cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 112 Documents
Search results for , issue "Vol 10, No 1: February 2020" : 112 Documents clear
Automated fundus image quality assessment and segmentation of optic disc using convolutional neural networks Bhargav Bhatkalkar; Abhishek Joshi; Srikanth Prabhu; Sulatha Bhandary
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (860.104 KB) | DOI: 10.11591/ijece.v10i1.pp816-827

Abstract

An automated fundus image analysis is used as a tool for the diagnosis of common retinal diseases. A good quality fundus image results in better diagnosis and hence discarding the degraded fundus images at the time of screening itself provides an opportunity to retake the adequate fundus photographs, which save both time and resources. In this paper, we propose a novel fundus image quality assessment (IQA) model using the convolutional neural network (CNN) based on the quality of optic disc (OD) visibility. We localize the OD by transfer learning with Inception v-3 model. Precise segmentation of OD is done using the GrabCut algorithm. Contour operations are applied to the segmented OD to approximate it to the nearest circle for finding its center and diameter. For training the model, we are using the publicly available fundus databases and a private hospital database. We have attained excellent classification accuracy for fundus IQA on DRIVE, CHASE-DB, and HRF databases. For the OD segmentation, we have experimented our method on DRINS-DB, DRISHTI-GS, and RIM-ONE v.3 databases and compared the results with existing state-of-the-art methods. Our proposed method outperforms existing methods for OD segmentation on Jaccard index and F-score metrics.
An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem Y. Kiran Kumar; R. Mahammad Shafi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (964.096 KB) | DOI: 10.11591/ijece.v10i1.pp530-537

Abstract

Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers.  Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud. 
Vertex markers: Modification of grid methods as markers to reproduce large size augmented reality objects to afford hands Wahyu Teja Kusuma; Ahmad Afif Supianto; Herman Tolle
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (696.742 KB) | DOI: 10.11591/ijece.v10i1.pp1063-1069

Abstract

The weakness of the research on developing Marker Based Augmented Reality applications found is using small digital content. Weakness is caused by the area of view of Augmented Reality cameras is limited by the placement of markers that are affordable to the user's hand. This study reproducing large digital objects by cutting large digital objects into many pieces. But to keep continuity accuracy between digital object pieces, this study aims to modify the grid method to become a vertex marker. Vertex marker is produced by removing the edge and using the vertex to place the marker. Vertex markers inherit the advantages of the Grid method. Therefore, vertex markers can be used to reproduce large digital objects accurately and can be reached by hand when displayed. The aim of this study is to measure the accuracy of the grid method that has been modified into a marker. The fundamental contributions and advantages of the vertex marker are innovations in the field of Marker Based Augmented Reality research.
Quantum cryptography for secured communication networks B. Muruganantham; P. Shamili; S. Ganesh Kumar; A. Murugan
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.042 KB) | DOI: 10.11591/ijece.v10i1.pp407-414

Abstract

Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Optimal design of symmetric switching CMOS inverter using symbiotic organisms search algorithm Nihad Dib; Umar Al-Sammarraie
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (805.672 KB) | DOI: 10.11591/ijece.v10i1.pp171-179

Abstract

This paper investigates the optimal design of symmetric switching CMOS inverter using the Symbiotic Organisms Search (SOS) algorithm. SOS has been recently proposed as an effective evolutionary global optimization method that is inspired by the symbiotic interaction strategies between different organisms in an ecosystem. In SOS, the three common types of symbiotic relationships (mutualism, commensalism, and parasitism) are modeled using simple expressions, which are used to find the global minimum of the fitness function. Unlike other optimization methods, SOS has no parameters to be tuned, which makes it an attractive and easy-to-implement optimization method. Here, SOS is used to design a high speed symmetric switching CMOS inverter, which is considered the most fundamental logic gate. SOS results are compared to those obtained using several optimization methods, like particle swarm optimization (PSO), genetic algorithm (GA), differential evolution (DE), and other ones, available in the literature. It is shown that the SOS is a robust straight-forward evolutionary algorithm that can compete with other well-known advanced methods.
A new partial image encryption method for document images using variance based quad tree decomposition C. R. Revanna; C. Keshavamurthy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1176.554 KB) | DOI: 10.11591/ijece.v10i1.pp786-800

Abstract

The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
Image steganography using least significant bit and secret map techniques Ashwaq Alabaichi; Maisa'a Abid Ali K. Al-Dabbas; Adnan Salih
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (612.474 KB) | DOI: 10.11591/ijece.v10i1.pp935-946

Abstract

In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Small-signal modeling of current-mode controlled modular DC-DC converters using the state-space algebraic approach Nuha M. Radaydeh; M. R. D. Al-Mothafar
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (719.57 KB) | DOI: 10.11591/ijece.v10i1.pp139-150

Abstract

Small-signal models are useful tools to preliminary understand the dynamics of interconnected systems like modular dc-dc converters which find a wide range of industrial applications. This work proposes a state-space-based averaged small-signal model in symbolic form for a peak current-mode controlled parallel-input/parallel-output buck converter operating in the continuous-conduction mode. In modeling the converter power-stage each module is independently represented. For modeling the current-mode control the state-space algebraic approach is used to incorporate the current-mode control-law into the power-stage equations. For each module two parasitic elements in addition to the current-loop sampling action are included in the derivation. Furthermore, the control-to-output voltage transfer functions are presented in symbolic form for two cases of interest: the first when the converter has two non-identical modules to study the effect of inductor mismatch, and the second when the converter is composed of n-connected identical modules to assess the effect of varying the number of modules. All responses from PSIM cycle-by-cycle simulations are in good agreement with the mathematical model predictions up to half the switching frequency.
Alienor method applied to induction machine parameters identification Latifa Khemici; M’hamed Bounekhla; Elghalia Boudissa
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.818 KB) | DOI: 10.11591/ijece.v10i1.pp223-232

Abstract

This paper presents an identification method to estimate simultaneously the electrical and mechanical induction machine (IM) parameters by using only the measured current and the corresponding phase voltage. This identification method is based on the output error and uses the multidimensional Alienor global optimization method as a minimization technique. Alienor method is essentially based on converting multivariable problem to monovariable one. To improve the Alienor method performance, the reducing transformation is proposed and compared with the genetic algorithm (GA). Firstly, the identification method is verified using the simulated data. Secondly, the validation is then confirmed by measured data from one machine. The corresponding computed transient and steady state currents agree well with the measured data. The results obtained show the superiority of the proposed Alienor method versus GA in terms of computing time.
Three-dimensional structure from motion recovery of a moving object with noisy measurement Zoubaida Mejri; Lilia Sidhom; Afef Abdelkrim
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1427.763 KB) | DOI: 10.11591/ijece.v10i1.pp117-128

Abstract

In this paper, a Nonlinear Unknown Input Observer (NLUIO) based approach is proposed for three-dimensional (3-D) structure from motion identification. Unlike the previous studies that require prior knowledge of either the motion parameters or scene geometry, the proposed approach assumes that the object motion is imperfectly known and considered as an unknown input to the perspective dynamical system. The reconstruction of the 3-D structure of the moving objects can be achieved using just two-dimensional (2-D) images of a monocular vision system. The proposed scheme is illustrated with a numerical example in the presence of measurement noise for both static and dynamic scenes. Those results are used to clearly demonstrate the advantages of the proposed NLUIO.

Page 9 of 12 | Total Record : 112


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue