LCD projectors is very urgent, so even though they often experience shortcomings, it is impossible to continue to make purchases when needed to repair LCD projectors that require high costs such as buying a new device. Software development from the results of this study is not only beneficial for educational institutions but also for personal or specific institutions and institutions who want to conduct seminars, presentations, or other activities that involve many audiences. The advantage is that the audience will not experience problems such as when using an LCD projector, such as limited visibility, location or space, and the viewpoint of the audience on the Projector LCD / Screen. Another contribution that can be given from this research is a model of the teaching and learning process in real-time without using an LCD and only using a PC/ Laptop connected to the same LAN. It is a development of research that supports the concept of green computing because it also reduces the use of equipment LCD projector, but the usage function remains the same even more effective and interactive even without the device. Presentation model like this is the development of new models in the learning process using LAN networks but without using the internet connection and is the cross-platform model. This research can be the answer to the need for using LCD projectors that often occur in the process of education, meetings, or seminars that continue to increase every time. Also, the lack of LCD compared to the number of teaching needs in each class and the unstable electricity conditions and the low electricity ratio in East Nusa Tenggara, have resulted in frequent blackouts suddenly, so that makes the device LCD vulnerable to damage. The test results showed an increase in RTT along with the increasing number of servers conducting presentation activities. Testing on LAN networks with the same number of clients on each test shows that there was an increase of 18% and 75% in each addition to the number of servers. The best performance of Powerplan is still shown when the number of servers that present several five, with the response time of each client connected under two seconds.
Multiple intrusion detection in RPL based networks Manjula C. Belavagi; Balachandra Muniyal
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.875 KB) | DOI: 10.11591/ijece.v10i1.pp467-476

Abstract

Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.
Software reusability development through NFL approach for identifying security based inner relationships of affecting factors T. Rajani Devi; B. Rama
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1078.561 KB) | DOI: 10.11591/ijece.v10i1.pp333-345

Abstract

In component based software reusability development process, the software developers have to choose the best components which are self adaptive future to overcome the functional errors, framework mismatches, violation of user level privacy issues and data leakage feasibilities. The software developers can build high quality software applications by taking the consideration of the reusable components which are more suitable to provide high level data security and privacy. This paper has proposing the neural based fuzzy framework based approach to estimate the reusable components which are directly and indirectly involve the security and privacy to improve the quality of the software system. This approach has considered the twenty effecting factors and fifty three attribute matrices. It has formed with three stages of execution scenarios. The first stage has executed with eleven effecting factors and eighteen attribute matrices for identification of supporting software reusability components, the second stage has executed with four effecting factors and thirty five attribute matrices for identification of sub-internal relationships in terms of security-privacy, and the third stage has executed with eight effecting factors and six attribute matrices for identification of sub of sub-internal relationships in terms of security risk estimation. This analytical finding proposes a fuzzy logic model to evaluate the most feasible effecting factors that influence the enterprise level data security-privacy practices at real time environment.
Impact of LCC–HVDC multiterminal on generator rotor angle stability Oluwafemi Emmanuel Oni; Andrew G. Swanson; Rudiren Pillay Carpanen
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1559.578 KB) | DOI: 10.11591/ijece.v10i1.pp22-34

Abstract

Multiterminal High Voltage Direct Current (HVDC) transmission utilizing Line Commutated Converter (LCC-HVDC) technology is on the increase in interconnecting a remote generating station to any urban centre via long distance DC lines. This Multiterminal-HVDC (MTDC) system offers a reduced right of way benefits, reduction in transmission losses, as well as robust power controllability with enhanced stability margin. However, utilizing the MTDC system in an AC network bring about a new area of associated fault analysis as well as the effect on the entire AC system during a transient fault condition. This paper analyses the fault current contribution of an MTDC system during transient fault to the rotor angle of a synchronous generator. The results show a high rotor angle swing during a transient fault and the effectiveness of fast power system stabilizer connected to the generator automatic voltage regulator in damping the system oscillations. The MTDC link improved the system performance by providing an alternative path of power transfer and quick system recovery during transient fault thus increasing the rate at which the system oscillations were damped out. This shows great improvement compared to when power was being transmitted via AC lines.
On tracking control problem for polysolenoid motor model predictive approach Nguyen Hong Quang; Nguyen Phung Quang; Do Trung Hai; Nguyen Nhu Hien
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (513.65 KB) | DOI: 10.11591/ijece.v10i1.pp849-855

Abstract

The Polysolenoid Linear Motor (PLM) have been playing a crucial role in many industrial aspects due to its functions, in which a straight motion is provided directly without mediate mechanical actuators. Recently, with several commons on mathematic model, some control methods for PLM based on Rotational Motor have been applied, but position, velocity and current constraints which are important in real systems have been ignored. In this paper, position tracking control problem for PLM was considered under state-independent disturbances via min-max model predictive control. The proposed controller forces tracking position errors converge to small region of origin and satisfies state including position, velocity and currents constraints. Further, a numerical simulation was implemented to validate the performance of the proposed controller.
Optimal parameters of inverter-based microgrid to improve transient response Sergio Andrés Pizarro Pérez; John E. Candelo-Becerra; Fredy E. Hoyos Velasco
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1979.267 KB) | DOI: 10.11591/ijece.v10i1.pp637-650

Abstract

The inertia issues in a microgrid can be improved by modifying the inverter control strategies to represent a virtual inertia simulation. This method employs the droop control strategy commonly used to share the power of a load among different power sources in the microgrid. This paper utilizes a modified droop control that represents this virtual inertia and applies an optimization algorithm to determine the optimal parameters and improve transient response. The results show better control when different variations are presented in the loads, leading the microgrid to have a better control of the operation. The optimization method applied in this research allows improvement to the transient response, thus avoiding unnecessary blackouts in the microgrid.
Assistant robot through deep learning Robinson Jiménez-Moreno; Javier Orlando Pinzón-Arenas; César Giovany Pachón-Suescún
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.575 KB) | DOI: 10.11591/ijece.v10i1.pp1053-1062

Abstract

This article presents a work oriented to assistive robotics, where a scenario is established for a robot to reach a tool in the hand of a user, when they have verbally requested it by his name. For this, three convolutional neural networks are trained, one for recognition of a group of tools, which obtained an accuracy of 98% identifying the tools established for the application, that are scalpel, screwdriver and scissors; one for speech recognition, trained with the names of the tools in Spanish language, where its validation accuracy reach a 97.5% in the recognition of the words; and another for recognition of the user's hand, taking in consideration the classification of 2 gestures: Open and Closed hand, where a 96.25% accuracy was achieved. With those networks, tests in real time are performed, presenting results in the delivery of each tool with a 100% of accuracy, i.e. the robot was able to identify correctly what the user requested, recognize correctly each tool and deliver the one need when the user opened their hand, taking an average time of 45 seconds in the execution of the application.
Hide text depending on the three channels of pixels in color images using the modified LSB algorithm Rusul Mohammed Neamah; Jinan Ali Abed; Elaf Ali Abbood
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (366.121 KB) | DOI: 10.11591/ijece.v10i1.pp809-815

Abstract

At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
Energy efficient intelligent routing in WSN using dominant genetic algorithm Shanthi D. L.
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (40.346 KB) | DOI: 10.11591/ijece.v10i1.pp500-511

Abstract

In the current era of wireless sensor network development, among the various challenging issues, the life enhancement has obtained the prime interest. Reason is clear and straight: the battery operated sensors do have limited period of life hence to keep the network active as much as possible, life of network should be larger. To enhance the life of the network, at different level different approaches has been applied, broadly defining the proper scheduling of sensors and defining the energy efficient communication. In this paper heuristic based energy efficient communication approch has applied. A new development in the Genetic algorithm has presented and called as Dominant Genetic algorithm to determine the optimum energy efficient routing path between sensor nodes and to define the optimal energy efficient trajectory for mobile data gathering node. Dominancy of high fitness solution has included in the Genetic algorithm because of its natural existence. The proposed solution has applied the connection oriented crossover and mutation operator to maintain the feasibility of generated solution. The proposed solution has applied with various simulation experiments under two different scenarios: in first case energy efficient routes among the sensors have explored to deliver the information from source sensor to the sink node and in second case, energy efficient route among all local data hubs for mobile data gathering node has obtained. The proposed solution performances have been analyzed quantitatively and analytically. It has observed with various experimental results that proposed method not only has delivered the better solution but also has faster convergence and high level of reliability in compared to conventional form of Genetic algorithm.
A time efficient and accurate retrieval of range aggregate queries using fuzzy clustering means (FCM) approach A. Murugan; D. Gobinath; S. Ganesh Kumar; B. Muruganantham; Sarubala Velusamy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (307.039 KB) | DOI: 10.11591/ijece.v10i1.pp415-420

Abstract

Massive growth in the big data makes difficult to analyse and retrieve the useful information from the set of available data’s. Statistical analysis: Existing approaches cannot guarantee an efficient retrieval of data from the database. In the existing work stratified sampling is used to partition the tables in terms of static variables. However k means clustering algorithm cannot guarantees an efficient retrieval where the choosing centroid in the large volume of data would be difficult. And less knowledge about the static variable might leads to the less efficient partitioning of tables. Findings: This problem is overcome in the proposed methodology by introducing the FCM clustering instead of k means clustering which can cluster the large volume of data which are similar in nature. Stratification problem is overcome by introducing the post stratification approach which will leads to efficient selection of static variable. Improvements: This methodology leads to an efficient retrieval process in terms of user query within less time and more accuracy.

Page 2 of 12 | Total Record : 112


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue